Re: OpenSSL MAKE test problem.
Hi. I've managed to run the MAKE with c99_x now, but I still get this 0C4 abend in MAKE test. Is there anybody who can give me a pointer on where to start looking, I'm all out of ideas. Hälsningar / Best regards, Magnus Persson, Mainframe Tieto -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Magnus Persson Sent: den 14 maj 2012 15:02 To: IBM-MAIN@bama.ua.edu Subject: OpenSSL MAKE test problem. Hi. Is there anybody out there who has runned the MAKE TEST of OpenSSL succefully? When I try it I end up with a 0C4 ABEND: ÅMAKE TEST cfb64 idea ok ../util/shlib_wrap.sh ./shatest CEE3204S The system detected a protection exception (System Completion Code=0C4) . From entry point _openssl_ebcdic2ascii at compile unit offset +007C at entry offset +007C at address 0E10AA04. gmakeÝ1¨: *** Ýtest_sha¨ Segmentation fault gmakeÝ1¨: Leaving directory é/tc/openssl/openssl-1.0.1b/test' gmake: *** Ýtests¨ Error 2 Anybody with any ideas? I will start looking at the dump first thing tomorrow... Br.Magnus Persson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
SMS Dataset Alloc Issue
Hello Group, I have used below JCL to allocate SMS dataset. But when I checked, JCL has created only data part not cluster part of the dataset. not sure why it has happened. I tried ISPF 3.4 against volume. Only Data part is visible. //SMSALOC JOB (660),SAURABH, // CLASS=A,NOTIFY=SYSUID, // MSGCLASS=A //* //ALLOC EXEC PGM=IDCAMS,REGION=512K //DDSOZ1D1 DD DISP=OLD,UNIT=SYSALLDA,VOL=SER=SOZ1D1 //SYSPRINT DD SYSOUT=* //SYSINDD * /* ALLOCATE SCDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.SCDS)- LINEAR - VOLUMES(SOZ1D1)- TRK(6 6) - SHAREOPTIONS(2,3) - ) - DATA( - NAME(SYS1.SMS.SCDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* ALLOCATE ACDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.ACDS)- LINEAR - VOLUMES(SOZ1D1)- TRK(6 6) - SHAREOPTIONS(3,3) - ) - DATA( - NAME(SYS1.SMS.ACDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* ALLOCATE COMMDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.COMMDS) - LINEAR - VOLUMES(SOZ1D1)- TRK(1 1) - SHAREOPTIONS(3,3) - ) - DATA( - NAME(SYS1.SMS.COMMDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* // -- Thanks Regards Saurabh -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN 1 J E S 2 J O B L O G -- S Y S T E M M V S 9 -- N O D E J E S S U P 0 00.09.35 JOB00712 THURSDAY, 24 MAY 2012 00.09.35 JOB00712 IRR010I USERID SKHAND9 IS ASSIGNED TO THIS JOB. 00.09.35 JOB00712 ICH70001I SKHAND9 LAST ACCESS AT 23:54:22 ON WEDNESDAY, MAY 23, 2012 00.09.35 JOB00712 $HASP373 SMSALOC STARTED - INIT BASE - CLASS A - SYS MVS9 00.09.35 JOB00712 IEF403I SMSALOC - STARTED - TIME=00.09.35 00.09.35 JOB00712 - -TIMINGS (MINS.)-- -PAGING COUNTS 00.09.35 JOB00712 -STEPNAME PROCSTEPRC EXCP CONN TCB SRB CLOCK SERV WORKLOAD PAGE SWAP VIO SWAPS 00.09.35 JOB00712 -ALLOC00105 52 .00 .00 .0 7006 SYSTEM 0 0 0 0 00.09.35 JOB00712 IEF404I SMSALOC - ENDED - TIME=00.09.35 00.09.35 JOB00712 -SMSALOC ENDED. NAME-SAURABH TOTAL TCB CPU TIME= .00 TOTAL ELAPSED TIME=.0 00.09.35 JOB00712 $HASP395 SMSALOC ENDED 0-- JES2 JOB STATISTICS -- - 24 MAY 2012 JOB EXECUTION DATE - 51 CARDS READ - 110 SYSOUT PRINT RECORDS -0 SYSOUT PUNCH RECORDS -5 SYSOUT SPOOL KBYTES - 0.00 MINUTES EXECUTION TIME 1 //SMSALOC JOB (660),SAURABH, JOB00712 // CLASS=A,NOTIFY=SYSUID, // MSGCLASS=A //* IEFC653I SUBSTITUTION JCL - (660),SAURABH,CLASS=A,NOTIFY=SKHAND9,MSGCLASS=A 2 //ALLOC EXEC PGM=IDCAMS,REGION=512K 3 //DDSOZ1D1 DD DISP=OLD,UNIT=SYSALLDA,VOL=SER=SOZ1D1 4 //SYSPRINT DD SYSOUT=* 5 //SYSINDD * ICH70001I SKHAND9 LAST ACCESS AT 23:54:22 ON WEDNESDAY, MAY 23, 2012 IEF236I ALLOC. FOR SMSALOC ALLOC IEF237I 6137 ALLOCATED TO DDSOZ1D1 IEF237I JES2 ALLOCATED TO SYSPRINT IEF237I JES2 ALLOCATED TO SYSIN IEF237I 6137 ALLOCATED TO SYS1 IEF285I SYS12145.T000935.RA000.SMSALOC.R0138041 KEPT IEF285I VOL SER NOS= SOZ1D1. IEF237I 6137 ALLOCATED TO SYS2 IEF285I SYS12145.T000935.RA000.SMSALOC.R0138042 KEPT IEF285I VOL SER NOS= SOZ1D1. IEF237I 6137 ALLOCATED TO SYS3 IEF285I SYS12145.T000935.RA000.SMSALOC.R0138043 KEPT IEF285I VOL SER NOS= SOZ1D1. IEF142I SMSALOC ALLOC - STEP WAS EXECUTED - COND CODE IEF285I SYS12145.T000935.RA000.SMSALOC.R0138040 KEPT IEF285I VOL SER NOS= SOZ1D1. IEF285I SKHAND9.SMSALOC.JOB00712.D102.? SYSOUT IEF285I SKHAND9.SMSALOC.JOB00712.D101.? SYSIN IEF373I STEP/ALLOC /START 2012145.0009 IEF032I STEP/ALLOC /STOP 2012145.0009 CPU:
Re: SMS Dataset Alloc Issue
From: saurabh khandelwal sourabhkhandelwal...@gmail.com I tried ISPF 3.4 against volume. Only Data part is visible. Saurabh, are you sure you cataloged the VSAM under the correct master catalog ? Walter Marguccio z/OS Systems Programmer BELENUS LOB Informatic GmbH Munich - Germany -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: SMS Dataset Alloc Issue
Were you looking at a catalog search or did you specify the volume serial on the 3.4 screen? Thank You, Dave O'Brien From: Walter Marguccio [walter_marguc...@yahoo.com] Sent: Friday, May 25, 2012 7:06 AM To: IBM-MAIN@bama.ua.edu Subject: Re: SMS Dataset Alloc Issue From: saurabh khandelwal sourabhkhandelwal...@gmail.com I tried ISPF 3.4 against volume. Only Data part is visible. Saurabh, are you sure you cataloged the VSAM under the correct master catalog ? Walter Marguccio z/OS Systems Programmer BELENUS LOB Informatic GmbH Munich - Germany -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
How to delete the SYSZWLM_* structures
Hello, I have been looking into IRD, to see if this could be useful and in that process I defined the SYSZWLM structures. In the end I decided that IRD was not useful, because it stops working when an LPAR is soft-capped and that just was when I needed it to do its job. The moment I activated the policy with the SYSZWLM structures, all WLMs in all Sysplex members jumped on it and allocated it and they keep on allocating it. I reloaded the old policy and the structures came in a Pending-delete status, but cannot be deleted because WLM allocates it. SETXCF FORCE and IPLs don't help, I can only think of a Sysplex wide IPL to get rid of the structure. Is there any other way? This is similar to the RRS Archive Logstream, that you could only get rid of with a Sysplex wide RRS down, until IBM decided to create a parameter for not allocating it. Apparently it is not obvious that after implementing a function, one sometimes want to decommission it again. Thanks, Kees. For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Transferring stuff from Mainframe to a RDz/UT clone of itself
On 5/25/2012 2:03 AM, mpjac...@comcen.com.au wrote: Hi all Can't readily see how to search the group, so apologies if this info is in here somewhere I'm just after opinion as to the best way to transfer files across from a normal MF Lpar , including some USS directories, to a copy of this Lpar running on RDz/UT under RedHat linux on a VM server. I'm told that shared DASD is not possible between the MF Lpar the RDz instance, we have FTP or NJE (don't know which is quicker). The basic scenario is to do regular incremental refreshes of the RDz/UT environment from it's big brother MF instance I'm posting this last thing on a Fri arvo, so may not get back to it before Monday (it's just gone 4pm here in Sydney) Thx Melvyn Jacobs Melvyn, I would run DFDSS DUMP, TERSE, FTP binary, DETERSE, then DFDSS RESTORE. Regards, Tom Conley -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: SMS Dataset Alloc Issue
Saurabh, By specifying the volume, you will only see the DATA. The CLUSTER part is just a catalog entry, not a physical dataset. (Yeah, guys, I know, but let's keep it simple, OK?) Leave off the VOLUME on ISPF 3.4, and you will see both the Cluster and Data portions. Cheers,,,Steve Steven F. Conway, CISSP LA Systems z/OS Systems Support Phone: 703.295.1926 steve_con...@ao.uscourts.gov From: saurabh khandelwal sourabhkhandelwal...@gmail.com To: IBM-MAIN@bama.ua.edu Date: 05/25/2012 06:49 AM Subject:SMS Dataset Alloc Issue Sent by:IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu Hello Group, I have used below JCL to allocate SMS dataset. But when I checked, JCL has created only data part not cluster part of the dataset. not sure why it has happened. I tried ISPF 3.4 against volume. Only Data part is visible. //SMSALOC JOB (660),SAURABH, // CLASS=A,NOTIFY=SYSUID, // MSGCLASS=A //* //ALLOC EXEC PGM=IDCAMS,REGION=512K //DDSOZ1D1 DD DISP=OLD,UNIT=SYSALLDA,VOL=SER=SOZ1D1 //SYSPRINT DD SYSOUT=* //SYSINDD * /* ALLOCATE SCDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.SCDS)- LINEAR - VOLUMES(SOZ1D1)- TRK(6 6) - SHAREOPTIONS(2,3) - ) - DATA( - NAME(SYS1.SMS.SCDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* ALLOCATE ACDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.ACDS)- LINEAR - VOLUMES(SOZ1D1)- TRK(6 6) - SHAREOPTIONS(3,3) - ) - DATA( - NAME(SYS1.SMS.ACDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* ALLOCATE COMMDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.COMMDS) - LINEAR - VOLUMES(SOZ1D1)- TRK(1 1) - SHAREOPTIONS(3,3) - ) - DATA( - NAME(SYS1.SMS.COMMDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* // -- Thanks Regards Saurabh -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN [attachment SMS.txt deleted by Steve Conway/DCA/AO/USCOURTS] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: SMS Dataset Alloc Issue
I see you are specifying a catalog too. Why? Are you sure you are using the correct catalog? If not, you wont see it either. _ Dave Jousma Assistant Vice President, Mainframe Services david.jou...@53.com 1830 East Paris, Grand Rapids, MI 49546 MD RSCB2H p 616.653.8429 f 616.653.2717 -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Steve Conway Sent: Friday, May 25, 2012 8:16 AM To: IBM-MAIN@bama.ua.edu Subject: Re: SMS Dataset Alloc Issue Saurabh, By specifying the volume, you will only see the DATA. The CLUSTER part is just a catalog entry, not a physical dataset. (Yeah, guys, I know, but let's keep it simple, OK?) Leave off the VOLUME on ISPF 3.4, and you will see both the Cluster and Data portions. Cheers,,,Steve Steven F. Conway, CISSP LA Systems z/OS Systems Support Phone: 703.295.1926 steve_con...@ao.uscourts.gov From: saurabh khandelwal sourabhkhandelwal...@gmail.com To: IBM-MAIN@bama.ua.edu Date: 05/25/2012 06:49 AM Subject:SMS Dataset Alloc Issue Sent by:IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu Hello Group, I have used below JCL to allocate SMS dataset. But when I checked, JCL has created only data part not cluster part of the dataset. not sure why it has happened. I tried ISPF 3.4 against volume. Only Data part is visible. //SMSALOC JOB (660),SAURABH, // CLASS=A,NOTIFY=SYSUID, // MSGCLASS=A //* //ALLOC EXEC PGM=IDCAMS,REGION=512K //DDSOZ1D1 DD DISP=OLD,UNIT=SYSALLDA,VOL=SER=SOZ1D1 //SYSPRINT DD SYSOUT=* //SYSINDD * /* ALLOCATE SCDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.SCDS)- LINEAR - VOLUMES(SOZ1D1)- TRK(6 6) - SHAREOPTIONS(2,3) - ) - DATA( - NAME(SYS1.SMS.SCDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* ALLOCATE ACDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.ACDS)- LINEAR - VOLUMES(SOZ1D1)- TRK(6 6) - SHAREOPTIONS(3,3) - ) - DATA( - NAME(SYS1.SMS.ACDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* ALLOCATE COMMDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.COMMDS) - LINEAR - VOLUMES(SOZ1D1)- TRK(1 1) - SHAREOPTIONS(3,3) - ) - DATA( - NAME(SYS1.SMS.COMMDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* // -- Thanks Regards Saurabh -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN [attachment SMS.txt deleted by Steve Conway/DCA/AO/USCOURTS] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN This e-mail transmission contains information that is confidential and may be privileged. It is intended only for the addressee(s) named above. If you receive this e-mail in error, please do not read, copy or disseminate it in any manner. If you are not the intended recipient, any disclosure, copying, distribution or use of the contents of this information is prohibited. Please reply to the message immediately by informing the sender that the message was misdirected. After replying, please erase it from your computer system. Your assistance in correcting this error is appreciated. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: SMS Dataset Alloc Issue
The original define only explicitly named the data component. The index got a system generated name. LISTCAT the cluster and you should see the data component you named and the name that was generated for the index. Doug -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of O'Brien, David W. (NIH/CIT) [C] Sent: Friday, May 25, 2012 7:14 AM To: IBM-MAIN@bama.ua.edu Subject: Re: SMS Dataset Alloc Issue Were you looking at a catalog search or did you specify the volume serial on the 3.4 screen? Thank You, Dave O'Brien From: Walter Marguccio [walter_marguc...@yahoo.com] Sent: Friday, May 25, 2012 7:06 AM To: IBM-MAIN@bama.ua.edu Subject: Re: SMS Dataset Alloc Issue From: saurabh khandelwal sourabhkhandelwal...@gmail.com I tried ISPF 3.4 against volume. Only Data part is visible. Saurabh, are you sure you cataloged the VSAM under the correct master catalog ? Walter Marguccio z/OS Systems Programmer BELENUS LOB Informatic GmbH Munich - Germany -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: SMS Dataset Alloc Issue
Hello Group, Walter has clarified my doubt that I am trying to see a cluster cataloged under MCATB from a system whose master catalog is MCATA. Then, it is perfectly normal to see only the data part of the cluster. So I will be able to see cluster+data only when I logon on thesystem whose master catalog is MCATB. Thanks for helping me . Regards Saurabh On Fri, May 25, 2012 at 5:48 PM, Jousma, David david.jou...@53.com wrote: I see you are specifying a catalog too. Why? Are you sure you are using the correct catalog? If not, you wont see it either. _ Dave Jousma Assistant Vice President, Mainframe Services david.jou...@53.com 1830 East Paris, Grand Rapids, MI 49546 MD RSCB2H p 616.653.8429 f 616.653.2717 -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Steve Conway Sent: Friday, May 25, 2012 8:16 AM To: IBM-MAIN@bama.ua.edu Subject: Re: SMS Dataset Alloc Issue Saurabh, By specifying the volume, you will only see the DATA. The CLUSTER part is just a catalog entry, not a physical dataset. (Yeah, guys, I know, but let's keep it simple, OK?) Leave off the VOLUME on ISPF 3.4, and you will see both the Cluster and Data portions. Cheers,,,Steve Steven F. Conway, CISSP LA Systems z/OS Systems Support Phone: 703.295.1926 steve_con...@ao.uscourts.gov From: saurabh khandelwal sourabhkhandelwal...@gmail.com To: IBM-MAIN@bama.ua.edu Date: 05/25/2012 06:49 AM Subject:SMS Dataset Alloc Issue Sent by:IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu Hello Group, I have used below JCL to allocate SMS dataset. But when I checked, JCL has created only data part not cluster part of the dataset. not sure why it has happened. I tried ISPF 3.4 against volume. Only Data part is visible. //SMSALOC JOB (660),SAURABH, // CLASS=A,NOTIFY=SYSUID, // MSGCLASS=A //* //ALLOC EXEC PGM=IDCAMS,REGION=512K //DDSOZ1D1 DD DISP=OLD,UNIT=SYSALLDA,VOL=SER=SOZ1D1 //SYSPRINT DD SYSOUT=* //SYSINDD * /* ALLOCATE SCDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.SCDS)- LINEAR - VOLUMES(SOZ1D1)- TRK(6 6) - SHAREOPTIONS(2,3) - ) - DATA( - NAME(SYS1.SMS.SCDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* ALLOCATE ACDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.ACDS)- LINEAR - VOLUMES(SOZ1D1)- TRK(6 6) - SHAREOPTIONS(3,3) - ) - DATA( - NAME(SYS1.SMS.ACDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* ALLOCATE COMMDS */ DEFINE CLUSTER( - NAME(SYS1.SMS.COMMDS) - LINEAR - VOLUMES(SOZ1D1)- TRK(1 1) - SHAREOPTIONS(3,3) - ) - DATA( - NAME(SYS1.SMS.COMMDS.DATA) - ) - CATALOG(SOZ1D.MASTER.CATALOG) /* // -- Thanks Regards Saurabh -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN [attachment SMS.txt deleted by Steve Conway/DCA/AO/USCOURTS] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN This e-mail transmission contains information that is confidential and may be privileged. It is intended only for the addressee(s) named above. If you receive this e-mail in error, please do not read, copy or disseminate it in any manner. If you are not the intended recipient, any disclosure, copying, distribution or use of the contents of this information is prohibited. Please reply to the message immediately by informing the sender that the message was misdirected. After replying, please erase it from your computer system. Your assistance in correcting this error is appreciated. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with
IKJTSOEV ISPF services question
I know that I can run the TSO TMP in batch. Using this, I can run a REXX program which sets up all the ISPF required datasets. I can then invoke ISPSTART with the CMD(...) option to run another program/CLIST/REXX. In that program, I can use most of the non-DISPLAY oriented services, such as DIRLIST or DSINFO. The TSO book on IKJTSOEV only talks about ISPF in the negative, but mentions display services. So, can I write a batch program which uses IKJTSOEV to set up a TSO environment. Once I have a TSO environment set, can I directly invoke ISPF services? What I would like to do is to have some simple way in a batch program to invoke ISPF services such as DSINFO without the hokeyness of running the TSO TMP. And also without invoking ISPSTART and telling it to run a separate program/CLIST/REXX routine. But I don't think it's possible. Frustrates me no end. John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Retiring after 43+ years with IBM
Aw darn! I was hoping you'd be there until I retired next summer! Congratulations, and enjoy it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Transferring stuff from Mainframe to a RDz/UT clone of itself
Another, possibly too weird, technique would be to use GIMZIP. GIMZIP supports the packaging of both z/OS datasets and z/OS UNIX files into a container file. It is also compressed and needs to be transferred in BINary mode. And then there is the CBT tape method. Use TSO XMIT for all the z/OS datasets. Put each XMIT in a separate member of a PDS. Use z/OS UNIX pax to make an archive of all the UNIX files. pax can output that directly into another member in the same PDS. Then either XMIT that PDS and transfer it, or TERSE it. Just pointing out some alternatives. I, personally, have done the latter (XMIT) but only because I submitted it to the CBT Tape and that's how they wanted it done. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Thomas Conley Sent: Friday, May 25, 2012 7:10 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Transferring stuff from Mainframe to a RDz/UT clone of itself On 5/25/2012 2:03 AM, mpjac...@comcen.com.au wrote: Hi all Can't readily see how to search the group, so apologies if this info is in here somewhere I'm just after opinion as to the best way to transfer files across from a normal MF Lpar , including some USS directories, to a copy of this Lpar running on RDz/UT under RedHat linux on a VM server. I'm told that shared DASD is not possible between the MF Lpar the RDz instance, we have FTP or NJE (don't know which is quicker). The basic scenario is to do regular incremental refreshes of the RDz/UT environment from it's big brother MF instance I'm posting this last thing on a Fri arvo, so may not get back to it before Monday (it's just gone 4pm here in Sydney) Thx Melvyn Jacobs Melvyn, I would run DFDSS DUMP, TERSE, FTP binary, DETERSE, then DFDSS RESTORE. Regards, Tom Conley -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
REPRO MERGECAT performance
We've just done a couple of REPRO MERGECATs that were fairly large, and took some time, so I was wondering: Can MERGECAT performance be improved by altering the buffer space values for either the input or output catalog, or both? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
On Fri, 25 May 2012 07:44:31 -0500, McKown, John wrote: I know that I can run the TSO TMP in batch. Using this, I can run a REXX program which sets up all the ISPF required datasets. I can then invoke ISPSTART with the CMD(...) option to run another program/CLIST/REXX. In that program, I can use most of the non-DISPLAY oriented services, such as DIRLIST or DSINFO. The TSO book on IKJTSOEV only talks about ISPF in the negative, but mentions display services. So, can I write a batch program which uses IKJTSOEV to set up a TSO environment. Once I have a TSO environment set, can I directly invoke ISPF services? What I would like to do is to have some simple way in a batch program to invoke ISPF services such as DSINFO without the hokeyness of running the TSO TMP. And also without invoking ISPSTART and telling it to run a separate program/CLIST/REXX routine. But I don't think it's possible. Frustrates me no end. I would say, If it ain't broke, don't fix it. Except it is broke. Syntactic restrictions of the CMD(...) option prohibit my passing certain PARM strings to my program/CLIST/REXX routine that I could readily specify if I invoked it directly from the command line. Bummer. (This might be more on-charter for ISPF-L.) -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
How to leave ISPF
When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. -- Radoslaw Skorupka Lodz, Poland -- Treść tej wiadomości może zawierać informacje prawnie chronione Banku przeznaczone wyłącznie do użytku służbowego adresata. Odbiorcą może być jedynie jej adresat z wyłączeniem dostępu osób trzecich. Jeżeli nie jesteś adresatem niniejszej wiadomości lub pracownikiem upoważnionym do jej przekazania adresatowi, informujemy, że jej rozpowszechnianie, kopiowanie, rozprowadzanie lub inne działanie o podobnym charakterze jest prawnie zabronione i może być karalne. Jeżeli otrzymałeś tę wiadomość omyłkowo, prosimy niezwłocznie zawiadomić nadawcę wysyłając odpowiedź oraz trwale usunąć tę wiadomość włączając w to wszelkie jej kopie wydrukowane lub zapisane na dysku. This e-mail may contain legally privileged information of the Bank and is intended solely for business use of the addressee. This e-mail may only be received by the addressee and may not be disclosed to any third parties. If you are not the intended addressee of this e-mail or the employee authorised to forward it to the addressee, be advised that any dissemination, copying, distribution or any other similar activity is legally prohibited and may be punishable. If you received this e-mail by mistake please advise the sender immediately by using the reply facility in your e-mail software and delete permanently this e-mail including any copies of it either printed or saved to hard drive. BRE Bank SA, 00-950 Warszawa, ul. Senatorska 18, tel. +48 (22) 829 00 00, fax +48 (22) 829 00 33, www.brebank.pl, e-mail: i...@brebank.pl Sąd Rejonowy dla m. st. Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, nr rejestru przedsiębiorców KRS 025237, NIP: 526-021-50-88. Według stanu na dzień 01.01.2012 r. kapitał zakładowy BRE Banku SA (w całości wpłacony) wynosi 168.410.984 złotych. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
On 5/25/2012 7:54 AM, R.S. wrote: When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. Issue the Settings command Select the top menu item: Log/List Select option 1, Log data set defaults Select Process Option 2;press enter; PF3 Select Log/List again Select option 2, List data set defaults Select Process Option 2;press enter; PF3 done after this, =x will skip the message(s) about log or list processing. -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-355-2752 http://www.trainersfriend.com * To get a good Return on your Investment, first make an investment! + Training your people is an excellent investment * Try our tool for calculating your Return On Investment for training dollars at http://www.trainersfriend.com/ROI/roi.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
On Fri, 25 May 2012 15:54:05 +0200, R.S. wrote: When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. If I'm in SDSF, I type C in front of my user ID. I miss the VM CP LOGOFF command. Blink of an eye. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
Along with setting up the ISPF defaults, I use Tom Brennan's Vista 3270 and have the following macro assigned to an unused key, in my case alt-f9. Sometimes you have to hit it more than once because you are in split screen mode. * * Logoff * Vista macro generated on 09/24/2011 by C.Y.Blaicher * Wait(30,Status=Unlocked) Key(Home) Type(=x) Key(EraseEndofField) Key(Enter) Wait(30,Status=Unlocked) Type(logoff) Key(EraseEndofField) Key(Enter) Wait(30,Status=Unlocked) Exit * End of macro * Chris Blaicher Senior Software Engineer, Software Services Syncsort Incorporated 50 Tice Boulevard, Woodcliff Lake, NJ 07677 P: 201-930-8260 | M: 512-627-3803 E: cblaic...@syncsort.com www.syncsort.com Check out our Knowledge Base at www.syncsort.com/support Syncsort aims for the best product and service experience. We welcome your feedback. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Steve Comstock Sent: Friday, May 25, 2012 9:03 AM To: MVS List Server 1 Subject: Re: How to leave ISPF On 5/25/2012 7:54 AM, R.S. wrote: When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. Issue the Settings command Select the top menu item: Log/List Select option 1, Log data set defaults Select Process Option 2;press enter; PF3 Select Log/List again Select option 2, List data set defaults Select Process Option 2;press enter; PF3 done after this, =x will skip the message(s) about log or list processing. -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-355-2752 http://www.trainersfriend.com * To get a good Return on your Investment, first make an investment! + Training your people is an excellent investment * Try our tool for calculating your Return On Investment for training dollars at http://www.trainersfriend.com/ROI/roi.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
On Fri, 25 May 2012 08:03:10 -0600, Steve Comstock st...@trainersfriend.com wrote: BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. This part wasn't answered. You need to use the field mark key (x'1E'). It looks like a semi colon with a solid line above it. I have no idea what it might be set to if anything in your 3270 emulation. It's been a long time since I used it and I don't think it's assigned in my vista TN3270 (which I usually use) - but it is on the keypad. I normally would do this: =x;;xfield marklogoff At many shops I've been at, to save key strokes I've seen clists called O or LO or LOGO etc. and I would just type=x;;xfield markoto logoff. The reason I don't use it, is because I use FASTPATH from CBT file 183, which includes 2 commands - LOGOFF and CRASH . Using LOGOFF will log you off regardless of how many logical / split screens you have active. Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:m...@mzelden.com Mark's MVS Utilities: http://www.mzelden.com/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Early IPL problems
In 4fbe7bb5.3060...@valley.net, on 05/24/2012 at 02:19 PM, Gerhard Postpischil gerh...@valley.net said: You used the PASSWORD facility to protect critical data sets. In order to update them, it was necessary to respond to a WTOR with the password. Don't forget my local mods to OPEN, which checked CVTUSER and bypassed the WTOR if authorized. That was inconvenient enough so that I wrote SETPASS [2]. As I recall, you wrote it after my OPEN mods were in place. The ABEND table was fun eg. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
In a6b9336cdb62bb46b9f8708e686a7ea00e924b4...@nrhmms8p02.uicnrh.dom, on 05/25/2012 at 07:44 AM, McKown, John john.mck...@healthmarkets.com said: I know that I can run the TSO TMP in batch. Using this, I can run a REXX program which sets up all the ISPF required datasets. I can then invoke ISPSTART with the CMD(...) option to run another program/CLIST/REXX. In that program, I can use most of the non-DISPLAY oriented services, such as DIRLIST or DSINFO. The TSO book on IKJTSOEV only talks about ISPF in the negative, but mentions display services. So, can I write a batch program which uses IKJTSOEV to set up a TSO environment. Once I have a TSO environment set, can I directly invoke ISPF services? No. ISPF services are only available for applications running under ISPF. The good news is that ISPF display services are available in batch if you connect to the WSA on a PC. What I would like to do is to have some simple way in a batch program to invoke ISPF services such as DSINFO without the hokeyness of running the TSO TMP. Why isn't IKJTSOEV just as hokey? -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
From my view point, it is because the user of my program simply does EXEC PGM=MYPGM rather than PGM=IKJEFT01,PARM='%MYPGM' which runs a, in my case, REXX program called MYPGM, which then does the TSO allocates for the ISPF datasets, followed by ISPSTART CMD(%MYPGM2). Which is either a TSO command, or another REXX program which does a TSO CALL to actually invoke the processing program. All that overhead just so that my program can, for instance, use a DSINFO to __easily__ get a list of cataloged datasets and their attributes. Again, what I really would like is something like the ISPF services (non DISPLAY). But make them available via a simple COBOL CALL verb without the need for the complicated JCL and REXX layers. This would allow a COBOL program to easily allocate and open a PDS, get a list of the members, and then read one or more of the members. All in a relatively simple, easy to use, way. The same with z/OS UNIX files too. Or use DSINFO for some DASD management reports. I guess it's just a recent itch of mine. Not possible as I would like to do it, so I'm just stuck with the clumsy (IMO) way. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Shmuel Metz (Seymour J.) Sent: Friday, May 25, 2012 8:16 AM To: IBM-MAIN@bama.ua.edu Subject: Re: IKJTSOEV ISPF services question In a6b9336cdb62bb46b9f8708e686a7ea00e924b4...@nrhmms8p02.uicnrh.dom, on 05/25/2012 at 07:44 AM, McKown, John john.mck...@healthmarkets.com said: I know that I can run the TSO TMP in batch. Using this, I can run a REXX program which sets up all the ISPF required datasets. I can then invoke ISPSTART with the CMD(...) option to run another program/CLIST/REXX. In that program, I can use most of the non-DISPLAY oriented services, such as DIRLIST or DSINFO. The TSO book on IKJTSOEV only talks about ISPF in the negative, but mentions display services. So, can I write a batch program which uses IKJTSOEV to set up a TSO environment. Once I have a TSO environment set, can I directly invoke ISPF services? No. ISPF services are only available for applications running under ISPF. The good news is that ISPF display services are available in batch if you connect to the WSA on a PC. What I would like to do is to have some simple way in a batch program to invoke ISPF services such as DSINFO without the hokeyness of running the TSO TMP. Why isn't IKJTSOEV just as hokey? -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
In article 9817663136320041.wa.paulgboulderaim@bama.ua.edu you wrote: On Fri, 25 May 2012 15:54:05 +0200, R.S. wrote: When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. If I'm in SDSF, I type C in front of my user ID. I miss the VM CP LOGOFF command. Blink of an eye. -- gil If you don't mind just abending yourself, you could always hit SYSREQ and type in LOGOFF. -- Don Poitras - SAS Development - SAS Institute Inc. - SAS Campus Drive sas...@sas.com (919) 531-5637Cary, NC 27513 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Masking Numeric Keys
I can foresee that my organization will soon need to provide test data to an external vendor. This test data will need to be generated by masking subsets of real production data, since crafting fictional test data would be an impossible undertaking in the time we have available. So all Personally Identifiable Information (PII) fields must be masked. I have figured out techniques to mask names and addresses. But I now need to figure out a technique to mask a nine digit numeric key. This field is used as either a primary or secondary key in many files. So I can't just substitute a random number, since the relationships need to be maintained. I have identified some requirements for the masking algorithm: (1) It must be deterministic (same input produces same output always). (2) Uniqueness must be maintained. Therefore no two original values can translate to the same masked value. (3) The masked result must also be a nine digit numeric value. (4) It must not be possible to calculate the original value from the masked value (i.e. a one-way transformation). I can think of many ways to address the first three requirements. But I am stuck on number (4). The closest I can get to meeting this requirement is to assume that the masking algorithm itself is kept secret. And I know that security thru obscurity is hardly a good plan. Do any of the listers have an idea for such as masking algorithm? John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote on 05/25/2012 08:30:45 AM: From: Roberts, John J jrobe...@dhs.state.ia.us To: IBM-MAIN@bama.ua.edu, Date: 05/25/2012 08:32 AM Subject: Masking Numeric Keys Sent by: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu I can foresee that my organization will soon need to provide test data to an external vendor. This test data will need to be generated by masking subsets of real production data, since crafting fictional test data would be an impossible undertaking in the time we have available. So all Personally Identifiable Information (PII) fields must be masked. I have figured out techniques to mask names and addresses. But I now need to figure out a technique to mask a nine digit numeric key. This field is used as either a primary or secondary key in many files. So I can't just substitute a random number, since the relationships need to be maintained. I have identified some requirements for the masking algorithm: (1) It must be deterministic (same input produces same output always). (2) Uniqueness must be maintained. Therefore no two original values can translate to the same masked value. (3) The masked result must also be a nine digit numeric value. (4) It must not be possible to calculate the original value from the masked value (i.e. a one-way transformation). I can think of many ways to address the first three requirements. But I am stuck on number (4). The closest I can get to meeting this requirement is to assume that the masking algorithm itself is kept secret. And I know that security thru obscurity is hardly a good plan. Do any of the listers have an idea for such as masking algorithm? John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN You can try IBM InfoSphere Optim Data Masking Solution which serves your purpose. Check this link for more details http://www.ibm.com/software/sw-library/en_US/detail/I640169M54983H90.html skolusu -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
If you have ICSF configured you might be able to use one of the One-Way Hash Generate Callable Services (CSNBOWH or CSNBOWH1 and CSNEOWH or CSNEOWH1) Mark Jacobs On 05/25/12 11:30, Roberts, John J wrote: I can foresee that my organization will soon need to provide test data to an external vendor. This test data will need to be generated by masking subsets of real production data, since crafting fictional test data would be an impossible undertaking in the time we have available. So all Personally Identifiable Information (PII) fields must be masked. I have figured out techniques to mask names and addresses. But I now need to figure out a technique to mask a nine digit numeric key. This field is used as either a primary or secondary key in many files. So I can't just substitute a random number, since the relationships need to be maintained. I have identified some requirements for the masking algorithm: (1) It must be deterministic (same input produces same output always). (2) Uniqueness must be maintained. Therefore no two original values can translate to the same masked value. (3) The masked result must also be a nine digit numeric value. (4) It must not be possible to calculate the original value from the masked value (i.e. a one-way transformation). I can think of many ways to address the first three requirements. But I am stuck on number (4). The closest I can get to meeting this requirement is to assume that the masking algorithm itself is kept secret. And I know that security thru obscurity is hardly a good plan. Do any of the listers have an idea for such as masking algorithm? John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- Mark Jacobs Time Customer Service Tampa, FL The Doctor: You know when grown-ups tell you everything's going to be fine, and you think they're probably lying to make you feel better? Young Amy: Yes. The Doctor: Everything's going to be fine. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
A likely weird thought occurred to me. Do you need to keeping the masking values between runs? I.e. must the masked value be the same for the same input on multiple runs? If not, then the simpliest way that I can think of is to either use a sequential number as the replacement value. Keep a hash table so that when you look at the unmapped number, you can either determine it has already been seen and has a replacement value. If is does, then replace it. If it doesn't, generate the next number in order and update your mapping data with the input value and its replacement. This could be as simple as a very large sequential array. If you have DB2, then you've got an easy way. Create a table with two column. The first column is defined as a serial number which is autogenerated by DB2. The second column is the live number. Put an index on both columns. When you get a live number, do a lookup in the table to retrieve the mapped value. If the lookup fails, add the live number to the table, getting the serial number assigned. If this is not random enough, then actually use a random generated number instead of a serial number in the first (live) column. This is a bit more complicated since, if the live number is not yet in the table, you'll need to generate the random number and try to insert a new row (unique index on both of the column). If the new row inserts properly (which guarantees that both the random number and live number are unique in the table), use the random number. If the new row does not insert, then generate a new random number and try to insert again. Repeat until the row inserts and use t! he random number which succeeded. Some pseudo code might look like: read live record. do forever select (live, random) where live=record.live from table. if success then leave /* first do forever */ do forever /* second do forever */ generate random number insert (record.live, generated.random) into table if succeeded then leave /* second do forever */ end /* second do forever */ end /* first do forever */ replace live value with random value write mapped record. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Roberts, John J Sent: Friday, May 25, 2012 10:31 AM To: IBM-MAIN@bama.ua.edu Subject: Masking Numeric Keys I can foresee that my organization will soon need to provide test data to an external vendor. This test data will need to be generated by masking subsets of real production data, since crafting fictional test data would be an impossible undertaking in the time we have available. So all Personally Identifiable Information (PII) fields must be masked. I have figured out techniques to mask names and addresses. But I now need to figure out a technique to mask a nine digit numeric key. This field is used as either a primary or secondary key in many files. So I can't just substitute a random number, since the relationships need to be maintained. I have identified some requirements for the masking algorithm: (1) It must be deterministic (same input produces same output always). (2) Uniqueness must be maintained. Therefore no two original values can translate to the same masked value. (3) The masked result must also be a nine digit numeric value. (4) It must not be possible to calculate the original value from the masked value (i.e. a one-way transformation). I can think of many ways to address the first three requirements. But I am stuck on number (4). The closest I can get to meeting this requirement is to assume that the masking algorithm itself is kept secret. And I know that security thru obscurity is hardly a good plan. Do any of the listers have an idea for such as masking algorithm? John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the
Re: How to leave ISPF
On Fri, 25 May 2012 11:23:48 -0400, Don Poitras poit...@pobox.com wrote: In article 9817663136320041.wa.paulgboulderaim@bama.ua.edu you wrote: On Fri, 25 May 2012 15:54:05 +0200, R.S. wrote: When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. If I'm in SDSF, I type C in front of my user ID. I miss the VM CP LOGOFF command. Blink of an eye. -- gil If you don't mind just abending yourself, you could always hit SYSREQ and type in LOGOFF. If you use a VTAM session manager, that will only log you off from the session manager application. I know lots of small shops / development shops don't have them these days since you can start as many emulation sessions as you want, but I think most production shops - especially the medium to large size ones - still use them. Regards, Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:m...@mzelden.com Mark's MVS Utilities: http://www.mzelden.com/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
If you have ICSF configured you might be able to use one of the One-Way Hash Generate Callable Services (CSNBOWH or CSNBOWH1 and CSNEOWH or CSNEOWH1) I don't know if we have ICSF installed. But even if we did, I would doubt if any hash function could meet my requirement #2 (uniqueness) and may even have trouble with #3 (PIC 9(9) result). And of course if truncation is needed to meet requirement #3, this itself would probably defeat #2. But I thank you for the suggestion. If I strike out otherwise, I will ask the SYSPROGs about ICSF. John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: REPRO MERGECAT performance
Can MERGECAT performance be improved by altering the buffer space values for either the input or output catalog, or both? If you have a lot of VSAM, probably not. As I recall, doing a large repro mergecat with a lot of VSAM was very slow, but it was mostly due to the need to go change every vvds entry. In other words, I don't think you'll get a lot of bang for your buck. Mary Anne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
On Fri, May 25, 2012 at 2:54 PM, R.S. r.skoru...@bremultibank.com.plwrote: When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. -- Radoslaw Skorupka Lodz, Poland I assign ISPLOG and ISPLIST to SYSOUT so that message never appears and the output is available in the SPOOL if required. Jim McAlpine -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
There must be 50 ways to leave your session. - groan - Well, it is Friday. Bill Fairchild Programmer Rocket Software 408 Chamberlain Park Lane * Franklin, TN 37069-2526 * USA t: +1.617.614.4503 * e: bfairch...@rocketsoftware.com * w: www.rocketsoftware.com -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Mark Zelden Sent: Friday, May 25, 2012 10:58 AM To: IBM-MAIN@bama.ua.edu Subject: Re: How to leave ISPF On Fri, 25 May 2012 11:23:48 -0400, Don Poitras poit...@pobox.com wrote: In article 9817663136320041.wa.paulgboulderaim@bama.ua.edu you wrote: On Fri, 25 May 2012 15:54:05 +0200, R.S. wrote: When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. If I'm in SDSF, I type C in front of my user ID. I miss the VM CP LOGOFF command. Blink of an eye. -- gil If you don't mind just abending yourself, you could always hit SYSREQ and type in LOGOFF. If you use a VTAM session manager, that will only log you off from the session manager application. I know lots of small shops / development shops don't have them these days since you can start as many emulation sessions as you want, but I think most production shops - especially the medium to large size ones - still use them. Regards, Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:m...@mzelden.com Mark's MVS Utilities: http://www.mzelden.com/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
Do you need to keeping the masking values between runs? I.e. must the masked value be the same for the same input on multiple runs? No - we will extract a full set of PROD data, mask it, and then burn a DVD for our vendor. If they ask for a refresh, we will just repeat using current PROD data. If not, then the simpliest way that I can think of is to either use a sequential number as the replacement value. Keep a hash table so that when you look at the unmapped number, you can either determine it has already been seen and has a replacement value. If is does, then replace it. If it doesn't, generate the next number in order and update your mapping data with the input value and its replacement. This could be as simple as a very large sequential array. If you have DB2, then you've got an easy way. Create a table with two column. The first column is defined as a serial number which is autogenerated by DB2. The second column is the live number. Put an index on both columns. When you get a live number, do a lookup in the table to retrieve the mapped value. If the lookup fails, add the live number to the table, getting the serial number assigned. If this is not random enough, then actually use a random generated number instead of a serial number in the first (live) column. This is a bit more complicated since, if the live number is not yet in the table, you'll need to generate the random number and try to insert a new row (unique index on both of the column). If the new row inserts properly (which guarantees that both the random number and live number are unique in the table), use the random number. If the new row does not insert, then generate a new random number and try to insert again. Repeat until the row inserts and use ! t! John, this is actually kinda like my plan B. A real identifier of value N would be translated to be the Nth value in a sequence of pseudo-random numbers. The only problem is maintaining a billion row table. I have thought of asking our security officer if I can get away with only masking the last six digits of the identifier, leaving the first three ASIS. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
Unfortunately, ISPF significantly predates the MVC design pattern. -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 11:23, McKown, John wrote: From my view point, it is because the user of my program simply does EXEC PGM=MYPGM rather than PGM=IKJEFT01,PARM='%MYPGM' which runs a, in my case, REXX program called MYPGM, which then does the TSO allocates for the ISPF datasets, followed by ISPSTART CMD(%MYPGM2). Which is either a TSO command, or another REXX program which does a TSO CALL to actually invoke the processing program. All that overhead just so that my program can, for instance, use a DSINFO to __easily__ get a list of cataloged datasets and their attributes. Again, what I really would like is something like the ISPF services (non DISPLAY). But make them available via a simple COBOL CALL verb without the need for the complicated JCL and REXX layers. This would allow a COBOL program to easily allocate and open a PDS, get a list of the members, and then read one or more of the members. All in a relatively simple, easy to use, way. The same with z/OS UNIX files too. Or use DSINFO for some DASD management reports. I guess it's just a recent itch of mine. Not possible as I would like to do it, so I'm just stuck with the clumsy (IMO) way. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
I've never seen this term before now -- MVC design pattern??? What is that please? I'm guessing it is not MoVe Character design pattern. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Gord Tomlin Sent: Friday, May 25, 2012 12:12 PM To: IBM-MAIN@bama.ua.edu Subject: Re: IKJTSOEV ISPF services question Unfortunately, ISPF significantly predates the MVC design pattern. -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 11:23, McKown, John wrote: From my view point, it is because the user of my program simply does EXEC PGM=MYPGM rather than PGM=IKJEFT01,PARM='%MYPGM' which runs a, in my case, REXX program called MYPGM, which then does the TSO allocates for the ISPF datasets, followed by ISPSTART CMD(%MYPGM2). Which is either a TSO command, or another REXX program which does a TSO CALL to actually invoke the processing program. All that overhead just so that my program can, for instance, use a DSINFO to __easily__ get a list of cataloged datasets and their attributes. Again, what I really would like is something like the ISPF services (non DISPLAY). But make them available via a simple COBOL CALL verb without the need for the complicated JCL and REXX layers. This would allow a COBOL program to easily allocate and open a PDS, get a list of the members, and then read one or more of the members. All in a relatively simple, easy to use, way. The same with z/OS UNIX files too. Or use DSINFO for some DASD management reports. I guess it's just a recent itch of mine. Not possible as I would like to do it, so I'm just stuck with the clumsy (IMO) way. -- This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
Surely you don't actually use all billion values. John, this is actually kinda like my plan B. A real identifier of value N would be translated to be the Nth value in a sequence of pseudo-random numbers. The only problem is maintaining a billion row table. I have thought of asking our security officer if I can get away with only masking the last six digits of the identifier, leaving the first three ASIS. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
If it is the U.S. tax number, about 700M have been issued since inception and 300M in use every year. On Fri, May 25, 2012 at 11:33 AM, Gibney, Dave gib...@wsu.edu wrote: Surely you don't actually use all billion values. -- Mike A Schwab, Springfield IL USA Where do Forest Rangers go to get away from it all? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
Surely you don't actually use all billion values. No, but generating index values on demand is a complication I would like to avoid. But for a million values, the masked values could be pre-generated. And I could generate multiple such indexes by simply using a different seed value for the random number generator. But I still hold out hope for some kind of algorithm that does not require a table lookup. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
If it is the U.S. tax number, about 700M have been issued since inception and 300M in use every year. I can't even mention what specific type of nine digit number we are discussing. Because if I put that TLA in my messages, Tumbleweed Secure Messenger will start intercepting my emails. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
CSVDYNEX ?'s
The CSVDYNEX macro provides keywords ABENDNUM and ABENDCONSEC to control how many times the exit routine can abend before the exit is disabled. 1) At what point does the dynamic exit processing determine that an abend has occurred? If I were to provide an ESTAE or similar recovery routine in my exit, what that be sufficient to prevent the exit from becoming disabled? (Assuming it recovered correctly.) 2) Other than the CSV430I MODULE FOR EXIT IGGPRE00_EXIT HAS BEEN MADE INACTIVE DUE TO ABEND=xx REASON= message appearing, is any notification made available? Specifically an ENF? (I did not see any mention of that in the docs.) 3) If a recovery routine in the exit itself (as in (1) above) is not the answer, then what is the correct way to provide recovery? The CSVDYNEX RECOVER option seems to be only for callers of the exit; I am essentially only doing a CSVDYNEX ADD,STATE=ACTIVE. Thank you for any insight. Paul Schuster -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
Sorry, it stands for model/view/controller, and it is a widely used design pattern for decoupling the logic of a program from the presentation of its inputs and outputs. The basic idea is that you can reuse the program that does the actual work in different scenarios, because that program is not wedded to a particular presentation layer. https://en.wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 12:16, Farley, Peter x23353 wrote: I've never seen this term before now -- MVC design pattern??? What is that please? I'm guessing it is not MoVe Character design pattern. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Gord Tomlin Sent: Friday, May 25, 2012 12:12 PM To: IBM-MAIN@bama.ua.edu Subject: Re: IKJTSOEV ISPF services question Unfortunately, ISPF significantly predates the MVC design pattern. -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 11:23, McKown, John wrote: From my view point, it is because the user of my program simply does EXEC PGM=MYPGM rather than PGM=IKJEFT01,PARM='%MYPGM' which runs a, in my case, REXX program called MYPGM, which then does the TSO allocates for the ISPF datasets, followed by ISPSTART CMD(%MYPGM2). Which is either a TSO command, or another REXX program which does a TSO CALL to actually invoke the processing program. All that overhead just so that my program can, for instance, use a DSINFO to __easily__ get a list of cataloged datasets and their attributes. Again, what I really would like is something like the ISPF services (non DISPLAY). But make them available via a simple COBOL CALL verb without the need for the complicated JCL and REXX layers. This would allow a COBOL program to easily allocate and open a PDS, get a list of the members, and then read one or more of the members. All in a relatively simple, easy to use, way. The same with z/OS UNIX files too. Or use DSINFO for some DASD management reports. I guess it's just a recent itch of mine. Not possible as I would like to do it, so I'm just stuck with the clumsy (IMO) way. -- This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
Surely you don't actually use all billion values. No, and don't call me Shirley. (sorry, its Friday ;-) ) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
Thank you. That link was very helpful. Peter -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Gord Tomlin Sent: Friday, May 25, 2012 12:51 PM To: IBM-MAIN@bama.ua.edu Subject: Re: IKJTSOEV ISPF services question Sorry, it stands for model/view/controller, and it is a widely used design pattern for decoupling the logic of a program from the presentation of its inputs and outputs. The basic idea is that you can reuse the program that does the actual work in different scenarios, because that program is not wedded to a particular presentation layer. https://en.wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 12:16, Farley, Peter x23353 wrote: I've never seen this term before now -- MVC design pattern??? What is that please? I'm guessing it is not MoVe Character design pattern. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Gord Tomlin Sent: Friday, May 25, 2012 12:12 PM To: IBM-MAIN@bama.ua.edu Subject: Re: IKJTSOEV ISPF services question Unfortunately, ISPF significantly predates the MVC design pattern. -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 11:23, McKown, John wrote: From my view point, it is because the user of my program simply does EXEC PGM=MYPGM rather than PGM=IKJEFT01,PARM='%MYPGM' which runs a, in my case, REXX program called MYPGM, which then does the TSO allocates for the ISPF datasets, followed by ISPSTART CMD(%MYPGM2). Which is either a TSO command, or another REXX program which does a TSO CALL to actually invoke the processing program. All that overhead just so that my program can, for instance, use a DSINFO to __easily__ get a list of cataloged datasets and their attributes. Again, what I really would like is something like the ISPF services (non DISPLAY). But make them available via a simple COBOL CALL verb without the need for the complicated JCL and REXX layers. This would allow a COBOL program to easily allocate and open a PDS, get a list of the members, and then read one or more of the members. All in a relatively simple, easy to use, way. The same with z/OS UNIX files too. Or use DSINFO for some DASD management reports. I guess it's just a recent itch of mine. Not possible as I would like to do it, so I'm just stuck with the clumsy (IMO) way. -- This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
