No. APF is not done on a TCB by TCB basis. Every TCB points to a control
block called the JSCB (Job Step Control Block). There is an undocumented
parameter: JSCB= on the ATTACHX macro which allows specification of the
address of this control block, possibly dynamically allocated and
initialized. Ho
On Fri, 2011-04-22 at 18:35 -0600, Frank Swarbrick wrote:
> Where can an application programmer who can barely spell SVC and PC
> get an understanding of what these are? (I know the SVC is supervisor
> call, but that's about it.)
Well, how to write an SVC is documented here:
http://publibz.bould
At 19:04 -0500 on 04/22/2011, Patrick Roehl wrote about Re: Mixing
Auth and Non-Auth Modules:
Would this work?
Program A (non-authorized) does an ATTACHX with DCB which points to an
authorized library to start program B in a new TCB. Program B would be
authorized and service RACROUTE requests
Thanks Dan and Mark, however I am now confused, but not by anything
either of said.
Dan, in the dump I am looking at, I found the SCTX and it does, in fact,
have the value you indicate.
Mark, I found the RAX in this dump and it, too, had the same value as
found in the SCTX.
However, and this is t
Hello
I collected some SMF62 record in my shop to analyse dataset openning,and I
happended to find that there‘s no record relates to DB2 table spaces
dataset.The doc says:’This record is not generated when a system task issues
the OPEN macro’ ,so what does the 'system task' exactly mean?
tha
Where can an application programmer who can barely spell SVC and PC get an
understanding of what these are? (I know the SVC is supervisor call, but
that's about it.)
--
Frank Swarbrick
Applications Architect - Mainframe Applications Development
FirstBank Data Corporation - Lakewood, CO USA
P:
Would this work?
Program A (non-authorized) does an ATTACHX with DCB which points to an
authorized library to start program B in a new TCB. Program B would be
authorized and service RACROUTE requests from program A via common
storage and a WAIT/POST protocol.
Program A would then be free to c
Gerhard Postpischl is of course quite right; trapdoors are necessary during the
development of much softwar; and they are useful for later troubleshooting
tooe.
What has interested me more about this thread has been its preoccupation with
SVCs, which are at best obsolescent. There is nothin
I also found that in the SCT Extention...
SCTXMEMS DSXL1SOURCE OF MEMLIMIT VALUE @L5A
SCTXMLSZ DSCL8MEMLIMIT SIZE (IN MB)@L5A
For REGION=0M
SCTXMEMS is 3 and SCTXMLSZ is X'0000'
(at least at our shop).
Dan
wrote:
Hello
As long as that sandbox doesn't share anything with any production system
maybe.
On Fri, Apr 22, 2011 at 5:45 PM, Gerhard Postpischil wrote:
> On 4/22/2011 4:17 PM, Rob Schramm wrote:
>
>> Super Secret (aka Security Through Obscurity) is always a bad idea.
>> Security and integrity are difficult
Dang.. did I use Always again and left out the 1 or 2 use cases?
Then lock them up in data sets only the trusted can use and certainly
putting them in linklst would be something to be avoided. Or on sandbox
systems that if co-opted would not adversely affect your business.
Rob Schramm
On
On 4/22/2011 4:17 PM, Rob Schramm wrote:
Super Secret (aka Security Through Obscurity) is always a bad idea.
Security and integrity are difficult enough when balanced against allowing
progress to occur. Adding in ridiculously risky back doors into your system
is a recipe for disaster.
I take
Hi Lizette, yes, we traced and verified spool for allocation of that file...
It's removed, allocated and written sequentially and used only to write
after checks ftpapi's stem.
I can't understand..
--
For IBM-MAIN subscribe / sign
Thanks for that Rob.
I'm not really after a real time thing, just a point in time snapshot to be
taken on a regular basis to track the largest ECSA fragments.
On 22 April 2011 09:27, Rob Scott wrote:
> Graham
>
> You can easily knock up your own tool using the VSMLIST service if you
> require
Super Secret (aka Security Through Obscurity) is always a bad idea.
Security and integrity are difficult enough when balanced against allowing
progress to occur. Adding in ridiculously risky back doors into your system
is a recipe for disaster.
An auditor that doesn't know enough to ask the righ
I have ... but then again .. it is also my point.. especially with AI (I
speak of
the robot).
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf
Of Matthew Stitt
Sent: Friday, April 22, 2011 2:37 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Deletin
Read "DUNE, The Butlerian Jihad", etc..
On Fri, 22 Apr 2011 14:23:22 -0500, Jim Thomas
wrote:
>Humm... what happened to AI and having robot's 'learn' ??.
>
>
>-Original Message-
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf
>Of Staller, Allan
>Sent: Fri
Humm... what happened to AI and having robot's 'learn' ??.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf
Of Staller, Allan
Sent: Friday, April 22, 2011 2:05 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Deleting post
See "I,Robot by Issac Asim
On Fri, Apr 22, 2011 at 11:47 AM, Schwarz, Barry A <
barry.a.schw...@boeing.com> wrote:
> Does that imply that no inaction can ever be immoral?
>
> In my book no. It seems John believes otherwise.
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] O
---
I hope that this SVC has been removed. These "super-secret" SVC's are
nothing more than MASSIVE integrity exposures, that can be relatively
easily spoofed, and should be banned from any and all z/OS sites.
-
See "I,Robot by Issac Asimov"
I quote from the first law of robotics;
A robot may not injure a human being or, through inaction, allow a human
being to come to harm.
--
For IBM-MAIN subscribe / signoff / archive access instru
I quote from the first law of robotics;
A robot may not injure a human being or, through inaction, allow a human
being to come to harm.
On 04/22/11 14:47, Schwarz, Barry A wrote:
Does that imply that no inaction can ever be immoral?
-Original Message-
From: IBM Mainframe Discussion
Does that imply that no inaction can ever be immoral?
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
john gilmore
Sent: Friday, April 22, 2011 5:50 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Deleting post
Neither the past nor even our re
I hope your auditors never visit a shop I am at. They are not worth the money.
My auditores use tools that identify each active user SVC, non user SVCs that
IBM does has not supplied, and all SVCs that have been updated.
Vendors must certify that the SVC does not override the problem state
prot
On Fri, 22 Apr 2011 10:58:01 -0400, Hardee, Charles H
wrote:
>Hello Everyone,
>
>
>
>I am in need of locating the where the MEMLIMT value is stored for the
>active job.
>
>Can anyone out there give me an idea of where to look?
>
The RAX (RSM ADDRESS SPACE BLOCK EXTENSION) mapped
by IARRAX.
If
On Fri, 22 Apr 2011 12:10:15 -0500, Wayne Driscoll
wrote:
>I hope that this SVC has been removed. These "super-secret" SVC's are
>nothing more than MASSIVE integrity exposures, that can be relatively
>easily spoofed, and should be banned from any and all z/OS sites.
>
>=
>You must not have auditors.
This is not an audit issue.
>This is a security breach waiting to happen.
Auditors can only monitor procedures.
And, they can only point out issues that SMEs have identified.
>How do you prevent someone from calling their program the same name as one in
>the intern
I hope that this SVC has been removed. These "super-secret" SVC's are
nothing more than MASSIVE integrity exposures, that can be relatively
easily spoofed, and should be banned from any and all z/OS sites.
===
Wayne Driscoll
OMEGAMON DB2 L3 Support/D
That is a very bad idea. It would be better to make the RACF functions in
the SVC itself. Perhaps doing a validation before by checking a FACILITY
profile.
On Apr 22, 2011 11:28 AM, "Emily A. Rambo"
wrote:
> If there's no way to get what you need without using the functions that
IBM
> requires be
You must not have auditors. This is a security breach waiting to happen. How do
you prevent someone from calling their program the same name as one in the
internal table?
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Emily A. Rambo
S
If there's no way to get what you need without using the functions that IBM
requires be authorized, here's another possibility. We had a sysprog years ago
who coded a user SVC that could be called to flip the JSCBAUTH bit on or off,
with a very short list of program names in an internal table t
> Hi, we have a problem in a rexx function that send data using ftpapi and
> after start
> ssh using bpxbatch.
> The problem occurs randomly and appare as a S213-FC when we try to make
> operation on output files(i.e. ftp log) This happens rarely and we have just
> checked the
> correct syntax of
Hi, we have a problem in a rexx function that send data using ftpapi and
after start ssh using bpxbatch.
The problem occurs randomly and appare as a S213-FC when we try to make
operation on output files(i.e. ftp log)
This happens rarely and we have just checked the correct syntax of
rm/alloc/open/w
Hello Everyone,
I am in need of locating the where the MEMLIMT value is stored for the
active job.
Can anyone out there give me an idea of where to look?
Also, if you know, is the value stored in the address space control
block, whatever block that is, a merged value between the system
>Morality ... computing ...
>I thought we'd beaten the (recent) oxymoron thread to death.
I wasn't judging.
I was asking a question.
If you don't want something read, don't write it.
-
Ted MacNEIL
eamacn...@yahoo.ca
Twitter: @TedMacNEIL
Allocate, delete, migrate, or recall a dataset in the affected storage group.
Or a migrate a volume to level 0 so a migrate / recall occurs for
unused datasets.
On Fri, Apr 22, 2011 at 9:19 AM, Wang Xiaobing wrote:
> Restart OMEGAMON still get nothing...:-(
>
--
Mike A Schwab, Springfield IL USA
try to verify the space info in RMF III storage group space monitor.
If it's empty too, the problem lies in SMS.
Best Regards,
Johnny Luo
On Fri, Apr 22, 2011 at 10:19 PM, Wang Xiaobing wrote:
> Restart OMEGAMON still get nothing...:-(
>
>
Restart OMEGAMON still get nothing...:-(
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/
On Thu, 21 Apr 2011 15:27:48 -0500, Patrick Roehl
wrote:
>The RACF functions are used to determine if a 3rd party is allowed to access a
>specific resource.
>
>RACROUTE REQUEST=VERIFY,ENVIR=CREATE
>RACROUTE REQUEST=AUTH
>RACROUTE REQUEST=VERIFY,ENVIR=DELETE
>
>The process is run as a started task
(Cross-posted to IBMVM, IBM-Main and Linux-390)
The SHARE Linux & VM Program is looking for individuals who are able to
attend the upcoming conference in Orlando, FL (August 7-12, 2011), and who
are interested in presenting User Experience sessions on topics related to
Linux and virtualization. W
OMEGAMON or RMF can only get the space info after the first data set is
allocated on it. HyperSwap may swap the ucb and it's possible that the
space stat is updated at the ucb level . So after a swap the old info is
lost.
Just my guess.
Best Regards,
Johnny Luo
On Fri, Apr 22, 2011 at 9:35 PM,
Hi ,
Today, after a HyperSwap processing, all are looks well, but the OMEGAMON
For Storage can not get the Storage Group sapce information, any one
experience the same problem ? Thanks.
Wang
--
For IBM-MAIN subscribe / signoff
The lawyers' doctrine of de minimis---Let's not decide issues that need not be
reached--suggests that questions about the morality of deleting a post from the
UA IBM-MAIN archive are at best moot.
We have no centralized system of Orwellian memory holes, only a congeries of
ineptly implemente
I should have been more specific with the macro parameters. Below are the
full macros being used, which include the ACEE parameter. If there is a
non-authorized way to perform a check with supplied credentials, that would
be an excellent solution.
RACROUTE REQUEST=VERIFY,
ENVIR=CREATE,
Morality ... computing ...
I thought we'd beaten the (recent) oxymoron thread to death.
Or maybe I've just spent too much time dealing with the marketing side of the
industry ...
Shane ...
On Fri, Apr 22nd, 2011 at 9:12 PM, Ted MacNEIL wrote:
> >I've removed the post from the UA archives.
>
>
On Thu, 21 Apr 2011 13:42:32 +0800 ibmnew wrote:
:> The application programmers in our shop always allocate many big
datesets(PS,PDS,VSAM),but they only use <10% space oF the datasets.
:> I want to release the spaces that aren't used by SMS .
:> Could you tell me how to do it?
:> I
>I've removed the post from the UA archives.
Don't get me wrong, and I'm not criticising, but is that the moral thing to do?
-
Ted MacNEIL
eamacn...@yahoo.ca
Twitter: @TedMacNEIL
--
For IBM-MAIN subscribe / signoff / archive acce
On Thu, 21 Apr 2011 13:49:14 -0700, John Weber wrote:
>Hi,
>
>We are calling from z/OS CICS COBOL to a C program which is opening a
socket to start a TCPIP connection and we got back error 167 from the socket
() function call.
Do you have
TCPIP.SEZATCP
in both your //DFHRPL and //STEPLIB ? Is
On 22/04/2011 12:59 PM, Chris Mason wrote:
John
The *issue* here is that IBM - and possibly other vendors - when dealing with
socket calls - that's socket calls in general not just the actual socket() call
-
just seem not to be comprehensive in documenting all possible return codes
(errnos) for
At 00:39 -0500 on 04/21/2011, Paul Gilmartin wrote about Re: Submit a
series of jobs in order after the previous:
I could build multi-data-set tapes starting with a nonspecific
VOLSER with the power of JCL. I once did this in Rexx, scanning
the TIOT (Thanks, Steve Bacher) for the volser of
Graham
You can easily knock up your own tool using the VSMLIST service if you require
real-time results.
Most (if not all) commercial MVS monitors would offer a display that shows this
sort of information - however I am guessing that you are after something free.
Rob Scott
Lead Developer
Rock
RACROUTE REQUEST=AUTH only needs to be called from an authorized environment
when using certain (less common) keywords.
Which keyword is being used that makes authorization required?
Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.2305
Em
I am out of the office until 04/25/2011.
I am out of the office. I will respond to your message when I return;
limited access to e-mail/phonemail.
Note: This is an automated response to your message "IBM-MAIN Digest - 20
Apr 2011 to 21 Apr 2011 (#2011-111)" sent on 4/22/11 0:00:01.
This is the
53 matches
Mail list logo