Re: Cross Memory Services with AXSET and SSAR.

2015-03-17 Thread Walt Farrell
On Mon, 16 Mar 2015 18:30:19 +, Cannaerts, Jan jan.cannae...@socmut.be 
wrote:

As for my problem;

I have made a small test program that holds a piece of storage paged in 
memory, it spits out the virtual address to that piece of memory on sysprint 
so that I can easily retrieve it. Calling the assembler routine to peek inside 
that address space from REXX on our test LPAR, works flawlessly. I plug in the 
ASID, the virtual address and the length (main part of my customization 
efforts), and it spits the contents back out to REXX. I'm very happy with this.


I'm very surprised that would work at all, as code within REXX execs does not 
run authorized, and you need to be authorized to do the MODESET and the other 
instructions you've mentioned. How are you invoking that routine from your REXX 
exec? Where does the REXX exec run (TSO session, batch job under IKJEFT01, or ?)

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Scott Ford
All,

See this thread ...Charles this is the one I spoke about...

https://groups.google.com/forum/#!msg/bit.listserv.ibm-main/tR7c3Pi9pFI/tnp_CEFOh-IJ

Regards,
Scott

On Tue, Mar 17, 2015 at 10:52 AM, John McKown john.archie.mck...@gmail.com
wrote:

 On Tue, Mar 17, 2015 at 9:43 AM, Binyamin Dissen
 bdis...@dissensoftware.com wrote:
  Of course, after this snippet the authorized section cannot trust the
 contents
  of any key8 storage.
 

 Yes, I can see how that can be true. Of course, I don't know of a
 _good_ method to ensure memory protection from a rogue program which
 runs in the same address space as a trusted program. That's why z/OS
 UNIX has the concept of a dirty address space and you can get some
 nasty return codes. That could be considered a plus for doing things
 like this using UNIX facilities to fork() a child address space to run
 the untrusted program, and only sharing specific memory pages using
 UNIX share memory facilities or IAZVSERV. But that then goes back to
 the problem of the child needing to access DD statements in the parent
 address space. There are always trade offs. Unless you are willing to
 go whole hog and only use UNIX facilities, including UNIX files
 instead of DDs.

 --
 If you sent twitter messages while exploring, are you on a textpedition?

 He's about as useful as a wax frying pan.

 10 to the 12th power microphones = 1 Megaphone

 Maranatha! 
 John McKown

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMS ACS and TEMP DSN Parsing

2015-03-17 Thread Vernooij, CP (ITOPT1) - KLM
Well, the temp-dsn pattern will probably only change with z/OS releases, so it 
will (only) be another item on that checklist.

Kees.

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Lizette Koehler
Sent: Tuesday, March 17, 2015 3:34 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SMS ACS and TEMP DSN Parsing

Yes, that I understand.  However, I have always been reluctant to set any TEMP 
DSN different than other TEMP DSNs.  But this is a unique case and I am hoping 
this will resolve the issue.

The other issue is the consistency for the temp DSN pattern.  If anything 
changes, this code will no longer work.  (Sigh)

Lizette


 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
 On Behalf Of Greg Shirey
 Sent: Tuesday, March 17, 2015 7:30 AM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: SMS ACS and TEMP DSN Parsing
 
 I don't think there's anything wrong with the logic, but you know that
most
 attributes of a DATACLAS can be overridden.
 
 Greg Shirey
 Ben E. Keith Company
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
 On Behalf Of Lizette Koehler
 Sent: Monday, March 16, 2015 7:02 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: SMS ACS and TEMP DSN Parsing
 
 I am trying to create a process in the Dataclas that will change some 
 of
the
 dataset attributes of on specific Temp DSN.
 
 The DSN comes in with DSTYPE = TEMP
 
 Does anyone know if this will work?  The DSN will look like this:
 SYS15070.T105514.RA000.MYDSN1.R0226931
 
 
 If (DSTYPE = Temp and DSN(4) = 'MYDSN1')
   Then
Do
   Set Dataclas = X
   Write DSN set to X Dataclas
   Exit
End

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Tech Skills Heading the Way of the Dinosaur - 2015 Edition

2015-03-17 Thread Scott Ford
Lizette and Elardus ,

The article I skimmed and will read more later. I agree. Sometimes one
learns bad habits or techniques because of exposure and rush to get things
done .
I suffer from this horrible illness and have been trying to correct it
through questions and research.

Regards,
Scott

On Tue, Mar 17, 2015 at 10:23 AM, Elardus Engelbrecht 
elardus.engelbre...@sita.co.za wrote:

 Lizette Koehler wrote:

 Interesting article that covers both midrange and mainframe platforms

 Indeed. Some of my old skills should be staying in prehistoric times like
 programming in Clarion and Clipper. You've gotta move on, just what that
 article suggests. I had to drop them because of platform development.

 Oh, one thing I think that author forgot was the evolving of viruses,
 Trojans, worms, etc.

 I remember how easy it was to get rid of that bouncing ball virus, today
 you get that stealthy rootkit havoc wreaker which are sometimes impossible
 to get rid of...

 You probably remember those bulliten boards on those home computers like
 Commodore 64 and such? Good days if you can say using those slow unreliable
 modems are 'good'.

 Natural Adabas was the rage some years ago in online jobhunting pages, now
 they're replaced by 1001 other skills in demand...

 One of these times I will tell my grand-grand-children there was something
 like 'Ancient Art of Computing.' (Sorry, Sun Tzu to misquote you...)

 Groete / Greetings
 Elardus Engelbrecht

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Walt Farrell
On Tue, 17 Mar 2015 09:14:56 -0500, John McKown john.archie.mck...@gmail.com 
wrote:

I just had a thought (and it's lonely). You start off APF authorized,
key 8 as a normal APF program. You want to run program B from the
STEPLIB, but without APF authorization. Perhaps the simplest way is to
use SYNCHX something like:

   LOAD EP=B
   ST R0,EPA_B
   MODESET KEY=ZERO
   USING PSA,0
   L  R3,PSATOLD MY TCB
   USING TCB,R3
   L  R3,TCBJSCB GET JSCB ADDRESS
   DROP R3
   ICM R3,B'1000',=X'00' CLEAR HIGH BYTE
   USING IEZJSCB,R3
   NI JSCBOPTS,255-JSCBAUTH NOT APF
   L R15,EPA_B
   SYNCHX (15) INVOKES PROGRAM B IN TCB KEY
   OI JSCBOPTS,JSCBAUTH RESTORE APF AUTHORIZATION
   MODESET KEY=NZERO

The SYNCHX is the magic which allows your code to stay key 0 while
invoking the other program in line in key 8. When the program
returns, your code is still key 0. At which point you restore APF
authorization and continue on.

At which point you have a _major_ system integrity flaw. What about all that 
key 8 storage your APF-authorized program has been using? The program you 
SYNCHX'd to is free to overwrite it. You cannot trust any of it, including the 
initial save area that MVS passed to your program, and where you presumably 
stored the registers on entry (including the return address).

When you go to return to the system it's quite possible that you'll go to an 
address selected by the rogue routine, and it will be running with APF 
authority at that point.

This can only be fully safe if you never have any key 8 storage, or if you copy 
all your key 8 data to a system key area before you invoke the unauthorized 
program, and never use the old key 8 storage again. That would be made a bit 
easier for you if your program was added to the PPT as running in a system key. 
Then your initial save area and everything you GETMAIN would be in that system 
key by default. But if you start out in key 8, you have more work to do.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Shmuel Metz (Seymour J.)
In 1169475919541461.wa.paulgboulderaim@listserv.ua.edu, on
03/16/2015
   at 04:52 PM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu said:

I don't think so; if I were to relink IEBCOPY with AC(1) into an
authorized library, it would work equally well when called from an
unauthorized program.

What did you mean by changing IEBCOPY from AC(1) to AC(0); I took it
to mean not only relinking but changing the code so that it would
work. If you were only talking about changing the AC after the code
was already changed, then the answer is still obvious: the principle
of least privilege.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Walt Farrell
On Tue, 17 Mar 2015 08:40:51 -0500, John McKown john.archie.mck...@gmail.com 
wrote:

On Tue, Mar 17, 2015 at 8:18 AM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
 In 5c91d5e7-95b6-439d-87a7-111003a2f...@comcast.net, on 03/16/2015
at 10:52 PM, Ed Gould edgould1...@comcast.net said:

Legally no but it can be done .

 You can, legally, turn APF off and later turn it off. It should be
 done the way porcupines make love: very carefully.

IMO, it would be easier to just use ATTACHX with the JSCB= pointing to
a copy of the current task's JSCB with the APF bit flipped off. Of
course, the copy really needs to be in subpool 253 (key 0, below the
line). The OP might even want a TASKLIB= if he wants to do a DYNALLOC
to specify the DSNs to be searched, perhaps given in a configuration
file of some sort. OK, likely overkill in this case. Another
interesting parameter might be  SZERO=NO to not share subpool zero to
avoid memory leaks if, as I have seen, the ATTACH'd program doesn't
bother to clean up all its memory because the system will do that
automatically. I've especially noticed this in the past because CLOSE
didn't always free the I/O buffers when a DCB was closed.

That still doesn't protect that APF-authorized program's key 8 storage from 
tampering by the non-authorized program. In other words, all that effort still 
leaves a major integrity hole open. Sharing your APF-authorized environment 
with untrusted code is _not_ simple, and even a complex implementation may not 
make it truly safe.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Walt Farrell
On Tue, 17 Mar 2015 11:19:56 -0400, Tony Harminc t...@harminc.net wrote:

On 17 March 2015 at 10:52, John McKown john.archie.mck...@gmail.com wrote:
 Of course, after this snippet the authorized section cannot trust the 
 contents
 of any key8 storage.


 Yes, I can see how that can be true. Of course, I don't know of a
 _good_ method to ensure memory protection from a rogue program which
 runs in the same address space as a trusted program.

Well there is the key9 scheme (officially
Storage-Protection-Override) that CICS uses. Whether it's hardened
enough to protect against a malicious -- as opposed to possibly
erroneous as the POO puts it --  problem program, I don't know.

It's not. It is intended only to protect from incorrectly coded programs, not 
malicious ones.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread John McKown
On Tue, Mar 17, 2015 at 10:18 AM, Walt Farrell walt.farr...@gmail.com wrote:
 On Tue, 17 Mar 2015 09:14:56 -0500, John McKown 
 john.archie.mck...@gmail.com wrote:

I just had a thought (and it's lonely). You start off APF authorized,
key 8 as a normal APF program. You want to run program B from the
STEPLIB, but without APF authorization. Perhaps the simplest way is to
use SYNCHX something like:

   LOAD EP=B
   ST R0,EPA_B
   MODESET KEY=ZERO
   USING PSA,0
   L  R3,PSATOLD MY TCB
   USING TCB,R3
   L  R3,TCBJSCB GET JSCB ADDRESS
   DROP R3
   ICM R3,B'1000',=X'00' CLEAR HIGH BYTE
   USING IEZJSCB,R3
   NI JSCBOPTS,255-JSCBAUTH NOT APF
   L R15,EPA_B
   SYNCHX (15) INVOKES PROGRAM B IN TCB KEY
   OI JSCBOPTS,JSCBAUTH RESTORE APF AUTHORIZATION
   MODESET KEY=NZERO

The SYNCHX is the magic which allows your code to stay key 0 while
invoking the other program in line in key 8. When the program
returns, your code is still key 0. At which point you restore APF
authorization and continue on.

 At which point you have a _major_ system integrity flaw. What about all that 
 key 8 storage your APF-authorized program has been using? The program you 
 SYNCHX'd to is free to overwrite it. You cannot trust any of it, including 
 the initial save area that MVS passed to your program, and where you 
 presumably stored the registers on entry (including the return address).

 When you go to return to the system it's quite possible that you'll go to an 
 address selected by the rogue routine, and it will be running with APF 
 authority at that point.

 This can only be fully safe if you never have any key 8 storage, or if you 
 copy all your key 8 data to a system key area before you invoke the 
 unauthorized program, and never use the old key 8 storage again. That would 
 be made a bit easier for you if your program was added to the PPT as running 
 in a system key. Then your initial save area and everything you GETMAIN would 
 be in that system key by default. But if you start out in key 8, you have 
 more work to do.


All of the above is very true. But as I understand the original
problem, it is how to run untrusted code in the same address space as
APF authorized code. IMO, this, in and of itself, is a possible?
integrity exposure in z/OS. The only real solution would be to only
run code which you have written or vetted to be safe (assuming you
trust yourself). In the original post, it was running an IBM utility.
But Charles didn't want to trust it enough to simply LINK to it and
allow it to do its thing. What he wanted is what I gave: a way to
temporarily turn off APF authorization, run the other code, then turn
it back on. I, personally, would not do this.

Being a paranoid heretic, I would go the UNIX route and figure out a
way to run the untrusted code in a child process in another address
space by using fork() and, likely, attach_execmvs(). And I again
acknowledge the problems associated with DD statements in this
environment. Too bad that z/OS does not have a easy way, in a UNIX
child process, to have the child process do I/O to DDs allocated in
the parent's address space. Perhaps by scheduling IRBs to a
specialized TCBs in the parent which is set up to do this. Of course,
this would be a massive new facility in DFSMSdfp. I can imagine a DCB
or ACB option which would say the DD for this is in my parent. That
would cause DFP to set things up in the child, and parent, so that the
when the child did I/O to the DCB/ACB, DFP would schedule a routine to
run in the parent to do the actual function (OPEN, CLOSE, READ, WRITE,
???) and pass the associated data back and forth (or use DAS or AR
mode somehow). This would probably be very difficult. Which means
expensive and time consuming. And for little actual need.

 --
 Walt



-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Shmuel Metz (Seymour J.)
In
d3571c7d425590479eb3adb197bfc47b03932...@m4ukex02.intranet.macro4.com,
on 03/17/2015
   at 09:45 AM, Steve Austin steve.aus...@macro4.com said:

any quotes I put around the dsn are ignored

Presumably the command operand of bpxwunix is subject to shell
parsing, for which quotes and apostrophes have special semantics. I
suspect that you need to escape the apostrophes.

Neither have I been able to set NOPREFIX

Can you issue two TSO commands separated by semicolon?
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Walt Farrell
On Mon, 16 Mar 2015 15:05:37 -0500, Paul Gilmartin paulgboul...@aim.com wrote:

When I whined about the (how?) in connection with SMP/E a few years ago,
before I knew even what little I now suspect about the nature of the weakness,
Walt replied with words similar to reasonable caution.  I take that to mean
that whatever flaw, it's (perhaps) susceptible to malicious exploitation, but
highly unlikely to be triggered inadvertently.

Exactly.

It is not specifically that the programs may misbehave, but that the users may 
misbehave. If you trust the users not to misbehave, then you can safely let 
them run the program. If you don't trust them, then you should not let them run 
it.

I do wish that IBM would describe the exact nature of the possible user 
misbehavior. Then folks like Charles would know more about the kind of program 
behavior they need to consider when deciding whether it's safe to invoke a 
program while running APF-authorized. Of course, if the possible user 
misbehavior were described in detail, then the malicious users would also know 
more about how to look for such potentially exploitable situations. That makes 
it difficult to convince everyone to improve that documentation.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Tony Harminc
On 17 March 2015 at 10:52, John McKown john.archie.mck...@gmail.com wrote:
 Of course, after this snippet the authorized section cannot trust the 
 contents
 of any key8 storage.


 Yes, I can see how that can be true. Of course, I don't know of a
 _good_ method to ensure memory protection from a rogue program which
 runs in the same address space as a trusted program.

Well there is the key9 scheme (officially
Storage-Protection-Override) that CICS uses. Whether it's hardened
enough to protect against a malicious -- as opposed to possibly
erroneous as the POO puts it --  problem program, I don't know.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Shmuel Metz (Seymour J.)
In 9542953551899120.wa.m42tomibmmainyahoo@listserv.ua.edu, on
03/16/2015
   at 02:25 PM, Tom Marchant
000a2a8c2020-dmarc-requ...@listserv.ua.edu said:

Furthermore, if it were not designed  to be invoked in an 
authorized environment, it should not be 
included in an APF authorized load library.

Lot's of luck convincing IBM of that.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Paul Gilmartin
On Tue, 17 Mar 2015 23:30:33 -0400, Shmuel Metz (Seymour J.) wrote:

SMP/E has a head start: the DDDEF list could be passed to the child process,

And those allocations that are in the JCL?
 
Are any necessary?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread Shmuel Metz (Seymour J.)
In b08549f0b5dc9644a4b897a29c64751a6640e...@monexch01.na.lzb.hq, on
03/17/2015
   at 04:12 PM, Jerry Criste jerry.cri...@la-z-boy.com said:

KBMS, has been unsupported since 2000, and is critical to the
business. 

Why didn't you replace it while you had time?

Here's some detail pulled from Fault Analyzer: 

It prints an ABEND code without a reason code? That makes the summary
far less usefull.

Thanks in advance for any insight that is provided.

Look at the instructions in AICKBMSE.@MEMALOC and AICKBMSE.@MEMZER0.
My guess is that it's looking at a system control block whose format
has changed. R15 (R12 at entry) seems to be some sort of PLIST and the
first word is bad or at least bytes 5-8[1] of what it points to are
bad.

At this point diagnosis is probably the easy part. Once you know the
problem, fixing it without the source will be expensive, and you don't
have time to find an alternative.

[1] Please excuse me while I retch.

-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread Shmuel Metz (Seymour J.)
In 8873067969180921.wa.m42tomibmmainyahoo@listserv.ua.edu, on
03/17/2015
   at 12:09 PM, Tom Marchant
000a2a8c2020-dmarc-requ...@listserv.ua.edu said:

If that is the case, it is loaded into key zero storage that is 
not retch protected. If that is the case,  you will S0C1 when you 
store into it.

No; that would be S0C4-04, not S0C1. In this case he's getting S0C4-10
on a load. My guess is a control block change, although I wouldn't
rule out Johm's CSVCLOC suggestion. If the problem is CSCBLOC, it's
easy to put a bandage on it.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Shmuel Metz (Seymour J.)
In 0281165305245017.wa.paulgboulderaim@listserv.ua.edu, on
03/17/2015
   at 12:10 PM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu said:

SMP/E has a head start: the DDDEF list could be passed to the child
process,

And those allocations that are in the JCL?
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Shmuel Metz (Seymour J.)
In
caajsdjhnouonkoeeao9-eccqp5obuypxwnhdo5c+v8vzbgd...@mail.gmail.com,
on 03/17/2015
   at 01:01 PM, John McKown john.archie.mck...@gmail.com said:

SVC 3 (EXIT) does not return to R15 in the RSA,

Of course not

but (I think, likely more)

And documented.

Now that I think on it, one could mess up the rogue programs
attempts to modify an RSA

Don't go there. Run in a system key and be done. 

-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


IDC31378I GDG BASE EXTENSION RECORD COUNT IS ZERO, BUT GDG EXTENSION

2015-03-17 Thread Ravi Gaur
Has anybody figure out a way to actively do run some process to identify the 
IDC31378I GDG BASE EXTENSION RECORD COUNT IS ZERO, BUT GDG EXTENSION  
condition in catalog? with gdg base name 

I see with diagnose we do see this message however there's definately a name 
which is needed for the GDG Base which has this problem I see IBM has APAR 
opened however wondering meanwhile if we could have CSI used to identify the 
situation

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IDC31378I GDG BASE EXTENSION RECORD COUNT IS ZERO, BUT GDG EXTENSION

2015-03-17 Thread Lizette Koehler
This will depend on your z/OS Level

I found two APARs that might be of interest

OA44642: IDC31379I DOES NOT LIST THE GDG WITH THE EXTENSION CELL COUNT MISMATCH
DFSMS V21 users affect.
MSGIDC31378I and MSGIDC31379I do not display the GDG BASE name in error,  users 
could not determine which GDG had error, if the catalog contained  more than 
one GDG's.

OA44886: NOT ALL EXTENSION RECORDS FOR A GDG BASE ARE DELETED IF THE EXTENSION 
CELL COUNT IN THE BASE IS WRONG
All users of z/OS 2.1.0 and higher getting message IDC31378I or IDC31379I.  
Code is changed to delete all extension records when DELETE GDG FORCE is issued.

Do either of these help?

Could you post the entire IDC31378I message?

Lizette


 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
 On Behalf Of Ravi Gaur
 Sent: Tuesday, March 17, 2015 9:44 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: IDC31378I GDG BASE EXTENSION RECORD COUNT IS ZERO, BUT GDG
 EXTENSION
 
 Has anybody figure out a way to actively do run some process to identify the
 IDC31378I GDG BASE EXTENSION RECORD COUNT IS ZERO, BUT GDG
 EXTENSION  condition in catalog? with gdg base name
 
 I see with diagnose we do see this message however there's definately a
 name which is needed for the GDG Base which has this problem I see IBM
 has APAR opened however wondering meanwhile if we could have CSI used
 to identify the situation
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMS ACS and TEMP DSN Parsing

2015-03-17 Thread Vernooij, CP (ITOPT1) - KLM
You can test it with the test-mode of ISMF option 7.4.

Kees.


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Lizette Koehler
Sent: 17 March, 2015 1:02
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SMS ACS and TEMP DSN Parsing

I am trying to create a process in the Dataclas that will change some of the
dataset attributes of on specific Temp DSN.

The DSN comes in with DSTYPE = TEMP

Does anyone know if this will work?  The DSN will look like this:
SYS15070.T105514.RA000.MYDSN1.R0226931


If (DSTYPE = Temp and DSN(4) = 'MYDSN1') 
  Then
   Do
  Set Dataclas = X 
  Write DSN set to X Dataclas
  Exit
   End


Thanks 

Lizette

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: HMC Integrated console and JAVA

2015-03-17 Thread Alan Field
Thanks to those who suggested checking for pop-ups etc. 

None of that worked. 

After seeing the post about an open PMR where IBM acknowledged problems with 
JAVA 8 I uninstalled it and went back to JAVA7_21.

Now my integrated console and operating system messages are available again. 

Alan



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread van der Grijn, Bart (B)
The listing indicates the @MEMALOC csect is AMODE 31. The calling program is 
listed as AMODE 24. Assuming the LINK in the first program is to @MEMALOC, it 
seems the contents of R2 at the time of the abend is part of some sort of save 
area passed by the AMODE 24 program, but now interpreted as a 31-bit address. 
The first program has a link-edit date of 1994 where the load module containing 
@MEMALOC has a link-edit date of yesterday. Are you sure the new copy of this 
program has the correct attributes? 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bernd Oppolzer
Sent: Tuesday, March 17, 2015 1:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: S0C4 abend after upgrading to z/OS 1.13

The PSW which is contained in the Fault Analyser Reports shows that
the AMODE at the time of error is 31 (see 99... at the leftmost part of
the instruction address), so the address in R2 is in fact treated as a
31 bit address. But the main task seems to be at RMODE 24 and
was probably AMODE 24. Could it be that the problem is that some
intermediate component switched the AMODE to 31 and didn't switch
it back to 24 on return?

Kind regards

Bernd



Am 17.03.2015 um 18:01 schrieb John McKown:
 The problem is R2: R2:  4F1D6048 (Storage invalid)
 If you have a dump that you can actually look at, see if there is
 something reasonable at 001D6048. Otherwise, you'll need to try to
 backtrack where this value came from. If the data at address  001D6048
 looks reasonable, then you need to figure out how the high order
 byte got set ot x'4F'.

 Well, I know nada about that package. The fact that the CSECT names
 all start with @MEM is suspicious. One question would be what
 release of z/OS did it last run on successfully? And I have two
 entries you could try with _might_ help. But, then again, they might
 not. In the DIAGnn member of PARMLIB, try putting in two lines like:

 VSM USEZOSV1R9RULES(YES)
 CBLOC VIRTUAL24(IHALCCA,IHAPCCA)

 http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/IEA2E2B0/31.6

 and, less likely, in IEASYSnn you might try

 CSCBLOC=BELOW

 I've had really old programs blow up when the CSCB is above the line.
 But this can have a negative impart on the use of common memory below
 the line. Please read up on this.
 http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/iea2e2b0/54.8.14

 The first two can be dynamically adjusted by putting them in a DIAGnn
 member of PARMLIB and the issuing the command: T DIAG=nn
 The latter requires an IPL to change.

 On Tue, Mar 17, 2015 at 11:12 AM, Jerry Criste
 jerry.cri...@la-z-boy.com wrote:
 Hello,

 We are experiencing an S0C4 abend after upgrading to z/OS 1.13.  The 
 application is known as KBMS, has been unsupported since 2000, and is 
 critical to the business.  We are working on a replacement, but full 
 implementation is still several months away.

 We have experienced problems with the application in previous upgrades, but 
 were able to address it by re-linking some of the programs (we do not have 
 the source). Unfortunately that approach is not working this time, so I'm 
 hoping someone can explain what might be happening and possible solutions.

 Thanks in advance for any insight that is provided.

 snip
 Instructions around point of failure:

Offset HexInstruction
-- -- -
   -10 90C8 C01C  STM R12,R8,28(R12)
-C 18FC   LR  R15,R12
-A 41C0 C050  LA  R12,80(,R12)
-6 18EB   LR  R14,R11
-4 5820 F000  L   R2,0(,R15)
 * 5870 2005  L   R7,5(,R2)
+4 D203 F014 7001 MVC 20(4,R15),1(R7)
+A 5860 F004  L   R6,4(,R15)
+E 1876   LR  R7,R6
   +10 4170 0007  LA  R7,7
   +14 1476   NR  R7,R6
   +16 1277   LTR R7,R7

 Program Status Word (PSW) . : 078D2000 9970FB58

 General Purpose Registers:
R0:  0003 (651264 bytes of storage addressable)
R1:  1970FCD8 (Module AICKBMSE CSECT @MEMFREE + X'0')
R2:  4F1D6048 (Storage invalid)
R3:  199DE000 (1069056 bytes of storage addressable)
R4:   (2048 bytes of storage addressable)
R5:  0001 (2047 bytes of storage addressable)
R6:   (2048 bytes of storage addressable)
R7:  0001 (2047 bytes of storage addressable)
R8:  0008 (2040 bytes of storage addressable)
R9:  104D6000 (Storage invalid)
R10: 199C6008 (1167352 bytes of storage addressable)
R11: 1970FB48 (Module AICKBMSE CSECT @MEMALOC + X'0')
R12: 199C86D8 (1157416 bytes of storage addressable)
R13: 9970FE80 (Module AICKBMSE CSECT @MEMZER0 + X'20')
R14: 1970FB48 (Module AICKBMSE CSECT @MEMALOC + X'0')
R15: 199C8688 (1157496 bytes of storage addressable)


 Virtual Storage Map
 AREA 
 

Re: SMS ACS and TEMP DSN Parsing

2015-03-17 Thread Graham Harris
Would checking the DDNAME and/or PROGRAM help?

On 17 March 2015 at 15:10, Vernooij, CP (ITOPT1) - KLM 
kees.verno...@klm.com wrote:

 Well, the temp-dsn pattern will probably only change with z/OS releases,
 so it will (only) be another item on that checklist.

 Kees.

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
 Behalf Of Lizette Koehler
 Sent: Tuesday, March 17, 2015 3:34 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: SMS ACS and TEMP DSN Parsing

 Yes, that I understand.  However, I have always been reluctant to set any
 TEMP DSN different than other TEMP DSNs.  But this is a unique case and I
 am hoping this will resolve the issue.

 The other issue is the consistency for the temp DSN pattern.  If anything
 changes, this code will no longer work.  (Sigh)

 Lizette


  -Original Message-
  From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
  On Behalf Of Greg Shirey
  Sent: Tuesday, March 17, 2015 7:30 AM
  To: IBM-MAIN@LISTSERV.UA.EDU
  Subject: Re: SMS ACS and TEMP DSN Parsing
 
  I don't think there's anything wrong with the logic, but you know that
 most
  attributes of a DATACLAS can be overridden.
 
  Greg Shirey
  Ben E. Keith Company
 
  -Original Message-
  From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
  On Behalf Of Lizette Koehler
  Sent: Monday, March 16, 2015 7:02 PM
  To: IBM-MAIN@LISTSERV.UA.EDU
  Subject: SMS ACS and TEMP DSN Parsing
 
  I am trying to create a process in the Dataclas that will change some
  of
 the
  dataset attributes of on specific Temp DSN.
 
  The DSN comes in with DSTYPE = TEMP
 
  Does anyone know if this will work?  The DSN will look like this:
  SYS15070.T105514.RA000.MYDSN1.R0226931
 
 
  If (DSTYPE = Temp and DSN(4) = 'MYDSN1')
Then
 Do
Set Dataclas = X
Write DSN set to X Dataclas
Exit
 End

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send email
 to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
 
 For information, services and offers, please visit our web site:
 http://www.klm.com. This e-mail and any attachment may contain
 confidential and privileged material intended for the addressee only. If
 you are not the addressee, you are notified that no part of the e-mail or
 any attachment may be disclosed, copied or distributed, and that any other
 action related to this e-mail or attachment is strictly prohibited, and may
 be unlawful. If you have received this e-mail by error, please notify the
 sender immediately by return e-mail, and delete this message.

 Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its
 employees shall not be liable for the incorrect or incomplete transmission
 of this e-mail or any attachments, nor responsible for any delay in receipt.
 Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch
 Airlines) is registered in Amstelveen, The Netherlands, with registered
 number 33014286
 


 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Looking for Miklos Szigetvari

2015-03-17 Thread Chuck Arney
Listers please forgive me for using the list for this purpose but I am
looking to contact Miklos Szigetvari and his email address is now rejected.
Miklos, if you are still monitoring the list would you please email me.  Or,
if anyone else knows a new email address for him that you could share,
please send it to me in a private email.  ch...@arneycomputer.com

Chuck Arney
Arney Computer Systems
Web: http://zosdebug.com
Facebook: http://www.facebook.com/arneycomputer

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Walt Farrell
On Tue, 17 Mar 2015 10:43:14 -0500, John McKown john.archie.mck...@gmail.com 
wrote:

All of the above is very true. But as I understand the original
problem, it is how to run untrusted code in the same address space as
APF authorized code. IMO, this, in and of itself, is a possible?
integrity exposure in z/OS. The only real solution would be to only
run code which you have written or vetted to be safe (assuming you
trust yourself). In the original post, it was running an IBM utility.
But Charles didn't want to trust it enough to simply LINK to it and
allow it to do its thing. What he wanted is what I gave: a way to
temporarily turn off APF authorization, run the other code, then turn
it back on. I, personally, would not do this.

That may be what he asked for, but it's not safe as you suggested it.

The existence of that SMP/E integrity APAR that we've mentioned demonstrates 
that if you want to run authorized, and invoke programs that you didn't write, 
then there is a level of knowledge you need to have about those routines in 
order to be sure it's safe to run them. The alternative is that you design your 
program so it will be safe to run them.

One method is using fork() and execmvs() as you suggest below (snipped) to make 
the program run someplace else, where it won't have your authority and can't 
interfere with you. 

Another is to change the way your authorized program runs. We've mentioned one 
possibility in that area: put the authorized processing in a PC routine, 
establish that PC while you're running authorized, then turn off authorization. 
When you need to perform the authorized function later on, let the PC routine 
do it.

Another design change might be to set your program up so the system invokes it 
in a system key, rather than invoking it in key 8. Then make sure any storage 
you allocate for your own use is also in that system key, and you should be 
safe from any tampering the other program might want to perform. You can then 
turn off JSCBAUTH before invoking the other program, and use SYNCHX to invoke 
it in problem state and a user key, and it won't run with any kind of 
authorization. 

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Walt Farrell
On Tue, 17 Mar 2015 13:28:29 -0500, John McKown john.archie.mck...@gmail.com 
wrote:

On Tue, Mar 17, 2015 at 10:43 AM, John McKown
john.archie.mck...@gmail.com wrote:

 Being a paranoid heretic, I would go the UNIX route and figure out a
 way to run the untrusted code in a child process in another address
 space by using fork() and, likely, attach_execmvs(). And I again
 acknowledge the problems associated with DD statements in this
 environment.

Talking to myself again. But I had another take on the above, for shop
which despise UNIX. Use ASCRE to create the new address space. One
problem is that this uses an INIT routine to initialize the address
space. The documentation for ASCRE does not say anything about
propagating the STEPLIB/JOBLIB, I assume this INIT routine needs to be
in LPA, or dynamically added to LPA. The INIT routine would be passed
the DSNs which make up the STEPLIB/JOBLIB for the task, do  DYNALLOC
on them, OPEN the DD, and use the TASKLIB= option of ATTACHX. It would
also receive the equivalent of the PARM= from a batch job, which it
might need to reformat and pass to the user program.

If some data needs to be shared, put all of it in a single, large,
page boundary GETMAIN'd area and use IAZVSERV to map that between the
two address spaces.

Sure, go ahead and reinvent fork(). Then try to figure out what parts of it you 
got wrong.

Or, guess what: it's a lot easier to simply use fork(), which after all is a 
native z/OS service. You don't _have_ to think of it as being UNIX.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Paul Gilmartin
On Tue, 17 Mar 2015 13:01:42 -0500, John McKown wrote:

SVC 3 (EXIT) does not return to R15 in the RSA, but (I think, likely more) ...

OK.  I had it backwards.  Dredging my memory, I believe the subtask is
entered with R14 pointing to an SVC 3.  And some rogue vendors,
I have heard, modify that R14 in order to front-end SVC 3.  Ugh.

Did I say R15?  I probably should have said R14.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Walt Farrell
On Tue, 17 Mar 2015 17:58:16 +0100, Thomas Berg thomas.b...@swedbank.se wrote:

May an ignorant peek in here... :)

Just as a concept and theoretically; wouldn't a way to secure that the key 8 
storage is untouched is to save a hash of the content in system key area 
(with a random salt) ?  Then just compare the hashes before reusing the key 8 
data.
Of course, this is only feasible if performance is not a problem.  


That does not secure the storage; it merely lets you tell if it has been 
corrupted. And you might have a lot of storage, with complex structure, that 
you need to handle that way.

Still, that approach might be a start, but since it doesn't really solve the 
issue. And there are other issues that it doesn't being to address, so I would 
look for a different approach that actually prevents the unauthorized program 
from interfering with you. 

I've seen too many cases of people designing solutions that they think will 
allow safe intermingling of trusted authorized code with unauthorized code, and 
it often devolves into a game of whack-a-mole. You think of an issue, and 
defend against it. The attacker comes up with an issue you didn't consider, so 
you patch your program to get around that. Then the attacker comes up with 
another attack for you to patch against, and another, and ...   It's best not 
to play that game. You need a design that fully isolates you in the first place.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: accounting packages

2015-03-17 Thread Wayne Bickerdike
CA-Masterpiece is a full blown z/OS accounting package.
Dun  Bradstreet also had the Millennium software. Not sure if still
available.
SAP also cover off financials.
Mincom (now Ventyx) also have an offering (Ellipse).


On Tue, Mar 17, 2015 at 4:08 PM, Timothy Sipples sipp...@sg.ibm.com wrote:

 CA MICS does not address corporate/organizational accounting and financial
 reporting, though.

 The word accounting is important to clarify. My assumption is that the
 question relates to corporate accounting and financial reporting -- the
 stuff a company would report to its shareholders, among other things -- and
 not strictly or even primarily to IT-related accounting. That's a
 reasonable default assumption when confronted with the word accounting.
 My assumption means sales, revenue, profit, expenses, accounts receivable,
 accounts payable, cashflows, asset valuations, taxes, etc. within
 particular departments and across the entire organization. If I'm mistaken,
 if the latter, there are also several solutions on z/OS and/or z/VSE that
 cover IT-related accounting. IBM Tivoli Decision Support for z/OS (and
 Tivoli Usage and Accounting Manager) would be another example in the latter
 category.

 I hope the original poster will clarify.


 
 Timothy Sipples
 IT Architect Executive, Industry Solutions, IBM z Systems, AP/GCG/MEA
 E-Mail: sipp...@sg.ibm.com
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




-- 
Wayne V. Bickerdike

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Steve Austin
I'm using bpxwunix with tsocmd to run an XMIT (see below). This works,
but I've been unable to prevent the TSO PREFIX, being added to dataset
name; any quotes I put around the dsn are ignored. Neither have I been
able to set NOPREFIX. Is there a way to prevent the suffix being added?

 

Thanks

 

Steve

lines.0 = 0 

env.0 = 0   

cmd=/bin/tsocmd XMIT target 'DS(dsn)'  

xrc = bpxwunix(cmd,lines.,out.,var.,env.)   

 


This e-mail message has been scanned and cleared by Postini / Google Message 
Security and the UNICOM Global security systems. This message is for the named 
person's use only. If you receive this message in error, please delete it and 
notify the sender. 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Elardus Engelbrecht
Steve Austin wrote:

I'm using bpxwunix with tsocmd to run an XMIT (see below). This works, but 
I've been unable to prevent the TSO PREFIX, being added to dataset name; any 
quotes I put around the dsn are ignored. Neither have I been able to set 
NOPREFIX. Is there a way to prevent the suffix being added?

Old trap for anyone trying string parsing... I sometimes fall in that trap too. 
;-)

And you can't do a TRACE to see how lines are parsed and resolved... ouch...

cmd=/bin/tsocmd XMIT target 'DS(dsn)'  

Try this (adding a single quote character to the right of ( and to the left of 
) ): 

cmd=/bin/tsocmd XMIT target 'DS('dsn')'  

Note: This is DS, then (, then single quote character, then double quote 
character, then variablename dsn, then double quote, single quote and then ).  
This is so that the datasetname have single quote chars to the left and right, 
all inside the parenthesis.

Something like this after parsing and resolving var names: cmd=/bin/tsocmd 
XMIT xyz 'DS('hlq.mlq.lq')' 

(Double quote outside string and only single quote inside the string.)

A$$uming of course, as you write, the characters from D to ) are both inside 
double and single quote characters.

Geez, I hope I got it right... ;-)

HTH!

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again using Standard ATTACH (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Clement Clarke
For decades, the IBM standard initiator has used a special form of
ATTACH to allow Authorized programs to execute via JCL.  The
replacement JCL and Clist language I invented (Jol - see
www.Oscar-Jol.com) and a more recent set of programs I wrote to allow
Long Parms (3,000 characters) and Symbolic Parameters to be used in
Control Cards (CBT Tape number 839) used the same ATTACH as the IBM
Initiator uses. Thus properly Authorized can execute Authorized, and
non-Aithorized can't do Authorized things.

 Jol was used by Amoco (USA) for decades, as well as Shell Oil, Air
New Zealand and many other companies without a problem using this
special form of ATTACH.  

 You might find it would save time to look at the Source Code and
duplicate it, or use one of my programs as is to execute Authorised
Programs with Long Parmeters, or with control cards created via
standard Symbolic Parameters.  Or use Jol itself.

 See CBT Tape number 839. http://www.cbttape.org/ftp/cbt/CBT839.zip

 Clement Clarke

 Scott Ford wrote:

John, I agree , I understand from a system integrity point of view
why going from ac(0) to ac(1) is dangerous and understand why the
customers ask the questions, boy do I... On Monday, March 16, 2015,
John McKown  wrote:  

Why stay in key 0? You could use another key in1..7 and most system
services will work. But you will need to be careful in updating
storage. ​ You could use something like MVCDK to move bytes from
location to location. But use of register to storage is going to be a
problem. I'm not really suggesting that you do either. But I don't
have a _simple_ solution for you either. ​ On Mar 16, 2015 5:31 PM,
Charles Mills  wrote: 

I don't really know but my logic goes like this: You can only turn
JCSBAUTH back on if you are key 0, otherwise you will S0C4. So you
could set key 0, and then turn JSCBAUTH off, do stuff, and then turn
it back on again -- but if you are going to run for any length 

of 

time doing stuff in key 0 you might just as well leave JSCBAUTH on,
and if on the other hand you are going to go to user key, you are
stuck there once you turn JSCBAUTH off. Does that make sense? Charles
-Original Message- From: IBM Mainframe Discussion List
[mailto:IBM-MAIN@LISTSERV.UA.EDU 

] On 

Behalf Of Scott Ford Sent: Monday, March 16, 2015 3:20 PM To:
IBM-MAIN@LISTSERV.UA.EDU  Subject: Re: IEBCOPYO (was: APF-authorized
...) I have a related question to this very informative thread. Inside
a long running task, i.e.; stc can you turn off APF authorization and
turn back on ? Btw I have customers asked about this.
--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to lists...@listserv.ua.edu  with the message: 

INFO IBM-MAIN 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to lists...@listserv.ua.edu  with the message: INFO IBM-MAIN  

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to listserv@listserv.uaedu with the message: INFO IBM-MAIN   



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread John McKown
On Tue, Mar 17, 2015 at 12:10 PM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu wrote:
snip
 Sigh.  Cf. UNIX, which certainly doesn't let exit() branch to a 
 user-modifiable address.
 A better designed END SVC would branch, not to the R15 in a key 8 RSA, but to 
 a
 caller's address kept in protected storage.

SVC 3 (EXIT) does not return to R15 in the RSA, but (I think, likely
more) (1) makes the previous RB the current RB, (2) releases the
exiting RB's storage, and (3) restores the PSW and registers from the
contents of the now current RB (what was the previous RB at the time
that the SVC 3 was issued).

Now that I think on it, one could mess up the rogue programs
attempts to modify an RSA by deliberately messing up the savearea
chain pointers in the save area pointed to by TCBFSA to defeat forward
save area chaining (perhaps copying the values in that area somewhere
else and setting all 72 bytes to x'00'), setting R13 to some page
boundary GETMAIN'd storage (get 8K and page protect the second 4K
using PGSER), doing the SYNCHX setup previously mentioned, and
restoring the save area chain pointers and restoring the FSA values
after the SYNCHX returns. Of course, this does not stop a rogue from
modifying key 8 storage. It just makes it more difficult to find
something interesting to modify. In fact, if there are critical
areas which are key 8, GETMAIN them on page boundaries in page
multiples and use PGSER to mark them read-only before the SYNCHX and
then read-write afterwards. Again, this is not impossible to get
around. But it adds another level of coding to the rogue program.



 -- gil

-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Tom Marchant
On Tue, 17 Mar 2015 13:01:42 -0500, John McKown john.archie.mck...@gmail.com 
wrote:

On Tue, Mar 17, 2015 at 12:10 PM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu wrote:
snip
 Sigh.  Cf. UNIX, which certainly doesn't let exit() branch to a 
 user-modifiable address.
 A better designed END SVC would branch, not to the R15 in a key 8 RSA, but 
 to a
 caller's address kept in protected storage.

PR.
With BAKR 14,0 on entry

SVC 3 (EXIT) does not return to R15 in the RSA, but 

No, it doesn't; it's the other way around. When the system passes 
control to your program, such as by ATTACH(X), LINK(X) or SYNCH(X), 
register 14 contains the address of CVTEXIT. CVTEXIT is an SVC 3 
instruction.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread Charles Mills
 it is loaded into key zero storage that is not retch protected. If that is 
 the case, you will S0C1 when you store into it.

Which will definitely make it retch.

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Tom Marchant
Sent: Tuesday, March 17, 2015 10:10 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: S0C4 abend after upgrading to z/OS 1.13

On Tue, 17 Mar 2015 16:12:53 +, Jerry Criste wrote:

Hello,

We are experiencing an S0C4 abend after upgrading to z/OS 1.13.

I can't read your Fault Analyzer report because of the formatting.

You didn't say what release of z/OS you were coming from, but one possibility 
is that your code is marked reentrant, but is not really, and is coming from an 
APF authorized library. If that is the case, it is loaded into key zero storage 
that is not retch protected. If that is the case, you will S0C1 when you store 
into it.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread Tom Marchant
On Tue, 17 Mar 2015 10:14:33 -0700, Charles Mills wrote:

 it is loaded into key zero storage that is not retch protected. If that is 
 the case, you will S0C1 when you store into it.

Oops. I meant to write S0C4

-- 
Tom Marchant

Which will definitely make it retch.

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
Behalf Of Tom Marchant
Sent: Tuesday, March 17, 2015 10:10 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: S0C4 abend after upgrading to z/OS 1.13

On Tue, 17 Mar 2015 16:12:53 +, Jerry Criste wrote:

Hello,

We are experiencing an S0C4 abend after upgrading to z/OS 1.13.

I can't read your Fault Analyzer report because of the formatting.

You didn't say what release of z/OS you were coming from, but one possibility 
is that your code is marked reentrant, but is not really, and is coming from 
an APF authorized library. If that is the case, it is loaded into key zero 
storage that is not retch protected. If that is the case, you will S0C1 when 
you store into it.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread Bernd Oppolzer

The PSW which is contained in the Fault Analyser Reports shows that
the AMODE at the time of error is 31 (see 99... at the leftmost part of
the instruction address), so the address in R2 is in fact treated as a
31 bit address. But the main task seems to be at RMODE 24 and
was probably AMODE 24. Could it be that the problem is that some
intermediate component switched the AMODE to 31 and didn't switch
it back to 24 on return?

Kind regards

Bernd



Am 17.03.2015 um 18:01 schrieb John McKown:

The problem is R2: R2:  4F1D6048 (Storage invalid)
If you have a dump that you can actually look at, see if there is
something reasonable at 001D6048. Otherwise, you'll need to try to
backtrack where this value came from. If the data at address  001D6048
looks reasonable, then you need to figure out how the high order
byte got set ot x'4F'.

Well, I know nada about that package. The fact that the CSECT names
all start with @MEM is suspicious. One question would be what
release of z/OS did it last run on successfully? And I have two
entries you could try with _might_ help. But, then again, they might
not. In the DIAGnn member of PARMLIB, try putting in two lines like:

VSM USEZOSV1R9RULES(YES)
CBLOC VIRTUAL24(IHALCCA,IHAPCCA)

http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/IEA2E2B0/31.6

and, less likely, in IEASYSnn you might try

CSCBLOC=BELOW

I've had really old programs blow up when the CSCB is above the line.
But this can have a negative impart on the use of common memory below
the line. Please read up on this.
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/iea2e2b0/54.8.14

The first two can be dynamically adjusted by putting them in a DIAGnn
member of PARMLIB and the issuing the command: T DIAG=nn
The latter requires an IPL to change.

On Tue, Mar 17, 2015 at 11:12 AM, Jerry Criste
jerry.cri...@la-z-boy.com wrote:

Hello,

We are experiencing an S0C4 abend after upgrading to z/OS 1.13.  The 
application is known as KBMS, has been unsupported since 2000, and is critical 
to the business.  We are working on a replacement, but full implementation is 
still several months away.

We have experienced problems with the application in previous upgrades, but 
were able to address it by re-linking some of the programs (we do not have the 
source). Unfortunately that approach is not working this time, so I'm hoping 
someone can explain what might be happening and possible solutions.

Thanks in advance for any insight that is provided.


snip

Instructions around point of failure:

   Offset HexInstruction
   -- -- -
  -10 90C8 C01C  STM R12,R8,28(R12)
   -C 18FC   LR  R15,R12
   -A 41C0 C050  LA  R12,80(,R12)
   -6 18EB   LR  R14,R11
   -4 5820 F000  L   R2,0(,R15)
* 5870 2005  L   R7,5(,R2)
   +4 D203 F014 7001 MVC 20(4,R15),1(R7)
   +A 5860 F004  L   R6,4(,R15)
   +E 1876   LR  R7,R6
  +10 4170 0007  LA  R7,7
  +14 1476   NR  R7,R6
  +16 1277   LTR R7,R7

Program Status Word (PSW) . : 078D2000 9970FB58

General Purpose Registers:
   R0:  0003 (651264 bytes of storage addressable)
   R1:  1970FCD8 (Module AICKBMSE CSECT @MEMFREE + X'0')
   R2:  4F1D6048 (Storage invalid)
   R3:  199DE000 (1069056 bytes of storage addressable)
   R4:   (2048 bytes of storage addressable)
   R5:  0001 (2047 bytes of storage addressable)
   R6:   (2048 bytes of storage addressable)
   R7:  0001 (2047 bytes of storage addressable)
   R8:  0008 (2040 bytes of storage addressable)
   R9:  104D6000 (Storage invalid)
   R10: 199C6008 (1167352 bytes of storage addressable)
   R11: 1970FB48 (Module AICKBMSE CSECT @MEMALOC + X'0')
   R12: 199C86D8 (1157416 bytes of storage addressable)
   R13: 9970FE80 (Module AICKBMSE CSECT @MEMZER0 + X'20')
   R14: 1970FB48 (Module AICKBMSE CSECT @MEMALOC + X'0')
   R15: 199C8688 (1157496 bytes of storage addressable)


Virtual Storage Map
AREA 
ADDRESS SIZE
64-BIT HIGH PRIVATE AREA 0002   8191P
64-BIT SHARED AREA   0200   510T
64-BIT COMMON AREA 01EF8000   
67583.9M
64-BIT LOW PRIVATE AREA  00088000   1948.00G
64-BIT JAVA AREA8000
   30720.0M
--- 2 GIG BOUNDARY ---
EXTENDED PRIVATE AREA1970   
   1641M
EXTENDED COMMON SERVICE AREA (ECSA)09C28000  256864K
EXT MODIFIED LINK PACK AREA (MLPA)09C27000 4K
EXT FIXED LINK PACK AREA (FLPA)   09C24000 

Re: zSeries HMC forcible disconnect issue - anybody seen this one before?

2015-03-17 Thread Don Williams
I opened a PMR and found that IBM is working on a Java 8 issue. They do not
have an ETA for a fix.

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
 On Behalf Of Ambros, Thomas
 Sent: Monday, March 09, 2015 2:56 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: zSeries HMC forcible disconnect issue - anybody seen this one
 before?
 
 Java issue.  Downgrading to version 6 as on old hosts worked around it.
SR
 time...
 
 Thomas Ambros
 zEnterprise Operating Systems
 zEnterprise Systems Management
 518-436-6433
 
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
 On Behalf Of Ed Gould
 Sent: Monday, March 09, 2015 12:48
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: zSeries HMC forcible disconnect issue - anybody seen this one
 before?
 
 Call MS.
 
 Ed
 
 On Mar 9, 2015, at 10:45 AM, Ambros, Thomas wrote:
 
  Remote access to our HMCs is controlled through a 'jump host' we
  access through Citrix in normal circumstances.  I'm experiencing this
  problem when I use Windows Remote Desktop access to that jump host,
  bypassing Citrix, so I believe it is something to do with the Windows
  machine that is the jump host.
 
  This is a new issue after our Windows guys upgraded the jump host to
  Windows Server 2008 R2 Datacenter 6.1.7601, Java Version 8 update 31
  and we're using Internet Explorer version 8.  I'm pretty sure IE is
  unchanged.
 
  The zSeries HMCs are at 2.12.0 and are unchanged, obviously.
 
  The problem is a fairly consistent forcible session disconnect after
  45 seconds.  The HMC log simply reports that it was forcibly
  disconnected with no further details, and I haven't found anything in
  any of Window's logs to indicate what or why it was done.  It's not an
  inactivity timeout, active use of the HMC gets cut off just as a
  session that is not being used.
 
  It appears to be restricted to the zSeries HMC, for example our
  Storage Admin team reports no problems with their TPC-R browser
  sessions through the same jump host.  My next move is to find the Java
  configuration file options and see if there's some mindless default in
  there.
 
  I haven't opened an SR yet, I was throwing it out here in case
  somebody's seen this sort of symptom themselves.  Already raised the
  issue of backing out to our Windows team, if they can't assist in
  diagnostics, but I'd prefer to fix it not really having the time to go
  through the annoyance of reinstall.
 
  Thanks...
 
  Thomas Ambros
  zEnterprise Operating Systems
  zEnterprise Systems Management
  518-436-6433
 
 
 
 
  This communication may contain privileged and/or confidential
  information. It is intended solely for the use of the addressee. If
  you are not the intended recipient, you are strictly prohibited from
  disclosing, copying, distributing or using any of this information. If
  you received this communication in error, please contact the sender
  immediately and destroy the material in its entirety, whether
  electronic or hard copy. This communication may contain nonpublic
  personal information about consumers subject to the restrictions of
  the Gramm-Leach-Bliley Act. You may not directly or indirectly reuse
  or redisclose such information for any purpose other than to provide
  the services for which you are receiving the information.
 
  127 Public Square, Cleveland, OH 44114 If you prefer not to receive
  future e-mail offers for products or services from Key send an e-mail
  to mailto:dnereque...@key.com with 'No Promotional E- mails' in the
  SUBJECT line.
 
 
  --
  For IBM-MAIN subscribe / signoff / archive access instructions, send
  email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send email
to
 lists...@listserv.ua.edu with the message: INFO IBM-MAIN
 
 
 This communication may contain privileged and/or confidential information.
 It is intended solely for the use of the addressee. If you are not the
intended
 recipient, you are strictly prohibited from disclosing, copying,
distributing or
 using any of this information. If you received this communication in
error,
 please contact the sender immediately and destroy the material in its
 entirety, whether electronic or hard copy. This communication may contain
 nonpublic personal information about consumers subject to the restrictions
 of the Gramm-Leach-Bliley Act. You may not directly or indirectly reuse or
 redisclose such information for any purpose other than to provide the
 services for which you are receiving the information.
 
 127 Public Square, Cleveland, OH 44114
 If you prefer not to receive future e-mail offers for products or services
from
 Key
 send an e-mail to mailto:dnereque...@key.com with 'No Promotional E-
 mails' in the
 

Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread John McKown
On Tue, Mar 17, 2015 at 10:43 AM, John McKown
john.archie.mck...@gmail.com wrote:

 Being a paranoid heretic, I would go the UNIX route and figure out a
 way to run the untrusted code in a child process in another address
 space by using fork() and, likely, attach_execmvs(). And I again
 acknowledge the problems associated with DD statements in this
 environment.

Talking to myself again. But I had another take on the above, for shop
which despise UNIX. Use ASCRE to create the new address space. One
problem is that this uses an INIT routine to initialize the address
space. The documentation for ASCRE does not say anything about
propagating the STEPLIB/JOBLIB, I assume this INIT routine needs to be
in LPA, or dynamically added to LPA. The INIT routine would be passed
the DSNs which make up the STEPLIB/JOBLIB for the task, do  DYNALLOC
on them, OPEN the DD, and use the TASKLIB= option of ATTACHX. It would
also receive the equivalent of the PARM= from a batch job, which it
might need to reformat and pass to the user program.

If some data needs to be shared, put all of it in a single, large,
page boundary GETMAIN'd area and use IAZVSERV to map that between the
two address spaces.

The DDs remain a problem.

-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Walt Farrell
On Tue, 17 Mar 2015 13:01:42 -0500, John McKown john.archie.mck...@gmail.com 
wrote:

Now that I think on it, one could mess up the rogue programs
attempts to modify an RSA by deliberately messing up the savearea
chain pointers in the save area pointed to by TCBFSA to defeat forward
save area chaining (perhaps copying the values in that area somewhere
else and setting all 72 bytes to x'00'), setting R13 to some page
boundary GETMAIN'd storage (get 8K and page protect the second 4K
using PGSER), doing the SYNCHX setup previously mentioned, and
restoring the save area chain pointers and restoring the FSA values
after the SYNCHX returns. Of course, this does not stop a rogue from
modifying key 8 storage. It just makes it more difficult to find
something interesting to modify. In fact, if there are critical
areas which are key 8, GETMAIN them on page boundaries in page
multiples and use PGSER to mark them read-only before the SYNCHX and
then read-write afterwards. Again, this is not impossible to get
around. But it adds another level of coding to the rogue program.

But TCBFSA points to one of the more interesting areas for the rogue program to 
modify :)

Yes, you can build in a little more protection by having the main program 
simply issue SVC 3 rather than restoring registers and branching to R14. But 
there are probably lots of other key 8 areas you'd still need to worry about. 
So it's really not a bullet-proof solution.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: HMC Integrated console and JAVA

2015-03-17 Thread Ed Jaffe

On 3/17/2015 12:17 PM, Alan Field wrote:

After seeing the post about an open PMR where IBM acknowledged problems with 
JAVA 8 I uninstalled it and went back to JAVA7_21.

Now my integrated console and operating system messages are available again.


I had the same issue just yesterday. I tried to open a hardware PMH via 
SR, but that didn't work much better.


Like you, backing off to Java 7 solved my issue.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Shmuel Metz (Seymour J.)
In
caajsdjgyexftzmrwu-geynan_9wbojog1jk35qbebr8mfp3...@mail.gmail.com,
on 03/17/2015
   at 09:14 AM, John McKown john.archie.mck...@gmail.com said:

I just had a thought (and it's lonely).

It's not my dog.

Violating system integrity is easy. Safely doing what Charlesv wanted
is much more difficult.

   SYNCHX (15) INVOKES PROGRAM B IN TCB KEY

Still able to walk all over your user key storage and yor subpool 0.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Shmuel Metz (Seymour J.)
In
caajsdjijjgpxfxevytorprbl-qzj7tqphpswo9bw3g_gjje...@mail.gmail.com,
on 03/17/2015
   at 08:53 AM, John McKown john.archie.mck...@gmail.com said:

I think the original design was to allow an type 3 or 4 SVC to 
invoke some used supplied code, and do so in TCB key / problem 
state. And then still be in key 0 / supervisor state when the user 
code returns.

Back in the day access methods were the obvious users and there
weren't all those options we have today.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Remaining Mainframes

2015-03-17 Thread Thomas Kern
I am looking to find any remaining Mainframe systems in the Department 
of Energy?


If you are running one, please let me know who you are.

/Thomas Kern
/On Contract to DOE Headquarters
/301-903-2211

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread John McKown
On Tue, Mar 17, 2015 at 2:04 PM, Walt Farrell walt.farr...@gmail.com wrote:

 But TCBFSA points to one of the more interesting areas for the rogue program 
 to modify :)

That is why you copy the 72 bytes pointed to by it to another area and
zero those 72 bytes while other perhap rogue is running.


 Yes, you can build in a little more protection by having the main program 
 simply issue SVC 3 rather than restoring registers and branching to R14. But 
 there are probably lots of other key 8 areas you'd still need to worry about. 
 So it's really not a bullet-proof solution.


Nope, not bullet-proof. But more bullet-resistant against a person
with poor aim, or something like that. But if the main worry is not
memory corruption, but improper use of APF authorized functions, then
it is pretty good. And now I'm back to hawking my UNIX (or ASCRE)
solution. Best is just to not require the possibly rogue program.

 --
 Walt

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Binyamin Dissen
On Tue, 17 Mar 2015 17:58:16 +0100 Thomas Berg thomas.b...@swedbank.se
wrote:

:  -Original Message-
: From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
Behalf Of
: Walt Farrell
: Sent: Tuesday, March 17, 2015 4:18 PM
: To: IBM-MAIN@LISTSERV.UA.EDU
: Subject: Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: 
APF-authorized
: ...))
: On Tue, 17 Mar 2015 09:14:56 -0500, John McKown 
john.archie.mck...@gmail.com
: wrote:
: 
: The SYNCHX is the magic which allows your code to stay key 0 while
: invoking the other program in line in key 8. When the program
: returns, your code is still key 0. At which point you restore APF
: authorization and continue on.
: 
: At which point you have a _major_ system integrity flaw. What about all 
that key 8 storage your
: APF-authorized program has been using? The program you SYNCHX'd to is free 
to overwrite it.
: You cannot trust any of it, including the initial save area that MVS passed 
to your program, and
: where you presumably stored the registers on entry (including the return 
address).
: 
: When you go to return to the system it's quite possible that you'll go to 
an address selected by
: the rogue routine, and it will be running with APF authority at that point.
: 
: This can only be fully safe if you never have any key 8 storage, or if you 
copy all your key 8 data
: to a system key area before you invoke the unauthorized program, and never 
use the old key 8
: storage again. That would be made a bit easier for you if your program was 
added to the PPT as
: running in a system key. Then your initial save area and everything you 
GETMAIN would be in
: that system key by default. But if you start out in key 8, you have more 
work to do.
:
:May an ignorant peek in here... :)
:
:Just as a concept and theoretically; wouldn't a way to secure that the key 8 
storage is untouched is to save a hash of the content in system key area (with 
a random salt) ?  Then just compare the hashes before reusing the key 8 data.
:Of course, this is only feasible if performance is not a problem.  
:(Not that I'm a knowledgeable person in any of these areas...)

You would have to also make sure no STIMERM's are around (or anything else
that could run as an ASYNC exit.

Of course the AC=1 routine does not need the FSA - it can discard it and
getmain a system key work area.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMS ACS and TEMP DSN Parsing

2015-03-17 Thread Mike Schwab
At our site we use DATACLAS=special to direct a dataset to a specific
storage group.

On Tue, Mar 17, 2015 at 2:37 PM, Graham Harris harris...@gmail.com wrote:
 Would checking the DDNAME and/or PROGRAM help?

 On 17 March 2015 at 15:10, Vernooij, CP (ITOPT1) - KLM 
 kees.verno...@klm.com wrote:

 Well, the temp-dsn pattern will probably only change with z/OS releases,
 so it will (only) be another item on that checklist.

 Kees.

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
 Behalf Of Lizette Koehler
 Sent: Tuesday, March 17, 2015 3:34 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: SMS ACS and TEMP DSN Parsing

 Yes, that I understand.  However, I have always been reluctant to set any
 TEMP DSN different than other TEMP DSNs.  But this is a unique case and I
 am hoping this will resolve the issue.

 The other issue is the consistency for the temp DSN pattern.  If anything
 changes, this code will no longer work.  (Sigh)

 Lizette


  -Original Message-
  From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
  On Behalf Of Greg Shirey
  Sent: Tuesday, March 17, 2015 7:30 AM
  To: IBM-MAIN@LISTSERV.UA.EDU
  Subject: Re: SMS ACS and TEMP DSN Parsing
 
  I don't think there's anything wrong with the logic, but you know that
 most
  attributes of a DATACLAS can be overridden.
 
  Greg Shirey
  Ben E. Keith Company
 
  -Original Message-
  From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
  On Behalf Of Lizette Koehler
  Sent: Monday, March 16, 2015 7:02 PM
  To: IBM-MAIN@LISTSERV.UA.EDU
  Subject: SMS ACS and TEMP DSN Parsing
 
  I am trying to create a process in the Dataclas that will change some
  of
 the
  dataset attributes of on specific Temp DSN.
 
  The DSN comes in with DSTYPE = TEMP
 
  Does anyone know if this will work?  The DSN will look like this:
  SYS15070.T105514.RA000.MYDSN1.R0226931
 
 
  If (DSTYPE = Temp and DSN(4) = 'MYDSN1')
Then
 Do
Set Dataclas = X
Write DSN set to X Dataclas
Exit
 End

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send email
 to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
 
 For information, services and offers, please visit our web site:
 http://www.klm.com. This e-mail and any attachment may contain
 confidential and privileged material intended for the addressee only. If
 you are not the addressee, you are notified that no part of the e-mail or
 any attachment may be disclosed, copied or distributed, and that any other
 action related to this e-mail or attachment is strictly prohibited, and may
 be unlawful. If you have received this e-mail by error, please notify the
 sender immediately by return e-mail, and delete this message.

 Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its
 employees shall not be liable for the incorrect or incomplete transmission
 of this e-mail or any attachments, nor responsible for any delay in receipt.
 Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch
 Airlines) is registered in Amstelveen, The Netherlands, with registered
 number 33014286
 


 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



-- 
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Shmuel Metz (Seymour J.)
In
CAAJSdjgEqM=ny94cfmkafhue_fbtvv7tueaphy8284_2m5u...@mail.gmail.com,
on 03/17/2015
   at 08:40 AM, John McKown john.archie.mck...@gmail.com said:

IMO, it would be easier to just use ATTACHX with the JSCB= pointing
to a copy of the current task's JSCB with the APF bit flipped off.

Why? You still have the same considerations for, e.g., user key
storage.

Another interesting parameter might be  SZERO=NO 

C/interesting/mandatory/
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread John McKown
On Tue, Mar 17, 2015 at 7:06 AM, Steve Austin steve.aus...@macro4.com wrote:
 Thanks Elardus, but however many quotes I insert they are appear to be 
 ignored. I've tried the command from OMVS and get the same result (see below).

 Steve

Example output from an actual UNIX command line prompt (not BPXWUNIX)

LIH1:TSH009:/home/tsh009$
tsocmd xmit lih1.tsh009 ds('sys1.ppoption')
xmit lih1.tsh009 ds('sys1.ppoption')
INMX000I 0 message and 8 data records sent as 113 records to LIH1.TSH009
INMX001I Transmission occurred on 03/17/2015 at 07:43:04.
LIH1:TSH009:/home/tsh009$

Example REXX code, run from a UNIX prompt, which uses tsocmd to run XMIT

LIH1:TSH009:/home/tsh009$
cat ~/bin/do_xmit.rexx
/* REXX */
command=/bin/tsocmd xmit lih1.tsh009 ds('sys1.ppoption') 
say command
call bpxwunix command
LIH1:TSH009:/home/tsh009$

The running of the above

LIH1:TSH009:/home/tsh009$
do_xmit.rexx
/bin/tsocmd xmit lih1.tsh009 ds('sys1.ppoption')
xmit lih1.tsh009 ds('sys1.ppoption')
INMX000I 0 message and 8 data records sent as 113 records to LIH1.TSH009
INMX001I Transmission occurred on 03/17/2015 at 07:54:23.
LIH1:TSH009:/home/tsh009$




-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Steve Austin
Thanks Elardus, but however many quotes I insert they are appear to be ignored. 
I've tried the command from OMVS and get the same result (see below).

Steve


/bin/tsocmd XMIT ZOS113.SA 'DS('SA2.DMXPORT.F5')

£ /bin/tsocmd XMIT ZOS113.SA 'DS('SA2.DMXPORT.F5')' 
XMIT ZOS113.SA DS(SA2.DMXPORT.F5)   
INMX060I TRANSMIT command terminated.  Input dataset unusable + 
INMX061I Allocation failed for dataset 'SA2.SA2.DMXPORT.F5' +   
IKJ56228I DATA SET SA2.SA2.DMXPORT.F5 NOT IN CATALOG OR CATALOG CAN NOT BE ACCES
SED 
£   

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Elardus Engelbrecht
Sent: 17 March 2015 10:40
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: using bpxwunix with tsocmd to run XMIT

Steve Austin wrote:

I'm using bpxwunix with tsocmd to run an XMIT (see below). This works, but 
I've been unable to prevent the TSO PREFIX, being added to dataset name; any 
quotes I put around the dsn are ignored. Neither have I been able to set 
NOPREFIX. Is there a way to prevent the suffix being added?

Old trap for anyone trying string parsing... I sometimes fall in that trap too. 
;-)

And you can't do a TRACE to see how lines are parsed and resolved... ouch...

cmd=/bin/tsocmd XMIT target 'DS(dsn)'  

Try this (adding a single quote character to the right of ( and to the left of 
) ): 

cmd=/bin/tsocmd XMIT target 'DS('dsn')'  

Note: This is DS, then (, then single quote character, then double quote 
character, then variablename dsn, then double quote, single quote and then ).  
This is so that the datasetname have single quote chars to the left and right, 
all inside the parenthesis.

Something like this after parsing and resolving var names: cmd=/bin/tsocmd 
XMIT xyz 'DS('hlq.mlq.lq')' 

(Double quote outside string and only single quote inside the string.)

A$$uming of course, as you write, the characters from D to ) are both inside 
double and single quote characters.

Geez, I hope I got it right... ;-)

HTH!

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This e-mail message has been scanned and cleared by Postini / Google Message 
Security and the UNICOM Global security systems. This message is for the named 
person's use only. If you receive this message in error, please delete it and 
notify the sender. 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Paul Gilmartin
On Tue, 17 Mar 2015 05:39:49 -0500, Elardus Engelbrecht wrote:

Old trap for anyone trying string parsing... I sometimes fall in that trap 
too. ;-)
 
I did, several times, trying to find a solution.

And you can't do a TRACE to see how lines are parsed and resolved... ouch...

trace R helps for Rexx, but not entirely'
set -x works for shell.

cmd=/bin/tsocmd XMIT target 'DS(dsn)'  

Try this (adding a single quote character to the right of ( and to the left of 
) ): 

cmd=/bin/tsocmd XMIT target 'DS('dsn')'  

It's even worse.  I got it to work with:

trace R
lines.0 = 0
cmd = set -x; /bin/tsocmd XMIT target DS('dsn')
xrc = bpxwunix(cmd, 'lines.', /* out. */, /* err. */, /* env., login, 
batch, */ ) 

(I defaulted most of the arguments in order to see the trace immediately.)

The hard one is RECEIVE -- one needs to QUEUE the reply to the prompt.
That's not always possible.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Elardus Engelbrecht
Steve Austin wrote:

Thanks Elardus, but however many quotes I insert they are appear to be 
ignored. I've tried the command from OMVS and get the same result (see below). 
 
So I see after that IKJ message. I assume you do it interactively. 

Replace /bin/tsocmd XMIT ZOS113.SA 'DS('SA2.DMXPORT.F5')'  with

/bin/tsocmd XMIT ZOS113.SA DS('SA2.DMXPORT.F5') 

so, no quotes on DS and its keyword (only quote around datasetname)? 

Alternatively: What if you try DDNAME instead of DSNAME?

If no one can help you on IBM-MAIN, I believe you may encountered a rare 
parsing problem.

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Elardus Engelbrecht
Paul Gilmartin wrote:

And you can't do a TRACE to see how lines are parsed and resolved... ouch...
trace R helps for Rexx, but not entirely'
set -x works for shell.

Thanks. So I found out the hard way...

It's even worse.  I got it to work with:
cmd = set -x; /bin/tsocmd XMIT target DS('dsn')
xrc = bpxwunix(cmd, 'lines.', /* out. */, /* err. */, /* env., login, 
 batch, */ ) 

More, but different types of quotes. Ok, next time I will quote you! ;-)

I believe Steve will use your example successfully.

Thanks Paul for kindly helping out. Much appreciated! You can of course quote 
me on this.

The hard one is RECEIVE -- one needs to QUEUE the reply to the prompt.
That's not always possible.

Of course.

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Steve Austin
/bin/tsocmd XMIT ZOS113.SA DS('SA2.DMXPORT.F5') 

Gives;

£ /bin/tsocmd XMIT ZOS113.SA DS('SA2.DMXPORT.F5') 
FSUM7332 syntax error: got (, expecting Newline   
£

DDNAME is not an option, as ultimately I want this to work using bpwxunix and 
the dataset will not be allocated in the address spaces in which xmit runs.

Regards

Steve  

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Elardus Engelbrecht
Sent: 17 March 2015 12:26
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: using bpxwunix with tsocmd to run XMIT

Steve Austin wrote:

Thanks Elardus, but however many quotes I insert they are appear to be 
ignored. I've tried the command from OMVS and get the same result (see below). 
 
So I see after that IKJ message. I assume you do it interactively. 

Replace /bin/tsocmd XMIT ZOS113.SA 'DS('SA2.DMXPORT.F5')'  with

/bin/tsocmd XMIT ZOS113.SA DS('SA2.DMXPORT.F5') 

so, no quotes on DS and its keyword (only quote around datasetname)? 

Alternatively: What if you try DDNAME instead of DSNAME?

If no one can help you on IBM-MAIN, I believe you may encountered a rare 
parsing problem.

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This e-mail message has been scanned and cleared by Postini / Google Message 
Security and the UNICOM Global security systems. This message is for the named 
person's use only. If you receive this message in error, please delete it and 
notify the sender. 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Steve Austin
Don't quote me, but I now have it working as described.

Thanks for your help!

Steve

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Elardus Engelbrecht
Sent: 17 March 2015 12:37
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: using bpxwunix with tsocmd to run XMIT

Paul Gilmartin wrote:

And you can't do a TRACE to see how lines are parsed and resolved... ouch...
trace R helps for Rexx, but not entirely'
set -x works for shell.

Thanks. So I found out the hard way...

It's even worse.  I got it to work with:
cmd = set -x; /bin/tsocmd XMIT target DS('dsn')
xrc = bpxwunix(cmd, 'lines.', /* out. */, /* err. */, /* env., 
login, batch, */ )

More, but different types of quotes. Ok, next time I will quote you! ;-)

I believe Steve will use your example successfully.

Thanks Paul for kindly helping out. Much appreciated! You can of course quote 
me on this.

The hard one is RECEIVE -- one needs to QUEUE the reply to the prompt.
That's not always possible.

Of course.

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This e-mail message has been scanned and cleared by Postini / Google Message 
Security and the UNICOM Global security systems. This message is for the named 
person's use only. If you receive this message in error, please delete it and 
notify the sender. 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Elardus Engelbrecht
Steve Austin wrote:

Don't quote me, but I now have it working as described. 
Thanks for your help! 

You're most welcome, but I believe Paul should get the credits for helping out.


About quotes, it reminds me of this old school joke:

Teacher: 'Hey, Pete, why are all your answers in quotes?'

Pete: 'Sir, they're not mine, they're coming from my pal next to me.'

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Shmuel Metz (Seymour J.)
In 5c91d5e7-95b6-439d-87a7-111003a2f...@comcast.net, on 03/16/2015
   at 10:52 PM, Ed Gould edgould1...@comcast.net said:

Legally no but it can be done .

You can, legally, turn APF off and later turn it off. It should be
done the way porcupines make love: very carefully.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread John McKown
On Tue, Mar 17, 2015 at 8:18 AM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
 In 5c91d5e7-95b6-439d-87a7-111003a2f...@comcast.net, on 03/16/2015
at 10:52 PM, Ed Gould edgould1...@comcast.net said:

Legally no but it can be done .

 You can, legally, turn APF off and later turn it off. It should be
 done the way porcupines make love: very carefully.

IMO, it would be easier to just use ATTACHX with the JSCB= pointing to
a copy of the current task's JSCB with the APF bit flipped off. Of
course, the copy really needs to be in subpool 253 (key 0, below the
line). The OP might even want a TASKLIB= if he wants to do a DYNALLOC
to specify the DSNs to be searched, perhaps given in a configuration
file of some sort. OK, likely overkill in this case. Another
interesting parameter might be  SZERO=NO to not share subpool zero to
avoid memory leaks if, as I have seen, the ATTACH'd program doesn't
bother to clean up all its memory because the system will do that
automatically. I've especially noticed this in the past because CLOSE
didn't always free the I/O buffers when a DCB was closed.


 --
  Shmuel (Seymour J.) Metz, SysProg and JOAT
  ISO position; see http://patriot.net/~shmuel/resume/brief.html

-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Elardus Engelbrecht
Shmuel Metz (Seymour J.) wrote:

Legally no but it can be done .
You can, legally, turn APF off and later turn it off. 

Turn it off and then again off? Or is there a typo in what you wrote?

It should be done the way porcupines make love: very carefully.

Or if you're male and in a wrong specie, then only ONCE! I rather feign death 
to stay out of trouble... ;-)

http://en.wikipedia.org/wiki/Sexual_cannibalism

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Tech Skills Heading the Way of the Dinosaur - 2015 Edition

2015-03-17 Thread Lizette Koehler
Interesting article that covers both midrange and mainframe platforms

 

http://www.globalknowledge.com/training/generic.asp?pageid=3750
http://www.globalknowledge.com/training/generic.asp?pageid=3750country=Uni
ted+Statesutm_medium=emailutm_source=email
country=United+Statesutm_medium=emailutm_source=email

 

When we learn a concept for the first time, the newness of it tends to
become embedded with the learning process. We remember the new idea's
significance and forever after remember it as new. The initial impact of a
discovery can prevent the concept from aging. At the same time, we realize
how quickly technology advances. Is it time to evolve your expertise?

If any of the following reminiscences ring true to you, have you moved
beyond them? If not, it might be time to make some new discoveries. To
paraphrase the comedian Jeff Foxworthy, You might be a tech dinosaur if ...
.

 

Lizette


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Shmuel Metz (Seymour J.)
In
ca+qm759umgfno+gbxqsgyni1r5uej7dkcdkdzdbnkai...@mail.gmail.com,
on 03/16/2015
   at 07:10 PM, Scott Ford idfzos...@gmail.com said:

I did a quick google on JSCBAUTH and long thread in 2010...very
interesting several people mentioned to SYNC and LINK to perform
authorized calls unless I misunderstood the thread.

The Devil is in the details. SYNC is useful when a dispatching element
is in a privileged state; it has nothing to do with whether the
address space is in a privileged state. Can you quote anything in that
thread to suggest otherwise? If so, it's wrong.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Shmuel Metz (Seymour J.)
In
CA+qM75_YCpXgMjXrqx=hcbif-qhjktvhz7eunmkcej56pxj...@mail.gmail.com,
on 03/16/2015
   at 06:20 PM, Scott Ford idfzos...@gmail.com said:

can you turn off APF authorization and turn back on ?

Easily? Yes. Safely? Only with great care.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread John McKown
On Mon, Mar 16, 2015 at 8:15 PM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
 In
 ca+qm759umgfno+gbxqsgyni1r5uej7dkcdkdzdbnkai...@mail.gmail.com,
 on 03/16/2015
at 07:10 PM, Scott Ford idfzos...@gmail.com said:

I did a quick google on JSCBAUTH and long thread in 2010...very
interesting several people mentioned to SYNC and LINK to perform
authorized calls unless I misunderstood the thread.

 The Devil is in the details. SYNC is useful when a dispatching element
 is in a privileged state; it has nothing to do with whether the
 address space is in a privileged state. Can you quote anything in that
 thread to suggest otherwise? If so, it's wrong.

Right. SYNCH and SYNCHX don't say anything about APF authorization.
There are parameters which can be used by an APF authorized program
which can do things such as changing the PKM (adding new keys in
addition to the TCB key), the PSW key, and PSW problem / supervisor
state. I've only use SYNCH to run a memory-resident piece of code
under a new PRB, not any of the fancy stuff. I think the original
design was to allow an type 3 or 4 SVC to invoke some used supplied
code, and do so in TCB key / problem state. And then still be in key 0
/ supervisor state when the user code returns.


 --
  Shmuel (Seymour J.) Metz, SysProg and JOAT
  ISO position; see http://patriot.net/~shmuel/resume/brief.html
 We don't care. We don't have to care, we're Congress.
 (S877: The Shut up and Eat Your spam act of 2003)

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Shmuel Metz (Seymour J.)
In 2128103613061808.wa.paulgboulderaim@listserv.ua.edu, on
03/17/2015
   at 07:19 AM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu said:

cmd = set -x; /bin/tsocmd XMIT target DS('dsn')

I see it now; your original code had the apostrophes around DS(foo)
instead of just around the dsn.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMS ACS and TEMP DSN Parsing

2015-03-17 Thread Greg Shirey
I don't think there's anything wrong with the logic, but you know that most 
attributes of a DATACLAS can be overridden. 

Greg Shirey
Ben E. Keith Company 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Lizette Koehler
Sent: Monday, March 16, 2015 7:02 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SMS ACS and TEMP DSN Parsing

I am trying to create a process in the Dataclas that will change some of the 
dataset attributes of on specific Temp DSN.

The DSN comes in with DSTYPE = TEMP

Does anyone know if this will work?  The DSN will look like this:
SYS15070.T105514.RA000.MYDSN1.R0226931


If (DSTYPE = Temp and DSN(4) = 'MYDSN1')
  Then
   Do
  Set Dataclas = X 
  Write DSN set to X Dataclas
  Exit
   End

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMS ACS and TEMP DSN Parsing

2015-03-17 Thread Elardus Engelbrecht
Lizette Koehler wrote:

However, I have always been reluctant to set any TEMP DSN different than other 
TEMP DSNs.  

I will also be reluctant.

The other issue is the consistency for the temp DSN pattern.  If anything 
changes, this code will no longer work.  (Sigh)

Can you force them to be not Temp and force them to use an unique HLQ with its 
own RACF profile and Dataclass?

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread John McKown
On Mon, Mar 16, 2015 at 5:31 PM, Charles Mills charl...@mcn.org wrote:
 I don't really know but my logic goes like this:

 You can only turn JCSBAUTH back on if you are key 0, otherwise you will S0C4. 
 So you could set key 0, and then turn JSCBAUTH off, do stuff, and then turn 
 it back on again -- but if you are going to run for any length of time doing 
 stuff in key 0 you might just as well leave JSCBAUTH on, and if on the other 
 hand you are going to go to user key, you are stuck there once you turn 
 JSCBAUTH off.

 Does that make sense?

 Charles

Charles,

I just had a thought (and it's lonely). You start off APF authorized,
key 8 as a normal APF program. You want to run program B from the
STEPLIB, but without APF authorization. Perhaps the simplest way is to
use SYNCHX something like:

   LOAD EP=B
   ST R0,EPA_B
   MODESET KEY=ZERO
   USING PSA,0
   L  R3,PSATOLD MY TCB
   USING TCB,R3
   L  R3,TCBJSCB GET JSCB ADDRESS
   DROP R3
   ICM R3,B'1000',=X'00' CLEAR HIGH BYTE
   USING IEZJSCB,R3
   NI JSCBOPTS,255-JSCBAUTH NOT APF
   L R15,EPA_B
   SYNCHX (15) INVOKES PROGRAM B IN TCB KEY
   OI JSCBOPTS,JSCBAUTH RESTORE APF AUTHORIZATION
   MODESET KEY=NZERO

The SYNCHX is the magic which allows your code to stay key 0 while
invoking the other program in line in key 8. When the program
returns, your code is still key 0. At which point you restore APF
authorization and continue on.



-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Binyamin Dissen
Of course, after this snippet the authorized section cannot trust the contents
of any key8 storage.

On Tue, 17 Mar 2015 09:14:56 -0500 John McKown john.archie.mck...@gmail.com
wrote:

:On Mon, Mar 16, 2015 at 5:31 PM, Charles Mills charl...@mcn.org wrote:
: I don't really know but my logic goes like this:
:
: You can only turn JCSBAUTH back on if you are key 0, otherwise you will 
S0C4. So you could set key 0, and then turn JSCBAUTH off, do stuff, and then 
turn it back on again -- but if you are going to run for any length of time 
doing stuff in key 0 you might just as well leave JSCBAUTH on, and if on the 
other hand you are going to go to user key, you are stuck there once you turn 
JSCBAUTH off.
:
: Does that make sense?
:
: Charles
:
:Charles,
:
:I just had a thought (and it's lonely). You start off APF authorized,
:key 8 as a normal APF program. You want to run program B from the
:STEPLIB, but without APF authorization. Perhaps the simplest way is to
:use SYNCHX something like:
:
:   LOAD EP=B
:   ST R0,EPA_B
:   MODESET KEY=ZERO
:   USING PSA,0
:   L  R3,PSATOLD MY TCB
:   USING TCB,R3
:   L  R3,TCBJSCB GET JSCB ADDRESS
:   DROP R3
:   ICM R3,B'1000',=X'00' CLEAR HIGH BYTE
:   USING IEZJSCB,R3
:   NI JSCBOPTS,255-JSCBAUTH NOT APF
:   L R15,EPA_B
:   SYNCHX (15) INVOKES PROGRAM B IN TCB KEY
:   OI JSCBOPTS,JSCBAUTH RESTORE APF AUTHORIZATION
:   MODESET KEY=NZERO
:
:The SYNCHX is the magic which allows your code to stay key 0 while
:invoking the other program in line in key 8. When the program
:returns, your code is still key 0. At which point you restore APF
:authorization and continue on.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: using bpxwunix with tsocmd to run XMIT

2015-03-17 Thread Paul Gilmartin
On Tue, 17 Mar 2015 09:27:53 -0400, Shmuel Metz (Seymour J.)  wrote:

 on 03/17/2015  at 07:19 AM, Paul Gilmartin said:

cmd = set -x; /bin/tsocmd XMIT target DS('dsn')

I see it now; your original code had the apostrophes around DS(foo)
instead of just around the dsn.
 
And the parentheses need to be protected from the shell, and if dsn mentions
a PDS member more parentheses need to be protected.

I sometimes post Rexx examples untested (with apologia).  This one I tested.

One might wonder, Why was OP doing it this (Byzantine) way?

One plausible answer:  This is the simplest (only?) form that works in all of:

o TSO TMP
o shell
o IRXJCL

I keep a UNIX directory in my SYSEXEC.  Unsupported; IBM told me so when
I submitted an ETR.  But it mostly works except for a few program checks,
always when a command successfully completes, and never more than once
per ISPF session.  I endure those, rather  than replicate EXECs in PDS and
UNIX directories.  Substance for a SER here, perhaps.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMS ACS and TEMP DSN Parsing

2015-03-17 Thread Lizette Koehler
Yes, that I understand.  However, I have always been reluctant to set any
TEMP DSN different than other TEMP DSNs.  But this is a unique case and I am
hoping this will resolve the issue.

The other issue is the consistency for the temp DSN pattern.  If anything
changes, this code will no longer work.  (Sigh)

Lizette


 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
 On Behalf Of Greg Shirey
 Sent: Tuesday, March 17, 2015 7:30 AM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: SMS ACS and TEMP DSN Parsing
 
 I don't think there's anything wrong with the logic, but you know that
most
 attributes of a DATACLAS can be overridden.
 
 Greg Shirey
 Ben E. Keith Company
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
 On Behalf Of Lizette Koehler
 Sent: Monday, March 16, 2015 7:02 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: SMS ACS and TEMP DSN Parsing
 
 I am trying to create a process in the Dataclas that will change some of
the
 dataset attributes of on specific Temp DSN.
 
 The DSN comes in with DSTYPE = TEMP
 
 Does anyone know if this will work?  The DSN will look like this:
 SYS15070.T105514.RA000.MYDSN1.R0226931
 
 
 If (DSTYPE = Temp and DSN(4) = 'MYDSN1')
   Then
Do
   Set Dataclas = X
   Write DSN set to X Dataclas
   Exit
End

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Tech Skills Heading the Way of the Dinosaur - 2015 Edition

2015-03-17 Thread Elardus Engelbrecht
Lizette Koehler wrote:

Interesting article that covers both midrange and mainframe platforms

Indeed. Some of my old skills should be staying in prehistoric times like 
programming in Clarion and Clipper. You've gotta move on, just what that 
article suggests. I had to drop them because of platform development.

Oh, one thing I think that author forgot was the evolving of viruses, Trojans, 
worms, etc.

I remember how easy it was to get rid of that bouncing ball virus, today you 
get that stealthy rootkit havoc wreaker which are sometimes impossible to get 
rid of...

You probably remember those bulliten boards on those home computers like 
Commodore 64 and such? Good days if you can say using those slow unreliable 
modems are 'good'. 

Natural Adabas was the rage some years ago in online jobhunting pages, now 
they're replaced by 1001 other skills in demand...

One of these times I will tell my grand-grand-children there was something like 
'Ancient Art of Computing.' (Sorry, Sun Tzu to misquote you...)

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Charles Mills
Thanks.

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of John McKown
Sent: Tuesday, March 17, 2015 7:15 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: 
APF-authorized ...))

On Mon, Mar 16, 2015 at 5:31 PM, Charles Mills charl...@mcn.org wrote:
 I don't really know but my logic goes like this:

 You can only turn JCSBAUTH back on if you are key 0, otherwise you will S0C4. 
 So you could set key 0, and then turn JSCBAUTH off, do stuff, and then turn 
 it back on again -- but if you are going to run for any length of time doing 
 stuff in key 0 you might just as well leave JSCBAUTH on, and if on the other 
 hand you are going to go to user key, you are stuck there once you turn 
 JSCBAUTH off.

 Does that make sense?

 Charles

Charles,

I just had a thought (and it's lonely). You start off APF authorized, key 8 as 
a normal APF program. You want to run program B from the STEPLIB, but 
without APF authorization. Perhaps the simplest way is to use SYNCHX something 
like:

   LOAD EP=B
   ST R0,EPA_B
   MODESET KEY=ZERO
   USING PSA,0
   L  R3,PSATOLD MY TCB
   USING TCB,R3
   L  R3,TCBJSCB GET JSCB ADDRESS
   DROP R3
   ICM R3,B'1000',=X'00' CLEAR HIGH BYTE
   USING IEZJSCB,R3
   NI JSCBOPTS,255-JSCBAUTH NOT APF
   L R15,EPA_B
   SYNCHX (15) INVOKES PROGRAM B IN TCB KEY
   OI JSCBOPTS,JSCBAUTH RESTORE APF AUTHORIZATION
   MODESET KEY=NZERO

The SYNCHX is the magic which allows your code to stay key 0 while invoking the 
other program in line in key 8. When the program returns, your code is still 
key 0. At which point you restore APF authorization and continue on.



--
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMS ACS and TEMP DSN Parsing

2015-03-17 Thread Vernooij, CP (ITOPT1) - KLM
Overriding DC space can be prevented by the 'override space' attribute (yes/no).

Kees.

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Greg Shirey
Sent: Tuesday, March 17, 2015 3:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SMS ACS and TEMP DSN Parsing

I don't think there's anything wrong with the logic, but you know that most 
attributes of a DATACLAS can be overridden. 

Greg Shirey
Ben E. Keith Company 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Lizette Koehler
Sent: Monday, March 16, 2015 7:02 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SMS ACS and TEMP DSN Parsing

I am trying to create a process in the Dataclas that will change some of the 
dataset attributes of on specific Temp DSN.

The DSN comes in with DSTYPE = TEMP

Does anyone know if this will work?  The DSN will look like this:
SYS15070.T105514.RA000.MYDSN1.R0226931


If (DSTYPE = Temp and DSN(4) = 'MYDSN1')
  Then
   Do
  Set Dataclas = X 
  Write DSN set to X Dataclas
  Exit
   End

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread John McKown
On Tue, Mar 17, 2015 at 9:43 AM, Binyamin Dissen
bdis...@dissensoftware.com wrote:
 Of course, after this snippet the authorized section cannot trust the contents
 of any key8 storage.


Yes, I can see how that can be true. Of course, I don't know of a
_good_ method to ensure memory protection from a rogue program which
runs in the same address space as a trusted program. That's why z/OS
UNIX has the concept of a dirty address space and you can get some
nasty return codes. That could be considered a plus for doing things
like this using UNIX facilities to fork() a child address space to run
the untrusted program, and only sharing specific memory pages using
UNIX share memory facilities or IAZVSERV. But that then goes back to
the problem of the child needing to access DD statements in the parent
address space. There are always trade offs. Unless you are willing to
go whole hog and only use UNIX facilities, including UNIX files
instead of DDs.

-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread Jerry Criste
Hello,

We are experiencing an S0C4 abend after upgrading to z/OS 1.13.  The 
application is known as KBMS, has been unsupported since 2000, and is critical 
to the business.  We are working on a replacement, but full implementation is 
still several months away.

We have experienced problems with the application in previous upgrades, but 
were able to address it by re-linking some of the programs (we do not have the 
source). Unfortunately that approach is not working this time, so I'm hoping 
someone can explain what might be happening and possible solutions.

Thanks in advance for any insight that is provided.

Here's some detail pulled from Fault Analyzer: (note, only copied events 1-9, 
10-128 are recurrences of 6-9)

Event

Fail

Module

Program

EP

#

Type

Point

Name

Name

Name

Event Location (*)

Description

--

--

--

-







--



1

Link

AICVTASK

AICVTASK

ICVTASK

E+20C

From SYSTEMS.KBSSKBMS.LOAD.ZOS113

2

Abend

S0C4

*

AICKBMSE

@MEMALOC

n/a

P+10

From SYSTEMS.KBSSKBMS.LOAD.ZOS113

3

SVC 12

IGC0101C

n/a

n/a

M+844E

From LPA

4

Link

KBESTAE

KBESTAE

n/a

P+220

From SYSTEMS.KBSSKBMS.LOAD.ZOS113

5

Call

KBESTAEM

KBESTAEM

BESTAEM

E+102A

From SYSTEMS.KBSSKBMS.LOAD.ZOS113

6

Abend

S0C4

AICVMISC

AICVMISC

n/a

P+C36

From SYSTEMS.KBSSKBMS.LOAD.ZOS113

7

SVC 12

IGC0101C

n/a

n/a

M+844E

From LPA

8

Call

AICKBMS3

AICKBMS3

n/a

P+276

From SYSTEMS.KBSSKBMS.LOAD.ZOS113

9

Call

KBESTAEM

KBESTAEM

BESTAEM

E+102A

From SYSTEMS.KBSSKBMS.LOAD.ZOS113

(*) One or more of the following abbreviations might appear in the Event
Location column:

F#n  Source file number (refer to detailed event information for file
 identification)
L#n  Source file line number
S#n  Listing file statement number (refer to detailed event information for
 file identification)
M+x  Offset from start of load module
P+x  Offset from start of program
E+x  Offset from start of entry point

- H1 I B M   F A U L T   A N A L Y Z E R   E V E N T   D E T A I L S



- H2 EVENT 1 OF 128: LINK (DSA ADDRESS 00083558)

NOTE: Source code information for CSECT AICVTASK could not be presented because
  no compiler listing or side-file data sets were provided.

Load Module Name. . . . . . : SYSTEMS.KBSSKBMS.LOAD.ZOS113(AICVTASK)
  At Address. . . . . . . . : 00054DF0
  Load Module Length. . . . : X'1210'
  Link-Edit Date and Time . : 1994/12/14  00:00:00

CSECT Name. . . . . . . . . : AICVTASK
  At Address. . . . . . . . : 00054DF0 (Module AICVTASK offset X'0')
  CSECT Length. . . . . . . : X'120C'
  CSECT Language. . . . . . : Assembler (Compiled using Assembler H V2 R1 M0 on
  1992/01/21)
  Entry Point Name. . . . . : ICVTASK
At Address. . . . . . . : 00054DF0 (CSECT AICVTASK offset X'0')

Machine Instruction . . . . : 0A06  SVC 6 (LINK LINKX)
  At Address. . . . . . . . : 00054FFC (CSECT AICVTASK offset X'20C')
  AMODE . . . . . . . . . . : 24

Additional instructions around event offset:
Offset HexInstruction
 -- -- --
-30 47E0 C3A6  BC  14,934(,R12)
-2C 5810 70DC  L   R1,220(,R7)
-28 5010 8000  ST  R1,0(,R8)
-24 4110 8000  LA  R1,0(,R8)
-20 9680 1000  OI  0(R1),128
-1C 47F0 C1F4  BC  15,500(,R12)
-18 D20B 8074 9154 MVC 116(12,R8),340(R9)
-12 900C D014  STM R0,R12,20(R13)
 -E 1811   LR  R1,R1
 -C 41F0 8074  LA  R15,116(,R8)
 -8 4100 5020  LA  R0,32(,R5)
 -4 5000 F000  ST  R0,0(,R15)
  * 0A06   SVC 6(LINK LINKX)
 +2 58D0 021C  L   R13,540
 +6 58DD 0070  L   R13,112(R13)
 +A 58DD 0008  L   R13,8(R13)
 +E 980C D014  LM  R0,R12,20(R13)
 +12 12FF   LTR R15,R15
 +14 4770 C22C  BC  7,556(,R12)
 +18 5810 021C  L   R1,540

Program Status Word (PSW) . : 078D3000 00054FFE

General Purpose Registers:
  R0:  00067F20 (422112 bytes of storage addressable)
  R1:  000815E0 (317984 bytes of storage addressable)
  R2:  00055A88 (Module AICVTASK CSECT AICVTASK + X'C98')
  R3:  000815E0 (317984 bytes of storage addressable)
  R4:  00067F00 (422144 bytes of storage addressable)
  R5:  00067F00 (422144 bytes of storage addressable)
  R6:  000817A8 (317528 bytes of storage addressable)
  R7:  000815E0 (317984 bytes of storage addressable)
  R8:  000835A8 (309848 bytes of storage addressable)
  R9:  00055DF0 (Module AICVTASK CSECT AICVTASK + X'1000')
  R10: 00013000 (20480 bytes of storage addressable)
  R11: 00083728 (309464 bytes of storage addressable)
  R12: 00054DF0 (Module AICVTASK CSECT AICVTASK + X'0')
  R13: 00083558 (309928 bytes of storage 

Re: S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread John McKown
The problem is R2: R2:  4F1D6048 (Storage invalid)
If you have a dump that you can actually look at, see if there is
something reasonable at 001D6048. Otherwise, you'll need to try to
backtrack where this value came from. If the data at address  001D6048
looks reasonable, then you need to figure out how the high order
byte got set ot x'4F'.

Well, I know nada about that package. The fact that the CSECT names
all start with @MEM is suspicious. One question would be what
release of z/OS did it last run on successfully? And I have two
entries you could try with _might_ help. But, then again, they might
not. In the DIAGnn member of PARMLIB, try putting in two lines like:

VSM USEZOSV1R9RULES(YES)
CBLOC VIRTUAL24(IHALCCA,IHAPCCA)

http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/IEA2E2B0/31.6

and, less likely, in IEASYSnn you might try

CSCBLOC=BELOW

I've had really old programs blow up when the CSCB is above the line.
But this can have a negative impart on the use of common memory below
the line. Please read up on this.
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/iea2e2b0/54.8.14

The first two can be dynamically adjusted by putting them in a DIAGnn
member of PARMLIB and the issuing the command: T DIAG=nn
The latter requires an IPL to change.

On Tue, Mar 17, 2015 at 11:12 AM, Jerry Criste
jerry.cri...@la-z-boy.com wrote:
 Hello,

 We are experiencing an S0C4 abend after upgrading to z/OS 1.13.  The 
 application is known as KBMS, has been unsupported since 2000, and is 
 critical to the business.  We are working on a replacement, but full 
 implementation is still several months away.

 We have experienced problems with the application in previous upgrades, but 
 were able to address it by re-linking some of the programs (we do not have 
 the source). Unfortunately that approach is not working this time, so I'm 
 hoping someone can explain what might be happening and possible solutions.

 Thanks in advance for any insight that is provided.

snip
 Instructions around point of failure:

   Offset HexInstruction
   -- -- -
  -10 90C8 C01C  STM R12,R8,28(R12)
   -C 18FC   LR  R15,R12
   -A 41C0 C050  LA  R12,80(,R12)
   -6 18EB   LR  R14,R11
   -4 5820 F000  L   R2,0(,R15)
* 5870 2005  L   R7,5(,R2)
   +4 D203 F014 7001 MVC 20(4,R15),1(R7)
   +A 5860 F004  L   R6,4(,R15)
   +E 1876   LR  R7,R6
  +10 4170 0007  LA  R7,7
  +14 1476   NR  R7,R6
  +16 1277   LTR R7,R7

 Program Status Word (PSW) . : 078D2000 9970FB58

 General Purpose Registers:
   R0:  0003 (651264 bytes of storage addressable)
   R1:  1970FCD8 (Module AICKBMSE CSECT @MEMFREE + X'0')
   R2:  4F1D6048 (Storage invalid)
   R3:  199DE000 (1069056 bytes of storage addressable)
   R4:   (2048 bytes of storage addressable)
   R5:  0001 (2047 bytes of storage addressable)
   R6:   (2048 bytes of storage addressable)
   R7:  0001 (2047 bytes of storage addressable)
   R8:  0008 (2040 bytes of storage addressable)
   R9:  104D6000 (Storage invalid)
   R10: 199C6008 (1167352 bytes of storage addressable)
   R11: 1970FB48 (Module AICKBMSE CSECT @MEMALOC + X'0')
   R12: 199C86D8 (1157416 bytes of storage addressable)
   R13: 9970FE80 (Module AICKBMSE CSECT @MEMZER0 + X'20')
   R14: 1970FB48 (Module AICKBMSE CSECT @MEMALOC + X'0')
   R15: 199C8688 (1157496 bytes of storage addressable)


 Virtual Storage Map
 AREA 
 ADDRESS SIZE
 64-BIT HIGH PRIVATE AREA 0002   8191P
 64-BIT SHARED AREA   0200   
 510T
 64-BIT COMMON AREA 01EF8000   
 67583.9M
 64-BIT LOW PRIVATE AREA  00088000   
 1948.00G
 64-BIT JAVA AREA8000  
  30720.0M
 --- 2 GIG BOUNDARY ---
 EXTENDED PRIVATE AREA1970 
  1641M
 EXTENDED COMMON SERVICE AREA (ECSA)09C28000  256864K
 EXT MODIFIED LINK PACK AREA (MLPA)09C27000 4K
 EXT FIXED LINK PACK AREA (FLPA)   09C24000
 12K
 EXT PAGEABLE LINK PACK AREA (PLPA) 05848000 69488K
 EXTENDED SYSTEM QUEUE AREA (ESQA)   01B1 62688K
 EXTENDED NUCLEUS  
 0100 11328K
 -- 16 MEG BOUNDARY ---
 NUCLEUS   
   00FD3000   180K
 SYSTEM QUEUE AREA (SQA)   

Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: APF-authorized ...))

2015-03-17 Thread Thomas Berg
  -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
 Behalf Of
 Walt Farrell
 Sent: Tuesday, March 17, 2015 4:18 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: Turning JSCBAUTH off and back on again (Was: IEBCOPYO (was: 
 APF-authorized
 ...))
 On Tue, 17 Mar 2015 09:14:56 -0500, John McKown john.archie.mck...@gmail.com
 wrote:
 
 The SYNCHX is the magic which allows your code to stay key 0 while
 invoking the other program in line in key 8. When the program
 returns, your code is still key 0. At which point you restore APF
 authorization and continue on.
 
 At which point you have a _major_ system integrity flaw. What about all that 
 key 8 storage your
 APF-authorized program has been using? The program you SYNCHX'd to is free to 
 overwrite it.
 You cannot trust any of it, including the initial save area that MVS passed 
 to your program, and
 where you presumably stored the registers on entry (including the return 
 address).
 
 When you go to return to the system it's quite possible that you'll go to an 
 address selected by
 the rogue routine, and it will be running with APF authority at that point.
 
 This can only be fully safe if you never have any key 8 storage, or if you 
 copy all your key 8 data
 to a system key area before you invoke the unauthorized program, and never 
 use the old key 8
 storage again. That would be made a bit easier for you if your program was 
 added to the PPT as
 running in a system key. Then your initial save area and everything you 
 GETMAIN would be in
 that system key by default. But if you start out in key 8, you have more work 
 to do.

May an ignorant peek in here... :)

Just as a concept and theoretically; wouldn't a way to secure that the key 8 
storage is untouched is to save a hash of the content in system key area (with 
a random salt) ?  Then just compare the hashes before reusing the key 8 data.
Of course, this is only feasible if performance is not a problem.  
(Not that I'm a knowledgeable person in any of these areas...)



Best Regards,
Thomas Berg
___ 
Thomas Berg   Specialist   zOS/RQM/IT Delivery   Swedbank AB (Publ)


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0C4 abend after upgrading to z/OS 1.13

2015-03-17 Thread Tom Marchant
On Tue, 17 Mar 2015 16:12:53 +, Jerry Criste wrote:

Hello,

We are experiencing an S0C4 abend after upgrading to z/OS 1.13.

I can't read your Fault Analyzer report because of the formatting.

You didn't say what release of z/OS you were coming from, but one 
possibility is that your code is marked reentrant, but is not really, and 
is coming from an APF authorized library. If that is the case, it is loaded 
into key zero storage that is not retch protected. If that is the case, 
you will S0C1 when you store into it.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IEBCOPYO (was: APF-authorized ...)

2015-03-17 Thread Paul Gilmartin
On Tue, 17 Mar 2015 10:07:37 -0500, Walt Farrell walt.farr...@gmail.com wrote:

It is not specifically that the programs may misbehave, but that the users may 
misbehave. If you trust the users not to misbehave, then you can safely let 
them run the program. If you don't trust them, then you should not let them 
run it.
 
Clarification:  ... should not let them run it *in*a*privileged*state*.  I 
like John M's
idea of running subtasks in separate address spaces, fork() or BPX1EXM.  He 
mentioned
the complications.  SMP/E has a head start: the DDDEF list could be passed to 
the child
process, and it could perform the allocations.  (Not so)SMOP.

I do wish that IBM would describe the exact nature of the possible user 
misbehavior. Then folks like Charles would know more about the kind of program 
behavior they need to consider when deciding whether it's safe to invoke a 
program while running APF-authorized. Of course, if the possible user 
misbehavior were described in detail, then the malicious users would also know 
more about how to look for such potentially exploitable situations. That makes 
it difficult to convince everyone to improve that documentation.

Nowadays, if I specify NOWAIT on all my DDDEFs, I believe (not rigorously 
tested)
I can run SMP/E unauthorized.  It would be a favor to me if SMP/E, when it runs
unauthorized, did not enforce the RACF checks.  I suspect this would not be 
widely
beneficial.  And other programmers might need the utilities to run authorized 
anyway.


On Tue, 17 Mar 2015 10:18:26 -0500, Walt Farrell walt.farr...@gmail.com wrote:
...
When you go to return to the system it's quite possible that you'll go to an 
address selected by the rogue routine, and it will be running with APF 
authority at that point.

Sigh.  Cf. UNIX, which certainly doesn't let exit() branch to a user-modifiable 
address.
A better designed END SVC would branch, not to the R15 in a key 8 RSA, but to a
caller's address kept in protected storage.

This can only be fully safe if you never have any key 8 storage, or if you 
copy all your key 8 data to a system key area before you invoke the 
unauthorized program, and never use the old key 8 storage again. That would be 
made a bit easier for you if your program was added to the PPT as running in a 
system key. Then your initial save area and everything you GETMAIN would be in 
that system key by default. But if you start out in key 8, you have more work 
to do.
 
For a modest start, I can naively wonder why, by default, authorized programs 
don't
start in a system key?  Oops! would the STM on entry S0C4?  Than could be fixed 
by
copying the RSA to that system key and addressing that with R13.

I suppose all the conventions were established before there was any such thing 
as
a nonzero system key.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN