Re: EXCP access methos

2008-06-16 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 06/11/2008
   at 10:37 AM, Rick Fochtman [EMAIL PROTECTED] said:

Makes perfect sense to me. Under OS/360, we didn't have the protection 
that CCW translation gives us today and it was incredibly easy to 
destroy part of the OS

Not by pointing a CCW at it; storage protection was good enough for that.
The holes were things like failure to ensure that key 0 code came from
authorized libraries..
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-16 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 06/11/2008
   at 06:50 PM, (IBM Mainframe Discussion List) [EMAIL PROTECTED]
said:

I don't know what VSAM-like access methods are. 

ACB/RPL. That includes VTAM and access to SPOOL data sets. I believe that
JES2 still uses EXCPVR but JES3 uses STARTIO.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-16 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 06/11/2008
   at 04:58 PM, J R [EMAIL PROTECTED] said:

I don't think so.  I remember writing code for OS/360 that, during  early
testing, incorrectly calculated a buffer size requirement.   Sure enough,
when a subsequent READ CCW tried to read into 
beyond the end of the GETMAINed area, a S0C4 was the result

The CCW-related failure was not an ABEND S0C4, but an error code in the
IOB. If you got an 0C4 it was not from executing the CCW.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-16 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 06/11/2008
   at 05:38 PM, Gerhard Postpischil [EMAIL PROTECTED] said:

You had storage?  All of our programmers had core, and 
persisted in that usage even into the late seventies.

Yeah, but not all shops saved money by buying a 370/155 after the
370/158 had been announced :-(

In PCP all of storage was fair game,

I believe that PCP supported storage protection, although, of course, it
shared the exposures that MFT and MVT had.

(there were a couple of loopholes in SVC 
parameter validity checking that IBM fixed eventually). 

There were more that IBM never fixed in OS/360, and some that they didn't
fix in SVS.

lucking out with an add-on memory whose 
protection capability had not been configured correctly.

At least you didn't have an alternate tape channel that hadn't been
upgraded to support IDA :-(
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-16 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 06/12/2008
   at 11:39 AM, Edward Jaffe [EMAIL PROTECTED] said:

And, EXCP is an ordinary unauthorized interface. STARTIO and EXCPVR are
not.

Are you a betting man?
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-15 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 06/11/2008
   at 08:25 AM, Paul Gilmartin [EMAIL PROTECTED] said:

It has always struck me as bizarre that the OS supports running channel
programs built by problem-state programs.  This is secure only if the
channel programs are in effect interpreted rather than executed
directly.

It was secure when it was designed, since storage protection kept the
application from overlaying someone else's storage. It was only with
virtual storage that translation was necessary. It was only with MVS that
the protection key no longer provided adequate security.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-15 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED],
on 06/11/2008
   at 08:03 AM, Bob Shannon [EMAIL PROTECTED] said:

This indicates that EXCP is used under the covers by the higher access
methods.

While BSAM and QSAM use EXCP[VR], some access methods use STARTIO
directly.

Is there a DCB option to enable EXCP for extended data sets?
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Ron Hawkins
Paul,

Did you my earlier response? Extended format Sequential datasets
(DSORG=PS-E) can be accessed by QSAM and BSAM access methods.

ADRDSSU does not use BSAM or QSAM. It uses EXCP.

That's it.

Ron

Paul,

It is not the DSORG that has to support Extended Format, it is the ACCESS
METHOD. The DSORG defines and extended format dataset, but the Access Method
has to support IO to it.

As far as I know QSAM and BSAM are the only Access Methods that support
PS-E.

Before converting to PS-E on a large scale you need to check for datasets
that are being accessed by other Access Methods. You can find this in the
Type 14 and 15 SMF records. If you have MXG this is a relatively simple
exercise - sometimes the harder part is incorporating the results into your
ACS logic. 

Also be aware that some utilities like DFSORT and SYNCSORT will
automatically detect PS-E and use BSAM to process the files in place of
EXCP. You don't have to exclude datasets just because you sort them.

Ron


 -Original Message-
 From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
 Behalf Of Paul Ip
 Sent: Wednesday, June 11, 2008 6:48 PM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: [IBM-MAIN] EXCP access methos
 
 Hi all,
 
 Can anyone give me another hint on this?? I am confused with what makes
 an
 output of ADRDSSU DUMP can't be Extended Format?
 
 On Wed, 11 Jun 2008 08:51:26 -0500, Paul Ip [EMAIL PROTECTED]
 wrote:
 
 Thanks for the reply!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Edward Jaffe

Rick Fochtman wrote:
Dear God, how I wish there was a documented interface to STARTIO; I'd 
like to play around with Format-1 CCW's. :-)


Format-1 CCWs have been supported by EXCP for some time. To enable their 
use, simply turn on bit IOBEFMT1 in the IOB extension (mapped by IOSDIOBE).


While you're at it, you might also wish to play around with 64-bit 
IDAWs, enabled via bit IOBEEIDA, used for I/O areas above the bar.


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Paul Ip
Oh, I missed your reply since I used the full subject search...

Now, I've used Strobe to perform some testings and it matches what you've 
said:
1. ADRDSSU DUMP uses EXCP so I can only use DSNTYPE=LARGE
2. ICEGENER (DFSORT) uses (auto detects) EXCP for non-EF datasets and 
BSAM for EF datasets
3. IDCAMS uses QSAM for either EF or non-EF datasets
4. COBOL uses QSAM for either EF or non-EF datasets

Well, it is clear that my concept was wrong: DSORG=PS uses QSAM access 
method only

Paul

On Wed, 11 Jun 2008 23:04:25 -0700, Ron Hawkins 
[EMAIL PROTECTED] wrote:

Paul,

Did you my earlier response? Extended format Sequential datasets
(DSORG=PS-E) can be accessed by QSAM and BSAM access methods.

ADRDSSU does not use BSAM or QSAM. It uses EXCP.

That's it.

Ron


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Ron Hawkins
Paul,

Mou man tai. My spellchecker changed the heading in my earlier post.

Ron

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
 Behalf Of Paul Ip
 Sent: Thursday, June 12, 2008 12:06 AM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: [IBM-MAIN] EXCP access methos
 
 Oh, I missed your reply since I used the full subject search...
 
 Now, I've used Strobe to perform some testings and it matches what
 you've
 said:
 1. ADRDSSU DUMP uses EXCP so I can only use DSNTYPE=LARGE
 2. ICEGENER (DFSORT) uses (auto detects) EXCP for non-EF datasets and
 BSAM for EF datasets
 3. IDCAMS uses QSAM for either EF or non-EF datasets
 4. COBOL uses QSAM for either EF or non-EF datasets
 
 Well, it is clear that my concept was wrong: DSORG=PS uses QSAM access
 method only
 
 Paul
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Paul Ip
On Thu, 12 Jun 2008 01:14:26 -0700, Ron Hawkins 
[EMAIL PROTECTED] wrote:

Paul,

Mou man tai. My spellchecker changed the heading in my earlier post.

Ron



Mou man tai ---You know Cantonese??! (thanks for your reply)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Paul Ip
On Thu, 12 Jun 2008 01:14:26 -0700, Ron Hawkins 
[EMAIL PROTECTED] wrote:

Paul,

Mou man tai. My spellchecker changed the heading in my earlier post.

Ron



Mou man tai - You know Cantonese??! (Thanks for your reply)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread (IBM Mainframe Discussion List)
 
 
In a message dated 6/11/2008 7:27:53 P.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:
I wish there was a documented interface to STARTIO; I'd 
like to play  around with Format-1 CCW's. :-)
 
In AUG 1987 there were two sessions by two different presenters (I was one  
of them) at SHARE in Chicago on how to use STARTIO.  In my session, I  
distributed a simple, sample program that used STARTIO to read the volume label 
 from 
a DASD volume.  If you can find this session in the SHARE archives,  that 
handout is in the proceedings.  IBM has not chosen to make STARTIO an  
externally 
documented interface.  The main danger in using STARTIO is when  you build a 
channel program with real addresses that has read CCWs in it, as you  can 
easily overlay storage that is not yours.  Write CCWs will not overlay  
storage, 
but you will write the wrong data out to the I/O device if you get  those real 
addresses wrong.  As with any other authorized service, STARTIO  must be used 
cautiously.
 
Or, as Ed Jaffe suggested, you can use Format 1 CCWs with EXCP in  
unauthorized code.  If your code is authorized, there is a lot more you can  do 
by 
modifying DEB fields after you OPEN your DCB.
 
Bill  Fairchild
Rocket Software





**Vote for your city's best dining and nightlife. City's Best 
2008.  (http://citysbest.aol.com?ncid=aolacg0005000102)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Rick Fochtman

snip-


Oh, I missed your reply since I used the full subject search...

Now, I've used Strobe to perform some testings and it matches what you've 
said:

1. ADRDSSU DUMP uses EXCP so I can only use DSNTYPE=LARGE
2. ICEGENER (DFSORT) uses (auto detects) EXCP for non-EF datasets and 
BSAM for EF datasets

3. IDCAMS uses QSAM for either EF or non-EF datasets
4. COBOL uses QSAM for either EF or non-EF datasets

Well, it is clear that my concept was wrong: DSORG=PS uses QSAM access 
method only
 


---unsnip-
Some of the older utilities still use BSAM; like IEHMOVE.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Rick Fochtman

-snip-
Or, as Ed Jaffe suggested, you can use Format 1 CCWs with EXCP in 
unauthorized code. If your code is authorized, there is a lot more you 
can do by modifying DEB fields after you OPEN your DCB.

---unsnip
BTDT. I once modified AMASPZAP to a full-volume ZAPPER by modifying the 
extent fields in the DEB. If you specified a dsname of FORMAT5.DSCB on 
the SYSLIB DD statement, I opened the VTOC, then modified the extent 
values in the DEB. Fun to play with, but didn't really serve any useful 
purpose. I have no idea where that program is now. :-)


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Edward Jaffe

(IBM Mainframe Discussion List) wrote:
... The main danger in using STARTIO is when  you build a 
channel program with real addresses that has read CCWs in it, as you  can 
easily overlay storage that is not yours.  Write CCWs will not overlay  storage, 
but you will write the wrong data out to the I/O device if you get  those real 
addresses wrong.  As with any other authorized service, STARTIO  must be used 
cautiously.
  


Real CCW addresses are also used by the documented EXCPVR interface. The 
biggest problem with STARTIO is that there is no allocation, DCB, or 
OPEN required. All it needs is an IOSB -- which contains pointers to the 
channel program and UCB. Using STARTIO, you can construct a channel 
program to read or write any records anywhere on any device. This puts 
you one subtle programming error away from wiping out something 
important that isn't yours. The other danger is having to write code 
that executes in SRB mode -- with PSW key zero -- to manage I/O completion.


Without question, STARTIO is a dangerous interface -- made even more 
dangerous by the total lack of documentation on its use.


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Rick Fochtman

---snip-
Real CCW addresses are also used by the documented EXCPVR interface. The 
biggest problem with STARTIO is that there is no allocation, DCB, or 
OPEN required. All it needs is an IOSB -- which contains pointers to the 
channel program and UCB. Using STARTIO, you can construct a channel 
program to read or write any records anywhere on any device. This puts 
you one subtle programming error away from wiping out something 
important that isn't yours. The other danger is having to write code 
that executes in SRB mode -- with PSW key zero -- to manage I/O completion.


Without question, STARTIO is a dangerous interface -- made even more 
dangerous by the total lack of documentation on its use.

unsnip--
Given the potential risks, I think that I'll stick to EXCP with Format-1 
CCW's. If this is going to be a public-domain program, I'd rather be 
safe than sorry; and I don't want to give someone the rope they might 
use to hang themselves. :-)


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread (IBM Mainframe Discussion List)
 
 
In a message dated 6/12/2008 11:42:05 A.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:
Real CCW addresses are also used by the documented EXCPVR  interface.
 
True.  And you have to get the real addresses correct with EXCPVR,  or you 
will hose storage on read commands.
 
The 
biggest problem with STARTIO is that there is no allocation,  DCB, or 
OPEN required.
 
I never considered this a problem but a major benefit, and one of several  
reasons why I use STARTIO.  If you are authorized enough to use EXCPVR, you  
can 
also use EXCP, modify the DEB, and get to any device which you have not  
allocated, enqueued upon, or OPENed a DCB for.  There are times when such  
things 
are necessary.  The lower the level access method you use, the  more 
flexibility you have, the more things you can do, sometimes the more things  
you have 
to do (e.g., block/deblock with BSAM but not with QSAM), and, at a low  
enough level, the more dangerous it becomes.
 
All it needs is an IOSB -- which contains pointers to the 
channel  program and UCB. Using STARTIO, you can construct a channel 
program to read  or write any records anywhere on any device. This puts 
you one subtle  programming error away from wiping out something 
important that isn't  yours.
 
Which is why you test your STARTIO code, and anything else you build that  is 
authorized, on test systems that everyone else knows may not survive your  
test.  You can also wipe out something that is not yours with an incorrect  
real address on a read command using the much safer EXCPVR.   When  you are 
building authorized code, you must write each instruction with the  awareness 
that you can unexpectedly hose almost any conceivable part of MVS if  you err.
 
The other danger is having to write code 
that executes in SRB  mode -- with PSW key zero -- to manage I/O completion.
 
Many posters have demonstrated a familiarity with coding SRBs.  I  assume a 
poster is competent enough to do whatever is necessary whenever he  finds out 
whatever prompted him to post a question.  The original mention  of STARTIO 
seemed to me more like intellectual curiosity than a desire to build  a 
production program with possibly massive, hidden dangers in it.  There  are 
plenty of 
other dangers, too; e.g., in STARTIO you must build your channel  program in 
and have all your data in fixed storage, and also make your address  space 
nonswappable.  You can screw up either of these and possibly hose  something.
 
Without question, STARTIO is a dangerous interface -- made even more  
dangerous by the total lack of documentation on its use.
 
Not completely total.  Only officially.  Long ago intrepid  developers 
discovered several IBM software products using STARTIO (JES3, IMS)  whose 
source 
code was distributed, and they copied the code surrounding those  STARTIOs.  I 
learned how to do it from a photocopy of a photocopy of a ...  from someone in 
Amdahl in 1985.   And when I explained publicly  how to use STARTIO in SHARE, I 
emphasized many times how easy it was to hose  things with STARTIO and to be 
very, very careful.
 
Bill  Fairchild
Rocket Software





**Vote for your city's best dining and nightlife. City's Best 
2008.  (http://citysbest.aol.com?ncid=aolacg0005000102)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Edward Jaffe

(IBM Mainframe Discussion List) wrote:
All it needs is an IOSB -- which contains pointers to the 

channel  program and UCB. Using STARTIO, you can construct a channel 
program to read  or write any records anywhere on any device. This puts 
you one subtle  programming error away from wiping out something 
important that isn't  yours.
 
Which is why you test your STARTIO code, and anything else you build that  is 
authorized, on test systems that everyone else knows may not survive your  
test.  You can also wipe out something that is not yours with an incorrect  
real address on a read command using the much safer EXCPVR.   When  you are 
building authorized code, you must write each instruction with the  awareness 
that you can unexpectedly hose almost any conceivable part of MVS if  you err.
  


The wiping out I was talking about was when writing to the disk. 
STARTIO does no prefixing. EXCPVR does. So, unless you do something to 
overlay the DEB extent information, or set the flag in the DEB to tell 
the system you will provide your own prefix, you are saved by MVS from 
accidentally writing on something important when you use EXCPVR.


I agree that if you supply bad buffer addresses for read CCWs, you will 
clobber storage. That goes without saying. Obviously, mistakes with 
real storage addresses have worse (more random) ill effects and are 
harder to track down than mistakes with virtual addresses. Good thing we 
have GTF.


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-12 Thread Edward Jaffe

Rick Fochtman wrote:
Given the potential risks, I think that I'll stick to EXCP with 
Format-1 CCW's. If this is going to be a public-domain program, I'd 
rather be safe than sorry; and I don't want to give someone the rope 
they might use to hang themselves. :-)


And, EXCP is an ordinary unauthorized interface. STARTIO and EXCPVR are not.

--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



EXCP access methos

2008-06-11 Thread Paul Ip
Hi,

Today, I was trying to have a DSORG=PS DASD dataset (output from 
ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where 
B8 means An OPEN was attempted against an extended-format data set with 
a DCB that specified EXCP. EXCP is not supported for extended-format data 
sets according to manul.

Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per 
volume limit.

However, I don't know that output file (DSORG=PS) from ADRDSSU is using 
EXCP access method and how do I know if a DASD dataset was proccessed by 
EXCP instead of QSAM access method??

Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the 
dataset was processed by EXCP access method??

Can anyone give me a hint? Thanks

Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread shai hess
Every access method uses Excp, every Excp uses STARTIO and every STARTIO
uses SSCH.

On 6/11/08, Paul Ip [EMAIL PROTECTED] wrote:

 Hi,

 Today, I was trying to have a DSORG=PS DASD dataset (output from
 ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where
 B8 means An OPEN was attempted against an extended-format data set with
 a DCB that specified EXCP. EXCP is not supported for extended-format data
 sets according to manul.

 Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per
 volume limit.

 However, I don't know that output file (DSORG=PS) from ADRDSSU is using
 EXCP access method and how do I know if a DASD dataset was proccessed by
 EXCP instead of QSAM access method??

 Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the
 dataset was processed by EXCP access method??

 Can anyone give me a hint? Thanks

 Paul

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread R.S.

Paul Ip wrote:
[...]
Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the 
dataset was processed by EXCP access method??


EXCP is low level access method, so DSORG is not a clue.
In fact EXCP access method is a kind of general description for any 
untypical access methods and their possible untypical shortcomings.
It can be no support for extfmt-PS, it can be limitation to first 64k 
tracks on volume (afaik it existed in Adabas), it can be 
geometry-dependance etc. etc.


--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 01.01.2008 r. kapita zakadowy BRE Banku SA  wynosi 
118.642.672 zote i zosta w caoci wpacony.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Vernooy, C.P. - SPLXM


R.S. [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]...
 Paul Ip wrote:
 [...]
  Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the 
  dataset was processed by EXCP access method??
 
 EXCP is low level access method, so DSORG is not a clue.
 In fact EXCP access method is a kind of general description for any 
 untypical access methods and their possible untypical shortcomings.
 It can be no support for extfmt-PS, it can be limitation to first 64k 
 tracks on volume (afaik it existed in Adabas), it can be 
 geometry-dependance etc. etc.
 
 -- 
 Radoslaw Skorupka

At a higher level, the difference between EXCP and an Access Methods is
that if 'you' do I/O with EXCP, 'you' build your own channel programs
i.s.o. the Access Method, so 'you' must enhance your application to
support extended format datasets, i.s.o. the Access Method. If you use
an Access Method you can expect IBM to enhance the Access Method to
support the new datasets.

Kees.
**
For information, services and offers, please visit our web site:
http://www.klm.com. This e-mail and any attachment may contain
confidential and privileged material intended for the addressee
only. If you are not the addressee, you are notified that no part
of the e-mail or any attachment may be disclosed, copied or
distributed, and that any other action related to this e-mail or
attachment is strictly prohibited, and may be unlawful. If you have
received this e-mail by error, please notify the sender immediately
by return e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries
and/or its employees shall not be liable for the incorrect or
incomplete transmission of this e-mail or any attachments, nor
responsible for any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal
Dutch Airlines) is registered in Amstelveen, The Netherlands, with
registered number 33014286 
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Paul Gilmartin
On Wed, 11 Jun 2008 08:03:27 -0400, Bob Shannon wrote:

In fact EXCP access method is a kind of general description for any 
untypical access methods and their possible untypical shortcomings.
It can be no support for extfmt-PS, it can be limitation to first 64k tracks 
on volume (afaik it existed in Adabas), it can be geometry-dependance etc. 
etc.

EXCP is a perfectly valid access method; it just requires more skill, and more 
detailed work, then using something such as QSAM. Regardless of the access 
method, CCWs are used to access data on a volume. This indicates that EXCP is 
used under the covers by the higher access methods. The only reason that EXCP 
cannot be used for extended format datasets or PDSEs is that IBM installed 
checks to prevent it. There is nothing inherent in EXCP itself that prevents 
it from being used for any data type.

I'm naive here.  I suspect many of my misconceptions will be
promptly corrected.

It's my understanding that for many decades EXCP has not executed
channel programs in place and as provided by the caller.  Rather,
they are moved to protected storage so the user can not modify
them on the fly; they are prefixed to prevent seeks to prohibited
tracks; virtual addresses are translated to real; etc.  I'd
further expect changes to CCW architecture to accommodate XA and
later 64-bit addressing and new I/O architecture.  So the checks
to prevent it may be a matter of IBM's resource allotment: rather
than continually update EXCP code to all new hardware features,
it's easier simply to prohibit use of EXCP for such purposes.

It has always struck me as bizarre that the OS supports running
channel programs built by problem-state programs.  This is secure
only if the channel programs are in effect interpreted rather than
executed directly.  A more rational layering of functions should
have channel programs built only by trustworthy supervisor-state
code.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Paul Ip
Thanks for the reply!

In fact, my target is to overome the 65536 tracks limit on a volume for SMS 
Datasets, so there are two approaches for me:
1. Extended Format
2. DSNTYPE=LARGE

At the beginning, I tried to apply Extended Format for all SMS datasets, if the 
dataset is an output of COBOL program, assigning Extended Format is ok 
(DSORG=PS-E). However, it is failed when I tried to apply the Extended 
Format for output of ADRDSSU DUMP... Form the RC IEC143I 213-B8, it 
said ...a DCB that specified EXCP...

I should rephrase my question as: why the output of ADRDSSU DUMP can't be 
assigned with Extented Format? What is actually a DCB that specified EXCP 
means from IEC143I 213-B8 (I was wondering if it is talking about the dataset 
is under a dataset type of 'EXCP'...)?

...In addition, I don't know there is a dataset type called 'EXCP' until I 
found 
the following from DFDSSdss Storage Admin. Guide:
DFSMSdss can copy, dump, and restore data sets of the following types:  
DATABASE 2(TM) (DB2?;)
Direct access
EXCP (execute channel program)  Dataset Type = EXCP???
Partitioned, including:
PDS (partitioned data set)
PDSE (partitioned data set extended)
HFS (hierarchical file system) data set
Sequential, including extended-format data sets and Large Format data sets
VSAM data sets that are cataloged in an ICF catalog, including:
ESDS (entry-sequenced data set)
KSDS (key-sequenced data set)
KSDS with key ranges
LDS (linear data set)
RRDS (relative record data set)
VRRDS (variable relative record data set)
Extended-format ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS, 
KSDS, LDS, RRDS, and VRRDS
Extended-addressable VSAM ESDS, KSDS, LDS, RRDS, and VRRDS, including 
striped ESDS, KSDS, LDS, RRDS, and VRRDS
zFS (zSeries? file system) data set
Unmovable data set types (PSU, POU, DAU, ABSTR, ISU, and direct with 
OPTCD=A).

Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Paul Gilmartin
Sent: Wednesday, June 11, 2008 8:26 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: EXCP access methos

On Wed, 11 Jun 2008 08:03:27 -0400, Bob Shannon wrote:

SNIP
I'm naive here.  I suspect many of my misconceptions will be promptly
corrected.

It's my understanding that for many decades EXCP has not executed
channel programs in place and as provided by the caller.  Rather, they
are moved to protected storage so the user can not modify them on the
fly; they are prefixed to prevent seeks to prohibited tracks; virtual
addresses are translated to real; etc.  I'd further expect changes to
CCW architecture to accommodate XA and later 64-bit addressing and new
I/O architecture.  So the checks to prevent it may be a matter of
IBM's resource allotment: rather than continually update EXCP code to
all new hardware features, it's easier simply to prohibit use of EXCP
for such purposes.

It has always struck me as bizarre that the OS supports running channel
programs built by problem-state programs.  This is secure only if the
channel programs are in effect interpreted rather than executed
directly.  A more rational layering of functions should have channel
programs built only by trustworthy supervisor-state code.
SNIP

Ok, here goes from about the 10,000' level. You are basically correct
when it comes to VM. If you are not a preferred guest, then expect ALL
your CCWs to be interpreted.

If you are a preferred guest, then you get dispatched with SIE (Start
Interpretive Execution, or some equivalent in the IEF, Interpretive
Execution Facility -- been gone from H/W for too long) where VM sets
certain masks And so some or all of your CCWs will basically be run
as written.

NOW for the MVS world. The system will start your CCWs AFTER it has
run its initial chain (by a TIC to your first CCW). Depending on the H/W
(devices, controllers, channels, etc.) will determine which of the
control CCWs will be executed to LIMIT what your CCW string is allowed
to do (such as setting CYL LIMITS where you can't seek outside of those
without getting your hand slapped).

I'm sure that others will be able to take you down to the settings of
the ORB, SCHIB, etc. should it be needed.

Regards,
Steve Thompson

-- All opinions expressed by me are my own and may not necessarily
reflect those of my employer. --

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Edward Jaffe

Paul Ip wrote:

Hi,

Today, I was trying to have a DSORG=PS DASD dataset (output from 
ADRDSSU DUMP) with Extended Format, it failed with IEC143I 213-B8, where 
B8 means An OPEN was attempted against an extended-format data set with 
a DCB that specified EXCP. EXCP is not supported for extended-format data 
sets according to manul.


Finally, I specified DSNTYPE=LARGE instead to overcome the 65535 tracks per 
volume limit.


However, I don't know that output file (DSORG=PS) from ADRDSSU is using 
EXCP access method and how do I know if a DASD dataset was proccessed by 
EXCP instead of QSAM access method??


Is that the DCB=(DSORG=PS,LRECL=0,RECFM=U,BLKSIZE=27998) means the 
dataset was processed by EXCP access method??


Can anyone give me a hint? Thanks
  


Technically, you can never really be sure if EXCP was used for a 
supported data set. The gentleman's agreement used by z/OS 
applications is the specification of MACRF=E on the DCB at OPEN time. 
For EF data sets, that triggers the abend you are seeing.


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Rick Fochtman

-snip-
I'm naive here. I suspect many of my misconceptions will be promptly 
corrected.


It's my understanding that for many decades EXCP has not executed 
channel programs in place and as provided by the caller. Rather, they 
are moved to protected storage so the user can not modify them on the 
fly; they are prefixed to prevent seeks to prohibited tracks; virtual 
addresses are translated to real; etc. I'd further expect changes to CCW 
architecture to accommodate XA and later 64-bit addressing and new I/O 
architecture. So the checks to prevent it may be a matter of IBM's 
resource allotment: rather than continually update EXCP code to all new 
hardware features, it's easier simply to prohibit use of EXCP for such 
purposes.

-unsnip---
Don't forget adjustments made for non-contiguous real storage areas 
containing buffers, etc. (IDAW anyone?) :-)


snip
It has always struck me as bizarre that the OS supports running
channel programs built by problem-state programs. This is secure only if 
the channel programs are in effect interpreted rather than executed 
directly. A more rational layering of functions should have channel 
programs built only by trustworthy supervisor-state code.

--unsnip
Makes perfect sense to me. Under OS/360, we didn't have the protection 
that CCW translation gives us today and it was incredibly easy to 
destroy part of the OS. But EXCP is much of the mechanism for developing 
support for new or exotic devices, like the old MCR/OCR gear that was so 
doggone timing-sensitive.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Rick Fochtman

--snip-
Every access method uses Excp, every Excp uses STARTIO and every STARTIO 
uses SSCH.

--unsnip---
IIRC, VSAM and the VSAM-like access methods use STARTIO directly.

At least those AM's that are ACB/RPL based.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread (IBM Mainframe Discussion List)
 
 
In a message dated 6/11/2008 8:25:57 A.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:
It's my understanding that for many decades EXCP has not  executed
channel programs in place and as provided by the  caller.
 
Back in the days before paging systems, back when there was no virtual  or 
real storage, back when storage was just called storage, EXCP would execute  
the channel program in place and as provided by the caller, but with extra CCWs 
 in front of the caller's first CCW.  These extra CCWs were added to insure  
data set integrity; i.e., the caller's channel program cannot go to any track  
that is not in the list of allocated extents created by OPEN.  I don't  
remember for sure, but it was probably possible for a caller to have a read  
command executed with a storage address that would cause data being read to  
overlay 
storage that was outside his region, partition, or whatever the big  chunk of 
storage was called.  So you could clobber the operating system as  well as 
other users' central storage with read commands.  The various DASD  access 
methods on these systems (OS/360, DOS/360, TOS/360, and BPS/360) were  QSAM, 
BSAM, 
BPAM, BDAM, ISAM, and QISAM.  They all used EXCP internally to  do I/O 
requests, except for possibly ISAM which sometimes had a naked SIO  instruction 
(or 
so I was told).  I don't know very much about the other  access methods for 
devices other than DASD and tape (e.g., TCAM, QTAM, and  BTAM), but I would 
guess 
that they all also used EXCP internally.
 
With the advent of virtual and real storage, IBM chose to require that the  
data addresses inside CCWs be interpreted by the I/O hardware as real  
addresses.  Thus a scheme was needed to convert from virtual addresses to  real 
addresses in order to make the transition to the new systems transparent to  
customers.  The MVS architects decided to create a new I/O concept called  IOS 
Driver which is a new layer of software that performs I/O requests without  
having 
to use EXCP.  They also invented a new access method called  STARTIO which 
replaced EXCP as the lowest possible level access method.   The ancient DASD 
access methods, QSAM etc., still use EXCP, but EXCP was  redesigned to 
interface between the callers of EXCP (ancient access methods),  which present 
EXCP 
with channel programs containing virtual addresses, and the  new lower level 
and 
thus intermediate, internal access method called STARTIO,  which assumes 
that the channel program is in non-pageable storage, with real  addresses of 
data, and which was built by a trusted software component.   Many new functions 
in MVS were designed to use STARTIO directly themselves, such  as the paging 
supervisor, while some new MVS components were designed to use  EXCP, probably 
in order to get the new code written most quickly.  JES2,  e.g., originally 
used EXCP (I haven't dealt with JES2 internals now for 20+  years, so it may be 
different now), probably because JES2 was developed from  HASP, which used 
EXCP, and that code was already well debugged, so why rewrite  it?
 
Rather,
they are moved to protected storage so the user can not  modify
them on the fly
 
Yes, unless you have EXCP appendages, but these must be loaded from an  
authorized library, so the customer can control their use.
 
they are prefixed to prevent seeks to prohibited
tracks; virtual  addresses are translated to real; etc.  I'd
further expect changes to  CCW architecture to accommodate XA and
later 64-bit addressing and new I/O  architecture.
 
Correct on all counts.
 
So the checks
to prevent it may be a matter of IBM's resource  allotment: rather
than continually update EXCP code to all new hardware  features,
it's easier simply to prohibit use of EXCP for such  purposes.
 
I concur.  Also IBM would like to encourage users to migrate all  
applications to the latest and greatest software and hardware solutions; 
namely,  VSAM, 
DFSMS, ESS controllers, etc., so typically IBM adds support to strategic  
products and components first and then maybe, reluctantly and much later, to  
non-strategic components.  They, too, have limited resources for developing  
new products and adding support for new products into other, older, products  
that must interface with the new products.
 
It has always struck me as bizarre that the OS supports  running
channel programs built by problem-state programs.  This is  secure
only if the channel programs are in effect interpreted rather  than
executed directly.  A more rational layering of functions  should
have channel programs built only by trustworthy  supervisor-state
code.
 
I don't know to what you are referring here by the OS.   Problem-state 
programs in z/OS build channel programs which are then converted  to safe, 
trusted 
equivalent channel programs by trusted software components  before being 
started by IOS.
 
In VM, CCWs are not interpreted as far as I know, but rather the channel  
program is scanned before being 

Re: EXCP access methos

2008-06-11 Thread J R
 I don't 
 remember for sure, but it was probably possible for a caller to have a read 
 command executed with a storage address that would cause data being read to 
 overlay 
 storage that was outside his region, partition, or whatever the big chunk of 
 storage was called. So you could clobber the operating system as well as 
 other users' central storage with read commands. 
 
I don't think so.  I remember writing code for OS/360 that, during 
early testing, incorrectly calculated a buffer size requirement.  
Sure enough, when a subsequent READ CCW tried to read into 
beyond the end of the GETMAINed area, a S0C4 was the result 
because the following storage was in Key0.  
(This may have been either MFT or MVT -- can't remember.  I 
seem to remember that MVT was more robust in terms of storage 
keys for OS related control blocks, etc.)  
 
 
 
 Date: Wed, 11 Jun 2008 11:51:26 -0400
 From: [EMAIL PROTECTED]
 Subject: Re: EXCP access methos
 To: IBM-MAIN@BAMA.UA.EDU
 
 
 
 In a message dated 6/11/2008 8:25:57 A.M. Central Daylight Time, 
 [EMAIL PROTECTED] writes:
 It's my understanding that for many decades EXCP has not executed
 channel programs in place and as provided by the caller.
 
 Back in the days before paging systems, back when there was no virtual or 
 real storage, back when storage was just called storage, EXCP would execute 
 the channel program in place and as provided by the caller, but with extra 
 CCWs 
 in front of the caller's first CCW. These extra CCWs were added to insure 
 data set integrity; i.e., the caller's channel program cannot go to any track 
 that is not in the list of allocated extents created by OPEN. I don't 
 remember for sure, but it was probably possible for a caller to have a read 
 command executed with a storage address that would cause data being read to 
 overlay 
 storage that was outside his region, partition, or whatever the big chunk of 
 storage was called. So you could clobber the operating system as well as 
 other users' central storage with read commands. The various DASD access 
 methods on these systems (OS/360, DOS/360, TOS/360, and BPS/360) were QSAM, 
 BSAM, 
 BPAM, BDAM, ISAM, and QISAM. They all used EXCP internally to do I/O 
 requests, except for possibly ISAM which sometimes had a naked SIO 
 instruction (or 
 so I was told). I don't know very much about the other access methods for 
 devices other than DASD and tape (e.g., TCAM, QTAM, and BTAM), but I would 
 guess 
 that they all also used EXCP internally.
 
 With the advent of virtual and real storage, IBM chose to require that the 
 data addresses inside CCWs be interpreted by the I/O hardware as real 
 addresses. Thus a scheme was needed to convert from virtual addresses to real 
 addresses in order to make the transition to the new systems transparent to 
 customers. The MVS architects decided to create a new I/O concept called IOS 
 Driver which is a new layer of software that performs I/O requests without 
 having 
 to use EXCP. They also invented a new access method called STARTIO which 
 replaced EXCP as the lowest possible level access method. The ancient DASD 
 access methods, QSAM etc., still use EXCP, but EXCP was redesigned to 
 interface between the callers of EXCP (ancient access methods), which present 
 EXCP 
 with channel programs containing virtual addresses, and the new lower level 
 and 
 thus intermediate, internal access method called STARTIO, which assumes 
 that the channel program is in non-pageable storage, with real addresses of 
 data, and which was built by a trusted software component. Many new functions 
 in MVS were designed to use STARTIO directly themselves, such as the paging 
 supervisor, while some new MVS components were designed to use EXCP, probably 
 in order to get the new code written most quickly. JES2, e.g., originally 
 used EXCP (I haven't dealt with JES2 internals now for 20+ years, so it may 
 be 
 different now), probably because JES2 was developed from HASP, which used 
 EXCP, and that code was already well debugged, so why rewrite it?
 
 Rather,
 they are moved to protected storage so the user can not modify
 them on the fly
 
 Yes, unless you have EXCP appendages, but these must be loaded from an 
 authorized library, so the customer can control their use.
 
 they are prefixed to prevent seeks to prohibited
 tracks; virtual addresses are translated to real; etc. I'd
 further expect changes to CCW architecture to accommodate XA and
 later 64-bit addressing and new I/O architecture.
 
 Correct on all counts.
 
 So the checks
 to prevent it may be a matter of IBM's resource allotment: rather
 than continually update EXCP code to all new hardware features,
 it's easier simply to prohibit use of EXCP for such purposes.
 
 I concur. Also IBM would like to encourage users to migrate all 
 applications to the latest and greatest software and hardware solutions; 
 namely, VSAM, 
 DFSMS, ESS controllers, etc., so typically IBM adds support

Re: EXCP access methos

2008-06-11 Thread Gerhard Postpischil

(IBM Mainframe Discussion List) wrote:
Back in the days before paging systems, back when there was no virtual or  
real storage, back when storage was just called storage, EXCP would execute


You had storage?  All of our programmers had core, and 
persisted in that usage even into the late seventies.


remember for sure, but it was probably possible for a caller to have a read  
command executed with a storage address that would cause data being read to  overlay 
storage that was outside his region, partition, or whatever the big  chunk of 


Potential storage overlays were controlled by protect keys, 
providing the hardware supported them and the operating system 
set them correctly. In PCP all of storage was fair game, in MFT 
and MVT it was harder (there were a couple of loopholes in SVC 
parameter validity checking that IBM fixed eventually). I do 
remember clobbering storage in MVT reading a 2314 sized track 
buffer from a 3330, and lucking out with an add-on memory whose 
protection capability had not been configured correctly.


Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Anne Lynn Wheeler
The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.


[EMAIL PROTECTED] (, IBM Mainframe Discussion List) writes:
 In VM, CCWs are not interpreted as far as I know, but rather the channel  
 program is scanned before being executed in order to determine how to let it 
 run  
 safely on its own.  The only way I can think of to execute a channel  program 
 interpretively is to do a separate I/O request for each CCW in the  channel 
 program (of course, with the necessary CCWs in front of it for it to  work 
 correctly).  Then if a CCW reads data, the data would be read  somewhere that 
 VM 
 could trust, and then move that data into the caller's  buffer.  This is 
 similar to how interpretive machine instruction is  handled.  But the 
 overhead in 
 interpreting channel programs would be  prohibitive, I believe, so they are 
 not 
 really interpreted.  They are first  made safe with the proper CCWs in front 
 of those supplied by the problem-state  caller and then allowed to run on 
 their 
 own.

CCWTRANS was the CP67 routine that created a shadow copy of virtual
machine channel program.

channels run with real data transfer addresses. virtual machine (and
VS system application EXCP ) channel programs have virtual address.

CCWTRANS scanned the virtual machine channel program ... creating a
shadow copy of the virtual machine channel program ... fetching/fixing
the related virtual addresses ... and replacing the virtual addresses
with real addresses.

The original translation of os/360 to virtual storage operation included
crafting a copy of (cp67's) CCWTRANS into the side of VS2 ... to perform
the equivalent function of EXCP channel programs (whether application or
access methods). VS2 (SVS  then MVS) has had the same problem with
access methods (and other applications) creating channel programs with
virtual addresses ... and then issuing EXCP. At that point, EXCP
processing has the same problem as virtual machine emulation ...
translating channel programs built with virtual addresses into shadow
copy that has real addresses. 

EXCPVR was introduced to indicate that a channel program with real
addresses was being used (rather than traditional EXCP channel program).
A discussion of EXCPVR:
http://publib.boulder.ibm.com/infocenter/zos/v1r9/topic/com.ibm.zos.r9.idas300/efcprs.htm#efcprs

disk seek channel commands ... for virtual machine non-full-pack
minidisks would have also result in a shadow made of the seek argument
... adjusting it as appropriate (i.e. a minidisk could be for 30 cyls
starting at real cylinder 100 ... the shadow would have cylinder numbers
adjusted by 100 ... unless it attempted to access more than 30 cyls
... which would result in shadow being adjusted to an invalid cylinder
number).

OS360 used 3 channel command prefix ... SEEK, followed by set file
mask command and then TIC (transferred) to the channel program
referenced by EXCP (didn't need to scan/translate the passed channel
program ... just position the arm and then prevent the passed channel
program from moving the arm again.

There was a version of CP67 that was converted to run on 370s (CP67-I
system) ... which was used extensively inside IBM pending availability
of VM370 product. In the morph of CP67 to VM370 product, the CCWTRANS
channel program translation routine became DMKCCW.

past posts mentioning VS2 effort started out by crafting cp67 CCWTRANS
to get channel program translation for EXCP:
http://www.garlic.com/~lynn/2000.html#68 Mainframe operating systems
http://www.garlic.com/~lynn/2000c.html#34 What level of computer is needed for 
a computer to Love?
http://www.garlic.com/~lynn/2001i.html#37 IBM OS Timeline?
http://www.garlic.com/~lynn/2001i.html#38 IBM OS Timeline?
http://www.garlic.com/~lynn/2001l.html#36 History
http://www.garlic.com/~lynn/2002c.html#39 VAX, M68K complex instructions (was 
Re: Did Intel Bite Off More Than It Can Chew?)
http://www.garlic.com/~lynn/2002j.html#70 hone acronym (cross post)
http://www.garlic.com/~lynn/2002l.html#65 The problem with installable 
operating systems
http://www.garlic.com/~lynn/2002l.html#67 The problem with installable 
operating systems
http://www.garlic.com/~lynn/2002n.html#62 PLX
http://www.garlic.com/~lynn/2003b.html#0 Disk drives as commodities. Was Re: 
Yamhill
http://www.garlic.com/~lynn/2003g.html#13 Page Table - per OS/Process
http://www.garlic.com/~lynn/2003k.html#27 Microkernels are not all or 
nothing. Re: Multics Concepts For
http://www.garlic.com/~lynn/2004.html#18 virtual-machine theory
http://www.garlic.com/~lynn/2004c.html#59 real multi-tasking, multi-programming
http://www.garlic.com/~lynn/2004g.html#50 Chained I/O's
http://www.garlic.com/~lynn/2004n.html#26 PCIe as a chip-to-chip interconnect
http://www.garlic.com/~lynn/2004n.html#54 CKD Disks?
http://www.garlic.com/~lynn/2004o.html#57 Integer types for 128-bit addressing
http://www.garlic.com/~lynn/2005b.html#49 The 

Re: EXCP access methos

2008-06-11 Thread Anne Lynn Wheeler
The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.


Anne  Lynn Wheeler [EMAIL PROTECTED] writes:
 There was a version of CP67 that was converted to run on 370s (CP67-I
 system) ... which was used extensively inside IBM pending availability
 of VM370 product. In the morph of CP67 to VM370 product, the CCWTRANS
 channel program translation routine became DMKCCW.

re:
http://www.garlic.com/~lynn/2008i.html#68 EXCP access methos

an early use of the internal network was distributed development
project between the science center and endicott.

the internal network technology was created at the science center
(as well as cp67, gml, lots of other stuff)
http://www.garlic.com/~lynn/subtopic.html#545tech

the internal network was larger than the arpanet/internet from just
about the beinning to possibly mid-85
http://www.garlic.com/~lynn/subtopic.html#internalnet

the 370 virtual memory hardware architecture was well specified ...  and
endicott approached the science center about providing 370 virtual
machine support for early software testing ... i.e. in addition to
providing 360 and 360/67 virtual memory emulation ... cp67 would be
modified to also provide option for 370 and 370 virtual memory
emulation.

the original cms multi-level source maintenance system was developed as
part of this effort (cms  cp67 had source maintenance but was single
level update).

part of the issue was that this would run on the science center cp67
time-sharing system which including access by numerous non-employees
(many from various educational institutions in the cambridge/boston
area). 370 virtual memory was a closely held corporate secret and so
there had to be a lot of (security) measures to prevent it being
divulged.

the basic cambridge cp67 time-sharing system ran CP67-L.

eventually, in a 360/67 virtual machine, a CP67-H kernel ran which had
the modifications to provide 370 virtual machines as an option. This
provided isolation, preventing the general time-sharing users from being
exposed to any of the 370 features.

then a set of updates were created that modified the CP67 kernel to run
on 370 hardware  a CP67-I kernel would then run in a 370 virtual
machine provided by a CP67-H kernel running in a 360/67 virtual
machine.

CP67-I was in regular operation a year before the first engineeing 370
machine with virtual memory hardware was working. In fact, CP67-I was
used as a test case when that first engineering machine became
operational.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Andy Wood
On Wed, 11 Jun 2008 10:41:11 -0500, Rick Fochtman [EMAIL PROTECTED] 
wrote:

. . .
IIRC, VSAM and the VSAM-like access methods use STARTIO directly.


Directly? I thought that the move had been to use the Media Manager.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread (IBM Mainframe Discussion List)
 
 
On Wed, 11 Jun 2008 10:41:11 -0500, Rick Fochtman [EMAIL PROTECTED]  
wrote:_ (mailto:[EMAIL PROTECTED] wrote:) 
IIRC, VSAM and the VSAM-like access methods use STARTIO  directly.
 
In a message dated 6/11/2008 5:36:57 P.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:
Directly? I thought that the move had been to use the Media  Manager.
 
I don't know what VSAM-like access methods are.  For the last 15  years or 
so (or more) IBM has used the Media Manager to do DASD I/O in its new,  
strategic software products (e.g., DB2).  VSAM has been an official access  
method 
since the introduction of paging operating systems in the  mid-1970s.  The 
Media Manager uses STARTIO to do its I/O.
 
Bill  Fairchild
Rocket Software





**Vote for your city's best dining and nightlife. City's Best 
2008.  (http://citysbest.aol.com?ncid=aolacg0005000102)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Rick Fochtman

-snip-.


IIRC, VSAM and the VSAM-like access methods use STARTIO directly.

   



Directly? I thought that the move had been to use the Media Manager.
 


unsnip--
You may well be right, today. But Media Manager didn't exist, as such, 
until long after VSAM and VTAM. In all honesty, I'm not real sure what 
the sequence of development was, but I have some OLD VSAM source code 
that uses STARTIO, rather than EXCP, because of the channel programs it 
creates. It also contains PAGEFIX and PAGEFREE code, so I'm assuming 
that it's a step above your basic EXCP code.


Dear God, how I wish there was a documented interface to STARTIO; I'd 
like to play around with Format-1 CCW's. :-)


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: EXCP access methos

2008-06-11 Thread Paul Ip
Hi all,

Can anyone give me another hint on this?? I am confused with what makes an 
output of ADRDSSU DUMP can't be Extended Format?  

On Wed, 11 Jun 2008 08:51:26 -0500, Paul Ip [EMAIL PROTECTED] wrote:

Thanks for the reply!

In fact, my target is to overome the 65536 tracks limit on a volume for SMS
Datasets, so there are two approaches for me:
1. Extended Format
2. DSNTYPE=LARGE

At the beginning, I tried to apply Extended Format for all SMS datasets, if the
dataset is an output of COBOL program, assigning Extended Format is ok
(DSORG=PS-E). However, it is failed when I tried to apply the Extended
Format for output of ADRDSSU DUMP... Form the RC IEC143I 213-B8, it
said ...a DCB that specified EXCP...

I should rephrase my question as: why the output of ADRDSSU DUMP can't be
assigned with Extented Format? What is actually a DCB that specified EXCP
means from IEC143I 213-B8 (I was wondering if it is talking about the dataset
is under a dataset type of 'EXCP'...)?

...In addition, I don't know there is a dataset type called 'EXCP' until I 
found
the following from DFDSSdss Storage Admin. Guide:
DFSMSdss can copy, dump, and restore data sets of the following types:
DATABASE 2(TM) (DB2?;)
Direct access
EXCP (execute channel program)  Dataset Type = EXCP???
Partitioned, including:
PDS (partitioned data set)
PDSE (partitioned data set extended)
HFS (hierarchical file system) data set
Sequential, including extended-format data sets and Large Format data sets
VSAM data sets that are cataloged in an ICF catalog, including:
ESDS (entry-sequenced data set)
KSDS (key-sequenced data set)
KSDS with key ranges
LDS (linear data set)
RRDS (relative record data set)
VRRDS (variable relative record data set)
Extended-format ESDS, KSDS, LDS, RRDS, and VRRDS, including striped ESDS,
KSDS, LDS, RRDS, and VRRDS
Extended-addressable VSAM ESDS, KSDS, LDS, RRDS, and VRRDS, including
striped ESDS, KSDS, LDS, RRDS, and VRRDS
zFS (zSeries? file system) data set
Unmovable data set types (PSU, POU, DAU, ABSTR, ISU, and direct with
OPTCD=A).

Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html