Re: 3270 Software for Mac
what 3270 software do you use to connect to your mainframes? mark -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
EXCP access methos
Hi, Today, I was trying to have a DSORG=PS DASD dataset (output from ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where B8 means An OPEN was attempted against an extended-format data set with a DCB that specified EXCP. EXCP is not supported for extended-format data sets according to manul. Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per volume limit. However, I don't know that output file (DSORG=PS) from ADRDSSU is using EXCP access method and how do I know if a DASD dataset was proccessed by EXCP instead of QSAM access method?? Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the dataset was processed by EXCP access method?? Can anyone give me a hint? Thanks Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
Every access method uses Excp, every Excp uses STARTIO and every STARTIO uses SSCH. On 6/11/08, Paul Ip [EMAIL PROTECTED] wrote: Hi, Today, I was trying to have a DSORG=PS DASD dataset (output from ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where B8 means An OPEN was attempted against an extended-format data set with a DCB that specified EXCP. EXCP is not supported for extended-format data sets according to manul. Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per volume limit. However, I don't know that output file (DSORG=PS) from ADRDSSU is using EXCP access method and how do I know if a DASD dataset was proccessed by EXCP instead of QSAM access method?? Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the dataset was processed by EXCP access method?? Can anyone give me a hint? Thanks Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
Paul Ip wrote: [...] Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the dataset was processed by EXCP access method?? EXCP is low level access method, so DSORG is not a clue. In fact EXCP access method is a kind of general description for any untypical access methods and their possible untypical shortcomings. It can be no support for extfmt-PS, it can be limitation to first 64k tracks on volume (afaik it existed in Adabas), it can be geometry-dependance etc. etc. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2008 r. kapita zakadowy BRE Banku SA wynosi 118.642.672 zote i zosta w caoci wpacony. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
R.S. [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED]... Paul Ip wrote: [...] Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the dataset was processed by EXCP access method?? EXCP is low level access method, so DSORG is not a clue. In fact EXCP access method is a kind of general description for any untypical access methods and their possible untypical shortcomings. It can be no support for extfmt-PS, it can be limitation to first 64k tracks on volume (afaik it existed in Adabas), it can be geometry-dependance etc. etc. -- Radoslaw Skorupka At a higher level, the difference between EXCP and an Access Methods is that if 'you' do I/O with EXCP, 'you' build your own channel programs i.s.o. the Access Method, so 'you' must enhance your application to support extended format datasets, i.s.o. the Access Method. If you use an Access Method you can expect IBM to enhance the Access Method to support the new datasets. Kees. ** For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
On Wed, 11 Jun 2008 08:03:27 -0400, Bob Shannon wrote: In fact EXCP access method is a kind of general description for any untypical access methods and their possible untypical shortcomings. It can be no support for extfmt-PS, it can be limitation to first 64k tracks on volume (afaik it existed in Adabas), it can be geometry-dependance etc. etc. EXCP is a perfectly valid access method; it just requires more skill, and more detailed work, then using something such as QSAM. Regardless of the access method, CCWs are used to access data on a volume. This indicates that EXCP is used under the covers by the higher access methods. The only reason that EXCP cannot be used for extended format datasets or PDSEs is that IBM installed checks to prevent it. There is nothing inherent in EXCP itself that prevents it from being used for any data type. I'm naive here. I suspect many of my misconceptions will be promptly corrected. It's my understanding that for many decades EXCP has not executed channel programs in place and as provided by the caller. Rather, they are moved to protected storage so the user can not modify them on the fly; they are prefixed to prevent seeks to prohibited tracks; virtual addresses are translated to real; etc. I'd further expect changes to CCW architecture to accommodate XA and later 64-bit addressing and new I/O architecture. So the checks to prevent it may be a matter of IBM's resource allotment: rather than continually update EXCP code to all new hardware features, it's easier simply to prohibit use of EXCP for such purposes. It has always struck me as bizarre that the OS supports running channel programs built by problem-state programs. This is secure only if the channel programs are in effect interpreted rather than executed directly. A more rational layering of functions should have channel programs built only by trustworthy supervisor-state code. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
Thanks for the reply! In fact, my target is to overome the 65536 tracks limit on a volume for SMS Datasets, so there are two approaches for me: 1. Extended Format 2. DSNTYPE=LARGE At the beginning, I tried to apply Extended Format for all SMS datasets, if the dataset is an output of COBOL program, assigning Extended Format is ok (DSORG=PS-E). However, it is failed when I tried to apply the Extended Format for output of ADRDSSU DUMP... Form the RC IEC143I 213-B8, it said ...a DCB that specified EXCP... I should rephrase my question as: why the output of ADRDSSU DUMP can't be assigned with Extented Format? What is actually a DCB that specified EXCP means from IEC143I 213-B8 (I was wondering if it is talking about the dataset is under a dataset type of 'EXCP'...)? ...In addition, I don't know there is a dataset type called 'EXCP' until I found the following from DFDSSdss Storage Admin. Guide: DFSMSdss can copy, dump, and restore data sets of the following types: DATABASE 2(TM) (DB2?;) Direct access EXCP (execute channel program) Dataset Type = EXCP??? Partitioned, including: PDS (partitioned data set) PDSE (partitioned data set extended) HFS (hierarchical file system) data set Sequential, including extended-format data sets and Large Format data sets VSAM data sets that are cataloged in an ICF catalog, including: ESDS (entry-sequenced data set) KSDS (key-sequenced data set) KSDS with key ranges LDS (linear data set) RRDS (relative record data set) VRRDS (variable relative record data set) Extended-format ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS, KSDS, LDS, RRDS, and VRRDS Extended-addressable VSAM ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS, KSDS, LDS, RRDS, and VRRDS zFS (zSeries? file system) data set Unmovable data set types (PSU, POU, DAU, ABSTR, ISU, and direct with OPTCD=A). Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Paul Gilmartin Sent: Wednesday, June 11, 2008 8:26 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: EXCP access methos On Wed, 11 Jun 2008 08:03:27 -0400, Bob Shannon wrote: SNIP I'm naive here. I suspect many of my misconceptions will be promptly corrected. It's my understanding that for many decades EXCP has not executed channel programs in place and as provided by the caller. Rather, they are moved to protected storage so the user can not modify them on the fly; they are prefixed to prevent seeks to prohibited tracks; virtual addresses are translated to real; etc. I'd further expect changes to CCW architecture to accommodate XA and later 64-bit addressing and new I/O architecture. So the checks to prevent it may be a matter of IBM's resource allotment: rather than continually update EXCP code to all new hardware features, it's easier simply to prohibit use of EXCP for such purposes. It has always struck me as bizarre that the OS supports running channel programs built by problem-state programs. This is secure only if the channel programs are in effect interpreted rather than executed directly. A more rational layering of functions should have channel programs built only by trustworthy supervisor-state code. SNIP Ok, here goes from about the 10,000' level. You are basically correct when it comes to VM. If you are not a preferred guest, then expect ALL your CCWs to be interpreted. If you are a preferred guest, then you get dispatched with SIE (Start Interpretive Execution, or some equivalent in the IEF, Interpretive Execution Facility -- been gone from H/W for too long) where VM sets certain masks And so some or all of your CCWs will basically be run as written. NOW for the MVS world. The system will start your CCWs AFTER it has run its initial chain (by a TIC to your first CCW). Depending on the H/W (devices, controllers, channels, etc.) will determine which of the control CCWs will be executed to LIMIT what your CCW string is allowed to do (such as setting CYL LIMITS where you can't seek outside of those without getting your hand slapped). I'm sure that others will be able to take you down to the settings of the ORB, SCHIB, etc. should it be needed. Regards, Steve Thompson -- All opinions expressed by me are my own and may not necessarily reflect those of my employer. -- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
Paul Ip wrote: Hi, Today, I was trying to have a DSORG=PS DASD dataset (output from ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where B8 means An OPEN was attempted against an extended-format data set with a DCB that specified EXCP. EXCP is not supported for extended-format data sets according to manul. Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per volume limit. However, I don't know that output file (DSORG=PS) from ADRDSSU is using EXCP access method and how do I know if a DASD dataset was proccessed by EXCP instead of QSAM access method?? Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the dataset was processed by EXCP access method?? Can anyone give me a hint? Thanks Technically, you can never really be sure if EXCP was used for a supported data set. The gentleman's agreement used by z/OS applications is the specification of MACRF=E on the DCB at OPEN time. For EF data sets, that triggers the abend you are seeing. -- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318 [EMAIL PROTECTED] http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 3270 Software for Mac
Mark Wilson wrote: what 3270 software do you use to connect to your mainframes? BlueZone from seagullsoftware.com for serious work (supports graphics, 3290 partitions, and a few other fancies). Inexpensive for the provided features and support. Vista from Tom Brennan software. $30, doesn't support graphics nor partitions, but is easy and convenient to use, and a single user license is allows me to run it on all my machines. I tried x3270 and qws3270, but found them lacking. Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 3270 Software for Mac
On 11 Jun 2008 07:15:18 -0700, [EMAIL PROTECTED] (Gerhard Postpischil) wrote: what 3270 software do you use to connect to your mainframes? BlueZone from seagullsoftware.com for serious work (supports graphics, 3290 partitions, and a few other fancies). Inexpensive for the provided features and support. We use that for Windows - is there a Mac version as well? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methods
Paul, It is not the DSORG that has to support Extended Format, it is the ACCESS METHOD. The DSORG defines and extended format dataset, but the Access Method has to support IO to it. As far as I know QSAM and BSAM are the only Access Methods that support PS-E. Before converting to PS-E on a large scale you need to check for datasets that are being accessed by other Access Methods. You can find this in the Type 14 and 15 SMF records. If you have MXG this is a relatively simple exercise - sometimes the harder part is incorporating the results into your ACS logic. Also be aware that some utilities like DFSORT and SYNCSORT will automatically detect PS-E and use BSAM to process the files in place of EXCP. You don't have to exclude datasets just because you sort them. Ron -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Paul Ip Sent: Wednesday, June 11, 2008 6:51 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: [IBM-MAIN] EXCP access methos Thanks for the reply! In fact, my target is to overome the 65536 tracks limit on a volume for SMS Datasets, so there are two approaches for me: 1. Extended Format 2. DSNTYPE=LARGE At the beginning, I tried to apply Extended Format for all SMS datasets, if the dataset is an output of COBOL program, assigning Extended Format is ok (DSORG=PS-E). However, it is failed when I tried to apply the Extended Format for output of ADRDSSU DUMP... Form the RC IEC143I 213-B8, it said ...a DCB that specified EXCP... I should rephrase my question as: why the output of ADRDSSU DUMP can't be assigned with Extented Format? What is actually a DCB that specified EXCP means from IEC143I 213-B8 (I was wondering if it is talking about the dataset is under a dataset type of 'EXCP'...)? ...In addition, I don't know there is a dataset type called 'EXCP' until I found the following from DFDSSdss Storage Admin. Guide: DFSMSdss can copy, dump, and restore data sets of the following types: DATABASE 2(TM) (DB2?;) Direct access EXCP (execute channel program) Dataset Type = EXCP??? Partitioned, including: PDS (partitioned data set) PDSE (partitioned data set extended) HFS (hierarchical file system) data set Sequential, including extended-format data sets and Large Format data sets VSAM data sets that are cataloged in an ICF catalog, including: ESDS (entry-sequenced data set) KSDS (key-sequenced data set) KSDS with key ranges LDS (linear data set) RRDS (relative record data set) VRRDS (variable relative record data set) Extended-format ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS, KSDS, LDS, RRDS, and VRRDS Extended-addressable VSAM ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS, KSDS, LDS, RRDS, and VRRDS zFS (zSeries? file system) data set Unmovable data set types (PSU, POU, DAU, ABSTR, ISU, and direct with OPTCD=A). Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Moving RACF databases
Hi, I need to move RACF databases to another volume. From RACF System programmers manual I read chapter Recovery Procedures that could be useful, but I wonder if anybody of you guys has any other procedure that could be better. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methods
On Wed, 2008-06-11 at 07:26 -0700, Ron Hawkins wrote: Before converting to PS-E on a large scale you need to check for datasets that are being accessed by other Access Methods. Other problematic ones include: - ISPF recovery datasets - temporary datasets allocated by CA-ENF -- David Andrews A. Duda and Sons, Inc. [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 3270 Software for Mac
Seagull Software acquired by Rocket Software, Bluezone. Goes through a server providing encryption to the desktop. On Windows active x, other platforms java. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Mark Wilson Sent: Wednesday, June 11, 2008 1:13 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: 3270 Software for Mac what 3270 software do you use to connect to your mainframes? mark -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- NOTICE: This electronic mail message and any attached files are confidential. The information is exclusively for the use of the individual or entity intended as the recipient. If you are not the intended recipient, any use, copying, printing, reviewing, retention, disclosure, distribution or forwarding of the message or any attached file is not authorized and is strictly prohibited. If you have received this electronic mail message in error, please advise the sender by reply electronic mail immediately and permanently delete the original transmission, any attachments and any copies of this message from your computer system. Thank you. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 3270 Software for Mac
For Gerhard Postpischil Any problems with Bluezone graphics? Build v4.1C2 Build 838 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Mark Wilson Sent: Wednesday, June 11, 2008 1:13 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: 3270 Software for Mac what 3270 software do you use to connect to your mainframes? mark -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- NOTICE: This electronic mail message and any attached files are confidential. The information is exclusively for the use of the individual or entity intended as the recipient. If you are not the intended recipient, any use, copying, printing, reviewing, retention, disclosure, distribution or forwarding of the message or any attached file is not authorized and is strictly prohibited. If you have received this electronic mail message in error, please advise the sender by reply electronic mail immediately and permanently delete the original transmission, any attachments and any copies of this message from your computer system. Thank you. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
