Re: Access on ALESERV

2012-06-13 Thread Rob Scott
Have you read Using Access Registers in MVS Extended Addressability?


Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 13 June 2012 16:19
To: IBM-MAIN@bama.ua.edu
Subject: Access on ALESERV

Hi,

 

 Can anyone explain to me the significance of the ACCESS parameter on the 
ALESERV MACRO

 

THANKS  


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: ALESEERV AL=PASN

2012-06-12 Thread Rob Scott
Can I strongly suggest that you review the MVS Extended Addressability manual 
: SA22-7614

It is a very well written guide on how to do exotic things in z/OS including 
synchronous cross-memory, AR-mode programming and managing dataspaces and 
hiperspaces.

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 12 June 2012 13:29
To: IBM-MAIN@bama.ua.edu
Subject: Re: ALESEERV AL=PASN

Thanks

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Dave Day
Sent: Tuesday, June 12, 2012 8:26 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: ALESEERV AL=PASN

Michael,

 If you re executing an AESERV to add an alet, it means the alet is 
available to all units of work in the pasn address space.

 --Dave

On 6/12/2012 7:09 AM, Micheal Butz wrote:
 Hi,



   Does AL=PASN on the ALESERV macro mean that the ALET is available to 
 all address spaces



 Which is the same concept LXRES with SYSTEM=YES



 Correct ??


 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: SRB mode question

2012-06-10 Thread Rob Scott
All IBM services, whether branch entry, PC or SVC have their supported modes 
(TCB and/or SRB)  and cross-memory environments documented in the manuals.

I would strongly advise that you refer to the manuals than use any sort of 
generalizations.

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 10 June 2012 16:30
To: IBM-MAIN@bama.ua.edu
Subject: SRB mode question

Hi,

 

It's been a while since I scheduled an SRB If I use any IBM services in a SRB I 
use the branch entry from but I just looked at some documentation Cross memory 
for beginners

 

And it seems PC rtns are also okay in SRB mode didn't specify SSWITH (space 
switch or not)

 

 

Just wanted to verify this

 

 

thanks 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: ENF Listener usage

2012-06-08 Thread Rob Scott
The possibility of consuming extra CSA is much less desirable that a few extra 
instructions inside a neutered ENF listener routine.

I would probably choose option (2)

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Phil Smith
Sent: 07 June 2012 22:20
To: IBM-MAIN@bama.ua.edu
Subject: ENF Listener usage

We have a long-running Started Task that controls the use of an ENF listener 
for SMF interval record collection with an operator command.  The ENF listener 
requires use of CSA storage.

When the Started Task receives an operator command to start SMF interval 
processing it allocates CSA storage, registers the ENF listener, and WAITs for 
interval expiration.

The question is: what should it do when the operator command says to stop SMF 
interval processing?

The options seem to be:


1)  Deregister the ENF listener and free the CSA storage, meaning an 
operator can switch SMF interval processing on and off, causing CSA storage to 
be allocated and deallocated, possibly fragmenting CSA storage.  But when we 
aren't collecting SMF interval data, we won't have an ENF listener registered.


2)  Leave the ENF listener registered, but stop writing records when the 
interval expires. Don't stop the ENF listener and free CSA until the Started 
Task terminates (or possibly a special operator command like /f stcname,SMF 
STOP).  This approach is easier on CSA allocations for the case where the 
operator is switching SMF interval collection on and off.  But it leaves an ENF 
listener registered when one is not needed.

Which approach have you seen? Which is better (and why)?

Thanks,
--
...phsiii

Phil Smith III
p...@voltage.commailto:p...@voltage.com
Voltage Security, Inc.
www.voltage.comhttp://www.voltage.com/


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: SR

2012-06-08 Thread Rob Scott
 The component choice, however, is utterly baffling.  How that got into 
 production is a complete mystery.  No matter how I try I can not find a 
valid choice for Comm Server, for example.   

Agree completely - this very thing had me and a couple of our sysprogs 
scratching our heads for a while.

Eventually found Comms Server under our entitlement for z/OS base product - 
even though SR was listing things like Communications Server for VSE in the 
search results screen.

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Tom Ambros
Sent: 08 June 2012 16:23
To: IBM-MAIN@bama.ua.edu
Subject: Re: SR

I'm not feeling the hate, except for the one item just mentioned. 

The second sign on amounts to 9 keystrokes, one click and one enter - first 
character of userid, accept Chrome's prompt, enter password and hit enter.  
Once a day? No big deal.  Leave the browser window open. 

Being able to attach files is convenient. 

The long outage was a head scratcher but with one exception I think SR is no 
worse than and in some ways better than ETR.

The component choice, however, is utterly baffling.  How that got into 
production is a complete mystery.  No matter how I try I can not find a 
valid choice for Comm Server, for example.   There's always a delay while 
they go out and figure out that, yes, we are entitled for the product when I 
force the choice.  I really don't think it is a user issue, either. 
Something just isn't hooking up right. 

Thomas Ambros
Operating Systems and Connectivity Engineering
518-436-6433





From:   mvs1sp mvs...@yahoo.com
To: IBM-MAIN@bama.ua.edu
Date:   06/08/2012 11:11
Subject:Re: SR
Sent by:IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu



I have found it to be very unfriendly. I wish IBM would have incorporated the 
good features of ETR.  I have not gotten emails when the record is updated ( my 
profile requests such), so I have to logon (twice) just to check - this is a 
time waster to me. I opened a SR to the SR Help Desk, but I do not think they 
understood the problem. 
I have found it incredibly difficult to choose a component. For example, using 
z/OS as a keyword and selecting the show only entitled check box results in 
475 choices. Browsing through that list, I see far more products for which I am 
NOT licensed.
Response time is slower than ETR.
 
In short, ETR much better.
 
 
--- On Thu, 6/7/12, Dick Bond dickbond...@gmail.com wrote:


From: Dick Bond dickbond...@gmail.com
Subject: SR
To: IBM-MAIN@bama.ua.edu
Date: Thursday, June 7, 2012, 5:12 PM


Anyone else as disgusted with the SR replacement as I am?  Half time, it 
doesn't updae the record correctly and you have to sign-on twice just to
get into the thing.   On a positive note, you can download files which is
nice but does not make up for the generally poor design.  Makes me wonder if 
anyone at IBM bothered to look at the ETR function and how easy that was to 
use before designing SR.

I can't help but feel IBM is shooting itself in the foot by deploying stuff 
like SR while making it worse that the prior product.  Sorry for rant but I 
see SR just one component of The Rise and Fall of IBM.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

This communication may contain privileged and/or confidential information. It 
is intended solely for the use of the addressee. If you are not the intended 
recipient, you are strictly prohibited from disclosing, copying, distributing 
or using any of this information. If you received this communication in error, 
please contact the sender immediately and destroy the material in its entirety, 
whether electronic or hard copy. This communication may contain nonpublic 
personal information about consumers subject to the restrictions of the 
Gramm-Leach-Bliley Act. You may not directly or indirectly reuse or redisclose 
such information for any purpose other than to provide the services for which 
you are receiving the information.

127 Public Square, Cleveland, OH 44114
If you prefer not to receive future e-mail offers for products or services from 
Key send an e-mail to mailto:dnereque...@key.com with 'No Promotional E-mails' 
in the SUBJECT line.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

Re: Cell pool questions

2012-05-30 Thread Rob Scott
Charles

You could solve this requirement using a code solution - for example :

(1) Design a common structure for a cell pool identifier - something that 
includes the cell pool id and some double-word count fields for GET and 
FREE operations
(2) Build a macro to front-end the CPOOL GET and CPOOL FREE services (eg #CPOOL 
GET  and #CPOOL FREE) that take a pointer to the structure in (1) as a parameter
(3) Inside the macro, issue the real CPOOL GETs and FREEs - however you can now 
maintain the GET and FREE count fields using CSG
(4) Write your own service to list/dump the contents of the structures in (1) 
for diagnostic purposes

Obviously the above is simplistic and you could get into a more elegant 
solution depending on the environment that you are working in. 
If the program is running in a server, then perhaps you could consider a 
separate TCB acting as a storage manager (SM) and all other TCBs having some 
sort of API to GET and FREE cells from within defined pools. If so, the SM TCB 
could use callable cell pool services to manage the pools and the APIs could 
just manage your own free cell queue(s). The big advantage of callable cell 
pool services is the ability to contract the pools if required.   
 

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Charles Mills
Sent: 30 May 2012 21:09
To: IBM-MAIN@bama.ua.edu
Subject: Re: Cell pool questions

Jim, thanks.

Wow, I totally did not get that. I saw it as two different APIs to the same 
core service, like the C and assembler APIs to TCP/IP. Not sure if it is just 
me, but you might want to make that clearer in the documentation, seeing as 
both are called Cell Pool Services. I almost did not bother to ask question 
(1.) as it seemed so obvious that the answer was Yes.

Okay, moving right along ... re-formulating the question:

Is there any way to determine the number of cells in a CPOOL cell pool? I have 
a cell pool with a primary and a secondary count. It occurs to me that if, for 
example, I had a bug in which one time in ten I failed to return a cell to the 
pool, that I would have no indication of a problem until I got an SC78 abend, 
which might take quite a while.

I am kind of inferring that I could do a LIST and get the number of extents 
from work area Word 3 (possibly iteratively based on Word 1), from which I 
guess I could determine the pool size as primary + (secondary * (extents - 1)). 
Is that correct? Or is there not a one-to-one between pool expansions and 
extents?

Is there a better way?

Actually, I now see that that method won't work very well because I have no way 
of making sure that there would be no intervening GET requests. The GET 
requests come from asynchronous processes which the main task has no ability to 
pause. I guess I could just make sure the work area was large enough to get all 
of the extents in a single call?

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Jim Mulder
Sent: Wednesday, May 30, 2012 12:23 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Cell pool questions

 1. Can I mix CPOOL and CSRP calls on the same cell pool? Could one
for
 example use CPOOL GET for performance, and CSRPQPL to obtain 
 statistics
that
 are not available through CPOOL? I already have working CPOOL macro
code,
 but I would like to get the CSRQPL statistics. Can I do so without
having to
 re-write my working CPOOL macro code?
 
 2. Assuming the answer to (1.) is Yes, what CSRPQPL calls anchor_addr 
--
 is that the same datum that CPOOL calls pool id?

 No, CPOOL and CSRP are completely different services, which have no 
relation to each other. 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: CSVDYNEX ?'s

2012-05-26 Thread Rob Scott
If your dynamic exit has its own recovery routine and it recovers successfully, 
the the abend count will not be incremented and CSV430I will be avoided.

There is no documented ENF signal for any CSVDYNEX service.

You have at least the following choices for notification of possible problems 
with your exit :

(o) Periodically issue the LIST request to check on the exit status
(o) Make your dynamic exit update a count field or STCK value somewhere every 
time it is invoked.
(o) If you have a recovery routine for the exit, you could provide your own 
notification service to your server address space when it is invoked for an 
abend in the exit.

I would probably choose the last option.

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Paul Schuster
Sent: 25 May 2012 17:50
To: IBM-MAIN@bama.ua.edu
Subject: CSVDYNEX ?'s

The CSVDYNEX macro provides keywords ABENDNUM and ABENDCONSEC to control how 
many times the exit routine can abend before the exit is disabled.

1) At what point does the dynamic exit processing determine that an abend has 
occurred?  If I were to provide an ESTAE or similar recovery routine in my 
exit, what that be sufficient to prevent the exit from becoming disabled? 
(Assuming it recovered correctly.)

2) Other than the 

CSV430I MODULE  FOR EXIT IGGPRE00_EXIT HAS BEEN MADE INACTIVE
DUE TO ABEND=xx REASON=   

message appearing, is any notification made available?  Specifically an ENF?  
(I did not see any mention of that in the docs.)

3) If a recovery routine in the exit itself (as in (1) above) is not the 
answer, then what is the correct way to provide recovery?  The CSVDYNEX RECOVER 
option seems to be only for callers of the exit; I am essentially only doing a 
CSVDYNEX ADD,STATE=ACTIVE.

Thank you for any insight.

Paul Schuster
   

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Retiring after 43+ years with IBM

2012-05-16 Thread Rob Scott
Frank

You were one of the first IBMers I ever saw that went *way* beyond the call of 
duty to help others.

You will be missed.

Enjoy your retirement!

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Frank Yaeger
Sent: 16 May 2012 02:00
To: IBM-MAIN@bama.ua.edu
Subject: Retiring after 43+ years with IBM

Just a note to let everyone know I'll be retiring at the end of this month 
(5/31/2012).  I've been with IBM for 43+ years (plus a couple of summers in 
college) and I've enjoyed my career immensely.  I've especially enjoyed being 
able to help people use the DFSORT/ICETOOL functions I developed, over many 
years, in new and interesting ways.

Once I retire, I won't be posting solutions any more since I won't have access 
to a mainframe to test them, and I don't like posting untested solutions.  I 
may lurk a bit or I may not.

I'm looking forward to retirement, but I'll also miss this list.  I'm happy to 
say that others on the DFSORT Team will continue to contribute.

Thanks to everyone for giving me the chance to earn a living all these years 
doing something that was a lot of fun for me.

Long live the mainframe, IBM, z/OS, DFSORT and ICETOOL!

Frank Yaeger - DFSORT Development Team (IBM) - yae...@us.ibm.com
Specialties: JOINKEYS, FINDREP, WHEN=GROUP, ICETOOL, Symbols, Migration

 = DFSORT/MVS is on the Web at http://www.ibm.com/storage/dfsort

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Any way to programmatically detect diagnostic trap IGVCPOOLFREEQ active

2012-05-16 Thread Rob Scott
See ' SYS1.MODGEN(IGVDGNB)'

ECVT---ECVTDGNBDGNB

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Dave Day
Sent: 16 May 2012 17:20
To: IBM-MAIN@bama.ua.edu
Subject: Any way to programmatically detect diagnostic trap IGVCPOOLFREEQ active

 Does anyone know of any way to determine which diagnostic traps are 
active?  Is it possible?  Since my code makes heavy use of cell pools, 
IGVCPOOLFREEQ can have an impact on performance.

 --Dave Day

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: EXCP count like SDSF

2012-05-15 Thread Rob Scott
Look at ASCBIOSX and ASCBIOSC in the ASCB (IHAASCB)

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 15 May 2012 19:24
To: IBM-MAIN@bama.ua.edu
Subject: EXCP count like SDSF

Hi

Is it possible to find the actual EXCP count value in the address spac ?

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Any simple tool to monitor the storage uasge ?

2012-05-04 Thread Rob Scott
The MXI 4.3 freeware product comes with a REXX interface - it returns the 
information that would have been presented on the screen as a set of REXX stem 
variables for each logical line.

The commercial version of MXI has an enhanced REXX API where you can directly 
access each column variable without having to parse the screen line. 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 04 May 2012 11:35
To: IBM-MAIN@bama.ua.edu
Subject: Any simple tool to monitor the storage uasge ?

Hi

Any simple tool, to monitor the storage usage of an address space ?
I'm using now the MXI from Rob Scott, and it is very good, but I would need 
something like a function call to get this in a program or in REXX

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Any simple tool to monitor the storage uasge ?

2012-05-04 Thread Rob Scott
The VSMLIST service presents this information in a slightly more digestible 
form and it will also get the appropriate locks for the caller if you use 
LINKAGE=SYSTEM

It is what MXI uses under the covers for reporting on private or common subpool 
usage.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Bernd Oppolzer
Sent: 04 May 2012 13:00
To: IBM-MAIN@bama.ua.edu
Subject: Re: Any simple tool to monitor the storage uasge ?

Maybe you could write a function that reads the control blocks of the z/OS 
storage management queues and computes the overall size of the used storage 
blocks, per subpool?

If you call this function somewhere in a loop in your main program, you could 
discover if one of your subroutines allocates memory and doesn't free it.

See SPQE, DQE and FQE control blocks.

Kind regards

Bernd



Am 04.05.2012 13:25, schrieb Miklos Szigetvari:
 Hi

 Thank you, I will try out with REXX and stem.
 I would need something , shows the running address space memory usage 
 in some time intervals.



--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Leaving IBM

2012-03-26 Thread Rob Scott
Walt

Many thanks for all the help you have given me and other people over the years 
on IBM-Main and other forums.

Enjoy your retirement!

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Walt Farrell
Sent: 26 March 2012 14:53
To: IBM-MAIN@bama.ua.edu
Subject: Leaving IBM

I mentioned this over on RACF-L the other day, so for some of you this will be 
old news. 

I've been an IBMer for 28 years and have had a lot of fun with RACF and MVS, 
and I've had a lot of fun interacting with you folks on RACF-L and IBM-MAIN.

But the time has come for me to retire and have fun with other things. I've 
enjoyed the discussions here, and working with many of you to plan enhancements 
or resolve problems.  I'm sure I'll still read both lists for awhile, and 
probably even participate from a personal email address. 

But after Wednesday morning I will no longer be an active IBM employee and I'll 
speak about z/OS and RACF even less officially than than I do now.

It's been a great 28 years, but my family and other activities are calling to 
me more and more strongly, and it's time to spend more time with them.

Best wishes to you all,
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: WTOR problem

2012-03-19 Thread Rob Scott
WTOR and WTO are macros that require a model parameter list to be constructed 
and populated *before* you issue the MF=E form.

Zeroing the parameter list is NOT sufficient - you must move in a model MF=L 
form just before the MF=E invocation.

More modern macros have the ,COMPLETE option on the MF=E specification, 
unfortunately some of the older macros do not have this functionality.  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 19 March 2012 12:45
To: IBM-MAIN@bama.ua.edu
Subject: WTOR problem

Hi,

 

I am having problems with following coding generating a re-entrable version of 
the WTOR below is the relvant code

 

  LTORG

 DEBUG_MESS DC  C'THE BASE ADDRESS IS  '

 TBL  DC240X'00'   

  DCC'0123456789ABCDEF'

 

 

WS_DSECT   DSECT

D_MSG  DS   AL2 

   DS   CL29

WORKFLDDS   CL9

BASE_ADDR  DS   XL5

REPLY_AREA DS   X

REPLY_LEN  EQU  1

REPLY_ECB  DS   F   

WTO_D_LST WTOR TEXT=(,,,),MF=L 

WTO_D_LST_LEN  EQU  *-WTO_D_LST

 

 

  STR3,BASE_ADDR

  UNPK  WORK_FLD,BASE_ADDR  

  TRWORK_FLD,TBL

  MVC   D_MSG+2(L'DEBUG_MESS),DEBUG_MESS

  MVC   D_MSG+22(8),WORK_FLD

  MVC   D_MSG(2),=AL2(L'DEBUG_MESS) 

  XCWTO_D_LST(WTO_D_LST_LEN),WTO_D_LST  

 WTOR   TEXT=(D_MSG,REPLYAREA,REPLY_LEN,REPLY_ECB),MF=(E,WTO_D_L

ST) 



  WAIT ECB=REPLY_ECB



--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: WTOR problem

2012-03-19 Thread Rob Scott
I do not think so.

There could well be parameter list contents that are not set during MF=E logic 
that are primed by MF=L. 

Just because you specify all possible parameters does not mean that WTOR/WTO 
MF=E will generate a fully constructed parameter list.

It is a historical thing - and developers just have to put up with it and use 
the move the model in technique.

Be warned - there are other macros like this around.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 19 March 2012 14:07
To: IBM-MAIN@bama.ua.edu
Subject: Re: WTOR problem

Rob,

I understand that however moving the model *statement* would be sufficient if I 
coded WTOR MF=(E,WTOR_LIST) By coding 

WTOR   TEXT=(D_MSG,REPLYAREA,REPLY_LEN,REPLY_ECB),MF=(E,WTO_D_LX
   ST)  

With the parameters the macro should populate the parameter list

 
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Rob Scott
Sent: Monday, March 19, 2012 8:52 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: WTOR problem

WTOR and WTO are macros that require a model parameter list to be constructed 
and populated *before* you issue the MF=E form.

Zeroing the parameter list is NOT sufficient - you must move in a model MF=L 
form just before the MF=E invocation.

More modern macros have the ,COMPLETE option on the MF=E specification, 
unfortunately some of the older macros do not have this functionality.  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 19 March 2012 12:45
To: IBM-MAIN@bama.ua.edu
Subject: WTOR problem

Hi,

 

I am having problems with following coding generating a re-entrable version of 
the WTOR below is the relvant code

 

  LTORG

 DEBUG_MESS DC  C'THE BASE ADDRESS IS  '

 TBL  DC240X'00'   

  DCC'0123456789ABCDEF'

 

 

WS_DSECT   DSECT

D_MSG  DS   AL2 

   DS   CL29

WORKFLDDS   CL9

BASE_ADDR  DS   XL5

REPLY_AREA DS   X

REPLY_LEN  EQU  1

REPLY_ECB  DS   F   

WTO_D_LST WTOR TEXT=(,,,),MF=L 

WTO_D_LST_LEN  EQU  *-WTO_D_LST

 

 

  STR3,BASE_ADDR

  UNPK  WORK_FLD,BASE_ADDR  

  TRWORK_FLD,TBL

  MVC   D_MSG+2(L'DEBUG_MESS),DEBUG_MESS

  MVC   D_MSG+22(8),WORK_FLD

  MVC   D_MSG(2),=AL2(L'DEBUG_MESS) 

  XCWTO_D_LST(WTO_D_LST_LEN),WTO_D_LST  

 WTOR   TEXT=(D_MSG,REPLYAREA,REPLY_LEN,REPLY_ECB),MF=(E,WTO_D_L

ST) 



  WAIT ECB=REPLY_ECB



--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Enclave SRB's

2012-03-16 Thread Rob Scott
Have a look in the following manuals :

Authorized Assembler Services Guide 
Authorized Assembler Services Reference
Workload Management Services

Hints : IEAMSCHD and  IWM4ECRE 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 16 March 2012 15:35
To: IBM-MAIN@bama.ua.edu
Subject: Enclave SRB's

Hi,

 

I am looking for information on the use of enclave SRB/TCB's maybe an example 
of the usage

 

 

Thanks 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: How to? Receive response to a z/OS command issued by a program

2012-03-15 Thread Rob Scott
Yes - the accepted way to do this is to use EMCS consoles.

A few gotcha's waiting for you in the darkness :

(1) Name your EMCS console carefully - beware that other consoles active in the 
sysplex using the same name can generate confusion and extra return and reason 
codes to handle
(2) To get a response, use the CART keyword on the MGCRE - however, note that 
not all operator commands respond using the CART (it depends on the software 
that gets control to generate the response). 
(3) To handle (2), I would advise some sort of timer to pop after nn seconds 
and give up waiting for a response.

I think the data shown by SDSF on the LOG command (not opercmd responses) is 
gotten via spool browse services (or OPERLOG) rather than an EMCS with 
unsolicited messages.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
McKown, John
Sent: 15 March 2012 14:31
To: IBM-MAIN@bama.ua.edu
Subject: How to? Receive response to a z/OS command issued by a program

Yes, I'm trying something weird again. I just wrote a quick little HLASM 
program to issue commands via MGCRE. But I think I'm expecting too much for too 
little. I'd like to get the response. Which, from looking at the book, makes me 
think that I need to use the MCSOPER in order to have a EMCS console. Is this 
how it works? Is there anything else I should be looking at?

I guess what I'll end up accomplishing, if anything, is an equivalent to the 
SDSF LOG capability. In which case, maybe I should just use the SDSF REXX 
interface instead. Or, if I really want to be weird, the SDSF Java interface. 
 
--
John McKown
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone *
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Program FLIH backdoor - This is a criminal breach of security!

2012-03-08 Thread Rob Scott
1)If your authorized program while executing in PSW key 0-7 stores 
into an address provided by an unauthorized caller then this is a violation of 
the IBM statement of integrity.

Sorry - I disagree with this.

It is quite OK for auth routines (eg PC-ss) to store into storage whose address 
is provided by the caller *AS LONG AS THE CALLER'S KEY IS USED* when moving the 
data. 

See the MVCDK instruction.

Likewise any authorized routine should treat caller provided storage with 
suspicion and use MVCSK to copy any data from the caller and use trusted 
control block pointers rather than rely on caller contents.


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Ray Overby
Sent: 08 March 2012 18:46
To: IBM-MAIN@bama.ua.edu
Subject: Re: Program FLIH backdoor - This is a criminal breach of security!

Charles - yes, it is somewhat ambiguous what violation of the IBM statement of 
integrity means. Perhaps some Integrity Vulnerability examples will help 
clarify:

1)If your authorized program while executing in PSW key 0-7 stores 
into an address provided by an unauthorized caller then this is a violation of 
the IBM statement of integrity.

2)If your authorized program while executing in PSW Key 0-7 or 
supervisor state branches to an address provided by an unauthorized requester 
then this is a violation of the IBM statement of Integrity.

3)If your authorized program while executing in PSW Key 0-7 or 
supervisor state returns control to an unauthorized requester in an authorized 
state then this is a violation of the IBM statement of Integrity. By authorized 
state I mean PSW Key 0-7, Supervisor state, or now has the ability to MODESET.

4)If your authorized program while executing in PSW Key 0-7 copies 
fetch protected storage to non-fetch protected storage then this is a violation 
of the IBM statement of integrity.

The unauthorized requester in these case's would be any PSW Key 8 problem 
state program that is not currently enabled to MODESET prior to issuing a 
request to an authorized service. After the request completes the program now 
has new capabilities that were not available prior to the request such as:

-The program could now be in an authorized state (psw key 0-7 or 
supervisor state)
-The program could now have the ability to MODESET
-The security credentials may have been dynamically elevated (i.e. - 
I now have RACF privileged attribute which I did not have before)
-Some code provided by my program could have been executed in an 
authorized state (PSW Key 0-7 or Supervisor state).

If you examine the before and after state around the invoking of the authorized 
service you generally see some form of elevated capabilities when a violation 
of the IBM statement of integrity occurs.

Ray Overby
Key Resources, Inc.
Ensuring System Integrity for z/Series^(TM) www.zassure.com
(312)574-0007



On 3/8/2012 11:20 AM, Charles Mills wrote:
 I will give it one more shot at trying to clarify what I mean.

 Witness this thread, reasonable people can disagree on what violates 
 the statement of integrity means. One person's reasonable or only 
 available technique is another person's violation.

 We could use some finer granularity. We could use a standard statement 
 of does X but does not do Y.

 Charles

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On 
 Behalf Of Ray Overby
 Sent: Thursday, March 08, 2012 8:45 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Program FLIH backdoor - This is a criminal breach of security!

 The IBM statement of Integrity or its equivalent is a standard that 
 all authorized programs should conform with. See IBM statement of 
 Integrity 
 http://www-03.ibm.com/systems/z/os/zos/features/racf/zos_integrity_st
 atemen
 t.html.
 If you look at z/OS V1R12.0 MVS Authorized Assembler Services Guide:
 21.1.2
 http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/iea2a8b0/21.1.2?
 ACTION=MATCHESREQUEST=system+integrityTYPE=FUZZYSHELF=EZ2ZBK0KDT=2
 010062 
 9141054CASE=searchTopic=TOPICsearchText=TEXTsearchIndex=INDEXrank
 =RANK
 ScrollTOP=FIRSTHIT#FIRSTHIT/you/
 will see that IBM puts the responsibility on the installation for 
 ensuring the integrity (i.e. - conforms to the IBM statement of
 Integrity) for any modifications or extensions to z/OS the 
 installation makes. This would include any authorized code 
 written/installed by the installation as well as any authorized code 
 installed that is from ISVs.

 If the backdoor, intercept, or other authorized program violates the 
 IBM statement of integrity then it is a problem that needs to be remediated.

 --
 For IBM-MAIN subscribe / signoff / archive access

Re: Program FLIH backdoor - This is a criminal breach of security!

2012-03-08 Thread Rob Scott
How about :

If your authorized program, while executing in PSW key 0-7 stores into an 
address provided by an unauthorized caller without using the caller's key then 
this is a violation of the IBM statement of integrity

I am sure there are other people on IBM-Main who could make this more readable 
and accurate.

Truth is that there are lots programs out there (public domain, in-house 
utilities) that just splat into caller storage using Key0 regardless of caller 
key.

A good example of how to do it properly in Authorized Assembler Programming 
Guide would be my preferred start for re-education of the masses.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Ray Overby
Sent: 08 March 2012 19:15
To: IBM-MAIN@bama.ua.edu
Subject: Re: Program FLIH backdoor - This is a criminal breach of security!

Rob - How about: If your authorized program while executing in PSW Key
0-7 stores into an address provided by an unauthorized caller (as long as the 
store operation uses the execution PSW KEY) then this is a violation of the IBM 
statement of integrity.

Ray Overby
Key Resources, Inc.
Ensuring System Integrity for z/Series^(TM) www.zassure.com
(312)574-0007


On 3/8/2012 13:02 PM, Rob Scott wrote:
 1)If your authorized program while executing in PSW key 0-7 stores
 into an address provided by an unauthorized caller then this is a violation 
 of the IBM statement of integrity.

 Sorry - I disagree with this.

 It is quite OK for auth routines (eg PC-ss) to store into storage whose 
 address is provided by the caller *AS LONG AS THE CALLER'S KEY IS USED* when 
 moving the data.

 See the MVCDK instruction.

 Likewise any authorized routine should treat caller provided storage with 
 suspicion and use MVCSK to copy any data from the caller and use trusted 
 control block pointers rather than rely on caller contents.


 Rob Scott
 Lead Developer
 Rocket Software
 275 Grove Street * Newton, MA 02466-2272 * USA
 Tel: +1.781.684.2305
 Email: rsc...@rs.com
 Web: www.rocketsoftware.com

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On 
 Behalf Of Ray Overby
 Sent: 08 March 2012 18:46
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Program FLIH backdoor - This is a criminal breach of security!

 Charles - yes, it is somewhat ambiguous what violation of the IBM statement 
 of integrity means. Perhaps some Integrity Vulnerability examples will help 
 clarify:

 1)If your authorized program while executing in PSW key 0-7 stores
 into an address provided by an unauthorized caller then this is a violation 
 of the IBM statement of integrity.

 2)If your authorized program while executing in PSW Key 0-7 or
 supervisor state branches to an address provided by an unauthorized requester 
 then this is a violation of the IBM statement of Integrity.

 3)If your authorized program while executing in PSW Key 0-7 or
 supervisor state returns control to an unauthorized requester in an 
 authorized state then this is a violation of the IBM statement of Integrity. 
 By authorized state I mean PSW Key 0-7, Supervisor state, or now has the 
 ability to MODESET.

 4)If your authorized program while executing in PSW Key 0-7 copies
 fetch protected storage to non-fetch protected storage then this is a 
 violation of the IBM statement of integrity.

 The unauthorized requester in these case's would be any PSW Key 8 problem 
 state program that is not currently enabled to MODESET prior to issuing a 
 request to an authorized service. After the request completes the program now 
 has new capabilities that were not available prior to the request such as:

 -The program could now be in an authorized state (psw key 0-7 or
 supervisor state)
 -The program could now have the ability to MODESET
 -The security credentials may have been dynamically elevated (i.e. -
 I now have RACF privileged attribute which I did not have before)
 -Some code provided by my program could have been executed in an
 authorized state (PSW Key 0-7 or Supervisor state).

 If you examine the before and after state around the invoking of the 
 authorized service you generally see some form of elevated capabilities when 
 a violation of the IBM statement of integrity occurs.

 Ray Overby
 Key Resources, Inc.
 Ensuring System Integrity for z/Series^(TM) www.zassure.com
 (312)574-0007



 On 3/8/2012 11:20 AM, Charles Mills wrote:
 I will give it one more shot at trying to clarify what I mean.

 Witness this thread, reasonable people can disagree on what violates 
 the statement of integrity means. One person's reasonable or only 
 available technique is another person's violation.

 We could use some finer granularity. We could use a standard 
 statement of does X but does not do Y

Re: LAE instruction

2012-03-07 Thread Rob Scott
Note also that using ALESERV ADD for ASSBSTKN using CHKEAX=NO for a foreign 
address space (ie not under control of the primary ASID where you code is 
running) is NOT recommended.

If the other ASID *is* under control of your PASN  there is a good chance that 
ASCRE was used to start it earlier in your code, in which case you will have 
been handed the STOKEN in the ODA return area and can use SASN mode to access 
its private storage. 

If the ASID is truly foreign then the best way to access its private storage is 
to use SRB mode programming -  search the archives as this has been discussed 
in the past.

No matter what - you need to be careful here - errors in cross-memory mode 
programming can be harmful for your system.  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Ngafei Huang
Sent: 07 March 2012 02:53
To: IBM-MAIN@bama.ua.edu
Subject: Re: LAE instruction

Chaining these control blocks requires supporting environment and setups as 
follow:

AR register basing ASNALET needs to be setup.

AR register basing ASXBFTCB needs to be setup.

Instead of LAE R4,TCBRBP, it should be L R4,TCBRBP.

Target address space needs to be on your access-list.

Target address space must be non-swappable.


Raymond Wong



-Original Message-
From: Micheal Butz michealb...@optonline.net
To: IBM-MAIN IBM-MAIN@bama.ua.edu
Sent: Tue, Mar 6, 2012 8:30 pm
Subject: Re: LAE instruction


Or a more practical use of LAE

s chaing thru control blocks from another address space AC. 512
AM   R3,R3,ASNALET
.   R3,ASXBFTCB
SING TCB,R3
AE.   R4,TCBRBP
SING R4,RB


ent from my iPhone
On Mar 6, 2012, at 5:53 PM, Rob Scott rsc...@rocketsoftware.com wrote:
 Micheal, 
 
 Putting a bit of meat on the bones to create an example piece of code with 
omments and notes :
 
 (o) We are going to process a linked list of FOO elements in a dataspace and 
alculate some random hash value based on a subset of bytes in the FOO_NAME 
ield.
 (o) This code has been just typed into my e-mail - they may be typos/errors
 (o) WA is the working storage structure/DSECT
 
 
 DO,
ALESERV ADD,STOKEN=WA_FOO_STOKEN,  Add dataspace containing linked list 
f FOOs
ALET=WA_FOO_ALET,  
AL=WORKUNIT,
   MF=(E,WA_ALESERV_LIST)
DOEXIT (LTR,R15,R15,NZ)Failed - quick exit
SAC512AR-Mode (1)
SYSSTATE ASCENV=ARInform assembler of AR-mode
LR6,WA_FOO_HEADGet head of list
LAMAR6,AR6,WA_FOO_ALETGet dataspace ALET (2) 
USING FOO,R6
DO UNTIL=(ICM,R6,B'',FOO_NEXT,Z)Traverse list (3)
LAER7,FOO_NAMEPoint to FOO_NAME (4)
LAER1,8(,R7)Use R1 for temp pointer (5)
XCWA_HASH,WA_HASHZero hash value
DO FROM=(R14,=AL4(L'FOO_NAME-8))
XRR0,R0
ICR0,0(,R1)Get 1-byte (6)
ALR0,WA_HASHAdd to hash value
STR0,WA_HASHStore new value
LAER1,1(,R1)Next byte of name (6)
ENDDO
NCWA_HASH,=X'00FF'0-255 range for hash
ENDDO
SAC0Inform assembler (7)
SYSSTATE ASCENV=P
 ENDDO(8)
 
 rest of code (9)
 
 Notes :
 
 (1) I think it is always worth having a macro to do both the SAC and the 
YSSTATE for you in one hit (not shown)- stops you forgetting the SYSSTATE and 
hat can confuse any macros that follow.
 (2) Loading the ALET in to the AR for the first time - R6 will be able to 
ddress data in the dataspace
 (3) AR-mode makes traversing data structures in dataspaces easy as you can 
ust use normal instructions (if you play by the rules)
 (4) Because LAE used and FOO dsect covers R6+AR6 - AR7 will contain ALET for 
ataspace after instruction executed
 (5) This time we are using R1 to point at 8 bytes into FOO_NAME (for whatever 
eason) - note that AR1 will get the dataspace ALET
 (6) Loading and using a byte from the dataspace 
 (7) See (1) 
 (8) Assuming all ARs are zero before we start, if the code goes thru 
uccessfully, then AR1, AR6 and AR7 will contain the ALET of the dataspace here 
 you may wish to consider zeroing the ARs at this point if they are no longer 
eeded.
 (9) Prudent use of LAM   AR14,AR1,=4A(0) will protect you from unintentional 
R values in working regs after calling certain system services - you can 
ever be sure how in-house macros expand.  
 
 Hope this helps

 
 Rob Scott
 Lead Developer
 Rocket Software
 275 Grove Street * Newton, MA 02466-2272 * USA
 Tel: +1.781.684.2305
 Email: rsc...@rs.com
 Web: www.rocketsoftware.com

Re: LAE instruction

2012-03-07 Thread Rob Scott
Not enough coffee yet today :

 in which case you will have been handed the STOKEN in the ODA return area and 
can use SASN mode to access its private storage

Should read 

in which case you will have been handed the STOKEN in the ODA return area and 
can use AR mode to access its private storage

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Rob Scott
Sent: 07 March 2012 08:25
To: IBM-MAIN@bama.ua.edu
Subject: Re: LAE instruction

Note also that using ALESERV ADD for ASSBSTKN using CHKEAX=NO for a foreign 
address space (ie not under control of the primary ASID where you code is 
running) is NOT recommended.

If the other ASID *is* under control of your PASN  there is a good chance that 
ASCRE was used to start it earlier in your code, in which case you will have 
been handed the STOKEN in the ODA return area and can use SASN mode to access 
its private storage. 


If the ASID is truly foreign then the best way to access its private storage is 
to use SRB mode programming -  search the archives as this has been discussed 
in the past.

No matter what - you need to be careful here - errors in cross-memory mode 
programming can be harmful for your system.  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Ngafei Huang
Sent: 07 March 2012 02:53
To: IBM-MAIN@bama.ua.edu
Subject: Re: LAE instruction

Chaining these control blocks requires supporting environment and setups as 
follow:

AR register basing ASNALET needs to be setup.

AR register basing ASXBFTCB needs to be setup.

Instead of LAE R4,TCBRBP, it should be L R4,TCBRBP.

Target address space needs to be on your access-list.

Target address space must be non-swappable.


Raymond Wong



-Original Message-
From: Micheal Butz michealb...@optonline.net
To: IBM-MAIN IBM-MAIN@bama.ua.edu
Sent: Tue, Mar 6, 2012 8:30 pm
Subject: Re: LAE instruction


Or a more practical use of LAE

s chaing thru control blocks from another address space AC. 512
AM   R3,R3,ASNALET
.   R3,ASXBFTCB
SING TCB,R3
AE.   R4,TCBRBP
SING R4,RB


ent from my iPhone
On Mar 6, 2012, at 5:53 PM, Rob Scott rsc...@rocketsoftware.com wrote:
 Micheal,
 
 Putting a bit of meat on the bones to create an example piece of code with 
omments and notes :
 
 (o) We are going to process a linked list of FOO elements in a dataspace and 
alculate some random hash value based on a subset of bytes in the FOO_NAME ield.
 (o) This code has been just typed into my e-mail - they may be typos/errors
 (o) WA is the working storage structure/DSECT
 
 
 DO,
ALESERV ADD,STOKEN=WA_FOO_STOKEN,  Add dataspace containing linked list 
f FOOs
ALET=WA_FOO_ALET,  
AL=WORKUNIT,
   MF=(E,WA_ALESERV_LIST)
DOEXIT (LTR,R15,R15,NZ)Failed - quick exit
SAC512AR-Mode (1)
SYSSTATE ASCENV=ARInform assembler of AR-mode
LR6,WA_FOO_HEADGet head of list
LAMAR6,AR6,WA_FOO_ALETGet dataspace ALET (2) 
USING FOO,R6
DO UNTIL=(ICM,R6,B'',FOO_NEXT,Z)Traverse list (3)
LAER7,FOO_NAMEPoint to FOO_NAME (4)
LAER1,8(,R7)Use R1 for temp pointer (5)
XCWA_HASH,WA_HASHZero hash value
DO FROM=(R14,=AL4(L'FOO_NAME-8))
XRR0,R0
ICR0,0(,R1)Get 1-byte (6)
ALR0,WA_HASHAdd to hash value
STR0,WA_HASHStore new value
LAER1,1(,R1)Next byte of name (6)
ENDDO
NCWA_HASH,=X'00FF'0-255 range for hash
ENDDO
SAC0Inform assembler (7)
SYSSTATE ASCENV=P
 ENDDO(8)
 
 rest of code (9)
 
 Notes :
 
 (1) I think it is always worth having a macro to do both the SAC and the 
YSSTATE for you in one hit (not shown)- stops you forgetting the SYSSTATE and 
hat can confuse any macros that follow.
 (2) Loading the ALET in to the AR for the first time - R6 will be able to 
ddress data in the dataspace
 (3) AR-mode makes traversing data structures in dataspaces easy as you can 
ust use normal instructions (if you play by the rules)
 (4) Because LAE used and FOO dsect covers R6+AR6 - AR7 will contain ALET for 
ataspace after instruction executed
 (5) This time we are using R1 to point at 8 bytes into FOO_NAME (for whatever 
eason) - note that AR1 will get the dataspace ALET
 (6) Loading and using a byte from

Re: LAE instruction

2012-03-06 Thread Rob Scott
Commas are *very* important in AR-mode

You have coded LAE   R3,0(R4) - which is the same as LAE   R3,(R4,R0)

Coded that way there is no automatic way that AR3 is going to inherit the AR4 
value.

You need : LAE   R3,0(,R4)

This will ensure that AR3 is populated from the AR for the referenced base 
register R4.


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 06 March 2012 19:05
To: IBM-MAIN@bama.ua.edu
Subject: LAE instruction

Hi,

 

I have two part question regarding the LAE instruction 



. What would the sac value e.g. 256,512,768 have to be that when
using the LAE instructions with the following operands LAE  3,0(R4) would
AR3 get loaded with AR4 

 

. Second what value does the displacement play in the instruction

 

 

 

 

 

 Thanks 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: LAE instruction

2012-03-06 Thread Rob Scott
 You have coded LAE   R3,0(R4) - which is the same as LAE   R3,(R4,R0)

Should read :

You have coded LAE   R3,0(R4) - which is the same as LAE   R3,0(R4,R0)

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Rob Scott
Sent: 06 March 2012 19:47
To: IBM-MAIN@bama.ua.edu
Subject: Re: LAE instruction

Commas are *very* important in AR-mode

You have coded LAE   R3,0(R4) - which is the same as LAE   R3,(R4,R0)

Coded that way there is no automatic way that AR3 is going to inherit the AR4 
value.

You need : LAE   R3,0(,R4)

This will ensure that AR3 is populated from the AR for the referenced base 
register R4.


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 06 March 2012 19:05
To: IBM-MAIN@bama.ua.edu
Subject: LAE instruction

Hi,

 

I have two part question regarding the LAE instruction 



. What would the sac value e.g. 256,512,768 have to be that when
using the LAE instructions with the following operands LAE  3,0(R4) would
AR3 get loaded with AR4 

 

. Second what value does the displacement play in the instruction

 

 

 

 

 

 Thanks 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: LAE instruction

2012-03-06 Thread Rob Scott
John McKown's reply covered these points very well

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 06 March 2012 19:59
To: IBM-MAIN@bama.ua.edu
Subject: Re: LAE instruction

Thanks
 
Regarding my questions

The doc says the inst is dependent
On address space control bits which is set by the SAC inst. 

Secondly seems like the displacement doesn't play a role in the inst

Sent from my iPhone

On Mar 6, 2012, at 2:49 PM, Rob Scott rsc...@rocketsoftware.com wrote:

 You have coded LAE   R3,0(R4) - which is the same as LAE   R3,(R4,R0)
 
 Should read :
 
 You have coded LAE   R3,0(R4) - which is the same as LAE   R3,0(R4,R0)
 
 Rob Scott
 Lead Developer
 Rocket Software
 275 Grove Street * Newton, MA 02466-2272 * USA
 Tel: +1.781.684.2305
 Email: rsc...@rs.com
 Web: www.rocketsoftware.com
 
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On 
 Behalf Of Rob Scott
 Sent: 06 March 2012 19:47
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: LAE instruction
 
 Commas are *very* important in AR-mode
 
 You have coded LAE   R3,0(R4) - which is the same as LAE   R3,(R4,R0)
 
 Coded that way there is no automatic way that AR3 is going to inherit the AR4 
 value.
 
 You need : LAE   R3,0(,R4)
 
 This will ensure that AR3 is populated from the AR for the referenced base 
 register R4.
 
 
 Rob Scott
 Lead Developer
 Rocket Software
 275 Grove Street * Newton, MA 02466-2272 * USA
 Tel: +1.781.684.2305
 Email: rsc...@rs.com
 Web: www.rocketsoftware.com
 
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On 
 Behalf Of Micheal Butz
 Sent: 06 March 2012 19:05
 To: IBM-MAIN@bama.ua.edu
 Subject: LAE instruction
 
 Hi,
 
 
 
 I have two part question regarding the LAE instruction
 
 
 
 . What would the sac value e.g. 256,512,768 have to be that when
 using the LAE instructions with the following operands LAE  3,0(R4) 
 would
 AR3 get loaded with AR4
 
 
 
 . Second what value does the displacement play in the instruction
 
 
 
 
 
 
 
 
 
 
 
 Thanks 
 
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: LAE instruction

2012-03-06 Thread Rob Scott
Micheal, 

Putting a bit of meat on the bones to create an example piece of code with 
comments and notes :

(o) We are going to process a linked list of FOO elements in a dataspace and 
calculate some random hash value based on a subset of bytes in the FOO_NAME 
field.
(o) This code has been just typed into my e-mail - they may be typos/errors
(o) WA is the working storage structure/DSECT


DO,
ALESERV ADD,STOKEN=WA_FOO_STOKEN,   Add dataspace containing linked 
list of FOOs
ALET=WA_FOO_ALET,  
AL=WORKUNIT,
MF=(E,WA_ALESERV_LIST)
DOEXIT (LTR,R15,R15,NZ) Failed - quick exit
SAC 512 AR-Mode (1)
SYSSTATE ASCENV=AR  Inform assembler of 
AR-mode
L   R6,WA_FOO_HEAD  Get head of list
LAM AR6,AR6,WA_FOO_ALET Get dataspace ALET (2) 
USING FOO,R6
DO UNTIL=(ICM,R6,B'',FOO_NEXT,Z)Traverse list (3)
LAE R7,FOO_NAME Point to FOO_NAME (4)
LAE R1,8(,R7)   Use R1 for temp pointer 
(5)
XC  WA_HASH,WA_HASH Zero hash value
DO FROM=(R14,=AL4(L'FOO_NAME-8))
XR  R0,R0   
IC  R0,0(,R1)   Get 1-byte (6)
AL  R0,WA_HASH  Add to hash value
ST  R0,WA_HASH  Store new value
LAE R1,1(,R1)   Next byte of name (6)
ENDDO
NC  WA_HASH,=X'00FF'0-255 range for hash
ENDDO
SAC 0   Inform assembler (7)
SYSSTATE ASCENV=P
ENDDO   (8) 

rest of code (9)

Notes :

(1) I think it is always worth having a macro to do both the SAC and the 
SYSSTATE for you in one hit (not shown)- stops you forgetting the SYSSTATE and 
that can confuse any macros that follow.
(2) Loading the ALET in to the AR for the first time - R6 will be able to 
address data in the dataspace
(3) AR-mode makes traversing data structures in dataspaces easy as you can just 
use normal instructions (if you play by the rules)
(4) Because LAE used and FOO dsect covers R6+AR6 - AR7 will contain ALET for 
dataspace after instruction executed
(5) This time we are using R1 to point at 8 bytes into FOO_NAME (for whatever 
reason) - note that AR1 will get the dataspace ALET
(6) Loading and using a byte from the dataspace 
(7) See (1) 
(8) Assuming all ARs are zero before we start, if the code goes thru 
successfully, then AR1, AR6 and AR7 will contain the ALET of the dataspace here 
- you may wish to consider zeroing the ARs at this point if they are no longer 
needed.
(9) Prudent use of LAM   AR14,AR1,=4A(0) will protect you from unintentional 
AR values in working regs after calling certain system services - you can 
never be sure how in-house macros expand.  

Hope this helps


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 06 March 2012 21:53
To: IBM-MAIN@bama.ua.edu
Subject: Re: LAE instruction

So  SAC 512
LAE R3,0(,R4)

 R3 is CPYA from access R4  right 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
McKown, John
Sent: Tuesday, March 06, 2012 4:22 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: LAE instruction

Yes, from the LAE instruction text:

quote
The address specified by the X2, B2, and D2 fields is placed in general 
register R1. Access register R1 is loaded with a value that depends on the 
current value of the address-space-control bits, bits 16 and
17 of the PSW. If the address-space-control bits are
01 binary, the value placed in the access register also depends on whether the 
B2 field is zero or non- zero.

...

PSW Bits
16 and 17
Value Placed in Access Register R1
00  hex (zeros in bit positions 0-31)

10 0001 hex (zeros in bit positions 0-30 and one in bit position 31)

01 If B2 field is zero:  hex (zeros in bit positions 0-31) If B2 field 
is nonzero: Contents of access register B2

11 0002 hex (zeros in bit positions 0-29 and 31, and one in bit position 30)

From the SAC instruction 

CodeName of ModeResult in PSW Bits 16  17
Primary space   00
0001Secondary space 10
0010Access register 01
0011Home space  11
All others Invalid

/quote

SAC 512 has is '0010' from

Re: Processor usage

2012-03-01 Thread Rob Scott
If you are not going to use SMF-70 records, you could consider using the 
ERBSMFI programming service (see the RMF manual) as part of the information 
returned by this API includes the system CPU% busy (from MVS perspective rather 
than LPAR view IIRC) and page rate.

Note also that CMF provides an alias to this program as well so that any code 
you author for ERBSMFI should work all systems.

If this does not suit your requirements - then I think you are going to have to 
roll your own solution.

What exactly are you trying to achieve? 

CPU utilization figures over very small intervals are next to meaningless on 
their own (in my opinion) and even sustained high CPU% over long periods could 
be OK as long as the WLM goals are being met.  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 01 March 2012 09:40
To: IBM-MAIN@bama.ua.edu
Subject: Re: Processor usage

 Hi

One important point :
We would like to see this CPU utilization values , in every RMF CYCLE , and not 
in every RMF INTERVAL (A CYCLE can be 50millisecond , but the INTERVAL minimum 
1 minute ) Can we get this values in a smaller interval ?


On 2/29/2012 11:43 AM, Rob Scott wrote:
 A simple calculation of physical CPU usage using SMF-70 :

   100*(SMF_interval_stck - SMF70WAT)/SMF_interval_stck

 (SMF_interval_stck is the STCK version of SMF70INT)

 You can also process the LCPU (logical CPU) sections and work out busy% using 
 the following fields :

 SMF70PDT
 SMF70EDT
 SMF70WST
 SMF70ONT

 Rob Scott
 Lead Developer
 Rocket Software
 275 Grove Street * Newton, MA 02466-2272 * USA
 Tel: +1.781.684.2305
 Email: rsc...@rs.com
 Web: www.rocketsoftware.com


 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf 
 Of Miklos Szigetvari
 Sent: 29 February 2012 10:26
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Processor usage

   Hi

 Just looking into the SMF 70 records.
 Till now don't see the processor usage (or see , just don't understand ) , 
 but I will try hard

 On 2/29/2012 10:24 AM, Rob Scott wrote:
 Examine the SMF type 70 records or use RMF to report on CPU/LCPU/LPAR
 data

 Rob Scott
 Lead Developer
 Rocket Software
 275 Grove Street * Newton, MA 02466-2272 * USA
 Tel: +1.781.684.2305
 Email: rsc...@rs.com
 Web: www.rocketsoftware.com

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
 Behalf Of Miklos Szigetvari
 Sent: 29 February 2012 09:18
 To: IBM-MAIN@bama.ua.edu
 Subject: Processor usage

Hi

 My colleagues would like to know the processor usage for every processor on 
 the machine or on the current LPAR .
 Any way to find out something like this:  CPU1 was busy 50% in the
 last
 1 minute and CPU2 was busy in 10%

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
 lists...@bama.ua.edu with the message: INFO IBM-MAIN

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Processor usage

2012-02-29 Thread Rob Scott
Examine the SMF type 70 records or use RMF to report on CPU/LCPU/LPAR data

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 29 February 2012 09:18
To: IBM-MAIN@bama.ua.edu
Subject: Processor usage

 Hi

My colleagues would like to know the processor usage for every processor on the 
machine or on the current LPAR .
Any way to find out something like this:  CPU1 was busy 50% in the last
1 minute and CPU2 was busy in 10%

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Processor usage

2012-02-29 Thread Rob Scott
A simple calculation of physical CPU usage using SMF-70 :

100*(SMF_interval_stck - SMF70WAT)/SMF_interval_stck

(SMF_interval_stck is the STCK version of SMF70INT)

You can also process the LCPU (logical CPU) sections and work out busy% using 
the following fields :

SMF70PDT
SMF70EDT
SMF70WST
SMF70ONT 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 29 February 2012 10:26
To: IBM-MAIN@bama.ua.edu
Subject: Re: Processor usage

 Hi

Just looking into the SMF 70 records.
Till now don't see the processor usage (or see , just don't understand ) , but 
I will try hard

On 2/29/2012 10:24 AM, Rob Scott wrote:
 Examine the SMF type 70 records or use RMF to report on CPU/LCPU/LPAR 
 data

 Rob Scott
 Lead Developer
 Rocket Software
 275 Grove Street * Newton, MA 02466-2272 * USA
 Tel: +1.781.684.2305
 Email: rsc...@rs.com
 Web: www.rocketsoftware.com

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On 
 Behalf Of Miklos Szigetvari
 Sent: 29 February 2012 09:18
 To: IBM-MAIN@bama.ua.edu
 Subject: Processor usage

   Hi

 My colleagues would like to know the processor usage for every processor on 
 the machine or on the current LPAR .
 Any way to find out something like this:  CPU1 was busy 50% in the 
 last
 1 minute and CPU2 was busy in 10%

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Calling Authorized Assembler from REXX

2012-02-29 Thread Rob Scott
Search the archives for IKJEFTSR.

Overview of one way of doing it :

(1) Write a separate non-auth stub REXX external function that processes the 
parameters and sets up addressability to the IRX* control blocks and handles 
the return data from the auth function.
(2) Ensure that the auth function module is in linklist (or authorized 
STEPLIB/JOBLIB if you must)
(3) Add the auth function module name to AUTHTSF in IKJTSOxx and get your 
friendly sysprog to update the system.
(4) In the stub function program, use IKJEFTSR to invoke the auth subroutine

Depending on the capabilities of the auth function stub, you may wish to add 
some sort of SAF check into its logic.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Betsy Jeffery
Sent: 29 February 2012 15:35
To: IBM-MAIN@bama.ua.edu
Subject: Calling Authorized Assembler from REXX

I'm looking for a method to call an authorized assembler sub-routine from a 
REXX exec.  Is this possible?  Does anyone have a sample? I have also posted to 
the TSO-REXX list.
Thanks,
Betsy Jeffery
MGIC

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Calling Authorized Assembler from REXX

2012-02-29 Thread Rob Scott
Walt - you are correct - I meant auth function program and, of course, the 
SAF checks should be done inside that and not the stub pgm

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Walt Farrell
Sent: 29 February 2012 18:26
To: IBM-MAIN@bama.ua.edu
Subject: Re: Calling Authorized Assembler from REXX

On Wed, 29 Feb 2012 15:49:01 +, Rob Scott rsc...@rocketsoftware.com wrote:

Search the archives for IKJEFTSR.

Overview of one way of doing it :

(1) Write a separate non-auth stub REXX external function that processes the 
parameters and sets up addressability to the IRX* control blocks and handles 
the return data from the auth function.
(2) Ensure that the auth function module is in linklist (or authorized 
STEPLIB/JOBLIB if you must)
(3) Add the auth function module name to AUTHTSF in IKJTSOxx and get your 
friendly sysprog to update the system.
(4) In the stub function program, use IKJEFTSR to invoke the auth 
subroutine

Depending on the capabilities of the auth function stub, you may wish to add 
some sort of SAF check into its logic.

I think you probably meant auth function module in that last sentence, not 
auth function stub. 

Performing security checks in the stub (which runs unauthorized, and can be 
bypassed) are not really effective. If security checks are needed, they should 
be in the authorized program that is invoked by IKJEFTSR (your auth function 
module).

Also, if the REXX exec merely needs to call an authorized assembler routine 
(not subroutine) then a simple address TSO call *(modulename) may be simpler. 
It would still need the system programmer to update IKJTSOxx, but the AUTHPGM 
section rather than AUTHTSF, but would not need the stub module and other REXX 
stuff.

--
Walt Farrell
IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: How convert historic STCK to local time?

2012-02-28 Thread Rob Scott
STCKCONV and CONVTOD are both provided macro services to translate between STCK 
values and various date/time formats 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Charles Mills
Sent: 28 February 2012 17:58
To: IBM-MAIN@bama.ua.edu
Subject: How convert historic STCK to local time?

Is there any straightforward way to convert an STCK value from some point in 
the fairly recent (months, not decades) past to local time for the LPAR's 
locale? By straightforward I mean without having to maintain my own table of 
time changes for the historic period?

I know about CVTLDTO (and CVTLSO). They can be used to convert a current
STCK value to local time. But what about a time that might be hours, days, or 
months in the past? (Of course, a nanosecond after you do an STCK it's a 
historic value, so the problem always exists, but at least the window there is 
fairly small.) For that matter, the same problem exists for leap seconds, but 
at least there the variance is small and the historic changes straightforward. 
(And No, I am not interested in revisiting the what about an STCK right at the 
leap second moment thread from 2009.)

Why? Several types of data in z/OS have timestamps in raw STCK form, and some 
customers want dates and times reported in a culturally comfortable format. 

Environment is z/OS batch; language is XL C++. Correct me if I am wrong: it 
appears to me that gmtime() converts *to* GMT but localtime() assumes the time 
is already local.

Converting *to* gmtime is a tougher problem because 1:30 am on the morning that 
we fall back to standard time is an ambiguous specification, is it not?

Charles 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: How convert historic STCK to local time?

2012-02-28 Thread Rob Scott
Something like :

LG  GR0,CURR_STCK   UTC
ALG GR0,LPAR_STCK_OFFSETLocal time STCK offset as signed value 
64-bit 
STG GR0,NEW_STCKNew STCK value
STCKCONV STCKVAL=NEW_STCK,
CONVVAL=.etc etc

Obviously this assumes you know the UTC offset at the time of the LPAR

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Charles Mills
Sent: 28 February 2012 18:39
To: IBM-MAIN@bama.ua.edu
Subject: Re: How convert historic STCK to local time?

If I had a TOD clock value from roughly six months ago, how would I use 
STCKCONV to convert it to local time for the LPAR's locale?

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Rob Scott
Sent: Tuesday, February 28, 2012 10:12 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: How convert historic STCK to local time?

STCKCONV and CONVTOD are both provided macro services to translate between STCK 
values and various date/time formats 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: How convert historic STCK to local time?

2012-02-28 Thread Rob Scott
If you are lucky enough to be in control of the data collection, then you could 
save the CVTLDTO value in the same control block or record as the STCK value so 
that you can accurately re-construct local time at a later date.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
McKown, John
Sent: 28 February 2012 20:07
To: IBM-MAIN@bama.ua.edu
Subject: Re: How convert historic STCK to local time?

Well, maybe. In __your__ shop. Until recently, we set the local clock with a T 
CLOCK=hh.mm.ss which was entered by hand. So you never could tell exactly 
when the person on site would issue the command. It was __around__ 02:00 on 
Sunday. But they didn't want to mess up the clock on running jobs, so they 
would defer entering the command until they could stop all initiators, issue 
the command, and restart the initiators.

John McKown 

Systems Engineer IV

IT

 

Administrative Services Group

 

HealthMarkets(r)

 

9151 Boulevard 26 * N. Richland Hills * TX 76010

(817) 255-3225 phone * 

john.mck...@healthmarkets.com * www.HealthMarkets.com

 

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

 -Original Message-
 From: IBM Mainframe Discussion List
 [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Charles Mills
 Sent: Tuesday, February 28, 2012 2:01 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: How convert historic STCK to local time?
 
  this assumes you know the UTC offset at the time of the LPAR
 
 That's the problem I was inquiring about: how to know what was the 
 local time offset on such-and-such a date, assuming the date is not 
 right now?
 
 But I think Gil has the solution.
 
 Charles
 
 -Original Message-
 From: IBM Mainframe Discussion List
 [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Rob Scott
 Sent: Tuesday, February 28, 2012 11:45 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: How convert historic STCK to local time?
 
 Something like :
 
   LG  GR0,CURR_STCK   UTC
   ALG GR0,LPAR_STCK_OFFSETLocal time STCK offset as signed
 value 64-bit 
   STG GR0,NEW_STCKNew STCK value
   STCKCONV STCKVAL=NEW_STCK,
   CONVVAL=.etc etc
 
 Obviously this assumes you know the UTC offset at the time of the LPAR
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
 
 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: My 3.4 went wonky

2012-02-23 Thread Rob Scott
On the 3.4 panel do you have  Include Additional Qualifiers selected ?

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Lindy Mayfield
Sent: 23 February 2012 16:38
To: IBM-MAIN@bama.ua.edu
Subject: My 3.4 went wonky

Hello

Something in my ISPF went funny and my 3.4 isn't working correctly.  Here is 
what I get:

SYS1 = No data set names found
SYS1.PARMLIB = SYS1.PARMLIB  but not another level. 
SYS1.PARMLIB.ZMVS = SYS1.PARMLIB.ZMVS
SYS1.*.ZMVS = SYS1.PARMLIB.ZMVS , SYS1.PROCLIB.ZMVS, SYS1.SAXREXEC.ZMVS

It has to be something with my ISPF and not a catalog error because my other 
user id works fine.  RACF?  I could have done something, but I don't find any 
differences between users.

Any ideas what I did wrong?

Thanks
Lindy

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Getting the Storage Group name for a DASD volume.

2012-02-09 Thread Rob Scott
I think the history of this runs as follows :

(1) SMS SSI documentation is made available for $$$ to ISVs and not to normal 
customers
(2) However - JES3 needs to get SMS volume info at some point - hence the 
minimum amount of doc and macros are distributed in SYS1.MODGEN (eg take a look 
at IGDVLD)
(3) Some smart people look the the doc in IGDVLD and experiment and work out 
how the SMS SSI works
(4) Tinkering and playing by various people in the 1980s/1990s including 
looking at IPCS dump formatting routines yield more info 

I do not believe the author of SHOWMVS had access to the official doc - it was 
just reverse engineered from IGDVLD.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Bill Fairchild
Sent: 09 February 2012 16:45
To: IBM-MAIN@bama.ua.edu
Subject: Re: Getting the Storage Group name for a DASD volume.

Presumably whoever coded the subsys call to SMS within SHOWMVS had access to 
some kind of doc (or to previously written working code, the author of which 
had access to the doc... etc.), and I would like to know more about the doc 
myself.  Perhaps there are other subsys calls to SMS which return useful 
information.  I would much rather look at original doc than at working code 
that exploits one particular function and reveals nothing about other 
functions.  If this doc is restricted, then how could SHOWMVS be made public?

Bill Fairchild

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Dennis Trojak
Sent: Thursday, February 09, 2012 9:47 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Getting the Storage Group name for a DASD volume.

John,
 Checkout SHOWMVS. It makes a subsys call to SMS to do just that.
Dennis

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
McKown, John
Sent: Thursday, February 09, 2012 8:13 AM
To: IBM-MAIN@bama.ua.edu
Subject: Getting the Storage Group name for a DASD volume.

I am updating an old DASD management program. It does a UCBSCAN to scan the 
online DASD volumes and an LSPACE to get the space information from them. I 
also get the Format 4 DSCB. I check DS4SMSFG to see if the volume is SMS 
managed or not. I would like to output the storage group name if it is. But I 
cannot find any indication of how to get that information. I know it is 
possible because QuickRef does it. Is this another of the if you want to know 
that, you need to give us a lot of money and sign an NDA part of z/OS? I 
really dispise that of IBM. No wonder I like GNU software. Oh, well, anything 
for a buck! is the main corporate motto in today's world.

John McKown
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone *
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Calling all experts on SMFPRMxx SUBSYS

2012-01-06 Thread Rob Scott
Offset x'12' in the standard SMF record header contains the 4-byte subsystem 
name.

The IEFU8x exits will be able to change this value - however obviously some 
care and attention is needed not to confuse the eventual consumer of the data.

Also - be aware that other software products sometimes put interesting 
information in this field as well - for example DB2 SMF records have the *DB2* 
SSID in this field - which obviously is NOT a SMF subsystem - but however is 
*extremely* useful for programs processing the DB2 SMF data (apologies for 
muddying the waters still further) 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Hunkeler Peter (KIUP 4)
Sent: 06 January 2012 13:44
To: IBM-MAIN@bama.ua.edu
Subject: Re: Calling all experts on SMFPRMxx SUBSYS

 Can a SMF exit overwrite and change that subsystem name (or any
field)
in a SMF record as passed on and send these changed SMF records on to be 
captured by SMF subsystem and stored on a SYS1.MANx dataset later?

Yes, we do this in IEFU83 and IEFU84 for the SYSID field.

You say that you change the SYSID field, don't' you? 

I understood the OP's question to ask if the SMF subsystem name of this 
record can be changed. I understand that this name is not part of the SMF 
record passed to the exits; it is only part of the SMFEWTM macro parameter list 
called to initiate writing of the record. Correct?

--
Peter Hunkeler

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Calling all experts on SMFPRMxx SUBSYS

2012-01-06 Thread Rob Scott
Charles

The SID is at offset X'0E' - the subsystem SSI is at offset x'12' 
(admittedly only for SMF records that have subtypes...)

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Charles Mills
Sent: 06 January 2012 14:43
To: IBM-MAIN@bama.ua.edu
Subject: Re: Calling all experts on SMFPRMxx SUBSYS

The subsystem name as we have been talking about it here is not part of the 
standard SMF record header. They contain a SID field that contains what is 
commonly called the SMF ID of the LPAR.

Certain types of SMF records contain a subsystem name in the SSI sense of the 
word, for example, DB2 records contain SM100SSI, the DB2 subsystem name.

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Hunkeler Peter (KIUP 4)
Sent: Friday, January 06, 2012 5:44 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Calling all experts on SMFPRMxx SUBSYS

 Can a SMF exit overwrite and change that subsystem name (or any
field)
in a SMF record as passed on and send these changed SMF records on to be 
captured by SMF subsystem and stored on a SYS1.MANx dataset later?

Yes, we do this in IEFU83 and IEFU84 for the SYSID field.

You say that you change the SYSID field, don't' you? 

I understood the OP's question to ask if the SMF subsystem name of this 
record can be changed. I understand that this name is not part of the SMF 
record passed to the exits; it is only part of the SMFEWTM macro parameter list 
called to initiate writing of the record. Correct?

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: Calling all experts on SMFPRMxx SUBSYS - How does Subsys of SILO work?

2012-01-05 Thread Rob Scott
Martin,

I have seen this at various sites as well, and thought that it was just the 
vendor's way of writing the user SMF records for tape silo performance.

For example, you can use :

SMFEWTM (Rx),SUBSYS==CL4'SILO',.

Maybe originally there was some other compelling reason for this - (maybe they 
used the SUBPARM facility?) or maybe it was just a way of forcing all SMF 
records for the tape silo to one place.

However, if there is NOTYPE(0:255) it seems sort of self-defeating.

  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Martin Packer
Sent: 05 January 2012 11:06
To: IBM-MAIN@bama.ua.edu
Subject: Was: Calling all experts on SMFPRMxx SUBSYS - How does Subsys of 
SILO work?

Topical: Just yesterday a colleague and I were discussing a user-defined (not 
SSI) subsystem - SILO - that a customer appears to have. You can guess (as I 
did) the origin of the subsystem. Anyone know anything about the subsystem? For 
some reason they have excluded SMF records with that subsys.

I see two problems/questions:

1) Getting address space counts out of RMF Type 70 Address Space Count section. 
They're there for TSO, STC etc but not for user-defined. I assume subtracting 
some of these from headline number would give (usually 0) user subsys address 
space count.

2) Wondering how WLM allows you to classify work from such a user subsystem. 
e.g. What qualifiers?

In general I just wonder what this thing is and how it behaves and how 
prevalent it is. Oh, and why it's a user-defined subsystem in the first place.

Cheers, Martin

Martin Packer,
Mainframe Performance Consultant, zChampion Worldwide Banking Center of 
Excellence, IBM

+44-7802-245-584

email: martin_pac...@uk.ibm.com

Twitter / Facebook IDs: MartinPacker
Blog: 
https://www.ibm.com/developerworks/mydeveloperworks/blogs/MartinPacker





Unless stated otherwise above:
IBM United Kingdom Limited - Registered in England and Wales with number 
741598. 
Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU






--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: cpu / machine identification

2011-12-27 Thread Rob Scott
Sam

I would suggest a license key based on company/product  name and date *only*.

CPUid schemes are such a PITA to administer for both customer and vendor.

Using expiration dates and sufficiently load warning messages (eg WTOs, prompts 
in the UI) as the expiration date approaches keeps 99.99% of customers paying 
the bill on time.
  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Sam Siegel
Sent: 26 December 2011 21:20
To: IBM-MAIN@bama.ua.edu
Subject: Re: cpu / machine identification

zMan - Thanks for the reply.  It is a new product - No customers yet.

I would like enough licensing to keep honest people honest and an operationally 
oriented reminder for the annual renewal.

Sam

On Mon, Dec 26, 2011 at 1:11 PM, zMan zedgarhoo...@gmail.com wrote:

 Gahh, IF BibBox, Inc.

 On Mon, Dec 26, 2011 at 4:11 PM, zMan zedgarhoo...@gmail.com wrote:
  On Mon, Dec 26, 2011 at 2:22 PM, Sam Siegel s...@pscsi.net wrote:
  Hello List - I'm attempting to create a licensing mechanism for a 
  bit of software.  I would like to be able to use a unique and 
  non-modifiable identifier as part of the mechanism.
 
  The CSRSI callable service and STSI instruction provide a variety 
  of hardware related identifiers.
 
  CSRSI returns fields called si00pccacpid and si11v1cpcsequencecode.
  These
  appear directly related to PCCACPID (PCCA control block) and 
  Sequence
 Code
  (STSI basic machine configuration)..
 
  Is there any preference to using one field over the other?  What 
  are the advantages and disadvantages of using each field?
 
  Are there other fields (in same or other control blocks) that 
  should be used?
 
  Please feel free to treat this as an open ended question related to 
  licensing mechanism and provided any related advice and tips based 
  on experience.
 
  OK, I gotta ask -- what's the problem you're trying to solve? You 
  don't trust your customers? In over a quarter century in the 
  mainframe software business, I've come across ONE customer running 
  software on an unlicensed box, and it was an oversight -- and a nice 
  full-price bluebird for the sales rep. I don't believe CPUIDs are 
  worth the hassle.
 
  Having said that, I would expect that any CPUID processing would 
  work off, well, the CPUID. That's what customers understand.
 
  SAS Institute used to have a nice CPUID system for their C compiler 
  that would issue a warning and print out what company the sucker was 
  licensed to, but would continue to operate if the CPUID was wrong.
  This allowed emergency operation, while clearly keeping any real 
  company from running it on the wrong box (though I suppose of 
  BigBox, Inc. licensed it on one and ran it on two, it would be 
  harder to notice; the case I'm thinking of was when we were running 
  the Merrill-Lynch copy on another company's machine, WITH permission 
  from SAS; every time we invoked the compiler, it would whine and say 
  Licensed to Merrill-Lynch).
 
  Now, with systems management stuff that doesn't have a real UI that 
  gets invoked all the time, it's harder. The best I've seen allowed:
  - multiple key entries in the CPUID file, so you didn't have to 
  worry about swapping files at expiration: you just added new entries 
  and eventually deleted the old ones. And you could keep all your 
  CPUIDs in a common file, shared (or replicated) across systems.
  - Warned starting 30 days before expiration, on the operator's
  console: XYZ will expire in 30 days (29, 28...).
  - If it had a valid license (i.e., one with time on it but on the 
  wrong machine) would run in emergency mode, whining on the 
  operator's console every 10 minutes or so, but still running (this 
  allowed for DR).
  - Supported universal temporary keys, that could be 
  read/emailed/FAXed by support at 3AM if you really screwed up and 
  were dead in the water despite the above.
 
  Now, this also meant that there were folks carrying beepers and temp 
  keys, so they could do that after-hours support.
 
  Are you prepared to deal with all this? Is it worth it?
 
  As you can tell, I'm not a fan of such mechanisms. But it's not my 
  decision (doh), so I'm trying to help :-)
  --
  zMan -- I've got a mainframe and I'm not afraid to use it



 --
 zMan -- I've got a mainframe and I'm not afraid to use it

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

Re: z/OS 1.13 ASCENV incompatible change in Assembler

2011-12-16 Thread Rob Scott
Barry

Maybe I am strange - but I welcome the new stricter approach to the SYSSTATE by 
IBM macros.

Anything that can flag up a potential problem in my code due to my lack of care 
of the declared environment seems very useful to me. 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Barry Merrill
Sent: 16 December 2011 15:20
To: IBM-MAIN@bama.ua.edu
Subject: z/OS 1.13 ASCENV incompatible change in Assembler

Change 29.280 -z/OS 1.13 ASM ERROR when assembling ASMTAPEE/MXGTMNT:
ASMTAPEEYOU SPECIFIED ASCENV=AR OR ANY ON THE SYSSTATE MACRO.
Dec 15, 2011 THE OPEN MACRO SUPPORTS ONLY ASCENV=P.
   But there is NO NEED to ASM a new load module under 1.13;
   your currently executing MXGTMNT module works just fine!

  -This IBM note (migration guide) is the ONLY clue of the
   incompatible change, which impacts OPEN/CLOSE macros, but
   doesn't mention any by name:
DFSMSdfp: Accommodate 64-bit  AR mode rules enforcement
in DFSMS macros; required if you have code that invokes
DFSMS macros (but not all!).  Before z/OS V1R13, many
DFSMS macros that did not support 64-bit or AR mode did
not react to being invoked in 64-bit or AR mode, and
generated code that might have been invalid in 64-bit or
AR mode. Starting with z/OS V1R13, these macros are
changed to issue an assembly-time message and suppress
expansion if they are invoked in 64-bit or AR mode.

  -But as noted above, you didn't really need to ASM.  Now,
   from MXG's asmguy, his comments on this change:

Nothing is going to happen to an existing site using
MXGTMNT and in fact the modification I have to make for
this does not result in any change to the executable
code.

The SYSSTATE macro is an assembler directive - it sets
a flag that tells any macros that support AR mode
(Access Register, used for cross memory access) to use
their AR mode compatible expansion. Macros that don't
have an AR mode expansion used to ignore this because
they had nothing to do, and it's always the coder's
responsibility to make sure that when those non-AR
compatible macros are executed, that the system is not
in AR mode.  This is similar to switching back and forth
from 24-bit to 31-bit mode: some macros can't tolerate
31-bit mode.  Nothing has really changed though; it is
still the coders responsibility to make sure the system
is not in AR mode and macros that can't tolerate AR mode
still can't, except now IBM is requiring the coder to
explicitly set SYSSTATE to indicate to the assembler
that the system is not in AR mode.
Of course this is all very silly because the assembler
can't know ahead of time that the system is or isn't in
AR mode.  So regardless of whether or not SYSSTATE is
coded this way the system still could be in AR mode,
OPEN/CLOSE will still expand the same way, and if the
system really is in AR mode OPEN/CLOSE will abend when
executed.
So the bottom line is that nothing has changed except
our need to do something for no reason at all.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN


Re: S402 ABEND upon cross-memory POST

2011-12-12 Thread Rob Scott
Justin,

If you look at the SYSTRACE in the dump for the S402 - can you see any 0C4 
abends prior to the actual S402 abend?

If your ECB is in Key-7 , I am not sure that the events table can be in Key-8.

My guess is that the cross-memory post routine is going to SPKA to Key-7 to 
POST the ECB and then when it follows the EVENTS table address in the low order 
three bytes of the ECB it is going to barf at any storage it cannot access in 
Key-7. 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Justin R. Bendich
Sent: 12 December 2011 18:28
To: IBM-MAIN@bama.ua.edu
Subject: S402 ABEND upon cross-memory POST

I am attempting a cross-memory POST and receiving a S402 ABEND, RSN=0.
Here is the environment:

The code is running in key zero, AMODE 31, ASC=PRIMARY, PASN=HASN=SASN .

It is running out of a FRR for a SRB.

The macro invocation is specified as follows:

POST  THE_ECB,0,ASCB=(2),ERRET=LBL1,ECBKEY=7,LINKAGE=SYSTEM,MF=(E,PL_LIST)

R2 addresses the correct ASCB.

The ECB resides in CSA.

The key of the ECB is, indeed, 7.

The code at LBL1 (the ERRET) is XL2'07FE' (BR R14).

The parameter list ends up looking like:

 X'00'(R1): ecb address
 X'04'(R1): ASCB address
 X'08'(R1): ERRET address
 X'0C'(R1): A(X'7000')

There does not appear to be anything wrong with it.

There is a task whose PSW key is zero which has issued an EVENTS macro whose 
table includes the ECB in question.

The home address space of that task is described by the passed ASCB.

The table for the EVENTS macro is in key-8 storage.

Thank you for any information you might be able to provide,

Justin R. Bendich

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: S402 ABEND upon cross-memory POST

2011-12-12 Thread Rob Scott
Justin,

May I politely suggest that you have another look at the design - you have at 
least three storage keys involved in this scenario I would feel uncomfortable 
with a solution that X-memory POSTs a Key-7 ECB using ECBKEY=0 and involves an 
EVENTS table in Key-8.

Key-7 CSA hints that this might be a DB2-related program - is there any reason 
why your EVENTS table owner cannot execute in Key-7 and then remove your Key-0 
and Key-8 usage altogether?
 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Justin R. Bendich
Sent: 12 December 2011 19:39
To: IBM-MAIN@bama.ua.edu
Subject: Re: S402 ABEND upon cross-memory POST

Rob Scott wrote:

Justin,

If you look at the SYSTRACE in the dump for the S402 - can you see any 0C4 
abends prior to the actual S402 abend?

If your ECB is in Key-7 , I am not sure that the events table can be in Key-8.

My guess is that the cross-memory post routine is going to SPKA to 
Key-7 to POST the ECB and then when it follows the EVENTS table address in the 
low order three bytes of the ECB it is going to barf at any storage it cannot 
access in Key-7.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

You must have been right, because when i changed it to ECBKEY=0, it worked.

Thank you very much!

Justin R. Bendich

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Assembler calling macro IEEVARYD

2011-12-02 Thread Rob Scott
Here is the meat from something I wrote 15 years ago :

Notes :

(1) You must be supervisor and key0
(2) You must be nonswap
(3) DEV_ARRAY is the address of unit array
(4) DEV_ENTRIES contains number of entries in the array
(5) Test the code on a TEST system! 

LA  R4,DEV_INPUT 
USING   VDEV,R4 
MVC VDEV_ID(4),=CL4'VDEV'   
MVI VDEV_VERSION,VDEV_VERN   
OI  VDEV_KEYWORDS1,VDEV_OFFLINE  
L   R3,DEV_ARRAY
MODESET MODE=SUP,KEY=ZERO
SYSEVENT DONTSWAP  
IEEVARYD OPERATION=DEV_INPUT,  
DEVICES=(R3),   
NUMDEVS=DEV_ENTRIES,
CALLERID==CL8'', 
RETCODE=DEV_RC,
RSNCODE=DEV_RSN,
SYSEVENT OKSWAP 


...
DEV_RC  DS  F
DEV_RSN DS  F
DEV_ENTRIES DS  F
DEV_ARRAY   DS  A
DEV_INPUT   DS  XL(VDEV_LENGTH) 



Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Leonardo Vaz
Sent: 02 December 2011 17:18
To: IBM-MAIN@bama.ua.edu
Subject: Assembler calling macro IEEVARYD

Hello all. I'm still crawling when it comes to assembler, but i've already done 
some cool thigs like changing the APF list, dynamically adding modules to the 
LPA or using the callrtm macros, real fun.

But I'm having a problem I can't bypass... I keep getting S0C4 when trying to 
use the IEEVARYD macro, I'm supposed to getmain some storage but I'm not really 
sure how to. I'm trying something very similar to IBM's example 2: 
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/iea2a2b0/72.1.14?SHELF=iea2bkb0.bksDT=20100630112343

You guys have any tips for me? Anyone has a working example? 

Thanks,
Leo

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ABEND S0C4 REASON CODE=0011

2011-11-26 Thread Rob Scott
Take a look at APAR : OA13544


Rob Scott
Lead Developer
Rocket Software
275 Grove Street · Newton, MA 02466-2272 · USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
HELIO
Sent: 25 November 2011 19:02
To: IBM-MAIN@bama.ua.edu
Subject: Fwd: ABEND S0C4 REASON CODE=0011

All list,

I run a job with the IKJEFT01 program and REGION=8M,but it abended ans display 
following info.

IEA995I SYMPTOM DUMP OUTPUT169

SYSTEM COMPLETION CODE=0C4REASON CODE=0011

TIME=15.45.46SEQ=01531CPU=ASID=0043

PSW AT TIME OF ERROR078D2005DBB8ILC 6INTC 11

ACTIVE LOAD MODULEADDRESS=0005C7C8OFFSET=13F0

NAME=ICHCLG00

DATA AT PSW0005DBB2 - 601E58E0BA75D202BD11E002

GR 0: _00011: _0005ED28

2: _0005BA083: _0005F5E2

4: _0006D0005: _

6: _0006EC407: _00073FF3

8: _00073FF69: _0006EC7D

A: _0005F36EB: _0005E36F

C: _0005D370D: _0005EC4C

E: _00073FFCF: 0004_

END OF SYMPTOM DUMP

This my job

//RACFGROU JOBF0,'SUPPORT',CLASS=6,TIME=(0004,00),

//MSGCLASS=X,MSGLEVEL=(1,1),NOTIFY=SYSUID

//*

//CE1E001 EXEC PGM=IKJEFT01,REGION=8M

//SYSTSPRT DDDISP=(NEW,CATLG,CATLG),

//DSN=RWA0001.RACF.LIST.GROUPS,

//SPACE=(TRK,(5000,500),RLSE),UNIT=SYSALLDA,

//RECFM=VBA,LRECL=137,BLKSIZE=0

//SYSTSINDD *

PROFILE NOPREFIX

LISTGRP *

LOGOFF

/*

Could anybody help me check the error ?

By the way, I run it in different region of the job/step, 64M, 0M, but it's 
keep abended.

Thanks.

Hélio José





--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: WLM interface

2011-11-25 Thread Rob Scott
See the IWMRESET macro in the Workload Management Services manual

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Vernooij, CP - SPLXM
Sent: 25 November 2011 11:02
To: IBM-MAIN@bama.ua.edu
Subject: WLM interface

Hello,

 

I have been looking in all kinds of places, without result.

 

Can someone point me to the assembler interface to change the WLM Service Class 
of a running job (and similar functions)? 

Or can this only be done with an E jobname operator command?

 

Thanks,

Kees.

 

/prebrFor 
information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message.brbrKoninklijke Luchtvaart Maatschappij NV 
(KLM), its subsidiaries and/or its employees shall not be liable for the 
incorrect or incomplete transmission of this e-mail or any attachments, nor 
responsible for any delay in receipt.brKoninklijke Luchtvaart Maatschappij 
N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The 
Netherland!
 s, with registered number  33014286 
brpre

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IEFU85 question

2011-11-18 Thread Rob Scott
No.

IEFU85 is invoked for cross-memory callers and the caller may well be holding 
locks.

I would guess that very few (if any) z/OS Unix callable services are valid in 
cross-memory mode and none of them would be valid when caller has locks held.

IMHO - it is never wise to do anything clever in IEFU83/84/85 - just save the 
SMF data that you are interested in a queue or list somewhere where a server 
subtask can pick it up asynchronously.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 18 November 2011 11:34
To: IBM-MAIN@bama.ua.edu
Subject: IEFU85 question

Hi


I would need the IEFU85 exit , to get control during the write of 92 (USS File 
Activity) records.
Can I use here USS  calls ?
Would like to send the record to an IPC message queue.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hiperspaces

2011-11-11 Thread Rob Scott
Hiperspaces are typically used when you are dealing in chunks of 4K pages - I 
think dataspaces would be more suitable if you insist on an AR-Mode solution as 
it allows direct byte access.

However, there are a few alternatives to consider here :

(1) Shared memory objects
(2) PC-ss to add SYSPRINT data to target ASID private?
(3) IARVSERV
  
I am sure others in this list will point out other choices

Rob Scott
Lead Developer
Rocket Software
275 Grove Street · Newton, MA 02466-2272 · USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Scott Ford
Sent: 11 November 2011 16:03
To: IBM-MAIN@bama.ua.edu
Subject: Hiperspaces

All:
 
Has anyone used Hiperspaces via Assmelber ? Created ? Read from ?  Wrote to ?
I have started the processs of reading the manuals and have a basic 
understanding.
What I want to do is have a program read and place its SYSPRINT output (large 
amt - 300,000 - 121 byte records) to either a datasopace or hiperspace. After 
the data is placed there, have a running task pick up the data and delete the 
hiperspace when done. 
 
I am assuming(bad word choice, I know) that this process as described above 
should work ...
All input is welcome and of course appreciated.

Scott J Ford
Software Engineer
http://www.identityforge.com

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to enable Storage Protection Override?

2011-11-09 Thread Rob Scott
Lindy 

My own reference list for key assignments :

0   Supervisor
1   JES
2   Reserved* (used to be VSPC)
3   Reserved*
4   Reserved*
5   Data management (eg DFP)
6   VTAM and TCAM
7   IMS, DB2 and MQ
8   Problem state programs
9   CICS user
10-15   n/a 

Note that (*) for reserved does not mean that you will find no users of 
storage in these keys.

In is very common for system software products (from IBM and ISVs) to run with 
a non-problem state storage protect key and it is better for the integrity of 
the system if they choose a key that is  *not* key0 if at all possible to avoid 
unintentional overlays of supervisor control blocks. I have not seen too much 
key3 usage in the past, but have often come across key2 and key4 being used by 
products.

You should be able to spot the main users of interesting keys by entries in 
the SCHEDxx member of PARMLIB. 



Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Lindy Mayfield
Sent: 09 November 2011 12:47
To: IBM-MAIN@bama.ua.edu
Subject: Re: How to enable Storage Protection Override?

I love following these discussions, though I don't use this stuff at all in my 
line of work.  

I have a list of all the subpools (tacked to my wall, of course), but where do 
I find the documentation that explains these keys and what they do?

Kind regards,
Lindy


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Peter Relson
Sent: Wednesday, November 09, 2011 2:25 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: How to enable Storage Protection Override?

UserKey 9 can write into CICSKey 8? that cannot be correct as all DFH 
modules would be up for overwriting.  Where would integrity be?

FWIW, system integrity is not a factor since in the CICS case the key 9 user 
has permission to get into key 8 and do whatever a key 8 user can do.
Reliability is the reason for this function. 

Peter Relson
z/OS Core Technology Design

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: $HASP165 Inconsistent Formatting

2011-11-04 Thread Rob Scott
I started noticing the 4-digit return codes with z/OS 1.13 - do you have at 
least one system in the MAS at that level? 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Edward Jaffe
Sent: 03 November 2011 20:09
To: IBM-MAIN@bama.ua.edu
Subject: $HASP165 Inconsistent Formatting

Lol! Never noticed before. $HASP165 has inconsistent formatting for the same 
return code (zero) from one job to the next. :-D

11.25.31 J0110283 $HASP165 EJES$SAL ENDED AT PHXHQ2  MAXCC=0 CN(INTERNAL)
11.25.34 J0110285 $HASP165 EJES$DAL ENDED AT PHXHQ2  MAXCC= CN(INTERNAL)
11.25.34 J0110284 $HASP165 EJES$TAL ENDED AT PHXHQ2  MAXCC=0 CN(INTERNAL)
***

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: A little bit more about Gilbert Saint-flour

2011-10-10 Thread Rob Scott
This truly is sad news about Gilbert.

An inspiration to many people.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
John P Kalinich
Sent: 10 October 2011 15:12
To: IBM-MAIN@bama.ua.edu
Subject: Re: A little bit more about Gilbert Saint-flour

Sam Golob from the IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote 
on 10/09/2011 09:43:52 PM:

Gilbert was responsible for keeping the CBT Tape up for five years.  He 
supplied the MVS machine that the support ran on.  If it weren't for 
him, I doubt that the CBT site would even exist today.

I remember FTP'ing some CBT updates to Gilbert's P/390 in upstate New York 
circa 1997.  I first heard of Gilbert when Sam wrote an article about ShowMVS 
in Technical Support magazine.  I, like others, have used many of his code 
snippets over the years.  He will be missed.

Regards,
John K

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IGVINITFREEMAIN

2011-10-06 Thread Rob Scott
I would be *very* surprised if this was a problem in IBM code -  DIAG 
IGVINITFREEMAIN has been around for quite a while and if there was a problem 
in something as fundamental as allocation then there would be existing APARs.

I think it is much more likely that the user program invoking has passed 
parameters to storage that is dirty or invalid in some way.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Shmuel Metz (Seymour J.)
Sent: 06 October 2011 17:55
To: IBM-MAIN@bama.ua.edu
Subject: Re: IGVINITFREEMAIN

In 4098194956941362.wa.bill.hecoxmail@bama.ua.edu, on 10/06/2011
   at 08:31 AM, Bill Hecox bill.he...@mail.com said:

I am running a program on  a test system with DIAG IGVINITFREEMAIN set.  
The program is getting a S0C4 in module IEFWS21D with this DIAG set.

Have you reported it to IBM?

IEFWS21D appears to be associated with dynamic allocation.

Also static allocation, AFAIK.

What could a program do to prevent the ABend?

Initialize the storage that it acquires. Since you don't control Allocation, 
it's IBM that needs to look at it.

Does anyone have some insight on what is going on here?

Allocation is acquiring storage and not initializing it correctly.
Open a PMR. If IBM closes it as BAD then you'll have to restrict 
IGVINITFREEMAIN to a sandbox.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: FORCE ARM

2011-09-23 Thread Rob Scott
FORCE ARM is pretty much just an standard MVS CANCEL that has been prefixed by 
some bit-twiddling (or bit-ignoring) to enable CANCEL to work against address 
spaces that are marked non-cancel , and task-level recovery routines and 
task-level resource managers for  the ASID receive control as usual.

FORCE *without* ARM results internally to CALLRTM TYPE=MEMTERM which will 
bypass task-level recovery routines and resource managers (whilst still 
allowing address space level resource manager to get control).

Bearing all this in mind, I have always believed that ARM stood for Allow 
Recovery Management or Allow Resource Managers.

I think it is just a happy coincidence or developer humour that forcing 
someone's arm is a saying in English.  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Shane
Sent: 23 September 2011 08:36
To: IBM-MAIN@bama.ua.edu
Subject: Re: FORCE ARM

On Fri, 23 Sep 2011 09:42:04 +0930 Anthony Thompson wrote:

 ARM means Automatic Restart Management.

Nope, not in this context.
FORCE,ARM would pre-date that by quite a bit I would reckon.

Perhaps everyone should heed Kees suggestion.

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: RESMGR Add Return Code 44

2011-09-19 Thread Rob Scott
A few questions :

(1) Did you pre-populate WORK_IBMPLIST with a model list form of RESMGR 
before the MF=E call ?
(2) Where does R3 point to ?
(3) Where does R2 point to ? 

Whenever I have used RESMGR in my code, I have always primed the plist from a 
constant RESMGR ADD,MF=L before using the MF=E form - so that hints that this 
macro might be one of those that require this extra attention (like WTO).


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Chuck Arney
Sent: 19 September 2011 16:46
To: IBM-MAIN@bama.ua.edu
Subject: RESMGR Add Return Code 44

Does anyone have any in site into what might cause a return code of 44 from a 
RESMGR ADD,TYPE=TASK?  The manual says System error. An unrecoverable error 
occurred while processing the request.* *so that's of no practical help.

The issuer is running in task mode with P=S=H.  The request is basically coded 
as:

   RESMGRADD,TOKEN=(R3),TYPE=TASK,TCB=CURRENT,PARAM=(R4),
ASID=CURRENT,ROUTINE=(BRANCH,(R2)),MF=(E,WORK_IBMPLIST)

All comments are welcome.

Chuck Arney
Arney Computer Systems

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ENF (event notification facility) question

2011-09-12 Thread Rob Scott
Listening on ENF codes is a very common thing to do and you will find that RMF 
and ISV monitors do this sort of thing a lot.

If you are coding the routine that gets invoked when the ENF code occurs, you 
need to be fully aware of the environment in which you get invoked - for 
example : you may get invoked in SRB mode.

My general advice here is to not try and do anything too clever in the ENF exit 
routine but just store away the bits of data you are interested in and notify 
your server address space to process asynchronously - maybe by some sort of 
event/request block on a queue or updating some counter somewhere. 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 12 September 2011 10:52
To: IBM-MAIN@bama.ua.edu
Subject: ENF (event notification facility) question

 Hi

 Reading the ENF descriptions, seems to me,  for the first , a useful 
facility would be to listen to a number of ENF events,
  and send some alerts if something wrong.
   I mean SRM event or config change or SMF ended etc etc .

To this general alert contradict  the ENF description in some points:
- you can define only one event code in the ENFREQ request
- from the description avoid multiple listener user exits

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: subtask recovery

2011-09-07 Thread Rob Scott
You could consider having a file owning TCB (FO-TCB) within your server, 
design structures that describe a file and a file action request and then 
you can send requests to some sort of queue monitored by the FO-TCB from your 
sub-tasks to open or close files.

Your ESTAEs (or RESMGRs or EOT exit routines) can then just place a request on 
the FO-TCB request queue to close the file.  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Donald Likens
Sent: 07 September 2011 16:45
To: IBM-MAIN@bama.ua.edu
Subject: subtask recovery

In the IP Sockets Application Programming Interface Guide and Reference IBM 
discusses data services task (DST). This uses sub-tasks to do I/O. When I 
designed my program using DSTs I had a problem I could not resolve. I have been 
informed by IBM that sub-tasks are suspended during an abend and cannot be 
used. This means there is no way to close the files opened by the sub-tasks in 
my estae routine. Has anyone come with a solution to this problem?

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TCB List - again

2011-08-18 Thread Rob Scott
The freeware MXI does have a limit on the maximum number of TCBs shown for an 
ASID - the commercial version (MXI G2) does not.

I do not believe that there is another free tool that lists TCBs in a foreign 
address space dynamically - your only other free option is to DUMP the 
address space and use IPCS. 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street · Newton, MA 02466-2272 · USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
ITURIEL DO NASCIMENTO NETO
Sent: 18 August 2011 15:45
To: IBM-MAIN@bama.ua.edu
Subject: TCB List - again

Hi all,

Sorry, I'm resending this message because the other one presents strange 
characters in its text.

I need to list all TCBs from an specific A.S. but I don't want to reinvent the 
wheel.
I tried to use MXI - TCB JOB(xxx), but it only shows 500 rows, which is 
insufficient to my case.
Does any of you have or can point me to a program that lists others A.S'TCBs ?

Any help will be very appreciated.

TIA

Atenciosamente / Regards / Saludos

Ituriel do Nascimento Neto
BANCO BRADESCO S.A.
4254 / DPCD Engenharia de Software
Sistemas Operacionais Mainframes
Tel: +55 11 4197-2021 R: 22021
Fax: +55 11 4197-2814


AVISO LEGAL br...Esta mensagem é destinada exclusivamente para a(s) pessoa(s) 
a quem é dirigida, podendo conter informação confidencial e/ou legalmente 
privilegiada. Se você não for destinatário desta mensagem, desde já fica 
notificado de abster-se a divulgar, copiar, distribuir, examinar ou, de 
qualquer forma, utilizar a informação contida nesta mensagem, por ser ilegal. 
Caso você tenha recebido esta mensagem por engano, pedimos que nos retorne este 
E-Mail, promovendo, desde logo, a eliminação do seu conteúdo em sua base de 
dados, registros ou sistema de controle. Fica desprovida de eficácia e validade 
a mensagem que contiver vínculos obrigacionais, expedida por quem não detenha 
poderes de representação. 
LEGAL ADVICEbr...This message is exclusively destined for the people to whom 
it is directed, and it can bear private and/or legally exceptional information. 
If you are not addressee of this message, since now you are advised to not 
release, copy, distribute, check or, otherwise, use the information contained 
in this message, because it is illegal. If you received this message by 
mistake, we ask you to return this email, making possible, as soon as possible, 
the elimination of its contents of your database, registrations or controls 
system. The message that bears any mandatory links, issued by someone who has 
no representation powers, shall be null or void.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TCB List - again

2011-08-18 Thread Rob Scott
Walt

That sounds really cool. 

I wonder if there are any example IPCS REXX execs out there that take advantage 
of this?

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Walt Farrell
Sent: 18 August 2011 16:43
To: IBM-MAIN@bama.ua.edu
Subject: Re: TCB List - again

On Thu, 18 Aug 2011 14:12:42 +, Rob Scott rsc...@rocketsoftware.com wrote:

The freeware MXI does have a limit on the maximum number of TCBs shown for an 
ASID - the commercial version (MXI G2) does not.

I do not believe that there is another free tool that lists TCBs in a foreign 
address space dynamically - your only other free option is to DUMP the 
address space and use IPCS.


With appropriate authorization via FACILITY class resource BLSACTV.SYSTEM an 
IPCS user can use IPCS ACTIVE and examine the storage of other address spaces. 
That should allow running TCB chains and producing an appropriate report, 
possibly via a REXX exec, though of course as TCBs are created or deleted 
errors might occur and will need to be handled.

--
Walt Farrell
IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Shared Hiperspace write serialization

2011-08-11 Thread Rob Scott
Is there a fundamental reason why are you using a hiperspace?

If you are trying to selectively copy SMF data from IEFU8x into somewhere that 
can be accessed/post-processed by another task/ASID, then using a common 
dataspace would be much easier and you could manage the serialization with CDS. 

As mentioned before, you could also consider PC-ss into another server ASID and 
write the data directly to private storage.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Donald Likens
Sent: 11 August 2011 02:45
To: IBM-MAIN@bama.ua.edu
Subject: Shared Hiperspace write serialization

I have looked in the manuals so if the answer is there, I could not find it.

I am looking to write to a hiperspace from the IEFU8x exits. I do not see 
anything to stop this but I am concerned about writing to a shared hiperspace 
from multiple addree spaces. Do I need to be concerned? If in a middle of a 
write operation an interrupt occurs and then from another address space issues 
a write to the hiperspace, what happens? 

Another thing I did not see in the manual. I assume an SREAD will retrieve the 
data in the order it was written. True?

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: batch job as non-swappable

2011-08-10 Thread Rob Scott
If you identify the jobstep program name (and you *always* want it to run 
non-swap), then an entry in SCHEDxx PARMLIB member should do it - see MVS 
Init+Tuning

If a more flexible approach is required, then the SYSEVENT DONTSWAP and 
TRANSWAP services can be used (depending on the length of time you want the 
program to remain non-swappable) - note that your program will have to be 
authorized to issue these SYSEVENTs

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Tim Brown
Sent: 10 August 2011 19:51
To: IBM-MAIN@bama.ua.edu
Subject: batch job as non-swappable

What is required to make a particular  batch job  run as non-swappable

 

Thanks,

 

Tim Brown
Systems Specialist - Project Leader
Central Hudson Gas  Electric
284 South Ave
Poughkeepsie, NY 12601
Email: tbr...@cenhud.com mailto:tbr...@cenhud.com
Phone: 845-486-5643
Fax: 845-486-5921
Cell: 845-235-4255

 


This message contains confidential information and is only for the intended 
recipient. If the reader of this message is not the intended recipient, or an 
employee or agent responsible for delivering this message to the intended 
recipient, please notify the sender immediately by replying to this note and 
deleting all copies and attachments. 

 




--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: batch job as non-swappable

2011-08-10 Thread Rob Scott
Mark

Only three SYSEVENTs are unauthorized : FREEAUX, QVS and REQFASD

If you are going to use SYSEVENT TRANSWAP or DONTSWAP, then you have to be 
authorized.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Mark Zelden
Sent: 10 August 2011 20:46
To: IBM-MAIN@bama.ua.edu
Subject: Re: batch job as non-swappable

On Wed, 10 Aug 2011 18:25:27 +, Ted MacNEIL eamacn...@yahoo.ca wrote:

If you identify the jobstep program name (and you *always* want it to 
run non-swap), then an entry in SCHEDxx PARMLIB member should do it - 
see MVS Init+Tuning

It also has to be authourised.
-

No, you are incorrect sir.

--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
mailto:m...@mzelden.com
Mark's MVS Utilities: http://www.mzelden.com/mvsutil.html
Systems Programming expert at http://expertanswercenter.techtarget.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: batch job as non-swappable

2011-08-10 Thread Rob Scott
Yeah - I replied out of context and sent too early

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Walt Farrell
Sent: 10 August 2011 21:33
To: IBM-MAIN@bama.ua.edu
Subject: Re: batch job as non-swappable

On Wed, 10 Aug 2011 19:27:55 +, Rob Scott rsc...@rocketsoftware.com wrote:

Mark

Only three SYSEVENTs are unauthorized : FREEAUX, QVS and REQFASD

If you are going to use SYSEVENT TRANSWAP or DONTSWAP, then you have to be 
authorized.


But Mark was replying in the context of using the PPT to set the program 
non-swappable, Rob, not in the context of having the program issue SYSEVENT. 
Yes, issuing the SYSEVENT requires the program to run authorized. Using the PPT 
does not; it only requires the program to come from an authorized library.

--
Walt Farrell
IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SETLOCK in IEFU85

2011-08-09 Thread Rob Scott
Personally, I think SETLOCK is overkill for what you are attempting to do.

Either a circular buffer or a slotted (pre-divided) buffer can be maintained in 
some sort of common storage across multiple tasks and ASIDs using CDS (Compare 
Double and Swap).

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Donald Likens
Sent: 09 August 2011 17:55
To: IBM-MAIN@bama.ua.edu
Subject: Re: SETLOCK in IEFU85

You understand completely. I thought of the control block structure you talk 
about but I wanted to control how much space I used in CSA and avoid the extra 
overhead. Of course I could limit the number of control blocks I create but 
this seemed to work. PS. I anchor  the buffer in a module dynamically loaded 
into LPA. When I designed this I wasn't even sure I could do a getmain in 
IEFU85 since it could not issue SVCs (I have since learned obtain storage does 
a PC). 

Do you see any problem with what I am planning for setlock?

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF TLD control block lookup Z/OS 1.12 ISPF 6.1

2011-07-29 Thread Rob Scott
That looks very similar to something written by Doug Nadel (IBMer in ISPF team) 
many moons ago.

It comes with disclaimers about not being supported - however the logic has 
worked for many years.

Since the REXX was originally written ISPF has been enhanced to return the 
screen image info in ISPF system variables ZSCREENI and ZSCREENC if requested - 
can you convert your code to use that instead?  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
michealbutz
Sent: 29 July 2011 16:07
To: IBM-MAIN@bama.ua.edu
Subject: ISPF TLD control block lookup Z/OS 1.12 ISPF 6.1

Hi,

 

 

Found this snipet of code to get the ISPF TLD

Would anyone know if still valid in IPSF 6.1

 

 

**/

/*RETRIEVE LINE ADDRESS AND CURSOR POSITION   */

/**/

/**/

find_cursor_position:

  tcb= PTR(540)   /* TCB (EXEC command)PSATOLD  */

  tcb= PTR(tcb+132)   /* TCB (ISPTASK) TCBOTC   */

  fsa= PTR(tcb+112)   /* first save area   TCBFSA   */

  r1 = PTR(fsa+24)/* ISPTASK's R1   */

  tld= PTR(r1)/* TLD address*/

  tls= PTR(tld+096)   /* screen buffer TLDTLSP  */

  csr= PTR(tld+164)   /* relative cursor pos.  TLDCSR   */

  scrw   = PTR(tld+192)   /* screen width  TLDCLSWD */

  offl   = scrw * TRUNC(csr/scrw) /* offset to current line */

  csrp   = csr-offl+1 /* cursor position*/

  linead = D2X(tls+offl)  /* current line address   */

  line   = STORAGE(linead,scrw)   /* text of current line   */

 

  RETURN

 

 

  

Joseph Reichman

 

Joe Reichman

 

5420 15TH AVE APT 2B

Brooklyn NY 11219

 

 

Hone  (718) 851 - 8712

Work ((914) 921 - 7360

Cell  (917) 748 - 9693

 

 

  

 

 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: musings on listing a catalog

2011-07-26 Thread Rob Scott
Fairly simple to achieve as a REXX external function in assembler by calling 
IGGCSI00 and then IRXEXCOM to create the REXX variables.

There is some decent doc on how to code REXX external functions in the TSO/E 
REXX  Programming Services chapter in the TSO/E Rexx Reference  manual and 
there a quite a few samples out there in CBTtape-land.
   

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
McKown, John
Sent: 26 July 2011 17:06
To: IBM-MAIN@bama.ua.edu
Subject: Re: musings on listing a catalog

 -Original Message-
 From: IBM Mainframe Discussion List
 [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Kirk Wolf
 Sent: Tuesday, July 26, 2011 10:46 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: musings on listing a catalog
 
 On Tue, Jul 26, 2011 at 9:51 AM, McKown, John 
 john.mck...@healthmarkets.com
  wrote:
 
  OK. I've looked at IGGCSI00. Way to complicated, IMO. REXX
 is supposed to
  make things __simple__. creating and decoding buffers in a
 REXX variable
  blob is not my idea of simple.
 
 
 Isn't this how REXX deals with record/field data structures? :-)

I was thinking more how the SDSF REXX and UNIX REXX work. Not with blobs, but 
with stem variables and predefined named constants. The environments are by 
initialized by invoking an initialization routine (ISFCALLS or SYSCALLS). Gee, 
for a LISTCAT, would it be CATCALLS? grin No, more likely IDCCALLS.

Example:
if 3  idccalls('on') then do
   say Failed to set up catalog environment
   exit 8
end
cluster='SOME.VSAM.CLUSTER.NAME'
address idcams listc ent((cluster)) (stem outrec.
if rc0 then say LISTC ended with a return code of rc if outrec.ENT_DSORG  
KSDS then say Dataset:cluster is not a VSAM KSDS file!
say avgrec is word(outrec.ENT_RECORDSIZE,1) max lrecl is 
word(outrec.ENT_RECORDSIZE,2) Say Volume are:
do i=1 to outrec.ENT_NUM_VOLUMES
   say Volume i is outrec.ENT_VOLUME.i end
/* or maybe */
do i=1 to words(outrec.ENT_VOLUMES)
   say Volume i is word(outrec.ENT_VOLUMES,i) end

Now, that is relatively simple.


 
 Take a look at the JZOS wrapper for CSI; it handles decoding of 
 fields, but still requires an understanding of how CSI works -
 
 http://www.ibm.com/developerworks/java/zos/javadoc/jzos/com/ib
 m/jzos/CatalogSearch.html
 http://www.ibm.com/developerworks/java/zos/javadoc/jzos/com/ib
 m/jzos/CatalogSearch.Entry.html
 http://www.ibm.com/developerworks/java/zos/javadoc/jzos/com/ib
 m/jzos/CatalogSearchField.html
 
 An interesting coding project would be to write a Java utility that 
 would
 provide an XML interface to CSI, using this wrapper.   
 Perhaps we should
 consider it as a future JZOS sample program.
 
 Kirk Wolf
 Dovetailed Technologies
 http://dovetail.com


--
John McKown
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone *
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dynamic STEPLIB

2011-07-22 Thread Rob Scott
Products that can be invoked under LIBDEF for ISPLLIB must be coded to 
recognize and support it - otherwise any bog-standard LOADs could be issued 
without awareness of the tasklib DCB requirements  and you end up with an S806. 
If the product sticks to just ISPEXEC SELECT to invoke any other programs, 
then you are probably OK - however if there is a LOAD lurking in the code, 
then it must be handled correctly.

ISPF has made this easier in recent years with the introduction of the QLIBDEF 
service so that a product can query the ISPLLIB and dynamically allocate its 
own tasklib to pass on the LOAD DCB keyword. 

I would suggest that if you have an IBM product whose ISPF interface does not 
support LIBDEF for ISPLLIB, then consider raising this as a PMR/ETR.   

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Shmuel Metz (Seymour J.)
Sent: 22 July 2011 13:28
To: IBM-MAIN@bama.ua.edu
Subject: Re: dynamic STEPLIB

In 5015311985942233.wa.juergen.kellerdeutscheboerse@bama.ua.edu,
on 07/22/2011
   at 02:40 AM, Juergen Keller juergen.kel...@deutsche-boerse.com
said:

And I do not understand why IBM does not offer an official way of 
doing this which is maintained with the approprate z/OS release.

IBM does, and it's pretty long in the tooth. It's restricted to the READY 
prompt, which is a RPITA, but if you're using ISPF then LIBDEF should do the 
trick.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dynamic STEPLIB

2011-07-22 Thread Rob Scott
 I believe that as long as you invoke the program via ISPEXEC SELECT CMD(...) 
 rather than ISPEXEC SELECT PGM(...) then the program does not need to worry 
 about the LIBDEF for ISPLLIB

Good point - I was blinkered by my own use of SELECT PGM() 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Walt Farrell
Sent: 22 July 2011 15:28
To: IBM-MAIN@bama.ua.edu
Subject: Re: dynamic STEPLIB

On Fri, 22 Jul 2011 12:45:24 +, Rob Scott rsc...@rocketsoftware.com wrote:

Products that can be invoked under LIBDEF for ISPLLIB must be coded to 
recognize and support it - otherwise any bog-standard LOADs could be 
issued without awareness of the tasklib DCB requirements  and you end up with 
an S806. If the product sticks to just ISPEXEC SELECT to invoke any other 
programs, then you are probably OK - however if there is a LOAD lurking in 
the code, then it must be handled correctly.

I believe that as long as you invoke the program via ISPEXEC SELECT CMD(...) 
rather than ISPEXEC SELECT PGM(...) then the program does not need to worry 
about the LIBDEF for ISPLLIB, Rob. 

Also, of course, if there's just one library involved and if you can invoke the 
program via the TSO/E CALL command instead of ISPEXEC SELECT PGM then the 
program won't need to worry about its LOADs.

In both cases the LOADs will simply work, because both CALL and ISPEXEC SELECT 
CMD establish real tasklibs.

--
Walt Farrell
IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: dynamic STEPLIB

2011-07-22 Thread Rob Scott
I have come across *many* software products and home-grown utilities that do 
not handle being invoked under LIBDEF very well - and, as Walt pointed out 
earlier, were invoked using SELECT PGM(foo).

All works fine and dandy when load modules exist in normal search order - 
however the code has naked LOADs that will fail S806 under a LIBDEF 
invocation.

What I was trying to point out is that the code could/should use QLIBDEF for 
ISPLLIB and then establish its own DCB for the LOADs.


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Shmuel Metz (Seymour J.)
Sent: 22 July 2011 20:52
To: IBM-MAIN@bama.ua.edu
Subject: Re: dynamic STEPLIB

In
295ed806ab479944b1217cc84a173de012a2d...@nwt-s-mbx1.rocketsoftware.com,
on 07/22/2011
   at 12:45 PM, Rob Scott rsc...@rocketsoftware.com said:

Products that can be invoked under LIBDEF for ISPLLIB must be coded to 
recognize and support it - otherwise any bog-standard LOADs could be 
issued without awareness of the tasklib DCB requirements  and you end 
up with an S806.

?

If there's a taklib DCB then what other requirements are there?
Perhaps you meant that they must use a for of SELECT that generates a tasklib, 
e.g., CMD rather than PGM.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


RE : dynamic STEPLIB

2011-07-22 Thread Rob Scott
It is probably worth pointing out that one of the reasons for using SELECT 
PGM() instead of SELECT CMD() is the format of the parameter list received 
by the invoked program. 

Depending on how this program is coded and what environments it expects to be 
possibly invoked in, it might not be feasible to just replace SELECT PGM(foo) 
PARM(bar) with SELECT CMD(foo bar)

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: Rob Scott
Sent: 22 July 2011 23:22
To: 'IBM Mainframe Discussion List'
Subject: RE: dynamic STEPLIB

I have come across *many* software products and home-grown utilities that do 
not handle being invoked under LIBDEF very well - and, as Walt pointed out 
earlier, were invoked using SELECT PGM(foo).

All works fine and dandy when load modules exist in normal search order - 
however the code has naked LOADs that will fail S806 under a LIBDEF 
invocation.

What I was trying to point out is that the code could/should use QLIBDEF for 
ISPLLIB and then establish its own DCB for the LOADs.


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Shmuel Metz (Seymour J.)
Sent: 22 July 2011 20:52
To: IBM-MAIN@bama.ua.edu
Subject: Re: dynamic STEPLIB

In
295ed806ab479944b1217cc84a173de012a2d...@nwt-s-mbx1.rocketsoftware.com,
on 07/22/2011
   at 12:45 PM, Rob Scott rsc...@rocketsoftware.com said:

Products that can be invoked under LIBDEF for ISPLLIB must be coded to 
recognize and support it - otherwise any bog-standard LOADs could be 
issued without awareness of the tasklib DCB requirements  and you end 
up with an S806.

?

If there's a taklib DCB then what other requirements are there?
Perhaps you meant that they must use a for of SELECT that generates a tasklib, 
e.g., CMD rather than PGM.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: where to find the assembler mapping macro for websphere smf record 120?

2011-07-12 Thread Rob Scott
Try member BBOOS120 of the SBBOMAC dataset

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Dr. Stephen Fedtke
Sent: 12 July 2011 06:31
To: IBM-MAIN@bama.ua.edu
Subject: where to find the assembler mapping macro for websphere smf record 120?

hi all,

on an IBM educational ppt presentation we googled, including sound, he
talked about mapping macros for websphere smf record 120.

does anybody know about these assembler mapping macros, and where to find them?

best
stephen


---
Dr. Stephen Fedtke
Enterprise-IT-Security.com

Seestrasse 3a
CH-6300  Zug
Switzerland
Tel. ++41-(0)41-710-4005
www.enterprise-it-security.com


++NEWS++ SF-NoEvasion lets you avoid all 10 pitfalls when connecting 
++NEWS++ z/OS to
your SIEM ++NEWS++

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Lines, Bars and ... mini-bars???

2011-07-05 Thread Rob Scott
AFAIK the only fella that grabs storage from the 2G-4G area is Java via an 
IBM-internal API

I used to like the Deadzone term but not now as the zone is not so dead. 

 Mini-bar is pretty good as it conveys the fact that you really shouldn't be 
taking anything from it :-)  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
David Cole
Sent: 05 July 2011 12:44
To: IBM-MAIN@bama.ua.edu
Subject: Lines, Bars and ... mini-bars???

So I'm working on XDC adding support for debugging execution above the bar, 
when I run into a nomenclature problem...

Above the line means 16M.
Above the bar  means 4G.

But AMODE(31) supports execution in only the zero to 2G range. For the 2G to 4G 
range, you need AMODE(64).

So what is the name for the 2G to 4G range of storage? Ok, you guys can go 
ahead and fight it out. Me? I'm just going to call it above the mini bar.

[;)]

Dave Cole  REPLY TO: dbc...@colesoft.com
ColeSoft Marketing WEB PAGE: http://www.colesoft.com
736 Fox Hollow RoadVOICE:540-456-8536
Afton, VA 22920FAX:  540-456-6658 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Lines, Bars and ... mini-bars???

2011-07-05 Thread Rob Scott
Shane

Actual tears of laughter at that.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Shane Ginnane
Sent: 05 July 2011 13:10
To: IBM-MAIN@bama.ua.edu
Subject: Re: Lines, Bars and ... mini-bars???

Unselectable Storage Segment ... ???
Seems a reasonable  acronym - shouldn't cause any controversy.

Shane ...

On Tue, Jul 5th, 2011 at 9:43 PM, David Cole wrote:

 So what is the name for the 2G to 4G range of storage? Ok, you guys 
 can go ahead and fight it out. Me? I'm just going to call it above 
 the mini bar.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Diagnose S0E0 Abend

2011-07-01 Thread Rob Scott
This is unlikely to be a problem in z/OS

What is more likely is that there is a logic error somewhere in your error 
recovery and the linkage stack level at retry is not what you (or the operating 
system) expect.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Donald Likens
Sent: 01 July 2011 13:48
To: IBM-MAIN@bama.ua.edu
Subject: Re: Diagnose S0E0 Abend

Lots of info in the POP about linkage stacks! Thanks

Note: I now believe this is an IBM problem. This started after system changes 
made last weekend and the job will shutdown normally 50% of the time.

Looking at POP to determine how to trace.

Thanks for your help.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PDSE cache

2011-07-01 Thread Rob Scott
Miklos

Barbara Nitz has explored this area in great detail in various threads over the 
last few years.

Check the archives and read her posts - they are excellent.


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 01 July 2011 14:53
To: IBM-MAIN@bama.ua.edu
Subject: PDSE cache

Hi

Started in zOS 1.11 the SMS PDSE1 address space with large cache, 
buffer_beyond_close  etc.
For my big surprise no any change in a program runtime, which is intensively 
using modules from PDSE libraries.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Reduced 3270 Screen Geometry

2011-06-22 Thread Rob Scott
 Last time I checked it didn't even support 'large' screens except under ISPF, 
 so I think it's very old code.

FYI : SDSF does support large screens in TSO mode (rather than ISPF) - I have 
just checked in 62x160 and it handles it fine.

These days I cannot imagine many people actually using SDSF too much from the 
READY prompt 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Edward Jaffe
Sent: 22 June 2011 15:28
To: IBM-MAIN@bama.ua.edu
Subject: Re: Reduced 3270 Screen Geometry

On 6/20/2011 4:05 PM, Paul Gilmartin wrote:

 o Does any terminal emulator provide dynamic geometry change
during a session?

Probably most of them. I know PCOMM supports this. Rebind is a standard part of 
the protocol.

ISPF wouldn't tolerate it; I know;
disconnecting from an ISPF session and reconnecting with
a different geometry results in an endless iterative
TERMINAL I/O ERROR.  I can't even SAVE and END.  But
that's ISPF tunnel vision.  OTOH:

 o If I disconnect from a TSO READY prompt and reconnect with
a different screen geometry, TSO continues in line mode
savvy to the change.  Why doesn't TSO pass notification
of this change to ISPF if it's running, and/or why doesn't
ISPF accommodate?

A command processor is not expected to issue GTTERM and adapt to any changes in 
screen geometry prior to every terminal I/O. Rather, standard procedure is to 
issue GTTERM once per command. When the command ends, the user can rebind and 
run another command at the new dimensions.

 o I must have tried the experiment with SDSF, under ISPF
and/or from the READY prompt.  I don't recall the result.

I would not expect SDSF to do anything other than follow standard procedures. 
Last time I checked it didn't even support 'large' screens except under ISPF, 
so I think it's very old code.

 o What would (E)JES do in case of reconnect with changed
terminal geometry?  :-)

(E)JES supports any terminal geometry in any environment (ISPF, TSO READY, 
CICS, stand-alone VTAM, even the emulated screens [should a program care to 
inspect them for some reason] under the APIs, etc.) If you reconnect to the 
stand-alone VTAM environment with different dimensions, the environment will 
pick up the change dynamically. But, to avoid 'strange' looking screens you 
should return to the equivalent of TSO/E READY and restart your (E)JES session 
(which takes only two keystrokes in that environment).

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Reduced 3270 Screen Geometry

2011-06-22 Thread Rob Scott
Mark

Have you got the following in TSOKEYxx?

HIBFREXT=96000


For later releases of z/OS this prevents some hang conditions with wide screen 
geometry in TSO and ISPF applications


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Mark Zelden
Sent: 22 June 2011 21:22
To: IBM-MAIN@bama.ua.edu
Subject: Re: Reduced 3270 Screen Geometry

On Wed, 22 Jun 2011 14:34:11 +, Rob Scott rsc...@rocketsoftware.com wrote:

 Last time I checked it didn't even support 'large' screens except 
 under
ISPF, so I think it's very old code.

FYI : SDSF does support large screens in TSO mode (rather than ISPF) - 
I
have just checked in 62x160 and it handles it fine.

What version are you using?  I am using 62 x 142 on z/OS 1.11 at
RSU1103 and it still doesn't work.  I get a menu fine, but if I type any 
commands like DA my terminal is so hosed up I can't even get an END excepted. 
 The LOG command produces some really interesting results of asterisks 
covering half my screen.


These days I cannot imagine many people actually using SDSF too much 
from
the READY prompt


What Bob said. :-)

Mark
--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
mailto:m...@mzelden.com
Mark's MVS Utilities: http://www.mzelden.com/mvsutil.html
Systems Programming expert at http://expertanswercenter.techtarget.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Chacteristics of HOME ASC mode

2011-06-15 Thread Rob Scott
Accessing *data* from the caller of a PC-ss is easy - just use SASN=OLD on the 
ETDEF and then ALET of 1 in AR-mode to address caller's data.

Why do you need to execute *instructions* in the home address space from a 
PC-ss?

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 15 June 2011 11:50
To: IBM-MAIN@bama.ua.edu
Subject: Re: Chacteristics of HOME ASC mode

What if you Have a ss pc rtn and want to access data and inst from the program 
that issued the ss pc rtn

Sent from my iPhone

On Jun 15, 2011, at 6:07 AM, Binyamin Dissen bdis...@dissensoftware.com wrote:

 Why do you think that you need HOME mode?

 There may be a better way to do what you want to do.

 Out of curiosity, are there any supervisor services that work in HOME?

 On Tue, 14 Jun 2011 17:18:49 -0400 Micheal Butz 
 michealb...@optonline.net
 
 wrote:

 :Rob
 :
 :I like you work for a vendor
 :Just want to understand home address space inst and data fetched 
 from :home : : :Sent from my iPhone : :On Jun 14, 2011, at 7:59 
 AM, Rob Scott rsc...@rocketsoftware.com
 :wrote:
 :
 : Micheal,
 :
 : Home ASC mode means that data and instruction fetch use the home 
 : address space.
 :
 : Home ASC mode is normally only used by low-level z/OS components - 
 : why do you need to be in HOME mode ?
 :
 :
 :
 : Rob Scott
 : Lead Developer
 : Rocket Software
 : 275 Grove Street * Newton, MA 02466-2272 * USA : Tel: 
 +1.617.614.2305 : Email: rsc...@rs.com : Web: 
 www.rocketsoftware.com : : -Original Message- : From: 
 IBM Mainframe Discussion List [mailto:IBM- m...@bama.ua.edu] On : 
 Behalf Of Micheal Butz : Sent: 14 June 2011 12:27 : To: 
 IBM-MAIN@bama.ua.edu : Subject: Chacteristics of HOME ASC mode : 
 : Hi : : : Would anyone know the charcteristocs of being in 
 HOME ASC mode : : E.G. If I issue a number of space swiching PC  
 and do a SAC 768 : would Intruction and data fetch refer to the 
 orignal Address Space

 --
 Binyamin Dissen bdis...@dissensoftware.com 
 http://www.dissensoftware.com

 Director, Dissen Software, Bar  Grill - Israel


 Should you use the mailblocks package and expect a response from me, 
 you should preauthorize the dissensoftware.com domain.

 I very rarely bother responding to challenge/response systems, 
 especially those from irresponsible companies.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO 
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Chacteristics of HOME ASC mode

2011-06-14 Thread Rob Scott
Micheal,  

Home ASC mode means that data and instruction fetch use the home address space.

Home ASC mode is normally only used by low-level z/OS components - why do you 
need to be in HOME mode ?



Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 14 June 2011 12:27
To: IBM-MAIN@bama.ua.edu
Subject: Chacteristics of HOME ASC mode

Hi


Would anyone know the charcteristocs of being in HOME ASC mode

E.G. If I issue a number of space swiching PC  and do a SAC 768 would 
Intruction and data fetch refer to the orignal Address Space

Sent from my iPhone

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: WAIT while holding LOCAL LOCK ?

2011-06-07 Thread Rob Scott
Paul

I believe you are going to be out of luck here as all of the normal 
wait/pause style services do not allow locks to be held (or in 
SUSPEND/RELEASE case will release when CALLDISP is invoked).

As I am sure you are aware, the number of services available to your program 
drastically decreases if you are holding locks.

A little bit more meat on the bones as to why might help?

As you will be holding the local lock - what are you expecting to happen in the 
address space so that you will be able to complete the locked operation?


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Paul Schuster
Sent: 07 June 2011 18:31
To: IBM-MAIN@bama.ua.edu
Subject: WAIT while holding LOCAL LOCK ?

Hi:
 
This might go under the heading of 'why would you want to to that', but, is 
there a way to do a WAIT (like a STIMERM for a hundreth of a second) while 
holding the LOCAL LOCK?

Is there such a thing as a WAIT service for when holding a LOCK?

Thank you.

Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What is the current feeling for MVC loop vs. MVCL?

2011-06-01 Thread Rob Scott
I am going to digress a bit here.

I got into a discussion with Martin Packer about some of this and it raised a 
few interesting thoughts :

(1) What percentage of executed MVCL instructions are for clearing storage 
versus actually moving data?

I know that in the software I am involved in, that MVCL(*) for clearing is 
used *way* more than any movement purposes as I am a heavy user of CPOOL 
services. 

Obviously you can have fast clear for objects with lengths that 256-multiple 
using n*XC  - however I have often wished for a ZERO=YES option on the CPOOL 
BUILD so that you are guaranteed a clean cell for each subsequent CPOOL GET. If 
anyone else agrees, I might consider raising a Share requirement 

(2) Is there any performance difference in MVCL when L2 is zero? 

I seem to recall hearing a while ago that there might be...however am not sure.

(3) How does MVC v MVCL compare in AR mode with source and target using 
different ALETs ?


(*) Yes - I have a @MVCL macro too :-) 

 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Charles Mills
Sent: 01 June 2011 14:20
To: IBM-MAIN@bama.ua.edu
Subject: Re: What is the current feeling for MVC loop vs. MVCL?

This thread has been really informative. I am going to put this to use. I have 
code that is executing a million or so ~8K MVCLs a day. I have other things on 
my plate at the moment but I will replace that with an MVC loop at some point.

It seems to me like the ideal way to do this would be to have not two stages 
(MVC for 256 and EX'ed MVC) but rather three cases: A loop with a hard-coded 
or unrolled string of 16 MVC's that moved 4K blocks and incremented registers 
by 4K on each iteration; followed by a loop of 256-byte MVCs; followed by an 
EX'ed MVC for 1 to 255 bytes. (Obviously each step would be optional depending 
on the exact count.)

Thoughts?

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
David Crayford
Sent: Tuesday, May 31, 2011 8:32 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: What is the current feeling for MVC loop vs. MVCL?

On 1/06/2011 12:13 AM, Kirk Wolf wrote:
 The IBM C compiler would generate an MVC loop.   So, that's how IBM feels
I
 guess.


And when the length is a constant it generates multiple MVC instructions to 
eliminate branches. Kind of like loop unrolling.

*
*char input[528];
*
*memcpy( output, input, sizeof input );
MVC  (*)void(256,r1,0),input(r4,1508)
MVC  (*)void(256,r1,256),input(r4,1764)
MVC  (*)void(16,r1,512),input(r4,2020)

And if you increase the size of the buffer it generates a loop with loop 
unrolling (if that makes sense). There seems to be a HWM where it drops into a 
loop.

*
*char input[1];
*
*memcpy( output, input, sizeof input );
LA   r0,5
LA   r6,2176(r4,)
@2L4 DS   0H
MVC  (*)void(256,r1,0),input(r6,0)
MVC  (*)void(256,r1,256),input(r6,256)
MVC  (*)void(256,r1,512),input(r6,512)
MVC  (*)void(256,r1,768),input(r6,768)
MVC  (*)void(256,r1,1024),input(r6,1024)
MVC  (*)void(256,r1,1280),input(r6,1280)
MVC  (*)void(256,r1,1536),input(r6,1536)
LA   r1,(*)void(,r1,1792)
LA   r6,input(,r6,1792)
BRCT r0,@2L4
MVC  (*)void(256,r1,0),input(r6,0)
MVC  (*)void(256,r1,256),input(r6,256)
MVC  (*)void(256,r1,512),input(r6,512)
MVC  (*)void(256,r1,768),input(r6,768)
MVC  (*)void(16,r1,1024),input(r6,1024)

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What is the current feeling for MVC loop vs. MVCL?

2011-05-31 Thread Rob Scott
One minor thing to remember that if you are dealing with lengths that are not a 
multiple of 256 bytes, then the MVC loop method is going to have to drop thru 
to an executed move for those remaining bytes.  This means that you need 
addressability to that target of the execute instruction and depending on the 
environment where your code is executing that might be a non-trivial or 
non-desirable exercise. 

Dropping through to an actual  MVCL to move those last remaining bytes might 
be a way to avoid the EXRx,MOVE_LAST_BIT  :-)   

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Charles Mills
Sent: 31 May 2011 23:24
To: IBM-MAIN@bama.ua.edu
Subject: Re: What is the current feeling for MVC loop vs. MVCL?

Wow! Man do I stand corrected!

Sounds like an MVC loop is well worth the bother in anything where performance 
*truly* matters.

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Andy Coburn
Sent: Tuesday, May 31, 2011 3:10 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: What is the current feeling for MVC loop vs. MVCL?

The following is a snip from a program which I just ran on our Z10 whose 
characteristics are shown last below. The program first moved 65536 bytes from 
one location to another using MVCL and did this 1 million times. You'll see it 
took ~56 seconds. Then the same number of bytes were moved using 1 million MVC 
loops. This took ~8 seconds. Finally, the same number of bytes were moved 1 
million times using MVCLE.

I have run this program on every CEC that I have had available to me and the 
results are always relatively the same although the actual numbers change. 

MVCL has some extraordinarily useful functions: Truncation, padding and 
returning addresses and lengths after MVCL. Each of these would have to be done 
manually if a MVC loop were used and these instructions would have to be added 
into the total time for MVC loops. And, yes, I wrote a MVCL macro.
But once one tries to support the case where bits 8 through 31 of  R1+1 and
R2+1 are not equal the macro gets very big and very awkward. And the 
R2+macro
would have to return the 4 registers with contents the same as MVCL would.

   


1 MILLION MVCL INSTRUCTIONS  IN SECONDS  55.961093
1 MILLION MVC LOOPS  IN SECONDS   8.389260
1 MILLION MVCLE INSTRUCTIONS IN SECONDS 115.548643


OPERATING SYSTEM= HBB7770SP7.1.2 HBB7770
CPU ID FROM STIDP: TYPE=2098 VERSION=00 SERIAL=00   
EXECUTION ENVIRONMENT: LPAR=YES VM=NO   
CPU ID FROM STSI: MANUF=IBM TYPE=2098 MODEL=R03 SERIAL=000X 
VERSION CODE FROM CONVERSION TABLE= 
ROLLING 4-HOUR AVERAGE UTILIZATION IS 23 MSUS   
LPAR  IS UNCAPPED IN A 89 MSU CEC   
ADJ FACTOR 1946 ACCUM WEIGHT 6385225 TIMES ACCUM 23219  
LPAR_NAME= LPAR_ID=0003 LPAR_SIZE=89 CEC_SIZE=89 ARCH=Z/ARCHITECTURE

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SYMUPDTE Why is it not fully supported yet

2011-05-25 Thread Rob Scott
Lizette

I imagine that it is because  its accidental miss-use could be confusing and 
possibly disastrous for the system.

Certain software elements (IBM and ISV) will have been presented with data 
during initialization that has been translated from system symbols and they 
will be ignorant of the updated value unless specifically informed and that 
assumes that they have a service to dynamically update themselves where 
required.

SYMUPDTE comes with caveats and if IBM were to officially endorse it then can 
you imagine the mess that users could get themselves into? How about the 
development resources (IBM and ISV) to change existing services to support the 
possible dynamic change of static system symbol?   

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Lizette Koehler
Sent: 25 May 2011 13:21
To: IBM-MAIN@bama.ua.edu
Subject: SYMUPDTE Why is it not fully supported yet

I have (yes I am way behind on this) researching SYMUPDTE.  And it has been 
around since 1999 and it is not well documented.  I was just wondering why IBM 
has not made this official?  The only manuals are SG24-5451, SG24-6818 and 
SG24-7328.  There is only a brief description of the RACF facility of IEASYMUP. 
 There is a sample usermod provided.  There is a sample JCL to run it.  But 
that is all.  Oh, and it uses PARM for input.  No documentation of error 
messages or return codes.  The most detail is in the 1999 Redbook
SG24-5451

The object code is in SYS1.SAMPLIB. So each shop has to manually implement it.

It will allow you to update the Symbols in IEASYMxx (symbolic table) 
dynamically and yet, IBM does not officially support it.

I am going to see if there is a Share requirement. And if there is not one, I 
will make one.

However, it seems that the length of time that this has been available (over
10 years) that it should have become part of the system by now.

The combination of SYMUPDTE and DEF ALIAS SYMBOLICRELATE could save a lot of 
IPL downtime.


Lizette

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Address of a PC routine

2011-05-19 Thread Rob Scott
Take an SVC Dump of the PCAUTH address space using the DUMP operator command 
and then use IPCS and go into option 2.4 (AnalysisSummary) and then choose 
Format and scroll down the report until you see the PC routine table listed

Note that some of the more well-known IBM PC routine numbers are documented in 
the MVS Diagnosis Reference manual

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 19 May 2011 21:19
To: IBM-MAIN@bama.ua.edu
Subject: Address of a PC routine

Hi would anyone know give a PC number how I can find out the associated module 
address

Sent from my iPhone

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Address of a PC routine

2011-05-19 Thread Rob Scott
What Binyamin is referring to is that CR5 contains the address of the ASTE for 
the home address space. 

The ASTE contains all sorts of cross-memory info used by the PCAUTH address 
space. If you are feeling masochistic you can try hunting down the various 
pointers and convert addresses between real and virtual and you will probably 
eventually end up somewhere with PCAUTH looking at some obscure control block.

If you are looking at a dump - it is much better to use IPCS to format the data 
for you.

If you want to find out this information from within a program then things get 
more (ahem).. interesting 

  

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 19 May 2011 22:03
To: IBM-MAIN@bama.ua.edu
Subject: Re: Address of a PC routine

Control register 5. ???

Sent from my iPhone

On May 19, 2011, at 4:44 PM, Binyamin Dissen bdis...@dissensoftware.com wrote:

 On Thu, 19 May 2011 16:18:51 -0400 Micheal Butz 
 michealb...@optonline.net
 
 wrote:

 :Hi would anyone know give a PC number how I can find out the 
 :associated module address

 Get thee to the POPs and start from CR5.

 --
 Binyamin Dissen bdis...@dissensoftware.com 
 http://www.dissensoftware.com

 Director, Dissen Software, Bar  Grill - Israel


 Should you use the mailblocks package and expect a response from me, 
 you should preauthorize the dissensoftware.com domain.

 I very rarely bother responding to challenge/response systems, 
 especially those from irresponsible companies.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO 
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Address of a PC routine

2011-05-19 Thread Rob Scott
Of course, CR5 contains the ASTE for the *Primary* ASID - not home as stated 
previously  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Rob Scott
Sent: 19 May 2011 22:18
To: IBM-MAIN@bama.ua.edu
Subject: Re: Address of a PC routine

What Binyamin is referring to is that CR5 contains the address of the ASTE for 
the home address space. 

The ASTE contains all sorts of cross-memory info used by the PCAUTH address 
space. If you are feeling masochistic you can try hunting down the various 
pointers and convert addresses between real and virtual and you will probably 
eventually end up somewhere with PCAUTH looking at some obscure control block.

If you are looking at a dump - it is much better to use IPCS to format the data 
for you.

If you want to find out this information from within a program then things get 
more (ahem).. interesting 

  

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal Butz
Sent: 19 May 2011 22:03
To: IBM-MAIN@bama.ua.edu
Subject: Re: Address of a PC routine

Control register 5. ???

Sent from my iPhone

On May 19, 2011, at 4:44 PM, Binyamin Dissen bdis...@dissensoftware.com wrote:

 On Thu, 19 May 2011 16:18:51 -0400 Micheal Butz 
 michealb...@optonline.net
 
 wrote:

 :Hi would anyone know give a PC number how I can find out the 
 :associated module address

 Get thee to the POPs and start from CR5.

 --
 Binyamin Dissen bdis...@dissensoftware.com 
 http://www.dissensoftware.com

 Director, Dissen Software, Bar  Grill - Israel


 Should you use the mailblocks package and expect a response from me, 
 you should preauthorize the dissensoftware.com domain.

 I very rarely bother responding to challenge/response systems, 
 especially those from irresponsible companies.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO 
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixing Auth and Non-Auth Modules

2011-04-25 Thread Rob Scott
Tony,

One major difference is that PC routines have to have an owning address space, 
whereas an SVC only needs an entry is PARMLIB and a small common storage 
resident module. 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Tony Harminc
Sent: 25 April 2011 18:07
To: IBM-MAIN@bama.ua.edu
Subject: Re: Mixing Auth and Non-Auth Modules

On 25 April 2011 07:48, Peter Relson rel...@us.ibm.com wrote:
 One point about SVCs vs PC's: unless you go fairly far out of your way, a
 PC routine will not confer additional key/state authorization to its
 invoker. An SVC routine easily can do that by manipulating control block
 fields. This conferrence leads directly to many of (or is itself) the
 system integrity issue(s) related to a magic SVC.

I'm not convinced... I think the idea of the scary magic SVC is just
something that's survived from decades past. They exist, of course,
and I'm not minimizing the danger, but I don't see that it's much
harder to code a magic PC routine to manipulate control block fields
in an equally unsafe way.

 Ed Jaffe mentioned SVC screening

Yes. And some of us have asked for PC screening for years.

 Curious: Does anyone use SVC screening for its documented intended
 purpose: to define those SVCs that a particular task is allowed to issue
 (and conversely those that it is not allowed to issue)?

Hmmm... IIRC SVC screening was introduced in the late 1970s in support
of VSPC (does anyone remember this product that was going to replace
TSO as an end-user general purpose time sharing system, leaving
expensive-to-run TSO only for sysprogs and the like? Anything to avoid
users moving to CMS...)

If SVC screening was intended only for disallowing certain SVCs,
surely it would have a simple table of 256 yes/no bits. (Well, plus a
couple more for ESR, perhaps, but still just a permissions table.) But
instead, it has not just a table, but the ability to get control and
do arbitrary things when a disallowed SVC is issued. So I'm not sure
it was so simple as defining which SVCs a task can use. Surely VSPC
did not just fail all disallowed SVCs, but converted some of them into
different implementations to allow hosting of e.g. TSO apps in its
non-TSO environment.

We have used screening to deal with the case of a vendor product that
in some cases issues TGET in a non-TSO environment. Unfortunately TGET
returns RC=0 in such a case, and if the product assumes this means the
(non existent) user has just hit enter, and re-issues the TGET... Well
- it's not good for CPU consumption. We just change the RC to 8 (user
has hit ATTN), and all is well.

Whether this is what screening was intended for, I'm not sure, but I
believe it's widely used for this kind of thing. I have encountered
SVC screening in use by other vendors in production environments to
modify GETMAIN and WTO arguments, among other things.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Rob Scott
RACROUTE REQUEST=AUTH only needs to be called from an authorized environment 
when using certain (less common) keywords.

Which keyword is being used that makes authorization required?  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Rob Schramm
Sent: 21 April 2011 22:01
To: IBM-MAIN@bama.ua.edu
Subject: Re: Mixing Auth and Non-Auth Modules

Maybe some others are willing to comment...

I thought that there was a short-cut to take for auth checking these days..
if you didn't really need to keep the ACEE around and you just want to do a
quick check to see if someone is auth'd for something.  Perhaps it was a
dream or a wish.  Anyone?

Rob Schramm

On Thu, Apr 21, 2011 at 4:40 PM, McKown, John john.mck...@healthmarkets.com
 wrote:

  -Original Message-
  From: IBM Mainframe Discussion List
  [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Patrick Roehl
  Sent: Thursday, April 21, 2011 2:57 PM
  To: IBM-MAIN@bama.ua.edu
  Subject: Mixing Auth and Non-Auth Modules
 
  I have a situation where APF-authorization is needed by a new
  subprogram
  that performs RACF functions.  This was working fine until it
  came time to call
  the new subprogram from the main program, which does not need to be
  authorized.  Making the whole process authorized seems silly
  (or worse), in
  addition to being inconvenient as there are many STEPLIB
  entries involved.
 
  I tried running the main program from an authorized LNKLST
  library, but quickly
  ran into S306-12 when trying to load a program from the STEPLIB.
 
  Is the best option to handle this setting up a separate
  region to handle the
  authorized calls and communicating via a PC?  It looks like a
  PC client would
  have to be authorized, which defeats the purpose.
 
  How has this been solved in the past?
 
  Thanks for any suggestions and/or examples.

 APF is generally an all or nothing affair. z/OS, and MVS before it, was
 not designed to swap between APF and non-APF authorized states. You can do
 the APF to non-APF switch relatively easily. But it is generally a one way
 street. TSO does it by having two TCB trees. TSO starts up APF authorized,
 but resets the APF when the TMP does an ATTACH. But before that it creates
 an APF authorized subtree. When you run an APF authorized TSO program, it is
 run on the APF subtree and not the normal subtree. The normal subtree is
 frozen via the STATUS STOP operation during APF authorized function to
 decrease the likelihood of cracking the APF code. CICS switched back and
 forth using its SVC somehow (I don't know the internals).

 Now, being the weirdo that I am, I'd likely do my APF authorized work by
 using the UNIX fork() and exec(), where I exec() a module which is in the
 UNIX filesystem marked as APF authorized. Depending on what I need to do, I
 would either use shared memory (shmat) or set up a UNIX bidirectional
 unnamed PIPE if the APF task worked more like a server and would be
 invoked multiple times. It's just seems easier to me. Or use UNIX message
 queues for communications. I have a better understanding of using pipes.

 The plus of the UNIX solution is that the invoker does not need to be APF
 authorized at all. It just needs to be able to do the UNIX fork() and exec()
 of the APF authorized service program. I'd likely secure the service
 program by having the appropriate UNIX security on the executable file in
 the UNIX filesystem (using ACLs if necessary). An alternative / enhancement
 would be to have the UNIX program do a RACF security call of some sort to
 see if the invoker is authorized. This latter would be better if the routine
 is multifunction where the sub functions need to be individually authorized,
 perhaps with differing access lists. Like what ISMF does.

 --
 John McKown
 Systems Engineer IV
 IT

 Administrative Services Group

 HealthMarkets(r)

 9151 Boulevard 26 * N. Richland Hills * TX 76010
 (817) 255-3225 phone *
 john.mck...@healthmarkets.com * www.HealthMarkets.com

 Confidentiality Notice: This e-mail message may contain confidential or
 proprietary information. If you are not the intended recipient, please
 contact the sender by reply e-mail and destroy all copies of the original
 message. HealthMarkets(r) is the brand name for products underwritten and
 issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake
 Life Insurance Company(r), Mid-West National Life Insurance Company of
 TennesseeSM and The MEGA Life and Health Insurance Company.SM



 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




-- 
Rob Schramm

Re: ECSA Fragmentation reporting

2011-04-22 Thread Rob Scott
Graham

You can easily knock up your own tool using the VSMLIST service if you require 
real-time results.

Most (if not all) commercial MVS monitors would offer a display that shows this 
sort of information - however I am guessing that you are after something free. 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Graham Harris
Sent: 21 April 2011 21:25
To: IBM-MAIN@bama.ua.edu
Subject: ECSA Fragmentation reporting

Are there any tools out there that can help summarise the state of available
fragments in ECSA, (e.g. top 10 largest extents)?

I'm half expecting to have to knock up a little REXX doing the necessary
with appropriate IPCS VSMDATA summary output, but thought I'd ask those
that may know first

Thanks

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IPLed Volume- ISMF Panel

2011-04-07 Thread Rob Scott
D SMS,VOL(volser)

Rob Scott
Lead Developer
Rocket Software
275 Grove Street · Newton, MA 02466-2272 · USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
SAURABH KHANDELWAL
Sent: 07 April 2011 10:59
To: IBM-MAIN@bama.ua.edu
Subject: Re: IPLed Volume- ISMF Panel

Sorry Jags,
 We don't have any other product rather then IBM. 
any other clue.

Regards
Saurabh Khandelwal

On 4/7/2011 3:26 PM, jagadishan perumal wrote:
 Then if your shop has QW chicagosoft product installed then you can 
 query the volume serial to know the stg group.
 Regards,
 Jags

 On Thu, Apr 7, 2011 at 3:04 PM, SAURABH KHANDELWAL 
 saurabh.khandel...@oracle.com mailto:saurabh.khandel...@oracle.com 
 wrote:

 Hello Jags,
  I was aware about this option. But the
 problem is, I have 25 storage group in our system so it is
 difficult to go into each of the storage group and use this
 listvol option.

  I am looking for the direct option, in which
 if we provide volume serial number, we should be able to get
 Storage group from which it is connected.

 Regards
 Saurabh Khandelwal

 On 4/7/2011 3:00 PM, jagadishan perumal wrote:
 IS.6(Option might vary but check it up) would take you to list
 the storage groups then you can type LISTVOL beside the
 storage group to know the volumes available for a storage group.

 2011/4/7 SAURABH KHANDELWAL saurabh.khandel...@oracle.com
 mailto:saurabh.khandel...@oracle.com

 Thanks for reply.  Do we have any option is ISMF panel to know

 Particular volume is mapped to which storage group.

 Regards
 Saurabh

 On 4/7/2011 12:21 PM, גדי בן אבי wrote:

 Hi,

 The Display IPLINFO command will tell you where you IPL's
 from.

 In SMP/E go to option 1, select you zone and then look at
 DDDEFS.

 You can also to a list ddefs command in batch.

 Gadi

 
 From: IBM Mainframe Discussion List [IBM-MAIN@bama.ua.edu
 mailto:IBM-MAIN@bama.ua.edu] On Behalf Of SAURABH
 KHANDELWAL [saurabh.khandel...@oracle.com
 mailto:saurabh.khandel...@oracle.com]
 Sent: 07 April 2011 09:36
 To: IBM-MAIN@bama.ua.edu mailto:IBM-MAIN@bama.ua.edu
 Subject: IPLed Volume

 Hello,
  If I have two RES volume( example IPE100
 and IPE101) in
 my system, then how can I find the detail about

 1) from which RES volume my system is currently IPLed.
 2) Is there any option in SMPE panel, by which we can
 come to know about
 volume detail, my target datasets are pointing to. Also
 in which volume
 my DDDEF are defined ( example SYSUT1 and SYSUT2 etc)

 Regards
 Saurabh

 
 --
 For IBM-MAIN subscribe / signoff / archive access
 instructions,
 send email to lists...@bama.ua.edu
 mailto:lists...@bama.ua.edu with the message: GET
 IBM-MAIN INFO
 Search the archives at
 http://bama.ua.edu/archives/ibm-main.html

 לשימת לבך, בהתאם לנהלי החברה וזכויות החתימה בה, כל הצעה,
 התחייבות או מצג מטעם החברה, מחייבים מסמך נפרד וחתום על
 ידי מורשי החתימה של החברה, הנושא את לוגו החברה או שמה
 המודפס ובצירוף חותמת החברה. בהעדר מסמך כאמור (לרבות מסמך
 סרוק) המצורף להודעת דואר אלקטרוני זאת, אין לראות באמור
 בהודעה אלא משום טיוטה לדיון,
 ואין להסתמך עליה לביצוע פעולה עסקית או משפטית כלשהי.


 Please note that in accordance with Malam's signatory
 rights, no offer, agreement, concession or representation
 is binding on the company,
 unless accompanied by a duly signed separate document (or
 a scanned version thereof), affixed with the company's seal.

 
 --
 For IBM-MAIN subscribe / signoff / archive access
 instructions,
 send email to lists...@bama.ua.edu
 mailto:lists...@bama.ua.edu with the message: GET
 IBM-MAIN INFO
 Search the archives at
 http://bama.ua.edu/archives/ibm-main.html


 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu
 mailto:lists...@bama.ua.edu with the message: GET

Re: Reason code 83000505 from Binder API call

2011-04-06 Thread Rob Scott
I would imagine that the owner of the module bound with EDIT=NO was doing for 
security/integrity reasons - they most likely do not want anyone to re-link the 
module and interfere with the order/sequencing or replace any of the CSECTs.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Dave Day
Sent: 05 April 2011 23:26
To: IBM-MAIN@bama.ua.edu
Subject: Reason code 83000505 from Binder API call

I'm using the Binder API to map load modules.  Getting an 83000505 from an 
include for a load module.  The reason code explanation says

 83000505 INCLUDE  Included module 
marked NOT-EDITABLE and   has been bypassed.



Can someone give me a reasonable explanation why a load module would be 
bound with EDIT=NO?  Is there a way to map a load module using Binder API if it 
is marked such?   Thanks in advance for taking a look at this, and any help 
provided.

--Dave Day 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: REXX INCLUDE ?

2011-04-06 Thread Rob Scott
Many moons ago when I was a sysprog, I wrote a couple of REXX external 
functions in assembler called STEMPUSH and STEMPULL that allow you to pass 
REXX stems between execs in the same address space. It does this by placing the 
REXX variable name and value into a dataspace stack and then you pass the 
dataspace token as a parameter between the execs (STEMPUSH places items on 
the stack and STEMPULL retrieves them). 

As far as I know the code still works and you can find it on the CBT tape 
website (www.cbttape.org).  

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Miklos Szigetvari
Sent: 06 April 2011 11:01
To: IBM-MAIN@bama.ua.edu
Subject: REXX INCLUDE ?

 Hi

Some REXX questions:

Any kind of REXX INCLUDE feature i.e include a REXX copybook  ?
We need some large initialized data areas,  stems.
What is the  best or  fastest way to do this?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Determining if address space is swapped out

2011-04-04 Thread Rob Scott
I would use OUCBSFL and OUCBQFL (see IRAOUCB in MODGEN) 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Charles Mills
Sent: 04 April 2011 15:52
To: IBM-MAIN@bama.ua.edu
Subject: Determining if address space is swapped out

I have an application that consists of two parts, system exit code and a
started task. I would like to count the number of times the exit code was
driven and determined that the started task was swapped out. What is the
best indicator of address space is at this moment swapped out? (Yes, I do
know that any such determination is valid for an instant and could change in
the next instant. I'm not going to make any code logic decisions based on
this determination, just count them for subsequent human analysis.)

What's the best or most definitive indicator?

ASCBOUT in ASCBRCTF?
ASCBLSAS in ASCBFLG1?
!ASCBNOQ in ASCBDSP1?
Or something else?

Yes, I know that none of the above are GUPI. I understand the risks of
taking my chances.

Thanks,
Charles

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Determining if address space is swapped out

2011-04-04 Thread Rob Scott
I use something along the lines of :

MVC   ASID_POS,=CL3'IN' Assume IN   
IF (TM,OUCBQFL,OUCBGOO+OUCBGOI+OUCBGOB,NZ)
  MVC   ASID_POS,=CL3'-'  indicate transition  
ELSEIF (TM,OUCBQFL,OUCBOUT+OUCBLSW,NZ)
  MVC   ASID_POS,=CL3'OUT'  indicate OUT  
ELSEIF (TM,OUCBSFL,OUCBNSW,O) 
  MVC   ASID_POS,=CL3'N/S'  indicate non-swap 
ENDIF 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Charles Mills
Sent: 04 April 2011 16:31
To: IBM-MAIN@bama.ua.edu
Subject: Re: Determining if address space is swapped out

Thanks. So OUCBGOO in OUCBSFL is the best indicator for is or is being
swapped out? Or OUCBLSW?

(I do like OUCBGOI, documented as transitioning into core. I thought we
had pretty much transitioned out of core about forty years ago.)

CM

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf
Of Rob Scott
Sent: Monday, April 04, 2011 8:01 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Determining if address space is swapped out

I would use OUCBSFL and OUCBQFL (see IRAOUCB in MODGEN) 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf
Of Charles Mills
Sent: 04 April 2011 15:52
To: IBM-MAIN@bama.ua.edu
Subject: Determining if address space is swapped out

I have an application that consists of two parts, system exit code and a
started task. I would like to count the number of times the exit code was
driven and determined that the started task was swapped out. What is the
best indicator of address space is at this moment swapped out? (Yes, I do
know that any such determination is valid for an instant and could change in
the next instant. I'm not going to make any code logic decisions based on
this determination, just count them for subsequent human analysis.)

What's the best or most definitive indicator?

ASCBOUT in ASCBRCTF?
ASCBLSAS in ASCBFLG1?
!ASCBNOQ in ASCBDSP1?
Or something else?

Yes, I know that none of the above are GUPI. I understand the risks of
taking my chances.

Thanks,
Charles

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the
archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the
archives at http://bama.ua.edu/archives/ibm-main.html


-
No virus found in this message.
Checked by AVG - www.avg.com
Version: 10.0.1209 / Virus Database: 1500/3548 - Release Date: 04/03/11

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: binary add

2011-03-29 Thread Rob Scott
Monika,

Personally I would use XGR   Rx,Rx and then a sequence of AGF   Rx,field 
instructions

At the end, just use CVDG and ED to make it pretty 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Monika Amiss
Sent: 29 March 2011 18:07
To: IBM-MAIN@bama.ua.edu
Subject: binary add

Dear group,

  I'm reading some SMF30 records and want to accumulate several 4 byte binary 
values (like CPU SU, IO SU, ...) for jobs which achieve the same criteria. But 
the summation grows over the 4 byte capacity (I use AR in Amode31). Is there a 
way to use 2 register for the summation. Or can I use Amode64-Code only for the 
addition. I fear to consume to much resources if I convert the data to decimal 
each time.

  Hope somebody could help me. Any hint appreciated.
  With best regards
  Monika

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: System Software Developer Position (UK/USA)

2011-03-26 Thread Rob Scott
Double oorah as FLOWASM is extensively used as well :-)

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Edward Jaffe
Sent: 25 March 2011 22:09
To: IBM-MAIN@bama.ua.edu
Subject: Re: System Software Developer Position (UK/USA)

On 3/17/2011 10:31 AM, Rob Scott wrote:
 Beneficial skills include using IBM structured macros ...

Oorah!

-- 
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: *IEA061E REPLACEMENT ASID SHORTAGE HAS BEEN DETECTED

2011-03-21 Thread Rob Scott
The most common reason for DB2 address spaces to be marked non-reusable these 
days is that they have a cross-memory bind to the RRS address space. You 
*could* probably relieve the shortage by stopping and re-starting the RRS 
address space - however there are implications to doing this while you have 
active workload that could be using RRS services.

Do you shutdown your DB2 subsystems on a regular basis? If so - maybe you need 
to consider if you still need to do this. The more often you shutdown DB2, the 
more chance you have of chewing up the ASVT slots.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Matan Cohen
Sent: 21 March 2011 10:23
To: IBM-MAIN@bama.ua.edu
Subject: *IEA061E REPLACEMENT ASID SHORTAGE HAS BEEN DETECTED

Hi,
One of my lpar is is suffering from
*IEA061E REPLACEMENT ASID SHORTAGE HAS BEEN DETECTED
I notices that the DB2 STC are ended with :
IEF352I ADDRESS SPACE UNAVAILABLE
I'm familiar with the option to start AS with REUSASID=YES but DB2 isn't
start with the 'start' command and i don't know how to implement this with
DB2 subsys and if it's possible.
is DB2 STCs always leave a AS unreausable ? or maybe there is somthing I can
do to avoid this.

the reason I asking it , is beacause i would like to avoid enlarge the
RSVNONR .

-- 
best regards,
matan cohen
MF System Administrator.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


System Software Developer Position (UK/USA)

2011-03-17 Thread Rob Scott
We have an opening for a developer position at Rocket Software to work on a 
z/OS system's software product with links into CICS, DB2 and MQ.

The position could be filled by someone working either in the UK 
(Uxbridge/Warwick) or USA (Boston) however  working from home is also possible 
and quite common within the company.

Core skills required include 3+ years high level assembler, experience of macro 
language  and a basic understanding z/OS control blocks and structure.

Beneficial skills include using IBM structured macros, any system's programming 
exposure and an understanding of the cross-memory environment.

Note that this is not a senior position and would suit someone venturing into 
system's software development from systems programming or applications 
development, or someone wanting to return to an assembler developer position 
following a break.

If you are interested - send your CV to h...@rs.commailto:h...@rs.com with 
IBM-Main in the subject field.


(The above post cleared with Darren Evans-Young)



Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.comhttp://www.rocketsoftware.com/




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PSAAOLD question - when is it updated?

2011-03-14 Thread Rob Scott
John

PSAAOLD points to the *HOME* ASID (HASN).

When space switching occurs it is the control registers that are updated to 
contain the new values of PASN and SASN.

There are instructions to extract the values for both PASN and SASN (EPAR and 
ESAR) on the fly or just look at the control regs in IPCS if you have a dump.

From what you are saying it sounds like the products ASID level RESMGR routine 
has got its knickers in a twist.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
McKown, John
Sent: 14 March 2011 16:35
To: IBM-MAIN@bama.ua.edu
Subject: PSAAOLD question - when is it updated?

The documentation that I can find is not really very helpful. Or I just don't 
understand it. But I'm wondering what, if any, is the relationship between 
PSAAOLD and either the home address space or the primary address space. I know 
that a PC can do a space switch. In that case, the primary address space 
becomes the switched to address space. The switched from address space (I 
think) becomes the secondary address space. And the home address space stays 
the same. So, if I write some code which is invoked via a PC-ss instruction 
(not likely!), is PSAAOLD updated to point to the new primary address space? Or 
is it left as-is? I only ask because the address is not mentioned in the 
Principles of Operation, but a comment in the DSECT says fixed by 
architecture. Which indicates to me that the hardware uses or modifies it in 
some way which is not documented.

What brought this on is a product which works on z/OS 1.10, but abends with an 
S0C4-11 on z/OS 1.12. The code appears to be using a pointer to the job's ASCB 
to look at some data in the job's SSIB. However, it appears that the primary 
address space is not the job's, but the Master Scheduler's. This is for an 
*OMVSEX substep which I __think__ is going through termination. Needless to say 
that using TCB pointers from one ASCB while a different ASCB is actually the 
primary is fairly well a guaranteed S0C4-11 since TCBs are not at the same 
virtual address in all address spaces (in primary addressing mode as this code 
is).

Perhaps another question I should ask is: Is there a simple way to determine if 
a given ASCB address is the current Primary Address Space's ASCB?

John McKown
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone *
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: PSAAOLD question - when is it updated?

2011-03-14 Thread Rob Scott
The following could explain what you are seeing but is based on a fair amount 
of guesswork :

(1) ISV code using some sort of BPX* service that results in new ASID being 
created to perform the work - one of those *OMVSEX chaps
(2) ISV (or IBM) code that runs in the new ASID wants, with good reason, to 
setup a ASID-level RESMGR routine to clean-up when the BPX-thing terminates.
(3) RESMGR code uses some sort of pointer to a TCB in the now-terminated ASID
(4) TCB addresses *can* be similar in different address spaces (obviously they 
are not the same thing)
(5) RESMGR routine has (for years) been processing the TCB address passed to it 
and finding a valid address in ASID(0001) - hence there has been no abend
(6) Something has changed in R12 that has made that TCB address not valid and 
the bug (that has been there for ages) now suddenly bites.

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
McKown, John
Sent: 14 March 2011 17:11
To: IBM-MAIN@bama.ua.edu
Subject: Re: PSAAOLD question - when is it updated?

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Rob Scott
 Sent: Monday, March 14, 2011 11:48 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: PSAAOLD question - when is it updated?
 
 John
 
 PSAAOLD points to the *HOME* ASID (HASN).
 
 When space switching occurs it is the control registers that 
 are updated to contain the new values of PASN and SASN.
 
 There are instructions to extract the values for both PASN 
 and SASN (EPAR and ESAR) on the fly or just look at the 
 control regs in IPCS if you have a dump.
 
 From what you are saying it sounds like the products ASID 
 level RESMGR routine has got its knickers in a twist.
 
 Rob Scott

I don't think so, but could be wrong. It's a monitor tool. I can't say more. We 
continue to use the product under a permanent use license that we got many 
years ago. But we dropped the support license in order to save money. 

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * 
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SYS1 Datasets and it associated product names

2011-03-01 Thread Rob Scott
There is a master list of registered product prefixes (three letters) that 
describe which IBM and ISV products are associated with them. In SMP/E terms, 
typically this means the three letters after the S or A in the LLQ of the 
product dataset.

For example, SGIM in the LLQ (or DDDEF) will mean SMP/E as GIM is its 
product prefix

I am unsure if this list is generally available, however most ISVs will either 
have a pre-registered range of prefixes that they manage internally or will 
request a new one for a new product.   

 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Mark Zelden
Sent: 01 March 2011 13:45
To: IBM-MAIN@bama.ua.edu
Subject: Re: SYS1 Datasets and it associated product names

On Tue, 1 Mar 2011 18:13:29 +0530, Chokalingam Thangavelu
thangavelu.chokalin...@wipro.com wrote:

Hi,

Please let me know if there is any document that describes SYS1 datasets
and its associated product names.

For example SYS1.SIGY* datasets are related to Enterprise Cobol.


There isn't any one document.  You need the program directory for each
product.   But since most of the products come with a ServerPac, you 
can use the CPAC.PGMDIR softcopy version. 

You won't find the entire data set name, just the LLQ (low level qualifier), 
which matches the DDDEF name in SMP/E that is required. 

Another place you can find the information is the Serverpac Installing 
Your Order document.

Regards,

Mark
--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
mailto:mzel...@flash.net  
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
Systems Programming expert at http://expertanswercenter.techtarget.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ASC. Mode

2011-02-20 Thread Rob Scott
Home space mode exists for the very small minority of cases where instruction 
fetch uses the home address space rather than primary. I imagine that there a 
very few people outside of core z/OS developers that use this facility and 
other than knowing it exists, us mere mortals should just carry on happily in 
blissful ignorance. 

Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com 


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
michealbutz
Sent: 20 February 2011 18:16
To: IBM-MAIN@bama.ua.edu
Subject: Re: ASC. Mode

One more question maybe I don't get it

Primary mode is the normal mode problem programs runs 


Secondary mode is When you Issue lets a SSAR and issue MVCP MVCS instruction 

AR mode well...when referencing a Address Access registers are used along 
General Purpose
Registers 


What is the characteristic  of HOME mode

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Kristine
Harper
Sent: Sunday, February 20, 2011 12:16 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: ASC. Mode

ModePSW Bits 16 and 17
Home Space  11
Primary Space   00
Secondary Space 10
AR Mode 01

Kristine Harper
IMS RD
NEON Enterprise Software

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Micheal
Butz
Sent: Sunday, February 20, 2011 9:14 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: ASC. Mode

Hi


Would you then what are the bit values
For bit 16  17 of the PSW for the different modes

Bits. 16.  17

   0.  0.   Primary


   ??  ?? Home

??  ?? Secondary

 ??  ??  AR

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


  1   2   3   4   5   6   >