Re: Calling unauthorized code from an authorized address space

2010-04-25 Thread Chris Craddock
On Sat, Apr 24, 2010 at 2:17 PM, Binyamin Dissen wrote: > :> There is no way to dance around it or pretend > :>otherwise. The only way you could avoid the exposure would be to > guarantee > :>that no authorized code code could ever run within the address space > after > :

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Chris Craddock
Oh geez... On Fri, Apr 23, 2010 at 8:41 AM, Sam Siegel wrote: > On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson wrote: > > > By definition, the subject seems to me to be an oxymoron. > Yes exactly!!! > Yes ... I agree that the subject lines is not properly worded and is > technically incorrec

Re: ADRNAPF was IEBCOP Y losing APF authori sation i n mi ddle of JOB - etc?

2010-04-22 Thread Chris Craddock
> > As long as all work areas used by the authorized program are in system key > there should not be any exposure by using SYNCH. True in an absolute theoretical sense, but in reality there is NO way to guarantee that. If we're talking about a function like OPEN as the example case of a privileg

Re: Calling unauthorized code from an authorized address space

2010-04-22 Thread Chris Craddock
On Thu, Apr 22, 2010 at 5:49 PM, Sam Siegel wrote: > I understand what you are saying and I'm not taking anything personally. > However, I must ask how is one to learn these things. I'm > not pretending to be anything or diminishing the complexity. I thought my > approach was exactly the oppos

Re: Calling unauthorized code from an authorized address space

2010-04-22 Thread Chris Craddock
On Thu, Apr 22, 2010 at 1:19 PM, Sam Siegel wrote: > On Thu, Apr 22, 2010 at 6:42 PM, Walt Farrell wrote: > > > On Thu, 22 Apr 2010 15:07:52 +0100, Sam Siegel wrote: > > > > > >I'm trying to write some authorized code that has a requirement to > invoke > > >unauthorized user exits. > > > > Firs

Re: ADRNAPF was IEBCOP Y losing APF authori sation i n mi ddle of JOB - etc‏

2010-04-20 Thread Chris Craddock
On Tue, Apr 20, 2010 at 6:09 PM, Sam Siegel wrote: > With all of the discussion about APF and loading programs from various > types > of libraries, I'm hoping someone can provide some clarification for > me regarding the ADRNAPF of the load macro. > > The doc indicates that a module can be loaded

Re: IEBCOPY losing APF authorisation in middle of JOB - etc

2010-04-19 Thread Chris Craddock
Ok, I am puzzled. Whether there is or is not an I/O appendage routine hidden away inside of dear old IEBCOPY seems immaterial. APF authorization is not something that just comes and goes within a step. Every new step can be authorized or not, but if the JOBLIB, STEPLIB or application specific libra

Re: IEFUSI - RESERVE SPACE

2010-04-16 Thread Chris Craddock
On Fri, Apr 16, 2010 at 9:00 AM, Arthur Gutowski wrote: > On Thu, 15 Apr 2010 13:46:26, Ted MacNEIL wrote: > > >Third, with the restructuring of the way initiators work, where draining > an init > actually terminates the offending address space underpinning that init, > rather > than a random on

Re: Putting system integrity at risk to save software charges

2010-04-12 Thread Chris Craddock
On Mon, Apr 12, 2010 at 3:12 PM, George Henke wrote: > Shadow from Data Direct does this painlessly. > > I am totally independent of this vendor, so I can be objective. > I am totally independent of this vendor, so I can be objective too. I just want to be clear on one point - at least with reg

Re: products or system components applying cross-memory FASTAUTH requests

2010-04-12 Thread Chris Craddock
On Mon, Apr 12, 2010 at 1:32 PM, Dr. Stephen Fedtke < max_mainframe_...@fedtke.com> wrote: > does anybody know products or system components applying (massive) > cross-memory FASTAUTH requests, maybe also in an SRB environment, in order > to get more experience with tricky situations for the ICHRF

Re: Putting system integrity at risk to save software charges (was "What is ziip and zaap" Training/doc)

2010-04-12 Thread Chris Craddock
On Mon, Apr 12, 2010 at 9:15 AM, Hunkeler Peter (KIUP 4) < peter.hunke...@credit-suisse.com> wrote: > >An SRB receives control in supervisor state. And while it can L(E)PSW > >itself to problem state, it will not be able to get back to supervisor. > > The manual says: > > "9.5.1 Implications of Ru

Re: (slightly OT) CA is laying off 1,000 workers and expects to take a $50m h...

2010-04-09 Thread Chris Craddock
On Fri, Apr 9, 2010 at 9:19 AM, Ed Finnell wrote: > > In a message dated 4/9/2010 9:14:34 A.M. Central Daylight Time, > maryanne4...@gmail.com writes: > > Um, it wasn't Ed Gould, it was zman. > True and regardless of who posted the original story it is at best insensitive to take any pleasure i

Re: Trying to understand ALLOWUSERKEYCSA and subpool storage

2010-03-24 Thread Chris Craddock
> > > Suppose your magic SVC does nothing unless the caller is APF > authorized? > > In that case it wouldn't be sufficiently "magic" for use within CICS, > which runs unauthorized. > true. And what would be the point of a magic svc for an authorized caller anyway? They could just as easily use MO

Re: Trying to understand ALLOWUSERKEYCSA and subpool storage

2010-03-24 Thread Chris Craddock
On Wed, Mar 24, 2010 at 11:56 AM, Brian Peterson < brian.peterson.ibm.m...@comcast.net> wrote: > In my opinion, a "magic" SVC is a MUCH WORSE integrity exposure than > allowing authorized code to GETMAIN Key 8 CSA. Indeed! -- This email might be from the artist formerly known as CC (or not) Yo

Re: Need to find alternative to shared storage because of ALLOWUSERKEYCSA parm

2010-03-24 Thread Chris Craddock
On Wed, Mar 24, 2010 at 9:59 AM, GOODWIN, DIANE M. wrote: > I was just going through the book on what and how dataspaces work. > > The other issue is that we save the address of this shared storage in a > common area. Then all application programs have the address in common, > will load it to a r

Re: Crazy idea for a "desktop integration with z/OS" project?

2010-03-19 Thread Chris Craddock
On Fri, Mar 19, 2010 at 11:46 AM, Natarajan Mohan wrote: > All we need is a full fledged desktop for z/OS like Gnome or KDE which then > we can export over a SSH session to any Xclient. If that desktop environment > is there then all your ideas is possible. > BMC built one eight years ago (Syst

Re: Performance cost of associating an ARR with a PC

2010-03-17 Thread Chris Craddock
> > :> ARR is a software concept, not machine architecture. Nothing special > :>happens with regard to an ARR when the PC instruction is executed. > > :> RTM2 processing examines the linkage stack to look for ARRs. > > Maybe I am looking in the wrong manual, but the POPs does not show me where >

Re: CSV and Duplicate ALIASes

2010-03-08 Thread Chris Craddock
On Mon, Mar 8, 2010 at 11:49 AM, Paul Gilmartin wrote: > Motivated by the recent "Directed Load" thread in another list: > > Suppose that (necessarily different) data sets in the programmer's > STEPLIB concatenation contain: > >load module FRED with ALIAS WOMBAT >load module JOE with ALIA

Re: Long LLE list

2010-02-16 Thread Chris Craddock
On Tue, Feb 16, 2010 at 10:23 PM, Greg Price wrote: > Bernd Oppolzer wrote: > > > > I have the following problem: > > > > a piece of software that I'm not allowed to change due to legal reasons > > walks through the LLE list to look for a specific module. > > Any chance of purging the module from

Re: Long LLE list

2010-02-16 Thread Chris Craddock
On Tue, Feb 16, 2010 at 2:39 PM, Bernd Oppolzer wrote: > a piece of software that I'm not allowed to change due to legal reasons > walks through the LLE list to look for a specific module. And it does this > very often. I cannot change this behaviour. This consumes 5 percent of CPU > of some of ou

Re: PDS vs. PDSE

2010-02-10 Thread Chris Craddock
On Wed, Feb 10, 2010 at 1:46 PM, John R. Ehrman (408-463-3543 T/543-) < ehr...@vnet.ibm.com> wrote: > PDSEs have been available for a long time, and provide many > advantages over PDSs. Why are people reluctant to use PDSEs? > As others have pointed out, PDSEs have a (justifiably) bad reputation

Re: SMP/E -- Removing a CSECT from a load module?

2010-02-09 Thread Chris Craddock
On Tue, Feb 9, 2010 at 8:29 PM, Brian Peterson < brian.peterson.ibm.m...@comcast.net> wrote: > I'm thinking that had the packaging been originally designed using the > ++MOD > entry's CSECT parameter, removing a CSECT from a ++MOD would have been > straightforward. > > Given the packaging you've d

Re: Movin' on Up!

2009-12-23 Thread Chris Craddock
On Tue, Dec 22, 2009 at 11:24 AM, Edward Jaffe wrote: > http://www.phoenixsoftware.com/newlocation.htm > > Cool. How's the noise level there? -- This email might be from the artist formerly known as CC (or not) You be the judge. --

Re: PSATOLD = 0 when under "PRB" !?!?

2009-12-17 Thread Chris Craddock
On Thu, Dec 17, 2009 at 10:41 AM, Ngafei Huang wrote: > Such a suggestion. VTAM exits can also run under SRB. How about make sure > that is not the case. > > Lots of system exits also get control in SRB mode, as do XCF inbounds and a bunch of other things people may find astonishing if they don

Re: Logging of PDS(E) member opens

2009-12-17 Thread Chris Craddock
I'm not sure what problem was originally being solved because I have not been paying attention. However, keep in mind that "OPEN" is a dataset level operation, not a member level operation. The idea of tracking member level opens is a meaningless concept. Tracking access to individual members of a

Re: 360 programs on a z/10

2009-12-17 Thread Chris Craddock
On Thu, Dec 17, 2009 at 11:06 AM, Lindy Mayfield wrote: > I've often heard that programs that ran on the IBM 360 will still run on a > z/10. Is this true? Some? Most? All? > > Has to be at least one (IEFBR14). (-: > > Application programs still run fine as long as they don't use archaic system

Re: PSATOLD = 0 when under "PRB" !?!?

2009-12-16 Thread Chris Craddock
On Wed, Dec 16, 2009 at 1:07 PM, Edward Jaffe wrote: > Thompson, Steve wrote: > >> I'm just baffled. >> >> > > Jim Mulder made the best suggestion of all. Force a dump when the condition > occurs and look at the SYSTRACE. > > If PSATOLD == 0 *FOR THE CU

Re: NEON sues IBM

2009-12-15 Thread Chris Craddock
On Tue, Dec 15, 2009 at 9:55 AM, Howard Brazee wrote: > On 15 Dec 2009 05:23:16 -0800, jch...@ussco.com (Chase, John) wrote: > > >It would seem that if Neon prevails, IBM's marketing credibility will be > >reduced to that of politicians seeking (re-)election to high office. > > I think you exagger

Re: Does SAC 0 make PASN = HASN = SASN

2009-12-14 Thread Chris Craddock
On Mon, Dec 14, 2009 at 6:25 PM, Joe Reichman wrote: > It is A Stacking PC I was under impression that when PR executes at the end > of the PC rtn the OS puts the environment back to the way it was before the > PC rtn > > Was invoked > > The POST ASID is only a few instruction later don't know why

Re: Does SAC 0 make PASN = HASN = SASN

2009-12-14 Thread Chris Craddock
On Mon, Dec 14, 2009 at 4:44 PM, Edward Jaffe wrote: > Chris Craddock wrote: > >> ... If you use a basic ss-PC you have to go through the usual charade of >> >> issuing PT and then SSAR to get back to where you came from - which is >> error >> prone to say

Re: Does SAC 0 make PASN = HASN = SASN

2009-12-14 Thread Chris Craddock
On Mon, Dec 14, 2009 at 7:34 AM, Joe Reichman wrote: > For some reason When XMEM Post Fails the Dump says HOME != PRIMAMRY > > I wrote 2 test program('S) to test out this code > > 1) with the WAIT > > 2) Post ASID= > > It worked > > So I have the parms right > > It must be the Space Switching PC r

Re: Does SAC 0 make PASN = HASN = SASN

2009-12-14 Thread Chris Craddock
On Sun, Dec 13, 2009 at 8:49 PM, David Stephens < d...@longpelaexpertise.com.au> wrote: > This (very rough draft) article "Cross Memory Communications for Beginners" > may help. > > http://www.longpelaexpertise.com.au/ezine/CrossMemoryBeginners.html > > David Stephens > Lead Systems Programmer > d

Re: Reentrant Programs and Protected Storage

2009-11-18 Thread Chris Craddock
On Wed, Nov 18, 2009 at 10:24 AM, David Shein wrote: > I grew up believing that if a program is link edited as reentrant AND it is > loaded from an authorized library, it gets loaded into protected storage. > That is what the manual says, too. However, that is not what appears to be > happening

Re: user-written MVS subsystems

2009-11-17 Thread Chris Craddock
On Tue, Nov 17, 2009 at 2:45 PM, Clark Morris wrote: > On 16 Nov 2009 23:11:57 -0800, in bit.listserv.ibm-main you wrote: > > >Unfortunately, you're in a pretty difficult situation. In a perfect world > I > >would say that you should re-write the stuff correctly, but here in the > real > >world,

Re: An Alternative Modest PARM Proposal

2009-11-03 Thread Chris Craddock
On Tue, Nov 3, 2009 at 5:44 PM, Paul Gilmartin wrote: > > You're inconsistent in your assumptions. You appear to believe that: > > o Some JCL programmers won't take responsibility ... but > > o All Assembler, Rexx, FORTRAN, COBOL, C, PL/I, ... can be > presumed to take responsibility for ensur

Re: An Alternative Modest PARM Proposal

2009-11-03 Thread Chris Craddock
On Tue, Nov 3, 2009 at 11:48 AM, Paul Gilmartin wrote: > On Tue, 3 Nov 2009 00:39:03 -0600, Chris Craddock wrote: > > > >The PARM interface is older than dirt and even though we can all agree > with > >hindsight that it was a momentously stupid design, it is nevertheless

Re: An Alternative Modest PARM Proposal

2009-11-03 Thread Chris Craddock
On Tue, Nov 3, 2009 at 1:36 PM, Shmuel Metz (Seymour J.) < shmuel+ibm-m...@patriot.net > wrote: > In <6fh0f55c4lt4scbntma0r9udums736r...@4ax.com>, on 11/03/2009 >at 05:06 PM, Binyamin Dissen said: > > >The API is defined as 100 byte maximum > > There is no such formal API. The limitations of

Re: SV: An Alternative Modest PARM Proposal

2009-11-03 Thread Chris Craddock
On Tue, Nov 3, 2009 at 9:08 AM, Thomas Berg wrote: > > On Tue, Nov 3, 2009 at 9:28 AM, Thomas Berg > > wrote: > > > > > Tsk, tsk. I think You should leave this matter to more > > persons with > > > more knowledge. You see, this is a complicated matter, > > which You will > > > maybe grasp when

Re: An Alternative Modest PARM Proposal

2009-11-02 Thread Chris Craddock
> > > > > You and I have diametrically opposed perspectives of "compatibility". > To me, "compatibility" means the facility to call a program from JCL > with a long PARM presenting exactly the same interface as today when > it's called from other languages (such as Rexx), and requiring > modificati

Re: Bizarre requirement for ENFREQ macro

2009-10-23 Thread Chris Craddock
On Fri, Oct 23, 2009 at 12:13 PM, Rob Scott wrote: > I was re-working some of my code for a new release today and I found a > bizarre pre-req if you want to use the ENFREQ macro - you *must* declare a > fullword field called "ENFPTR" - you cannot call it anything - else and > there is no keyword o

Re: Using The IWMxxxx Macros Question # 1

2009-10-23 Thread Chris Craddock
On Fri, Oct 23, 2009 at 10:11 AM, esst...@juno.com wrote: > Hi, > > I have several questions regarding the use of thw IWMx Work Load > management Macros. > > I have been reading two publications: > 1) Systems Programmers Guide to Work Load Manager (SG24-6472-03) RED BOOK > 2) MVS Programming

Re: Ownership of PC routines

2009-09-29 Thread Chris Craddock
On Tue, Sep 29, 2009 at 12:40 PM, esst...@juno.com wrote: > Chris Craddock wrote > > >I was speaking from direct personal experience (of course). This all > >falls into the realm of providing deep system level infrastructure >support > and without bragging at all, the

Re: Ownership of PC routines

2009-09-29 Thread Chris Craddock
I was speaking from direct personal experience (of course). This all falls into the realm of providing deep system level infrastructure support and without bragging at all, there are only a handful of people out there who can do it and get it right most of the time. Hence the sysprog community's ge

Re: Principle of Least Astonishment (Was: IDCAMS delete with mask)

2009-09-28 Thread Chris Craddock
On Mon, Sep 28, 2009 at 3:15 PM, Paul Gilmartin wrote: > On Mon, 28 Sep 2009 12:07:35 -0700, Edward Jaffe wrote: > > >Pinnacle wrote: > >> ... They violated Lionel Dyck's "principle of least astonishment". > > > >The Principle of Least Astonishment is attributable to Lionel Dyck? > > > Cowlishaw u

Re: Ownership of PC routines

2009-09-28 Thread Chris Craddock
On Mon, Sep 28, 2009 at 3:49 PM, Dave Day wrote: > I would like to establish a non space-switch PC routine that would outlive > the address space that establishes it. Have my started task come up and > during initialization place the PC routine into ECSA, and do the appropriate > calls(etcre,etd

Re: Long parms...again

2009-09-25 Thread Chris Craddock
On Fri, Sep 25, 2009 at 4:54 AM, Jousma, David wrote: > That wasn't the word I was referring to. > > It was the fact you referred to Chris Craddock as "Christ" that got the > chuckle out of me. > _

Re: Long parms ... again (was: Reading DD card information)

2009-09-23 Thread Chris Craddock
On Wed, Sep 23, 2009 at 10:59 AM, Thompson, Steve < steve_thomp...@stercomm.com> wrote: > > Might I suggest that you are being a bit myopic? Or perhaps suffering > from tunnel vision? > > APF programs are to be written to a higher standard. > > From what you have written, you believe that if someo

Re: Mainframe Hall of Fame: Three New Members Added

2009-09-17 Thread Chris Craddock
On Thu, Sep 17, 2009 at 6:38 AM, Anne & Lynn Wheeler wrote: > crashlu...@gmail.com (Chris Craddock) writes: > > Coyote something. That was the original postal area name. For some reason > I > > guess it was considered "un-pc" at the time. > > > closet post

Re: Mainframe Hall of Fame: Three New Members Added

2009-09-16 Thread Chris Craddock
> > > trivia question: what was going to be the original name for STL??? > ... it was changed at the last minute, a week before it was due to open > Coyote something. That was the original postal area name. For some reason I guess it was considered "un-pc" at the time. -- This email might be f

Re: Library Lookaside

2009-09-08 Thread Chris Craddock
Share presentation. > I'm > 99% sure it was an IBM SE that gave me the idea. > > Ron > > > -Original Message- > > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of > > Chris Craddock > > Sent: Tuesday, September 08, 200

Re: Library Lookaside

2009-09-08 Thread Chris Craddock
On Tue, Sep 8, 2009 at 8:52 AM, Ron Hawkins wrote: > > While googling this topic, I found the following comments from someone > attending Al Groccia's presentation at Share 71 in August 1988: > > "ESA Library Lookaside has been enhanced to apply to non-linklist datasets > and unauthorized librar

Re: SWAREQ UNAUTH=YES S0C1 ?1.10?

2009-09-03 Thread Chris Craddock
On Thu, Sep 3, 2009 at 2:59 PM, Kirk Talman wrote: > A utility macro that issues SWAREQ UNAUTH=YES has abended w/S0C1 because > it was used in 24 bit mode. IFA says at the BALR R14,R15 but I think the > problem is the BR R14 returning. > > The macro is used in multiple places/programs. This is

Re: How often IPL a production LPAR (any good practice)

2009-09-03 Thread Chris Craddock
...well not be be a broken record, but one of the major selling features of sysplex is not making IPL-ing an image any less necessary (they are what they are) but in making them invisible (or nearly invisible) to the business. With proper configuration you can take down an image, apply maintenance

Re: 回覆:Re: 回 覆:Re: paging in rates and r eal m emory

2009-09-03 Thread Chris Craddock
2009/9/3 Ron Hawkins > Tommy, > > > Someone correct me if I'm wrong, but aren't unchanged pages selected for > Page-out first? > UN changed pages are simply stolen. There's no point in paging them out since by definition they either have never been referenced, or there is a valid copy already o

Re: paging in rates and real memory

2009-09-01 Thread Chris Craddock
On Tue, Sep 1, 2009 at 5:14 PM, Ted MacNEIL wrote: > >n inactive CICS is almost always a test region, not worthy of critical > anything. And there are often a gaggle of idle test regions asleep. > > You are generalising, > IBM introduced 'memory critical' for a major bank in the US, that had majo

Re: Binder API...broke or working as designed

2009-08-28 Thread Chris Craddock
On Thu, Aug 27, 2009 at 6:29 PM, Peter Relson wrote: > There is no subpool that would satisfy both of the following > -- work for unauthorized callers running in their state and key > -- work for authorized callers running in their state and key and not come > out of "low private" (where "low" re

Re: Binder API...broke or working as designed

2009-08-25 Thread Chris Craddock
On Tue, Aug 25, 2009 at 4:01 PM, Tony Harminc wrote: > 2009-08-25 William H. Blair wrote: > > > Until the binder API can function as a full-fledged system > > service, it can't be used by any code that, itself, has to > > adhere to the previously-established and long-recognized > > MVS systems i

Re: how-to Sysplex? - the LOGR and exploiters part

2009-08-24 Thread Chris Craddock
On Tue, Aug 25, 2009 at 12:38 AM, Barbara Nitz wrote: > >The inconvenient truth of all things sysplex is that sysplex is a "shared > >everything" architecture which means for it to work correctly, everything > >must be available everywhere in the plex. Subdividing the plex with old > >fashioned i

Re: Fw: Fw: Binder API...broke or working as designed

2009-08-24 Thread Chris Craddock
There you go thinking logically again Pat... On Mon, Aug 24, 2009 at 5:45 PM, Patrick O'Keefe wrote: > On Mon, 24 Aug 2009 14:56:05 -0500, William H. Blair > wrote: > > >... The problem for us > >was that we could not invoke the binder API as we assumed we > >would be able to, and the reason h

Re: how-to Sysplex? - the LOGR and exploiters part

2009-08-24 Thread Chris Craddock
> > > The inconvenient truth of all things sysplex is that sysplex is a "shared everything" architecture which means for it to work correctly, everything must be available everywhere in the plex. Subdividing the plex with old fashioned ideas like "Prod runs on SYSA, development runs on SYSB and the

Re: SHARE in Denver

2009-08-22 Thread Chris Craddock
On Sat, Aug 22, 2009 at 5:19 PM, Knutson, Sam wrote: > Hi, > > First SHARE didn't take humbridge at anything. In a nutshell it was too > big and awkward and annoyed people who were trying to sit at the table. > I had good intentions but it didn't work well. The IBM-MAIN table has > not been a bi

Re: Fw: Binder API...broke or working as designed

2009-08-21 Thread Chris Craddock
On Fri, Aug 21, 2009 at 11:29 PM, Bill Klein wrote: > I know that ranting on IBM-MAIN is always a good way to spend your time, > but > > > Are you aware that the "ASM" project at SHARE accepts and processes > requirements against the Binder? If anyone who participates in SHARE needs > assis

Re: SHARE in Denver

2009-08-20 Thread Chris Craddock
On Thu, Aug 20, 2009 at 5:24 PM, Patrick O'Keefe wrote: > On Mon, 17 Aug 2009 09:42:52 -0400, Scott Rowe > wrote: > > >So, Denver is going to be my first real SHARE trip since 2000, who > else is going to be there? > >... > > Since my SHAREing days are over I humbly request you and/or > others to

Re: Where to find statistics for fetched programs?

2009-08-18 Thread Chris Craddock
ISTR that Peter Relson had a module fetch monitor tool that he made available on an "as is/no warranty" basis. He might chime in if he's still paying attention on ibm-main. -- This email might be from the artist formerly known as CC (or not) You be the judge. ---

Re: IBM aims System z at specific workloads

2009-08-18 Thread Chris Craddock
On Tue, Aug 18, 2009 at 3:13 AM, Timothy Sipples wrote: > > Vendors -- including your company, I'm sure -- are in business to earn > revenues and profit. Customers have a strong interest in doing business > with vendors that can continue to (or even increase) research, development, > and other pr

Re: Any Utilities to Archive Members of a PDS/PDSE - Load Librari es, Not Source

2009-08-18 Thread Chris Craddock
On Mon, Aug 17, 2009 at 10:40 PM, Edward Jaffe wrote: > Stocker, Herman wrote: > >> ... they want a package [...] from a vendor who can be held accountable if >> some >> thing goes wrong. >> >> > > Accountable? Better read the disclaimer carefully. A software provider like > IBM or an ISV will fix

Re: Make a job non-swappable

2009-08-04 Thread Chris Craddock
you might also check that somebody has not dynamically made it non-swap, e.g. by using the RESOLVE DONTSWAP command (or similar) On Tue, Aug 4, 2009 at 5:07 PM, Brian Peterson < brian.peterson.ibm.m...@comcast.net> wrote: > Check and see if PPT entry NOSWAP is set for the program in > SYS1.PARMLI

Re: authorize name/token service

2009-08-04 Thread Chris Craddock
On Tue, Aug 4, 2009 at 11:42 AM, Frank Swarbrick < frank.swarbr...@efirstbank.com> wrote: > This is a test, this is only a test. I want to perform this only so I can > then be locked out from performing this. I am trying to use a Cobol program > to create a system level token (level 4). This pr

Re: SDSF PREFIX Enhancement (UK44477)

2009-07-30 Thread Chris Craddock
On Thu, Jul 30, 2009 at 5:29 PM, Skip Robinson wrote: > Call me a wuss, but I just type FILTER ? and get a fairly intuitive series > of panels. > > . Ok Skip, "You're a wuss". :-) -- This email might be from the artist formerly known as CC (or not) You be the judge. -

Re: Enforcing CPU Time

2009-07-29 Thread Chris Craddock
On Wed, Jul 29, 2009 at 10:49 AM, Ted MacNEIL wrote: > >But also a cpu use limit per class is another > way to catch a looper early. > > But, what if it's not looping? > Exactly. Most programs actually DO loop, but eventually they finish processing whatever it is they're processing and they end.

Re: Enforcing CPU Time

2009-07-28 Thread Chris Craddock
On Tue, Jul 28, 2009 at 4:06 PM, Mark Zelden wrote: > On Tue, 28 Jul 2009 15:05:20 -0500, Kelman, Tom > wrote: > > >Management here has requested that we determine a way to enforce a CPU > >time limit on test jobs during the prime shift. That is we do not want > >the user to be able to override

Re: Suggested MEMLIMIT value for SMFPRMx

2009-07-28 Thread Chris Craddock
On Tue, Jul 28, 2009 at 4:32 PM, Martin Packer wrote: > I've spoken about the "Denial Of Service Attack" possibility many times in > the past. I believe it to be real (if you'll pardon the pun). :-) > IEFUSI/MEMLIMIT have to be effective to contain that. It's not, as has > been said, a decision fo

Re: Bulletproof (was Re: Mainframe hacking (getting back on topic))

2009-07-21 Thread Chris Craddock
On Tue, Jul 21, 2009 at 9:07 AM, Shane wrote: > On Tue, 2009-07-21 at 09:55 -0400, John Eells wrote: > > > "Specifically, z/OS "System Integrity" is defined as the inability of > > any program not authorized by a mechanism under the installation's > > control ... > > This is the bit I have troubl

Re: Converting CPU Time to MIPS

2009-07-20 Thread Chris Craddock
On Mon, Jul 20, 2009 at 9:51 AM, Bruce McKnight wrote: > I'm familiar with the discrepancy between hardware and software MSUs. IBM > has put the customers in an unfortunate position of contention with > software > vendors. > > I'm still curious about the gap between the 117 hardware MSU and the 1

Re: Complexity (was Re: Convert DB2 on z/OS to Oracle on z/Linux?)

2009-07-12 Thread Chris Craddock
On Sun, Jul 12, 2009 at 11:14 AM, Steve Comstock wrote: > Chris Craddock wrote: > >> Unlurking for a moment... >> > > >> If what you're trying to accomplish looks like a simple subroutine call, >> then it probably is simple enough to be one. OTOH i

Re: Complexity (was Re: Convert DB2 on z/OS to Oracle on z/Linux?)

2009-07-09 Thread Chris Craddock
Unlurking for a moment... On Thu, Jul 9, 2009 at 6:50 AM, Steve Comstock wrote: > Timothy Sipples wrote: > >> Nobody so far has mentioned another factor: as you increase the "distance" >> (latency) between applications and databases, CPU and memory >> consumption increases on both sides. I call t

Re: SMP/E packaging of maintence / products (was: FMID descriptions)

2009-05-30 Thread Chris Craddock
On Sat, May 30, 2009 at 8:51 AM, John McKown wrote: > A good idea. However, we only have 3390-3 volumes. And, as I said in > another post, if I have a large amount of "unused" space in a SMS pool, > then management becomes unglued. Of course, I could just leave the entire > space allocated to a z

Re: z/OS STORAGE service

2009-05-28 Thread Chris Craddock
Short answer: Choose a job-step owned subpool. They are documented in the authorized assembler services guide SA22-7608. More complicated answer: "It depends what you're trying to accomplish". You can just pick an appropriate job step task owned subpool but you must bear in mind that there may be

Re: ESTAE-underTSO question

2006-03-24 Thread Chris Craddock
>> I have a program with an ESTAE that gets control and issues a >> SDUMP. This works fine when submitted as a batch job, as the >> program is in an authorized library. >> >> When invoking the same program from a TSO REXX EXEC, the SDUMP in the >> ESTAE fails with a S133 abend indicating 'An unaut

<    1   2