-snip- I'm naive here. I suspect many of my misconceptions will be promptly corrected. It's my understanding that for many decades EXCP has not executed channel programs in place and as provided by the caller. Rather, they are moved to protected storage so the user can not modify them on the fly; they are prefixed to prevent seeks to prohibited tracks; virtual addresses are translated to real; etc. I'd further expect changes to CCW architecture to accommodate XA and later 64-bit addressing and new I/O architecture. So the checks to prevent it may be a matter of IBM's resource allotment: rather than continually update EXCP code to all new hardware features, it's easier simply to prohibit use of EXCP for such purposes. -unsnip--- Don't forget adjustments made for non-contiguous real storage areas containing buffers, etc. (IDAW anyone?) :-) snip It has always struck me as bizarre that the OS supports running channel programs built by problem-state programs. This is secure only if the channel programs are in effect interpreted rather than executed directly. A more rational layering of functions should have channel programs built only by trustworthy supervisor-state code. --unsnip Makes perfect sense to me. Under OS/360, we didn't have the protection that CCW translation gives us today and it was incredibly easy to destroy part of the OS. But EXCP is much of the mechanism for developing support for new or exotic devices, like the old MCR/OCR gear that was so doggone timing-sensitive. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
--snip- Every access method uses Excp, every Excp uses STARTIO and every STARTIO uses SSCH. --unsnip--- IIRC, VSAM and the VSAM-like access methods use STARTIO directly. At least those AM's that are ACB/RPL based. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Moving RACF databases
The official supported method to move a RACF database is by using the utility IRRUT400. This utility provides the proper ENQ and locking mechanisms to prevent updates to the database while the copy is in progress. And, it's simple enough to use. However, if you can afford the downtime, and have a 2nd completely independent operating system image, the database can be moved using FDR/DFSMSdss and/or IEBGENER/ICEGENER/SYNCGENR. This is officially unsupported, but works, provided the databases are not in use (in any way) while the copy is in progress. My opinion, always use IRRUT400. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
In a message dated 6/11/2008 8:25:57 A.M. Central Daylight Time, [EMAIL PROTECTED] writes: It's my understanding that for many decades EXCP has not executed channel programs in place and as provided by the caller. Back in the days before paging systems, back when there was no virtual or real storage, back when storage was just called storage, EXCP would execute the channel program in place and as provided by the caller, but with extra CCWs in front of the caller's first CCW. These extra CCWs were added to insure data set integrity; i.e., the caller's channel program cannot go to any track that is not in the list of allocated extents created by OPEN. I don't remember for sure, but it was probably possible for a caller to have a read command executed with a storage address that would cause data being read to overlay storage that was outside his region, partition, or whatever the big chunk of storage was called. So you could clobber the operating system as well as other users' central storage with read commands. The various DASD access methods on these systems (OS/360, DOS/360, TOS/360, and BPS/360) were QSAM, BSAM, BPAM, BDAM, ISAM, and QISAM. They all used EXCP internally to do I/O requests, except for possibly ISAM which sometimes had a naked SIO instruction (or so I was told). I don't know very much about the other access methods for devices other than DASD and tape (e.g., TCAM, QTAM, and BTAM), but I would guess that they all also used EXCP internally. With the advent of virtual and real storage, IBM chose to require that the data addresses inside CCWs be interpreted by the I/O hardware as real addresses. Thus a scheme was needed to convert from virtual addresses to real addresses in order to make the transition to the new systems transparent to customers. The MVS architects decided to create a new I/O concept called IOS Driver which is a new layer of software that performs I/O requests without having to use EXCP. They also invented a new access method called STARTIO which replaced EXCP as the lowest possible level access method. The ancient DASD access methods, QSAM etc., still use EXCP, but EXCP was redesigned to interface between the callers of EXCP (ancient access methods), which present EXCP with channel programs containing virtual addresses, and the new lower level and thus intermediate, internal access method called STARTIO, which assumes that the channel program is in non-pageable storage, with real addresses of data, and which was built by a trusted software component. Many new functions in MVS were designed to use STARTIO directly themselves, such as the paging supervisor, while some new MVS components were designed to use EXCP, probably in order to get the new code written most quickly. JES2, e.g., originally used EXCP (I haven't dealt with JES2 internals now for 20+ years, so it may be different now), probably because JES2 was developed from HASP, which used EXCP, and that code was already well debugged, so why rewrite it? Rather, they are moved to protected storage so the user can not modify them on the fly Yes, unless you have EXCP appendages, but these must be loaded from an authorized library, so the customer can control their use. they are prefixed to prevent seeks to prohibited tracks; virtual addresses are translated to real; etc. I'd further expect changes to CCW architecture to accommodate XA and later 64-bit addressing and new I/O architecture. Correct on all counts. So the checks to prevent it may be a matter of IBM's resource allotment: rather than continually update EXCP code to all new hardware features, it's easier simply to prohibit use of EXCP for such purposes. I concur. Also IBM would like to encourage users to migrate all applications to the latest and greatest software and hardware solutions; namely, VSAM, DFSMS, ESS controllers, etc., so typically IBM adds support to strategic products and components first and then maybe, reluctantly and much later, to non-strategic components. They, too, have limited resources for developing new products and adding support for new products into other, older, products that must interface with the new products. It has always struck me as bizarre that the OS supports running channel programs built by problem-state programs. This is secure only if the channel programs are in effect interpreted rather than executed directly. A more rational layering of functions should have channel programs built only by trustworthy supervisor-state code. I don't know to what you are referring here by the OS. Problem-state programs in z/OS build channel programs which are then converted to safe, trusted equivalent channel programs by trusted software components before being started by IOS. In VM, CCWs are not interpreted as far as I know, but rather the channel program is scanned before being
Re: 3270 Software for Mac
On 11 Jun 2008 08:28:47 -0700, [EMAIL PROTECTED] (Mansell, George R.) wrote: Seagull Software acquired by Rocket Software, Bluezone. Goes through a server providing encryption to the desktop. On Windows active x, other platforms java. When we first got it, it only used Active-X. I was very glad when it added Java support. I have no idea why the company didn't go Java altogether, instead of checking browsers to decide whether to go Active-X or Java. Every time you run it, it creates an icon on the desktop that remembers what browser you used and assumes you are using it again. I recommend that people don't use that icon (I dislike stuff on my desktop anyway). To create a bookmark, I want them to use our first web site, not the one they get redirected to that uses Active-X or Java. It's a pain to set up that bookmark. I tried using it with Firefox for Macintosh, but it didn't work. That may be because of the web page deciding it doesn't work. We have some people trying to get the new version of Bluezone working so that we can support Vista machines. Meanwhile we have a lot of angry users who can't use BlueZone reliably nor our VPN. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: STK-SUN-Brocade switch--2032 IOdef
Hi Ron, You can contact me off-list at the email address: [EMAIL PROTECTED] Glenn Miller -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: STK-SUN-Brocade switch--2032 IOdef
thanks for looking at this...getting conflict msg's on this. trying again this weekend...better warm confort feeling someone else looking at it... fyi switch I am connecting to is a brocade 5000.. they say out of the box there is no confuration getting various info on that too...but another issue -- Email Disclaimer This E-mail contains confidential information belonging to the sender, which may be legally privileged information. This information is intended only for the use of the individual or entity addressed above. If you are not the intended recipient, or an employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any disclosure, copying, distribution, or the taking of any action in reliance on the contents of the E-mail or attached files is strictly prohibited. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Poll about telecommuting
Hello everybody, With gas prices up so much we thought we would host a poll about the state of telecommuting. It is available at CICS World: http://www.cicsworld.com/ Thanks. Corneel. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SSL Timeout
Well that didn't work. And I had the firewall guy check his settings. He specifically raised the time-out value on that port to 1 hour. No difference, 10 mins, connection dies - S622. I wonder if the TIMEMARK and the other setting can be changed via OBEY or if I need to restart the TN3270 server. On Mon, Jun 9, 2008 at 5:12 PM, Mark Pace [EMAIL PROTECTED] wrote: When I saw the defaults in the manual I thought so also. I've raised the time-out values to the default and I'm waiting on the person with the issue to report back to me. On Mon, Jun 9, 2008 at 4:52 PM, Mansell, George R. [EMAIL PROTECTED] wrote: Our firewall inactive timeout is 1 hour. When it happened it was nasty; Tcpip Vtam resources were not recovered. We have Tcpip inactive set to timeout just before the firewall does. Your 10 minutes sounds awfully short. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Mark Pace Sent: Monday, June 09, 2008 7:52 AM To: IBM-MAIN@BAMA.UA.EDU Subject: SSL Timeout Is there a parameter somewhere that will time-out an SSL connected TN3270 session? I've just converted our users from standard TN3270 sessions to SSL/TLS TN3270 sessions. All users are using PCOMM. After converting, one user has called me and says that he gets disconnected from the system after about 10 mins with a S622 (terminal error). Our TSO timeout in JWT is set to 1 hour. No other user was having this problem so I thought this was probably a coincidence since that user had tornadoes in his area and some damage to his home. So I had him revert to standard TELNET. 1 hour later he timed out with a S522 (TSO time-out value reached). I'm still convinced it's a network issue, but I don't have a leg to stand on. Anyone have an idea why a user might get disconnected when using SSL/TLS and not standard telnet? -- Mark Pace Mainline Information Systems -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- NOTICE: This electronic mail message and any attached files are confidential. The information is exclusively for the use of the individual or entity intended as the recipient. If you are not the intended recipient, any use, copying, printing, reviewing, retention, disclosure, distribution or forwarding of the message or any attached file is not authorized and is strictly prohibited. If you have received this electronic mail message in error, please advise the sender by reply electronic mail immediately and permanently delete the original transmission, any attachments and any copies of this message from your computer system. Thank you. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Mark Pace Mainline Information Systems -- Mark Pace Mainline Information Systems -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SSL Timeout
Obey. My settings: TelnetParms Port 23 CodePage ISO8859-1 IBM-1047 PrtInactive 0 INACTIVE 2400 TIMEMARK 900 SCANINTERVAL 900 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Mark Pace Sent: Wednesday, June 11, 2008 2:22 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: SSL Timeout Well that didn't work. And I had the firewall guy check his settings. He specifically raised the time-out value on that port to 1 hour. No difference, 10 mins, connection dies - S622. I wonder if the TIMEMARK and the other setting can be changed via OBEY or if I need to restart the TN3270 server. On Mon, Jun 9, 2008 at 5:12 PM, Mark Pace [EMAIL PROTECTED] wrote: When I saw the defaults in the manual I thought so also. I've raised the time-out values to the default and I'm waiting on the person with the issue to report back to me. On Mon, Jun 9, 2008 at 4:52 PM, Mansell, George R. [EMAIL PROTECTED] wrote: Our firewall inactive timeout is 1 hour. When it happened it was nasty; Tcpip Vtam resources were not recovered. We have Tcpip inactive set to timeout just before the firewall does. Your 10 minutes sounds awfully short. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Mark Pace Sent: Monday, June 09, 2008 7:52 AM To: IBM-MAIN@BAMA.UA.EDU Subject: SSL Timeout Is there a parameter somewhere that will time-out an SSL connected TN3270 session? I've just converted our users from standard TN3270 sessions to SSL/TLS TN3270 sessions. All users are using PCOMM. After converting, one user has called me and says that he gets disconnected from the system after about 10 mins with a S622 (terminal error). Our TSO timeout in JWT is set to 1 hour. No other user was having this problem so I thought this was probably a coincidence since that user had tornadoes in his area and some damage to his home. So I had him revert to standard TELNET. 1 hour later he timed out with a S522 (TSO time-out value reached). I'm still convinced it's a network issue, but I don't have a leg to stand on. Anyone have an idea why a user might get disconnected when using SSL/TLS and not standard telnet? -- Mark Pace Mainline Information Systems -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- NOTICE: This electronic mail message and any attached files are confidential. The information is exclusively for the use of the individual or entity intended as the recipient. If you are not the intended recipient, any use, copying, printing, reviewing, retention, disclosure, distribution or forwarding of the message or any attached file is not authorized and is strictly prohibited. If you have received this electronic mail message in error, please advise the sender by reply electronic mail immediately and permanently delete the original transmission, any attachments and any copies of this message from your computer system. Thank you. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Mark Pace Mainline Information Systems -- Mark Pace Mainline Information Systems -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
SMP/E: Using BUILDMCS to copy a product
Hi, All, We noticed that the XML Toolkit was not included in our z/OS 1.9 ServerPac, though we had to install it on 1.7 in order to install CICS TS 3.2 last summer. I ran a BUILDMCS job against the 1.7 target zone from the 1.9 LPAR, with SMPPUNCH allocated to SYSOUT just to see what it generates. It looks really clean, and the report shows the target and dlib zones are perfectly synchronized for the relevant FMIDs; i.e., nothing is APPLY-ed that is not also ACCEPTed. What should I expect if I RECEIVE, APPLY and ACCEPT the BUILDMCS output on 1.9? Will SMP/E attempt to do a full install of the product? Or just do the CSI stuff? TIA, -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
I don't remember for sure, but it was probably possible for a caller to have a read command executed with a storage address that would cause data being read to overlay storage that was outside his region, partition, or whatever the big chunk of storage was called. So you could clobber the operating system as well as other users' central storage with read commands. I don't think so. I remember writing code for OS/360 that, during early testing, incorrectly calculated a buffer size requirement. Sure enough, when a subsequent READ CCW tried to read into beyond the end of the GETMAINed area, a S0C4 was the result because the following storage was in Key0. (This may have been either MFT or MVT -- can't remember. I seem to remember that MVT was more robust in terms of storage keys for OS related control blocks, etc.) Date: Wed, 11 Jun 2008 11:51:26 -0400 From: [EMAIL PROTECTED] Subject: Re: EXCP access methos To: IBM-MAIN@BAMA.UA.EDU In a message dated 6/11/2008 8:25:57 A.M. Central Daylight Time, [EMAIL PROTECTED] writes: It's my understanding that for many decades EXCP has not executed channel programs in place and as provided by the caller. Back in the days before paging systems, back when there was no virtual or real storage, back when storage was just called storage, EXCP would execute the channel program in place and as provided by the caller, but with extra CCWs in front of the caller's first CCW. These extra CCWs were added to insure data set integrity; i.e., the caller's channel program cannot go to any track that is not in the list of allocated extents created by OPEN. I don't remember for sure, but it was probably possible for a caller to have a read command executed with a storage address that would cause data being read to overlay storage that was outside his region, partition, or whatever the big chunk of storage was called. So you could clobber the operating system as well as other users' central storage with read commands. The various DASD access methods on these systems (OS/360, DOS/360, TOS/360, and BPS/360) were QSAM, BSAM, BPAM, BDAM, ISAM, and QISAM. They all used EXCP internally to do I/O requests, except for possibly ISAM which sometimes had a naked SIO instruction (or so I was told). I don't know very much about the other access methods for devices other than DASD and tape (e.g., TCAM, QTAM, and BTAM), but I would guess that they all also used EXCP internally. With the advent of virtual and real storage, IBM chose to require that the data addresses inside CCWs be interpreted by the I/O hardware as real addresses. Thus a scheme was needed to convert from virtual addresses to real addresses in order to make the transition to the new systems transparent to customers. The MVS architects decided to create a new I/O concept called IOS Driver which is a new layer of software that performs I/O requests without having to use EXCP. They also invented a new access method called STARTIO which replaced EXCP as the lowest possible level access method. The ancient DASD access methods, QSAM etc., still use EXCP, but EXCP was redesigned to interface between the callers of EXCP (ancient access methods), which present EXCP with channel programs containing virtual addresses, and the new lower level and thus intermediate, internal access method called STARTIO, which assumes that the channel program is in non-pageable storage, with real addresses of data, and which was built by a trusted software component. Many new functions in MVS were designed to use STARTIO directly themselves, such as the paging supervisor, while some new MVS components were designed to use EXCP, probably in order to get the new code written most quickly. JES2, e.g., originally used EXCP (I haven't dealt with JES2 internals now for 20+ years, so it may be different now), probably because JES2 was developed from HASP, which used EXCP, and that code was already well debugged, so why rewrite it? Rather, they are moved to protected storage so the user can not modify them on the fly Yes, unless you have EXCP appendages, but these must be loaded from an authorized library, so the customer can control their use. they are prefixed to prevent seeks to prohibited tracks; virtual addresses are translated to real; etc. I'd further expect changes to CCW architecture to accommodate XA and later 64-bit addressing and new I/O architecture. Correct on all counts. So the checks to prevent it may be a matter of IBM's resource allotment: rather than continually update EXCP code to all new hardware features, it's easier simply to prohibit use of EXCP for such purposes. I concur. Also IBM would like to encourage users to migrate all applications to the latest and greatest software and hardware solutions; namely, VSAM, DFSMS, ESS controllers, etc., so typically IBM adds support to
Re: SMP/E: Using BUILDMCS to copy a product
John, SMP/E will do a full install of the product, at the level the XML toolkit was when the BuildMCS was run on your target zone. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Chase, John Sent: Wednesday, June 11, 2008 10:55 PM To: IBM-MAIN@BAMA.UA.EDU Subject: SMP/E: Using BUILDMCS to copy a product Hi, All, We noticed that the XML Toolkit was not included in our z/OS 1.9 ServerPac, though we had to install it on 1.7 in order to install CICS TS 3.2 last summer. I ran a BUILDMCS job against the 1.7 target zone from the 1.9 LPAR, with SMPPUNCH allocated to SYSOUT just to see what it generates. It looks really clean, and the report shows the target and dlib zones are perfectly synchronized for the relevant FMIDs; i.e., nothing is APPLY-ed that is not also ACCEPTed. What should I expect if I RECEIVE, APPLY and ACCEPT the BUILDMCS output on 1.9? Will SMP/E attempt to do a full install of the product? Or just do the CSI stuff? TIA, -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html _ Standard Bank email Disclaimer and confidentiality note This e-mail, its attachments and any rights attaching hereto are, unless the content clearly indicates otherwise, the property of Standard Bank Group Limited and its subsidiaries. It is confidential, private and intended for only the addressee. Should you not be the addressee and receive this e-mail by mistake, kindly notify the sender, and delete this e-mail immediately. Do not disclose or use it in any way. Views and opinions expressed in this e-mail are those of the sender unless clearly stated as those of Standard Bank Group. Standard Bank Group accepts no liability for any loss or damages howsoever incurred, or suffered, resulting, or arising, from the use of this email or its attachments. Standard Bank Group does not warrant the integrity of this e-mail nor that it is free of errors, viruses, interception or interference. Licensed divisions of the Standard Bank Group are authorised financial services providers in terms of the Financial Advisory and Intermediary Services Act, No 37 of 2002 (FAIS). For information about the Standard Bank Group visit our website http://www.standardbank.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
(IBM Mainframe Discussion List) wrote: Back in the days before paging systems, back when there was no virtual or real storage, back when storage was just called storage, EXCP would execute You had storage? All of our programmers had core, and persisted in that usage even into the late seventies. remember for sure, but it was probably possible for a caller to have a read command executed with a storage address that would cause data being read to overlay storage that was outside his region, partition, or whatever the big chunk of Potential storage overlays were controlled by protect keys, providing the hardware supported them and the operating system set them correctly. In PCP all of storage was fair game, in MFT and MVT it was harder (there were a couple of loopholes in SVC parameter validity checking that IBM fixed eventually). I do remember clobbering storage in MVT reading a 2314 sized track buffer from a 3330, and lucking out with an add-on memory whose protection capability had not been configured correctly. Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 3270 Software for Mac
Mansell, George R. wrote: For Gerhard Postpischil Any problems with Bluezone graphics? Build v4.1C2 Build 838 I've only tested single and triple plane graphics, and explicit partitions, and that for debugging, not for production use. The main problem I found is that the configuration process uses the initial buffer size as the maximum, so you can't switch to a larger partition size later on. So for funny sizes you must define the largest one ever used for start-up. Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
The following message is a courtesy copy of an article that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well. [EMAIL PROTECTED] (, IBM Mainframe Discussion List) writes: In VM, CCWs are not interpreted as far as I know, but rather the channel program is scanned before being executed in order to determine how to let it run safely on its own. The only way I can think of to execute a channel program interpretively is to do a separate I/O request for each CCW in the channel program (of course, with the necessary CCWs in front of it for it to work correctly). Then if a CCW reads data, the data would be read somewhere that VM could trust, and then move that data into the caller's buffer. This is similar to how interpretive machine instruction is handled. But the overhead in interpreting channel programs would be prohibitive, I believe, so they are not really interpreted. They are first made safe with the proper CCWs in front of those supplied by the problem-state caller and then allowed to run on their own. CCWTRANS was the CP67 routine that created a shadow copy of virtual machine channel program. channels run with real data transfer addresses. virtual machine (and VS system application EXCP ) channel programs have virtual address. CCWTRANS scanned the virtual machine channel program ... creating a shadow copy of the virtual machine channel program ... fetching/fixing the related virtual addresses ... and replacing the virtual addresses with real addresses. The original translation of os/360 to virtual storage operation included crafting a copy of (cp67's) CCWTRANS into the side of VS2 ... to perform the equivalent function of EXCP channel programs (whether application or access methods). VS2 (SVS then MVS) has had the same problem with access methods (and other applications) creating channel programs with virtual addresses ... and then issuing EXCP. At that point, EXCP processing has the same problem as virtual machine emulation ... translating channel programs built with virtual addresses into shadow copy that has real addresses. EXCPVR was introduced to indicate that a channel program with real addresses was being used (rather than traditional EXCP channel program). A discussion of EXCPVR: http://publib.boulder.ibm.com/infocenter/zos/v1r9/topic/com.ibm.zos.r9.idas300/efcprs.htm#efcprs disk seek channel commands ... for virtual machine non-full-pack minidisks would have also result in a shadow made of the seek argument ... adjusting it as appropriate (i.e. a minidisk could be for 30 cyls starting at real cylinder 100 ... the shadow would have cylinder numbers adjusted by 100 ... unless it attempted to access more than 30 cyls ... which would result in shadow being adjusted to an invalid cylinder number). OS360 used 3 channel command prefix ... SEEK, followed by set file mask command and then TIC (transferred) to the channel program referenced by EXCP (didn't need to scan/translate the passed channel program ... just position the arm and then prevent the passed channel program from moving the arm again. There was a version of CP67 that was converted to run on 370s (CP67-I system) ... which was used extensively inside IBM pending availability of VM370 product. In the morph of CP67 to VM370 product, the CCWTRANS channel program translation routine became DMKCCW. past posts mentioning VS2 effort started out by crafting cp67 CCWTRANS to get channel program translation for EXCP: http://www.garlic.com/~lynn/2000.html#68 Mainframe operating systems http://www.garlic.com/~lynn/2000c.html#34 What level of computer is needed for a computer to Love? http://www.garlic.com/~lynn/2001i.html#37 IBM OS Timeline? http://www.garlic.com/~lynn/2001i.html#38 IBM OS Timeline? http://www.garlic.com/~lynn/2001l.html#36 History http://www.garlic.com/~lynn/2002c.html#39 VAX, M68K complex instructions (was Re: Did Intel Bite Off More Than It Can Chew?) http://www.garlic.com/~lynn/2002j.html#70 hone acronym (cross post) http://www.garlic.com/~lynn/2002l.html#65 The problem with installable operating systems http://www.garlic.com/~lynn/2002l.html#67 The problem with installable operating systems http://www.garlic.com/~lynn/2002n.html#62 PLX http://www.garlic.com/~lynn/2003b.html#0 Disk drives as commodities. Was Re: Yamhill http://www.garlic.com/~lynn/2003g.html#13 Page Table - per OS/Process http://www.garlic.com/~lynn/2003k.html#27 Microkernels are not all or nothing. Re: Multics Concepts For http://www.garlic.com/~lynn/2004.html#18 virtual-machine theory http://www.garlic.com/~lynn/2004c.html#59 real multi-tasking, multi-programming http://www.garlic.com/~lynn/2004g.html#50 Chained I/O's http://www.garlic.com/~lynn/2004n.html#26 PCIe as a chip-to-chip interconnect http://www.garlic.com/~lynn/2004n.html#54 CKD Disks? http://www.garlic.com/~lynn/2004o.html#57 Integer types for 128-bit addressing http://www.garlic.com/~lynn/2005b.html#49 The
oedit/obrowse invalid directory: Errno=81x
I sent this to the IBM-UNIX listserv as well but thought us regular users might have some insights. - I am hoping someone one this list has seen this problem and has a solution. When I use oedit or obrowse in OMVS I get an error back stating: Errno=81x No such file or directory exists; Reason=0594003Dx A directory in the pathname was not found. Press Enter to continue. The Directory field has been substituted with: Directory === -u10560572 pathname When I am superuser, then it puts in -u0 before the pathname. I had the security folks check my OMVS segment and I even tried deleting my ISPF profile and creating a new one. Nothing seems to be helping. Anyone have any ideas? Sean Smith Bank of America -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
The following message is a courtesy copy of an article that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well. Anne Lynn Wheeler [EMAIL PROTECTED] writes: There was a version of CP67 that was converted to run on 370s (CP67-I system) ... which was used extensively inside IBM pending availability of VM370 product. In the morph of CP67 to VM370 product, the CCWTRANS channel program translation routine became DMKCCW. re: http://www.garlic.com/~lynn/2008i.html#68 EXCP access methos an early use of the internal network was distributed development project between the science center and endicott. the internal network technology was created at the science center (as well as cp67, gml, lots of other stuff) http://www.garlic.com/~lynn/subtopic.html#545tech the internal network was larger than the arpanet/internet from just about the beinning to possibly mid-85 http://www.garlic.com/~lynn/subtopic.html#internalnet the 370 virtual memory hardware architecture was well specified ... and endicott approached the science center about providing 370 virtual machine support for early software testing ... i.e. in addition to providing 360 and 360/67 virtual memory emulation ... cp67 would be modified to also provide option for 370 and 370 virtual memory emulation. the original cms multi-level source maintenance system was developed as part of this effort (cms cp67 had source maintenance but was single level update). part of the issue was that this would run on the science center cp67 time-sharing system which including access by numerous non-employees (many from various educational institutions in the cambridge/boston area). 370 virtual memory was a closely held corporate secret and so there had to be a lot of (security) measures to prevent it being divulged. the basic cambridge cp67 time-sharing system ran CP67-L. eventually, in a 360/67 virtual machine, a CP67-H kernel ran which had the modifications to provide 370 virtual machines as an option. This provided isolation, preventing the general time-sharing users from being exposed to any of the 370 features. then a set of updates were created that modified the CP67 kernel to run on 370 hardware a CP67-I kernel would then run in a 370 virtual machine provided by a CP67-H kernel running in a 360/67 virtual machine. CP67-I was in regular operation a year before the first engineeing 370 machine with virtual memory hardware was working. In fact, CP67-I was used as a test case when that first engineering machine became operational. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
On Wed, 11 Jun 2008 10:41:11 -0500, Rick Fochtman [EMAIL PROTECTED] wrote: . . . IIRC, VSAM and the VSAM-like access methods use STARTIO directly. Directly? I thought that the move had been to use the Media Manager. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IPL Text
One more question on this subject, once this job executes, is there a data set that gets updated that I can verify it worked? Will it always reside on the RES volume? (somewhere in the back of my memory I seem to remember my old boss mentioning that we put it on a different volume, not the RES) I may be thinking of something else, but would like to feel a little more confident. How do I know it was successful? I know (think) that SYS1.NUCLEUS fits in here somewhere. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Jim Mulder Sent: Tuesday, June 10, 2008 5:03 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: IPL Text IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 06/10/2008 05:34:36 PM: - Original Message - From: Ken Porowski [EMAIL PROTECTED] Newsgroups: bit.listserv.ibm-main Sent: Tuesday, June 10, 2008 4:37 PM Subject: Re: IPL Text Here is what I have for z/OS 1.8, I doubt the level of ICKDSF matters, just use the correct SAMPLIB. This does look a little different from what John McKown sent. Mine came from the Serverpac installation, z/OS 1.7 was the same and IIRC so were earlier versions. //IPLTXT EXEC PGM=ICKDSF //SYSPRINT DD SYSOUT=* //IPLVOL DD DISP=SHR, //VOL=SER=RSAR8A, //UNIT=3390 //IPLTEXT DD DSN=LS0AR8.SYS1.SAMPLIB(IPLRECS),DISP=SHR // DD DSN=LS0AR8.SYS1.SAMPLIB(IEAIPL00),DISP=SHR //SYSINDD * REFORMAT DDNAME(IPLVOL) IPLDD(IPLTEXT) NOVERIFY BOOTSTRAP /* I'll just chip in that this example is the correct one to use, as you must have both IPLRECS and IEAIPL00 in the IPLDD. If you specify NOBOOTSTRAP, or avoid specifying BOOTSTRAP so that the default of NOBOOTSTRAP is used, then ICKDSF supplies the bootstrap records, and IPLRECS is not needed. Jim Mulder z/OS System Test IBM Corp. Poughkeepsie, NY -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
On Wed, 11 Jun 2008 10:41:11 -0500, Rick Fochtman [EMAIL PROTECTED] wrote:_ (mailto:[EMAIL PROTECTED] wrote:) IIRC, VSAM and the VSAM-like access methods use STARTIO directly. In a message dated 6/11/2008 5:36:57 P.M. Central Daylight Time, [EMAIL PROTECTED] writes: Directly? I thought that the move had been to use the Media Manager. I don't know what VSAM-like access methods are. For the last 15 years or so (or more) IBM has used the Media Manager to do DASD I/O in its new, strategic software products (e.g., DB2). VSAM has been an official access method since the introduction of paging operating systems in the mid-1970s. The Media Manager uses STARTIO to do its I/O. Bill Fairchild Rocket Software **Vote for your city's best dining and nightlife. City's Best 2008. (http://citysbest.aol.com?ncid=aolacg0005000102) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMP/E: Using BUILDMCS to copy a product
And in case it is not obvious, this also means you need to allocate new / empty target and distribution libraries. In this case it is a z/OS UNIX file system (HFS or zFS) for the target libs. You also need to add the DDDEFs with library names / path names. Check the program directory from your last install. You probably also need to run one of those MKDIR execs to create all the directories in your HFS / zFS before the apply. Actually... it might be just as easy (especially if you don't have the pgmdir) to re-download the entire thing from the web and install it. http://www-03.ibm.com/servers/eserver/zseries/software/xml Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:[EMAIL PROTECTED] z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html On Wed, 11 Jun 2008 23:25:17 +0200, e'Silva, Joaquim J [EMAIL PROTECTED] wrote: John, SMP/E will do a full install of the product, at the level the XML toolkit was when the BuildMCS was run on your target zone. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Chase, John Sent: Wednesday, June 11, 2008 10:55 PM To: IBM-MAIN@BAMA.UA.EDU Subject: SMP/E: Using BUILDMCS to copy a product Hi, All, We noticed that the XML Toolkit was not included in our z/OS 1.9 ServerPac, though we had to install it on 1.7 in order to install CICS TS 3.2 last summer. I ran a BUILDMCS job against the 1.7 target zone from the 1.9 LPAR, with SMPPUNCH allocated to SYSOUT just to see what it generates. It looks really clean, and the report shows the target and dlib zones are perfectly synchronized for the relevant FMIDs; i.e., nothing is APPLY-ed that is not also ACCEPTed. What should I expect if I RECEIVE, APPLY and ACCEPT the BUILDMCS output on 1.9? Will SMP/E attempt to do a full install of the product? Or just do the CSI stuff? TIA, -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html _ Standard Bank email Disclaimer and confidentiality note This e-mail, its attachments and any rights attaching hereto are, unless the content clearly indicates otherwise, the property of Standard Bank Group Limited and its subsidiaries. It is confidential, private and intended for only the addressee. Should you not be the addressee and receive this e-mail by mistake, kindly notify the sender, and delete this e-mail immediately. Do not disclose or use it in any way. Views and opinions expressed in this e-mail are those of the sender unless clearly stated as those of Standard Bank Group. Standard Bank Group accepts no liability for any loss or damages howsoever incurred, or suffered, resulting, or arising, from the use of this email or its attachments. Standard Bank Group does not warrant the integrity of this e-mail nor that it is free of errors, viruses, interception or interference. Licensed divisions of the Standard Bank Group are authorised financial services providers in terms of the Financial Advisory and Intermediary Services Act, No 37 of 2002 (FAIS). For information about the Standard Bank Group visit our website http://www.standardbank.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Can DB/2 use standard KSDS VSAM datasets?
We have a dataset that has a single (integer) key followed by a big block of binary data. We want access to this data via a DB/2 enabled program, using a SELECT statement. My question is this: Do we need to actually CREATE TABLE and load our data into the DB/2 internal formats, or can we just ask DB/2 to read the KSDS directly as a two-field table? (IMS allows this, for example.) Thanks! David Logan Manager of Product Development, Pitney Bowes Business Insight http://centrus.com http://centrus.com/ 4750 Walnut St, Suite 200 Boulder, CO 80301 W: (720) 564-3056 C: (303) 818-8222 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IPL Text
Yukus, Mary J CIV USMEPCOM wrote: One more question on this subject, once this job executes, is there a data set that gets updated that I can verify it worked? Will it always reside on the RES volume? (somewhere in the back of my memory I seem to remember my old boss mentioning that we put it on a different volume, not the RES) I may be thinking of something else, but would like to feel a little more confident. How do I know it was successful? I know (think) that SYS1.NUCLEUS fits in here somewhere. The IPL text is written onto track 0 of the RES volume. SYS1.NUCLEUS must also be on this volume. When you IPL the machine will start an I/O operation to read the bootstrap from track 0. This bootstrap consists of a PSW and CCW's to read the IPL text (including more CCW's), and then commnand chain to the newly read CCW's. After the CCW chain is complete, the PSW will be loaded and start executing the loaded program. This in turn will search for SYS1.NUCLEUS and start loading the system. Gets much more complicated, but this is a basic overview. If the ICKDSF completed normally, it should have written the IPL text. You should be doing this on a clone of your system so that if there is a problem you still have a RES volume you can IPL. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IPL Text
Okay, thanks! (I appreciate your overview it is very helpful - I hate flying blind. :-) ) It will be on a cloned RES maintenance pack which will be swapped when we try to implement all the maintenance we just put on. Thanks again! Mary -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Richard Peurifoy Sent: Wednesday, June 11, 2008 6:00 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: IPL Text Yukus, Mary J CIV USMEPCOM wrote: One more question on this subject, once this job executes, is there a data set that gets updated that I can verify it worked? Will it always reside on the RES volume? (somewhere in the back of my memory I seem to remember my old boss mentioning that we put it on a different volume, not the RES) I may be thinking of something else, but would like to feel a little more confident. How do I know it was successful? I know (think) that SYS1.NUCLEUS fits in here somewhere. The IPL text is written onto track 0 of the RES volume. SYS1.NUCLEUS must also be on this volume. When you IPL the machine will start an I/O operation to read the bootstrap from track 0. This bootstrap consists of a PSW and CCW's to read the IPL text (including more CCW's), and then commnand chain to the newly read CCW's. After the CCW chain is complete, the PSW will be loaded and start executing the loaded program. This in turn will search for SYS1.NUCLEUS and start loading the system. Gets much more complicated, but this is a basic overview. If the ICKDSF completed normally, it should have written the IPL text. You should be doing this on a clone of your system so that if there is a problem you still have a RES volume you can IPL. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Controlling the execution sequence of dependant jobs in JES2 (the details)
David Cole wrote: Ok, just FYI, here's my specific situation. My need is for controlling the updates, assemblies and linkedits that I need to run when regenerating z/XDC. (It has nothing to do with the installation process at customer sites.) My typical gen jobstream is: * One update job. * Followed by from 1 to 175 assemblies. * Followed by one multi-step linkedit job. The assemblies may run in any order, but none may run prior to the update job, and they all must run one at a time, and all must run before the linkedit job. Hi Dave, a very simple solution that GUTS have used to compile several hundred csects in the old MVT and OS/VS1 times was about this. The whole product was compiled and linked in a single job, containing only a few steps. step1: build a huge temp seq dataset from the source PDS containing all csects, embedded with pseudo-csects to punch lked control cards using a single ' punch name xxx(r)' statement (and asm END stmt) step2: a single-step assembler with option 'batch' producing a single syspunch containing all the csects and a trailing ' name xxx(r)' for each csect. step3: linkedit each single csect into a separate member using option NCAL into an intermediate load library step4: final linkedit only the composite modules into the final loadlib, using the final lked control statements, using option CALL to let autocall do the job. --- Notes: I have adopted a similar method for other smaller projects. Depending on the number of csects, either generating the sequential data automatically, or, for smaller projects, preparing the big assembler manually without such utilities and rather concatenate the source members. Here are some detais as far as memory serves: Step1 used a small utility, generating each member of the source pds to the same single temporary seq dataset, and added the lked control statements after each csect, as follows: source member A (including the ASM END stmt) PUNCH ' NAME A(R)' END member B PUNCH ' NAME B(R)' END ... Step2: ASM-G was quick enough for several hundred CSECTS although using plenty of AMODGEN macros. This is since using the BATCH option, macros actually referenced were kept by the compiler pre-processed. Thus, the complete assembly time was only a fraction of assembling each csect in a separate step. This was acceptable on 370 machines, so must not be problem for you today, even re-running the whole big assembly just for an error in a single csect. Such errors were rare anyway, since this big compile was only to prepare a consistent distribution version. For development changes, only the changed single csect was compiled and link-edited into the intermediate loadlib, and the final loadmod reconstructed. Note that there was also a small utility that split the biq sequential sysprint into separate members, one for each csect into a SYSPRINT PDS. Step3: was to split the single sequential SYSPUNCH into separate members again. Step4: For each final composite loadmod, there was a separate LKDEIN member manually prepared. Again, the LKED syslin was generated with putting each member of this LKEDIN PDS into a temp seq lkedin syslin, like INCLUDE LOADLIB(A) INCLUDE LOADLIB(B) ORDER A,B NAME MAINPGM(R) I hope it is clear enough, in spite of being quite late here. Sorry for the late reply, I can't keep up with the volume on the list. Best regards, Jenoe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
-snip-. IIRC, VSAM and the VSAM-like access methods use STARTIO directly. Directly? I thought that the move had been to use the Media Manager. unsnip-- You may well be right, today. But Media Manager didn't exist, as such, until long after VSAM and VTAM. In all honesty, I'm not real sure what the sequence of development was, but I have some OLD VSAM source code that uses STARTIO, rather than EXCP, because of the channel programs it creates. It also contains PAGEFIX and PAGEFREE code, so I'm assuming that it's a step above your basic EXCP code. Dear God, how I wish there was a documented interface to STARTIO; I'd like to play around with Format-1 CCW's. :-) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EXCP access methos
Hi all, Can anyone give me another hint on this?? I am confused with what makes an output of ADRDSSU DUMP can't be Extended Format? On Wed, 11 Jun 2008 08:51:26 -0500, Paul Ip [EMAIL PROTECTED] wrote: Thanks for the reply! In fact, my target is to overome the 65536 tracks limit on a volume for SMS Datasets, so there are two approaches for me: 1. Extended Format 2. DSNTYPE=LARGE At the beginning, I tried to apply Extended Format for all SMS datasets, if the dataset is an output of COBOL program, assigning Extended Format is ok (DSORG=PS-E). However, it is failed when I tried to apply the Extended Format for output of ADRDSSU DUMP... Form the RC IEC143I 213-B8, it said ...a DCB that specified EXCP... I should rephrase my question as: why the output of ADRDSSU DUMP can't be assigned with Extented Format? What is actually a DCB that specified EXCP means from IEC143I 213-B8 (I was wondering if it is talking about the dataset is under a dataset type of 'EXCP'...)? ...In addition, I don't know there is a dataset type called 'EXCP' until I found the following from DFDSSdss Storage Admin. Guide: DFSMSdss can copy, dump, and restore data sets of the following types: DATABASE 2(TM) (DB2?;) Direct access EXCP (execute channel program) Dataset Type = EXCP??? Partitioned, including: PDS (partitioned data set) PDSE (partitioned data set extended) HFS (hierarchical file system) data set Sequential, including extended-format data sets and Large Format data sets VSAM data sets that are cataloged in an ICF catalog, including: ESDS (entry-sequenced data set) KSDS (key-sequenced data set) KSDS with key ranges LDS (linear data set) RRDS (relative record data set) VRRDS (variable relative record data set) Extended-format ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS, KSDS, LDS, RRDS, and VRRDS Extended-addressable VSAM ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS, KSDS, LDS, RRDS, and VRRDS zFS (zSeries? file system) data set Unmovable data set types (PSU, POU, DAU, ABSTR, ISU, and direct with OPTCD=A). Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Can DB/2 use standard KSDS VSAM datasets?
The short answer is NO. DB/2 only understands VSAM linear data sets formatted as DB/2 objects, data or index. I do not believe that their LOAD utility understands KSDS input, but I could be very wrong on that point. Chris Blaicher -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of David Logan Sent: Wednesday, June 11, 2008 5:58 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Can DB/2 use standard KSDS VSAM datasets? We have a dataset that has a single (integer) key followed by a big block of binary data. We want access to this data via a DB/2 enabled program, using a SELECT statement. My question is this: Do we need to actually CREATE TABLE and load our data into the DB/2 internal formats, or can we just ask DB/2 to read the KSDS directly as a two-field table? (IMS allows this, for example.) Thanks! David Logan Manager of Product Development, Pitney Bowes Business Insight http://centrus.com http://centrus.com/ 4750 Walnut St, Suite 200 Boulder, CO 80301 W: (720) 564-3056 C: (303) 818-8222 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Can DB/2 use standard KSDS VSAM datasets?
That's what I was afraid of. Thanks. David Logan Manager of Product Development, Pitney Bowes Business Insight http://centrus.com 4750 Walnut St, Suite 200 Boulder, CO 80301 W: (720) 564-3056 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Blaicher, Chris Sent: Wednesday, June 11, 2008 9:28 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Can DB/2 use standard KSDS VSAM datasets? The short answer is NO. DB/2 only understands VSAM linear data sets formatted as DB/2 objects, data or index. I do not believe that their LOAD utility understands KSDS input, but I could be very wrong on that point. Chris Blaicher -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of David Logan Sent: Wednesday, June 11, 2008 5:58 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Can DB/2 use standard KSDS VSAM datasets? We have a dataset that has a single (integer) key followed by a big block of binary data. We want access to this data via a DB/2 enabled program, using a SELECT statement. My question is this: Do we need to actually CREATE TABLE and load our data into the DB/2 internal formats, or can we just ask DB/2 to read the KSDS directly as a two-field table? (IMS allows this, for example.) Thanks! David Logan Manager of Product Development, Pitney Bowes Business Insight http://centrus.com http://centrus.com/ 4750 Walnut St, Suite 200 Boulder, CO 80301 W: (720) 564-3056 C: (303) 818-8222 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html