Do you actually have a billion numbers in your data? If not, my thought would be to only generate as many mapped keys as you have unique live keys. That's what the pseudo code meant to say. Don't generate a key until you need one. You could even do this using VSAM as the data store. Or, even simplier since you don't need the mapped key to stay uniquely mapped to the same live key, generate them in an AMODE(31) table. PIC S9(9) could be stored in 5 bytes. A full billion, 5 byte, packed numbers would require 5 billion bytes of storage (5 Gb), or about 2^23 bytes. If you wanted to, you could run a program and save this in a VSAM Linear dataset. You could then use this dataset as your permanent map and access it as a DIV (Data In Virtual) file, using very efficient memory mapping. Or create it as an ESDS and access it in RBA mode. Or perhaps even an VSAM RRDS. Generating the file may take a while, especially to guarantee the uniqueness of the random map. The biggest problem migh! t be finding a random number generator which can actually generate uniformly random values in the range [0..5,000,000,000]. Do it over a weekend. Or in a low priority batch job. The dataset should fit on 3 volumes of 3390-3 space. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Roberts, John J Sent: Friday, May 25, 2012 11:11 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Masking Numeric Keys Do you need to keeping the masking values between runs? I.e. must the masked value be the same for the same input on multiple runs? No - we will extract a full set of PROD data, mask it, and then burn a DVD for our vendor. If they ask for a refresh, we will just repeat using current PROD data. If not, then the simpliest way that I can think of is to either use a sequential number as the replacement value. Keep a hash table so that when you look at the unmapped number, you can either determine it has already been seen and has a replacement value. If is does, then replace it. If it doesn't, generate the next number in order and update your mapping data with the input value and its replacement. This could be as simple as a very large sequential array. If you have DB2, then you've got an easy way. Create a table with two column. The first column is defined as a serial number which is autogenerated by DB2. The second column is the live number. Put an index on both columns. When you get a live number, do a lookup in the table to retrieve the mapped value. If the lookup fails, add the live number to the table, getting the serial number assigned. If this is not random enough, then actually use a random generated number instead of a serial number in the first (live) column. This is a bit more complicated since, if the live number is not yet in the table, you'll need to generate the random number and try to insert a new row (unique index on both of the column). If the new row inserts properly (which guarantees that both the random number and live number are unique in the table), use the random number. If the new row does not insert, then generate a new random number and try to insert again. Repeat until the row inserts and use ! t! John, this is actually kinda like my plan B. A real identifier of value N would be translated to be the Nth value in a sequence of pseudo-random numbers. The only problem is maintaining a billion row table. I have thought of asking our security officer if I can get away with only masking the last six digits of the identifier, leaving the first three ASIS. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: REPRO MERGECAT performance
Tim, I would love to hear about any as well. I have done a few and the length of time (even at 0200 ) was poor. I had to ask for 6 hours and was put off for quite some time. I ended up leaving and really never cared what happened. Ed On May 25, 2012, at 8:14 AM, Tim Hare wrote: We've just done a couple of REPRO MERGECATs that were fairly large, and took some time, so I was wondering: Can MERGECAT performance be improved by altering the buffer space values for either the input or output catalog, or both? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: REPRO MERGECAT performance
Mary Ann, From a long time ago the length of time was accessing other items than the catalog. Ed On May 25, 2012, at 11:02 AM, Mary Anne Matyaz wrote: Can MERGECAT performance be improved by altering the buffer space values for either the input or output catalog, or both? If you have a lot of VSAM, probably not. As I recall, doing a large repro mergecat with a lot of VSAM was very slow, but it was mostly due to the need to go change every vvds entry. In other words, I don't think you'll get a lot of bang for your buck. Mary Anne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Masking Numeric Keys
Do you actually have a billion numbers in your data? If not, my thought would be to only generate as many mapped keys as you have unique live keys. That's what the pseudo code meant to say. Don't generate a key until you need one. You could even do this using VSAM as the data store. Or, even simplier since you don't need the mapped key to stay uniquely mapped to the same live key, generate them in an AMODE(31) table. PIC S9(9) could be stored in 5 bytes. A full billion, 5 byte, packed numbers would require 5 billion bytes of storage (5 Gb), or about 2^23 bytes. If you wanted to, you could run a program and save this in a VSAM Linear dataset. You could then use this dataset as your permanent map and access it as a DIV (Data In Virtual) file, using very efficient memory mapping. Or create it as an ESDS and access it in RBA mode. Or perhaps even an VSAM RRDS. Generating the file may take a while, especially to guarantee the uniqueness of the random map. The biggest problem mig! h! t be finding a random number generator which can actually generate uniformly random values in the range [0..5,000,000,000]. Do it over a weekend. Or in a low priority batch job. The dataset should fit on 3 volumes of 3390-3 space. John, I will certainly do as you suggest if I strike out on finding an algorithm that is purely arithmetic. If I do resort to this, I would be doing it off platform using VB.Net and SQL Server. So a billion row table may even be feasible, after all my workstation has a terabyte HD. Another idea could be to have two indexes: one for the first five digits, and the other for the last four. If you break it up like this, the combined result is still unique, deterministic, and impossible to reverse engineer unless you have access to the translation index. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
From: paulgboul...@aim.com If I'm in SDSF, I type C in front of my user ID. Be aware that if you cancel your session your ISPF profile won't get saved. Dave Salt SimpList(tm) - try it; you'll get it! http://www.mackinney.com/products/program-development/simplist.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: REPRO MERGECAT performance
In the spirit of evenhandedness, faster mergecat is one of the good reasons to acquire T-Rexx from Dinosoft, or the other one :) Dave Gibney Information Technology Services Washington State University On May 25, 2012, at 11:02 AM, Mary Anne Matyaz wrote: Can MERGECAT performance be improved by altering the buffer space values for either the input or output catalog, or both? If you have a lot of VSAM, probably not. As I recall, doing a large repro mergecat with a lot of VSAM was very slow, but it was mostly due to the need to go change every vvds entry. In other words, I don't think you'll get a lot of bang for your buck. Mary Anne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Mystery from TSO
I have a user that somehow had her TSO profile prefix changed to the letter 'A'. She swears that she did not use the PROFILE command. Is there any other way that this prefix could have changed? Oh, and she does not drink on the job. John Norgauer Senior Systems Programmer Mainframe Technical Support Services University of California Davis Medical Center 2315 Stockton Blvd ASB 1300 Sacramento, Ca 95817 916-734-0536 SYSTEMS PROGRAMMING.. Guilty, until proven innocent !! JN 2004 Hardware eventually breaks - Software eventually works anon -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Mystery from TSO
Then you would need to change her prefix to AA. -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 14:10, John Norgauer wrote: I have a user that somehow had her TSO profile prefix changed to the letter 'A'. She swears that she did not use the PROFILE command. Is there any other way that this prefix could have changed? Oh, and she does not drink on the job. John Norgauer Senior Systems Programmer Mainframe Technical Support Services University of California Davis Medical Center 2315 Stockton Blvd ASB 1300 Sacramento, Ca 95817 916-734-0536 SYSTEMS PROGRAMMING.. Guilty, until proven innocent !! JN 2004 Hardware eventually breaks - Software eventually works anon -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: REPRO MERGECAT performance
Dave: We took the other one and in addition there were side bennies. We also got burned by an OEM that depended on some slight alterations to the catalog that were really not documented although I think IBM and the vendor agreed to disagree on the peculiarity (use of undocumented fields) in the catalog. I got caught in the middle as I raised the flag. IMO the vendor was at fault but its water under the bridge. I will never use the other vendor again as a result (although its a great vendor) I do not like getting burned. Ed On May 25, 2012, at 12:51 PM, Gibney, Dave wrote: In the spirit of evenhandedness, faster mergecat is one of the good reasons to acquire T-Rexx from Dinosoft, or the other one :) Dave Gibney Information Technology Services Washington State University On May 25, 2012, at 11:02 AM, Mary Anne Matyaz wrote: Can MERGECAT performance be improved by altering the buffer space values for either the input or output catalog, or both? If you have a lot of VSAM, probably not. As I recall, doing a large repro mergecat with a lot of VSAM was very slow, but it was mostly due to the need to go change every vvds entry. In other words, I don't think you'll get a lot of bang for your buck. Mary Anne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN - - For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
PPRC Cestpair problem
We are using PPRC Cestpair to duplex our DB2 farm for DR Backups. Have done it for years with no problem. Now I'm getting the following: CESTPAIR DEVN(X'1320') PRIM(X'1300',45342,X'20',X'03') SEC(X'1300',45342,X'21',X'03') MODE(COPY) PACE(100) COMMAND CONFLICTS WITH ESTABLISHED PPRC DEVICE STATE CESTPAIR COMMAND UNSUCCESSFUL FOR DEVICE 1320. COMPLETION CODE: 08 A similiar command earlier in the sequence works with no problem: CESTPAIR DEVN(X'132A') PRIM(X'1300',45342,X'2A',X'03') SEC(X'1300',45342,X'28',X'03') MODE(COPY) PACE(100) CESTPAIR COMMAND COMPLETED FOR DEVICE 132A. COMPLETION CODE: 00 READY The secondary volume has been varied offline to all other LPARs and has been detached from Z/VM. The hardware is an HDS 9990V. Is it possible I've hit a ceiling for the amount of PPRC Duplex volumes? We are currently duplexing 208 volumes. Any thoughts appreciated. Thank You, Dave O'Brien NIH Contractor -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Mystery from TSO
Perhaps a REXX exec which reset the profile to 'A'. Skolusu IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote on 05/25/2012 11:10:17 AM: From: John Norgauer john.norga...@ucdmc.ucdavis.edu To: IBM-MAIN@bama.ua.edu, Date: 05/25/2012 11:12 AM Subject: Mystery from TSO Sent by: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu I have a user that somehow had her TSO profile prefix changed to the letter 'A'. She swears that she did not use the PROFILE command. Is there any other way that this prefix could have changed? Oh, and she does not drink on the job. John Norgauer Senior Systems Programmer Mainframe Technical Support Services University of California Davis Medical Center 2315 Stockton Blvd ASB 1300 Sacramento, Ca 95817 916-734-0536 SYSTEMS PROGRAMMING.. Guilty, until proven innocent !! JN 2004 Hardware eventually breaks - Software eventually works anon -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Mystery from TSO
Are you using RACF or UADS (I still prefer UADS myself). With UADS I have seen strange occurrences. The UPT(?) gets written back to UADS and rarely it gets clobbered and is written back as it was in storage. Ed On May 25, 2012, at 1:10 PM, John Norgauer wrote: I have a user that somehow had her TSO profile prefix changed to the letter 'A'. She swears that she did not use the PROFILE command. Is there any other way that this prefix could have changed? Oh, and she does not drink on the job. John Norgauer Senior Systems Programmer Mainframe Technical Support Services University of California Davis Medical Center 2315 Stockton Blvd ASB 1300 Sacramento, Ca 95817 916-734-0536 SYSTEMS PROGRAMMING.. Guilty, until proven innocent !! JN 2004 Hardware eventually breaks - Software eventually works anon -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Mystery from TSO
chuckle Nice Friday line. To answer the OP: Other than a CLIST / REXX exec issuing the PROFILE PREFIX command, I don't think so. Unless you are using SYS1.UADS still and then someone could potentially edit the UADS member for that userid and modify it. Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:m...@mzelden.com Mark's MVS Utilities: http://www.mzelden.com/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ On Fri, 25 May 2012 14:17:09 -0400, Gord Tomlin gt.ibm.li...@actionsoftware.com wrote: Then you would need to change her prefix to AA. -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 14:10, John Norgauer wrote: I have a user that somehow had her TSO profile prefix changed to the letter 'A'. She swears that she did not use the PROFILE command. Is there any other way that this prefix could have changed? Oh, and she does not drink on the job. John Norgauer Senior Systems Programmer Mainframe Technical Support Services University of California Davis Medical Center 2315 Stockton Blvd -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: PPRC Cestpair problem
Is it possible I've hit a ceiling for the amount of PPRC Duplex volumes? We are currently duplexing 208 volumes. We are licensed by amount of space on our DS8300. Try issuing the CQUERY command against the secondary device. I'm guessing it is already in a pprc session. Cliff McNeill -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
On Fri, 25 May 2012 07:44:31 -0500, McKown, John john.mck...@healthmarkets.com wrote: I know that I can run the TSO TMP in batch. Using this, I can run a REXX program which sets up all the ISPF required datasets. I can then invoke ISPSTART with the CMD(...) option to run another program/CLIST/REXX. In that program, I can use most of the non-DISPLAY oriented services, such as DIRLIST or DSINFO. The TSO book on IKJTSOEV only talks about ISPF in the negative, but mentions display services. So, can I write a batch program which uses IKJTSOEV to set up a TSO environment. Once I have a TSO environment set, can I directly invoke ISPF services? What I would like to do is to have some simple way in a batch program to invoke ISPF services such as DSINFO without the hokeyness of running the TSO TMP. And also without invoking ISPSTART and telling it to run a separate program/CLIST/REXX routine. But I don't think it's possible. Frustrates me no end. As others have noted, you have to be under ISPF to use ISPF services. But you should be able to start ISPF from your program once it's setup a TSO environment using IKJTSOEV. So you might consider: (a) Invoking IKJTSOEV (b) Using IDENTIFY to create an alias (say, for example, XYZ) for an address within your program (c) Invoking ISPSTART (with an appropriate CPPL, etc.) and telling it to invoke XYZ. I'd probably ATTACH it, for safety. At that point, the rest of your code, starting at the XYZ address, is under ISPF. -- Walt -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: PPRC Cestpair problem
No, target device is simplex as is the primary device (PRIMARY) (SECONDARY) * SSID CCA LSS SSID CCA LSS* DEVICE LEVEL STATE PATH STATUS SERIAL# SERIAL#* -- - -- --- -- * 1321 . SIMPLEX... INACTIVE 1300 21 03 .. * ... ... 00045342 1300 21 03* ... ... * PATHS SAID DEST STATUS: DESCRIPTION * - - -- --- * 0 00NO PATH * 00NO PATH * 00NO PATH * 00NO PATH * SUBSYSTEM WWNN LIC LEVEL * --- --- * PRIMARY 96.0.0.0* *** NTP0001I CQUERY COMMAND COMPLETED FOR DEVICE 1321. COMPLETION CODE: 00 ** (PRIMARY) (SECONDARY) * SSID CCA LSS SSID CCA LSS* DEVICE LEVEL STATE PATH STATUS SERIAL# SERIAL#* -- - -- --- -- * 1320 . SIMPLEX... INACTIVE 1300 20 03 .. * ... ... 00045342 1300 20 03* ... ... * PATHS SAID DEST STATUS: DESCRIPTION * But thanks for the suggestion. Thank You, Dave O'Brien NIH Contractor From: Clifford McNeill [sy...@hotmail.com] Sent: Friday, May 25, 2012 2:37 PM To: IBM-MAIN@bama.ua.edu Subject: Re: PPRC Cestpair problem Is it possible I've hit a ceiling for the amount of PPRC Duplex volumes? We are currently duplexing 208 volumes. We are licensed by amount of space on our DS8300. Try issuing the CQUERY command against the secondary device. I'm guessing it is already in a pprc session. Cliff McNeill -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
SV: How to leave ISPF
-Ursprungligt meddelande- Från: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] För Don Poitras Skickat: den 25 maj 2012 17:24 Till: IBM-MAIN@bama.ua.edu Ämne: Re: How to leave ISPF In article 9817663136320041.wa.paulgboulderaim@bama.ua.edu you wrote: On Fri, 25 May 2012 15:54:05 +0200, R.S. wrote: When one leaves ISPF usually there is a panel Specify Disposition of Log Data Set. Usually the answer is 2 - delete. Q: how is it possible to exit ISPF by choosing some option (X - Exit) and NOT see the panel? I saw it many moons ago. BTW: I don't ask how to logoff TSO immediately after leaving ISPF. This is another issue. If I'm in SDSF, I type C in front of my user ID. I miss the VM CP LOGOFF command. Blink of an eye. -- gil If you don't mind just abending yourself, you could always hit SYSREQ and type in LOGOFF. Well, here I learned something new! Finally a usage for SysReq! Regards, Thomas Berg __ Thomas Berg Specialist AM/DQS SWEDBANK AB (publ) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
Very good. Thanks much, Walt. Now to encapsulate that functionality in a subroutine. And, horrible person that I am, my subroutine will be in HLASM and packaged as an LE enabled DLL so I can use it in my UNIX programs. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM snip As others have noted, you have to be under ISPF to use ISPF services. But you should be able to start ISPF from your program once it's setup a TSO environment using IKJTSOEV. So you might consider: (a) Invoking IKJTSOEV (b) Using IDENTIFY to create an alias (say, for example, XYZ) for an address within your program (c) Invoking ISPSTART (with an appropriate CPPL, etc.) and telling it to invoke XYZ. I'd probably ATTACH it, for safety. At that point, the rest of your code, starting at the XYZ address, is under ISPF. -- Walt -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Snap dump question
All: I have a program that uses a dsect...filling in fields and then calls an external program. I am doing a RACF extract through IRRSEQ00.. OPEN (SNAPOUT,OUTPUT) LA R3,SNAPOUT SNAP DCB=(3),TCB=(5),PDATA=ALL CLOSE SNAPOUT L R15,=V(IRRSEQ00) BALR R14,R15 ** dcb ** SNAPOUT DCB DDNAME=SNAPOT,DSORG=PS,MACRF=(W),RECFM=VBA,LECL=125 I want to see the the contents of the dsect prior to the call, I am experiencing the dreaded S0C4-11 When I execute the above code the SNAPOUT contents shows nada.. can anyone shed some light on my mistake, yes I am admiting I make mistakes :( Regards, Scott J Ford Software Engineer http://www.identityforge.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Snap dump question
Scott, Is LECL=125 just a typo for LRECL=125 in your post, or is it LECL in your code too? John Gilmore, Ashland, MA 01721 - USA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Snap dump question
On 5/25/12, John Gilmore johnwgilmore0...@gmail.com wrote: Scott, Is LECL=125 just a typo for LRECL=125 in your post, or is it LECL in your code too? John Gilmore, Ashland, MA 01721 - USA -- John Gilmore, Ashland, MA 01721 - USA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Snap dump question
John: That was correct in my code, thats what the manual gave..but I also found some of their parameter examples wrong Scott J Ford Software Engineer http://www.identityforge.com From: John Gilmore johnwgilmore0...@gmail.com To: IBM-MAIN@bama.ua.edu Sent: Friday, May 25, 2012 4:19 PM Subject: Re: Snap dump question On 5/25/12, John Gilmore johnwgilmore0...@gmail.com wrote: Scott, Is LECL=125 just a typo for LRECL=125 in your post, or is it LECL in your code too? John Gilmore, Ashland, MA 01721 - USA -- John Gilmore, Ashland, MA 01721 - USA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Snap dump question
DBB LECL will almost certainly not assemble (as John G. was pointing out, a bit obtusely). Should be LRECL. A DSECT is just a name for the variables presumably (the assembler trusts you) pointed to by some register. (There are additional forms of USING but let's not go there now.) If I say USING MYDSECT,R5 and dump MYDSECT, John says USING HISDSECT,R5 and dumps HISDSECT, and you just dump whatever R5 points to, we are all going to get the same output. It does not matter whether my DSECT is a bunch of halfwords, John's is a bunch of doublewords, and the storage in question is actually a bunch of bit fields. Dropping back from the dump question to DSECTs in general, if I say MYDSECT DSECT FOO DSF'0' BAR DS F'0' ... USING MYDSECT,R5 L R1,BAR the only thing I have accomplished is a (theoretically) more readable version of L R1,4(,R5) A DSECT is not really there -- it is just a story you have told the assembler about what you claim is there. If R5 is pointing out in the weeds then L R1,BAR is going to blow up exactly the same as L R1,4(,R5). Neither the assembler nor any sort of runtime validates USING MYDSECT,R5 (beyond the syntax). The L R1,BAR above will always assemble cleanly, even if the preceding instruction is L R5,=F'-1', which is obviously going to produce a S0C4 then at runtime. Perhaps you already knew that. Perhaps the S0C4 is unrelated to DSECTs. I have not used SNAP in about fifty years (literally). I don't think PDATA=ALL should be dependent on DSECTs or anything else -- it should just dump all of your program storage. No amount of erroneous DSECT definitions should matter one iota. Or are you also using SNAP LIST= ? I am not certain if LIST=(MYDSECT+X'8000',MYDSECT+100) would assemble but it will not work at run time -- an address constant in memory will NEVER assemble pointing to a DSECT because a DSECT is just a story you have told the assembler about a register, not storage that exists at assembly time -- and might well S0C4, I don't know. Do you really need TCB? If the SNAP is for your basic program storage then TCB is just adding to the confusion. How do you set R5? Is the DCB in 24-bit storage? On what instruction is the S0C4? Your hand-coded assembler? Inside a macro expansion? Out in SNAP magic land? Charles -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Friday, May 25, 2012 12:33 PM To: IBM-MAIN@bama.ua.edu Subject: Snap dump question All: I have a program that uses a dsect...filling in fields and then calls an external program. I am doing a RACF extract through IRRSEQ00.. OPEN (SNAPOUT,OUTPUT) LA R3,SNAPOUT SNAP DCB=(3),TCB=(5),PDATA=ALL CLOSE SNAPOUT L R15,=V(IRRSEQ00) BALR R14,R15 ** dcb ** SNAPOUT DCB DDNAME=SNAPOT,DSORG=PS,MACRF=(W),RECFM=VBA,LECL=125 I want to see the the contents of the dsect prior to the call, I am experiencing the dreaded S0C4-11 When I execute the above code the SNAPOUT contents shows nada.. can anyone shed some light on my mistake, yes I am admiting I make mistakes :( Regards, Scott J Ford Software Engineer http://www.identityforge.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
On Fri, 25 May 2012 13:59:37 -0500, McKown, John john.mck...@healthmarkets.com wrote: Very good. Thanks much, Walt. Now to encapsulate that functionality in a subroutine. And, horrible person that I am, my subroutine will be in HLASM and packaged as an LE enabled DLL so I can use it in my UNIX programs. I don't think it's amenable to coding as a subroutine, John. At least not using ATTACH. And even without using ATTACH I'm not sure I see a good way to run multiple service calls to ISPF. -- Walt -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Snap dump question
DBB LECL will almost certainly not assemble (as John G. was pointing out, a bit obtusely). Should be LRECL. I meant DCB LECL and LRECL, obviously. Charles -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Charles Mills Sent: Friday, May 25, 2012 3:28 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Snap dump question DBB LECL will almost certainly not assemble (as John G. was pointing out, a bit obtusely). Should be LRECL. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
In 8947834608329895.wa.markmzelden@bama.ua.edu, on 05/25/2012 at 10:04 AM, Mark Zelden m...@mzelden.com said: This part wasn't answered. You need to use the field mark key (x'1E'). Does ISPF treat it the same way that TSO does? I thought that it was just another character except for TSO line mode. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
In a6b9336cdb62bb46b9f8708e686a7ea00e924b4...@nrhmms8p02.uicnrh.dom, on 05/25/2012 at 10:23 AM, McKown, John john.mck...@healthmarkets.com said: From my view point, it is because the user of my program simply does EXEC PGM=MYPGM rather than PGM=IKJEFT01,PARM='%MYPGM' which runs a, in my case, REXX program called MYPGM, which then does the TSO allocates for the ISPF datasets, followed by ISPSTART CMD(%MYPGM2). Which is either a TSO command, or another REXX program which does a TSO CALL to actually invoke the processing program. All that overhead just so that my program can, for instance, use a DSINFO to __easily__ get a list of cataloged datasets and their attributes. I don't see anything there that you wouldn't also have to do if you used IKJTSOEV. Again, what I really would like is something like the ISPF services (non DISPLAY). CSI is available from COBOL. But make them available via a simple COBOL CALL verb without the need for the complicated JCL and REXX layers. Are you putting complicated in quotes because you agree that it is *not* complicated? ;-) This would allow a COBOL program to easily allocate and open a PDS, get a list of the members, and then read one or more of the members. A COBOL program can already do those. Or use DSINFO for some DASD management reports. If you want to use the services of an application then you have to set up the environment of that application. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Snap dump question
In 1337974360.45500.yahoomail...@web164501.mail.gq1.yahoo.com, on 05/25/2012 at 12:32 PM, Scott Ford scott_j_f...@yahoo.com said: I have a program that uses a dsect To describe what? Please show the code that acquires the storage and establishes addressability. L R15,=V(IRRSEQ00) BALR R14,R15 R1? -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IKJTSOEV ISPF services question
In 1356750482717750.wa.paulgboulderaim@bama.ua.edu, on 05/25/2012 at 08:54 AM, Paul Gilmartin paulgboul...@aim.com said: (This might be more on-charter for ISPF-L.) Anything on-topic for ISPF-L is on topic here. However, if there are any ISPF gurus who don't subscribe to IBM-MAIN then it might be worthwhile trying both. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: How to leave ISPF
On Fri, 25 May 2012 19:01:13 -0400, Shmuel Metz (Seymour J.) shmuel+ibm-m...@patriot.net wrote: In 8947834608329895.wa.markmzelden@bama.ua.edu, on 05/25/2012 at 10:04 AM, Mark Zelden m...@mzelden.com said: This part wasn't answered. You need to use the field mark key (x'1E'). Does ISPF treat it the same way that TSO does? I thought that it was just another character except for TSO line mode. I don't know. But when used the way I described, you are in TSO READY from the =x;;x prior to the field mark, so it is TSO at that point, not ISPF. The drawback IIRC was that it never worked in split screen and that was another reason I started using the LOGOFF command from FASTPATH. I'm sure there are discussions about this in the ISPF-L archives. Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:m...@mzelden.com Mark's MVS Utilities: http://www.mzelden.com/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Snap dump question
Charles Mills writes begin extract DBB LECL will almost certainly not assemble (as John G. was pointing out, a bit obtusely). Should be LRECL /end extract Equally, 'DBB' should of course be 'DCB'. My point--serendipitously well illustrated by what you typed--was that, since the OP obviously knows that 'LECL'. should be 'LRECL', there was a strong possibility that his typo was a transcription error, defective in his post but not in his code. In reviewing the language I used to make this point I find no basis for the notion that it is obtuse. (It is at once clear and polite, but perhaps I should add that I am capable of being impolite.) While I am responding, I do not much like your 'definition'/characterization of a DSECT. A DSECT is a portable putative storage template. It describes but neither allocates nor initializes a block of storage. Like other preogramming constructs, a DSECT can be misused. You are of course correct that if pointed in the weeds it will yield gibberish and, with luck, a quick ABEND. John Gilmore, Ashland, MA 01721 - USA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Mystery from TSO
I have seen this myself (albeit years ago). Someone updated the UPT (in storage via cross memory services long story don't ask) and logged off. During the logoff process the system rewrites the UPT in UADS not sure about RACF). Its been ages but one of the (at least I could find) undocumented fields in the UPT was CPU time (total since the user was created). I don't recall how I found that but I think it was found in the Fiche (before OCO naturally). I think it was when I was working on the tso pre prompt exit. Its got to be 30+ years. Ed On May 25, 2012, at 1:30 PM, Mark Zelden wrote: chuckle Nice Friday line. To answer the OP: Other than a CLIST / REXX exec issuing the PROFILE PREFIX command, I don't think so. Unless you are using SYS1.UADS still and then someone could potentially edit the UADS member for that userid and modify it. Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:m...@mzelden.com Mark's MVS Utilities: http://www.mzelden.com/mvsutil.html Systems Programming expert at http:// expertanswercenter.techtarget.com/ On Fri, 25 May 2012 14:17:09 -0400, Gord Tomlin gt.ibm.li...@actionsoftware.com wrote: Then you would need to change her prefix to AA. -- Regards, Gord Tomlin Action Software International (a division of Mazda Computer Corporation) Tel: (905) 470-7113, Fax: (905) 470-6507 On 2012-05-25 14:10, John Norgauer wrote: I have a user that somehow had her TSO profile prefix changed to the letter 'A'. She swears that she did not use the PROFILE command. Is there any other way that this prefix could have changed? Oh, and she does not drink on the job. John Norgauer Senior Systems Programmer Mainframe Technical Support Services University of California Davis Medical Center 2315 Stockton Blvd -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: SMS Dataset Alloc Issue
You misinterpreted. If the dataset is not catalogued in the normal search order, you have to tell DSLIST to search all the catalogs. The way to do this is to specify a wild card as the HLQ, include any additional qualifiers to limit the output, and NOT specify a volume. In the example you posted, try **.SMS.SCDS. If you specify the Display Catalog Name option, it will be easy to see which cluster came from MCATB and which components belong to that cluster. (This assumes SOZ1D.MASTER.CATALOG is connected to your current master catalog. Reasonable since otherwise your define would have failed.) :: -Original Message- :: From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On :: Behalf Of saurabh khandelwal :: Sent: Friday, May 25, 2012 5:24 AM :: To: IBM-MAIN@bama.ua.edu :: Subject: Re: SMS Dataset Alloc Issue :: :: Hello Group, :: Walter has clarified my doubt that I am trying :: to :: see a cluster cataloged under MCATB from a system whose master catalog :: is :: MCATA. Then, it is perfectly normal to see only the data part of the :: cluster. So I will be able to see cluster+data only when I logon on :: thesystem whose master catalog is MCATB. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN