Re: SYSPLEX JES2 SYSLOG processing
Hey Paul - Do you get any interesting results from the NetView command line (you may need to enter INPUT 2 to get more room) if you issue: WINDOW PIPE CC 5 $DS'SYSLOG'|TOS LAST "$HASP890"|SEP|EDIT "CB" COLOR 1.*|CONS ONLY If you do, hope is not lost. On Thu, Jan 4, 2024 at 12:31 PM Paul Gorlinsky wrote: > On a z/OS 2.5 system using z System Automation V4.3, I am trying to set a > daily event that runs on each LPAR of the SYSPLEX. > > The event needs to issue a 'W L' then locate the SYSLOG output for that > specific LPAR, start an XWTR with job selection for class and JOBID... > > For example, > 'S XWTR.XWTR,END=IEF176I' > 'F XWTR.XWTR,CLASS=L,JOBID=STC08984' > > Where STC08984 is the result of parsing a JES2 $DS'SYSLOG' command > > LPR1 2024002 02:01:00:45 STC08984 $HASP890 JOB(SYSLOG) > >$HASP890 JOB(SYSLOG) > STATUS=(EXECUTING/LPR1),CLASS=STC, >$HASP890 > PRIORITY=15,SYSAFF=(LPR1),HOLD=(NONE) > LPR1 2024002 02:01:00:45 STC09720 $HASP890 JOB(SYSLOG) > >$HASP890 JOB(SYSLOG) > STATUS=(EXECUTING/LPR2),CLASS=STC, >$HASP890 > PRIORITY=15,SYSAFF=(LPR2),HOLD=(NONE) > LPR1 2024002 02:01:00:45 STC06274 $HASP890 JOB(SYSLOG) > >$HASP890 JOB(SYSLOG) > STATUS=(EXECUTING/LPR3),CLASS=STC, >$HASP890 > PRIORITY=15,SYSAFF=(LPR3),HOLD=(NONE) > LPR1 2024002 02:01:00:45 STC09125 $HASP890 JOB(SYSLOG) > >$HASP890 JOB(SYSLOG) > STATUS=(EXECUTING/LPR4),CLASS=STC, >$HASP890 > PRIORITY=15,SYSAFF=(LPR4),HOLD=(NONE) > LPR1 2024002 02:01:00:45 STC03207 $HASP890 JOB(SYSLOG) > >$HASP890 JOB(SYSLOG) > STATUS=(EXECUTING/LPR5),CLASS=STC, >$HASP890 > PRIORITY=15,SYSAFF=(LPR5),HOLD=(NONE) > > I have tried using a PIPE command without success... > > Any ideas? > > Thanks > Paul > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LE C growing heap issue
I had similar situations a lot of times at different customers' locations. It always turned out that when the developers at the customer's site telled me that they returned all the storage requested to the heap, in fact they didn't. There was always a small area left which was not returned or freed. This area was then responsible for the growing heap on every call. What I did to diagnose the problem has already been done here, as far as I can see. The most interesting tool is the alternate heap manager (CEL4MCHK, IIRC), which allows you to track all memory allocations and frees, and it even tells you the stack trace at the place when the allocations have been done. I then wrote a procedure (REXX, IIRC), which processed the output of CEL4MCHK, just to see if there is a certain pattern in the areas which remain allocated. For example: I do exactly 1000 requests and then I look for areas which remain allocated (of a certain size) and are present in the list 1000 times (or a multiple of 1000 times). Then I do the same 2000 times, and look, if I have the same area 2000 times, and so on. (There is no need, BTW, to run the tests until all the memory is used up ... if you do this, your traces will grow much too large). Areas which remain constant if I change the number of calls are of no interest. But if I find areas, which change the number exactly with the number of calls, I know the place where the allocation without free has been done. And then I call the developer, who is responsible for the module which does that allocation and ask him or her to fix it. I've done this many times, and every time I found the module or function which was responsible for the storage leak within some hours. The languages used (which lead to the storage leaks) were C, C++ (often), and even PL/1 - this doesn't really matter, because it's all LE. AFAIK, for Windows and Linux and similar platforms, there is a tool called ValGrind, which does a similar analysis. The REXX procedure was used primarily to sort and group the requests in the CEL4MCHK output by size and caller sequence etc ... so that the numbers (like 1000 and 2000 above) can easily be recognized. This said: there is of course a small chance that the problem is not inside the user's (or customer's) code, but instead inside some of the vendor's functions (in this case: IBM, for example the JSON processors mentioned). But IMO the probability is low ... although in my career there were some rare situations, where after 4 weeks of examination of error situations, it REALLY turned out that the error was in the IBM part ... and it took me some time to convince IBM. If you want, I can tell you more about this ... but offline. But even if this was the case in your situation, the CEL4MCHK method IMO would detect it. Honestly: I believe, you will find out that the error is in the customer's code. HTH, kind regards Bernd Am 04.01.2024 um 22:45 schrieb Eric Erickson: We are in a bit of a quandary here with some memory issues surrounding our application. This is a multitasking LE C application running in 31 bit mode that utilizes the IBM JSON and EZNOSQL Services. Some of the attributes are: • z/OS V2.5 Operation System • POSIX(OFF) - all tasks/subtasks • Single address space (31 Bit Mode) • ATTACHX Multi-tasking model (no pthreads) • Execute as started task – Problem State – Key 4 • Drop in/out of supervisor state as needed • 3 EZNOSQL Databases are opened at application start and remain open until termination • Open EZNOSQL connections tokens are passed to the worker task(s) along with the unit of work to be processed Our issue is that the total available heap grows until we end up exhausting all available memory and inevitable application failure, but the key here is that while the total heap grows with every unit of work processed by tasks, the in use amount only shows no or only a small (<128 bytes) increment between units of work. For example, here is a heap report (using LE __heaprpt function) example. So we are fairly confident that our application code is not leaking memory. HeapReport: ZdpQuery @Start - Total/In Use/Available: 1048576/888160/ 160416. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 1048576/888160/ 160416. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 1560856/888192/ 672664. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 1560856/888192/ 672664. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2073088/888224/ 1184864. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2073088/888224/ 1184864. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2073088/888224/ 1184864. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2073088/888224/ 1184864. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2585376/888256/
Re: LE C growing heap issue
I could understand fragmentation being any issue if we did not return all the memory, but during each iteration we return all the application allocated memory, so how can memory become fragmented? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LE C growing heap issue
Sounds like your HEAP options are inappropriate for this application, classic fragmentation ... e.g. set to KEEP and increment size is too small. Check your CEE_RUNOPTS or there could be other LE config/exits involved. Suggest you set disp=FREE and work out increment size. HEAP(initial, increment, location, disp, init24, incr24) On Fri, Jan 5, 2024 at 8:45 AM Eric Erickson wrote: > We are in a bit of a quandary here with some memory issues surrounding our > application. This is a multitasking LE C application running in 31 bit mode > that utilizes the IBM JSON and EZNOSQL Services. Some of the attributes > are: > > • z/OS V2.5 Operation System > • POSIX(OFF) - all tasks/subtasks > • Single address space (31 Bit Mode) > • ATTACHX Multi-tasking model (no pthreads) > • Execute as started task – Problem State – Key 4 > • Drop in/out of supervisor state as needed > • 3 EZNOSQL Databases are opened at application start and remain > open until termination > • Open EZNOSQL connections tokens are passed to the worker task(s) > along with the unit of work to be processed > > Our issue is that the total available heap grows until we end up > exhausting all available memory and inevitable application failure, but the > key here is that while the total heap grows with every unit of work > processed by tasks, the in use amount only shows no or only a small (<128 > bytes) increment between units of work. For example, here is a heap report > (using LE __heaprpt function) example. So we are fairly confident that our > application code is not leaking memory. > > HeapReport: ZdpQuery @Start - Total/In Use/Available: 1048576/ > 888160/ 160416. > HeapReport: ZdpQuery @Enter - Total/In Use/Available: 1048576/ > 888160/ 160416. > HeapReport: ZdpQuery @Exit - Total/In Use/Available: 1560856/ > 888192/ 672664. > HeapReport: ZdpQuery @Enter - Total/In Use/Available: 1560856/ > 888192/ 672664. > HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2073088/ > 888224/1184864. > HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2073088/ > 888224/1184864. > HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2073088/ > 888224/1184864. > HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2073088/ > 888224/1184864. > HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2585376/ > 888256/1697120. > HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2585376/ > 888256/1697120. > HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2585376/ > 888256/1697120. > HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2585376/ > 888256/1697120. > HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2585376/ > 888256/1697120. > HeapReport: ZdpQuery @Finish - Total/In Use/Available: 2585376/ > 888256/1697120. > > The @Start and @Finish lines show the heap report results just after the > task is attached and before it terminates. Each of the @Enter/@Exit lines > show the heap at the unit of work start and end processing, respectively. > > We are at a loss to explain why the heap keeps growing. We would expect > that the heap would grow to some high water mark and become stabilized, but > the total size just keeps growing until the application fails due to out of > memory condition, even though there is a significant amount of heap storage > available. Our tasks are returning all the storage they directly allocate > back to the heap, as indicated by in use at start & end. While there is a > small increment in the in use number, we think that may just be LE overhead > in managing the heap, but in any case is generally less than 128 bytes per > iteration, and only appears then the total heap size increases. What makes > this example even more interesting, is that we are processing the exact > same request for each iteration. > > We’ve turned on all the various LE memory analysis options (HEAPCHK, > RPTSTG) and utilized the LE alternate heap manager to detect overlays, > corruption, etc.. This pointed us to a couple of minor leaks we plugged but > has not led us to an answer as to the growing heap. We make heavy use of > the IBM JSON and EZNOSQL services during processing. > > We are in search of any insight, recommendations as to how to proceed in > diagnosis this issue. > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
LE C growing heap issue
We are in a bit of a quandary here with some memory issues surrounding our application. This is a multitasking LE C application running in 31 bit mode that utilizes the IBM JSON and EZNOSQL Services. Some of the attributes are: • z/OS V2.5 Operation System • POSIX(OFF) - all tasks/subtasks • Single address space (31 Bit Mode) • ATTACHX Multi-tasking model (no pthreads) • Execute as started task – Problem State – Key 4 • Drop in/out of supervisor state as needed • 3 EZNOSQL Databases are opened at application start and remain open until termination • Open EZNOSQL connections tokens are passed to the worker task(s) along with the unit of work to be processed Our issue is that the total available heap grows until we end up exhausting all available memory and inevitable application failure, but the key here is that while the total heap grows with every unit of work processed by tasks, the in use amount only shows no or only a small (<128 bytes) increment between units of work. For example, here is a heap report (using LE __heaprpt function) example. So we are fairly confident that our application code is not leaking memory. HeapReport: ZdpQuery @Start - Total/In Use/Available: 1048576/888160/ 160416. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 1048576/888160/ 160416. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 1560856/888192/ 672664. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 1560856/888192/ 672664. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2073088/888224/ 1184864. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2073088/888224/ 1184864. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2073088/888224/ 1184864. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2073088/888224/ 1184864. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2585376/888256/ 1697120. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2585376/888256/ 1697120. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2585376/888256/ 1697120. HeapReport: ZdpQuery @Enter - Total/In Use/Available: 2585376/888256/ 1697120. HeapReport: ZdpQuery @Exit - Total/In Use/Available: 2585376/888256/ 1697120. HeapReport: ZdpQuery @Finish - Total/In Use/Available: 2585376/888256/ 1697120. The @Start and @Finish lines show the heap report results just after the task is attached and before it terminates. Each of the @Enter/@Exit lines show the heap at the unit of work start and end processing, respectively. We are at a loss to explain why the heap keeps growing. We would expect that the heap would grow to some high water mark and become stabilized, but the total size just keeps growing until the application fails due to out of memory condition, even though there is a significant amount of heap storage available. Our tasks are returning all the storage they directly allocate back to the heap, as indicated by in use at start & end. While there is a small increment in the in use number, we think that may just be LE overhead in managing the heap, but in any case is generally less than 128 bytes per iteration, and only appears then the total heap size increases. What makes this example even more interesting, is that we are processing the exact same request for each iteration. We’ve turned on all the various LE memory analysis options (HEAPCHK, RPTSTG) and utilized the LE alternate heap manager to detect overlays, corruption, etc.. This pointed us to a couple of minor leaks we plugged but has not led us to an answer as to the growing heap. We make heavy use of the IBM JSON and EZNOSQL services during processing. We are in search of any insight, recommendations as to how to proceed in diagnosis this issue. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LISTDSI - hardcoded dsn vs. read in from file
Everyone, I so appreciate everyone's prompt feedback on my challenge. I ended up using ITschak Mugzach solution by turning off TSO profile prefix and removing quotation marks from my input file. I am now good to go. Again really appreciate the prompt response! Steve Estle sest...@gmail.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
listdsi return code -324?
I have a script that is getting a return code -324 from listdsi. The parameter is alloc dsn(fqdsn) inrtddn(varname) shr. I tried shr both in upper case and in lower case. I ccan't send any outbound e-mail fromm my work machine due to security. Any suggestions? -- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 עַם יִשְׂרָאֵל חַי נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
RACF and Encryption (Cross Posted
Basically I have to set up data at rest (encrypted on DASD). In that I don't have my clearance yet, or a ID with SPECIAL my hands are kind of tied. I do know all the RACF work has to be done before anything else. Also as I understand it, we will have to unload a file, and reload the File to get the Data at Rest. Steve -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LISTDSI - hardcoded dsn vs. read in from file
On Thu, 4 Jan 2024 13:55:22 -0600, Steve Estle wrote: >I've hardcoded the enclosing double quote/quote inside my file as follows: >"'SYS1.PARMLIB'" That's the problem. When your exec that works correctly does this: > DSName = "'SYS1.PARMLIB'" the double quotes are part of the REXX syntax to indicate that what's between is a literal string, and only the single quotes are part of the value of that string. When that exec then does: > Say DSName you'll see in the output just the single quotes: 'SYS1.PARMLIB' When your failing exec does: > Say dsn you'll instead see both sets of quotes, because they're both part of the data you read from the input file: "'SYS1.PARMLIB'" So don't put the double quotes in your input file, because they're not part of your data. ¬R -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LISTDSI - hardcoded dsn vs. read in from file
On Thu, 4 Jan 2024 14:07:20 -0600, Steve Estle wrote: >It fails on this instruction in 2nd scenario: > >x = LISTDSI(dsn) > What is the failure message? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LISTDSI - hardcoded dsn vs. read in from file
On Thu, 4 Jan 2024 13:55:22 -0600, Steve Estle wrote: > >I'm sure I'm doing something boneheaded but can't quite figure out what. I >have a list of fully qualified datasets in a file that I want to read the >dataset names once per record and then once I've read the record with dataset >name then use that name in a LISTDSI command. When I hard code name in REXX >exec it works fine - when I read dsname from file it fails. I've hardcoded >the enclosing double quote/quote inside my file as follows: >... >Trace i >... Please show your Trace output. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LISTDSI - hardcoded dsn vs. read in from file
You need to quote the dsname in apostrophes if it's fully qualified. Try x = LISTDSI("'"dsn"'") This might be more readable: apostrophe = "'" x = listdsi(apostrophe||dsn||apostrophe) -- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 עַם יִשְׂרָאֵל חַי נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר From: IBM Mainframe Discussion List on behalf of Steve Estle Sent: Thursday, January 4, 2024 2:55 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: LISTDSI - hardcoded dsn vs. read in from file All, I'm sure I'm doing something boneheaded but can't quite figure out what. I have a list of fully qualified datasets in a file that I want to read the dataset names once per record and then once I've read the record with dataset name then use that name in a LISTDSI command. When I hard code name in REXX exec it works fine - when I read dsname from file it fails. I've hardcoded the enclosing double quote/quote inside my file as follows: "'SYS1.PARMLIB'" When it fails (2nd version) I get this error message: IKJ56712I INVALID KEYWORD, "'SYS1.PARMLIB'" Two scenarios: Works Fine: /* REXX */ /*--*/ /*S E L E C T D S N S & L I S T I N F O*/ /*--*/ DSName = "'SYS1.PARMLIB'" Say DSName x = LISTDSI(DSName) SAY 'Function code from LISTDSI is: ' x SAY 'The data set name is: ' sysdsname SAY 'The device unit on which the volume resides is:' sysunit SAY 'The record format is: ' sysrecfm SAY 'The logical record length is: ' syslrecl SAY 'The block size is: ' sysblksize SAY 'The allocation in space units is: ' sysalloc EXIT Failing Version: /* REXX */ INDSN = "'P69792.LISTDSI.INPUT'" OUTDSN = "'P69792.LISTDSI.OUTPUT.CSV'" DDNI = "DD"||RANDOM(1,9) DDNO = "DD"||RANDOM(1,9) /*--*/ /* R E A D D S N L I S T */ /*--*/ ADDRESS TSO "ALLOC DA(" INDSN ") DDNAME( " DDNI ") SHR REUSE " ADDRESS TSO "ALLOC DA(" OUTDSN ") DDNAME( " DDNO ") OLD REUSE " ADDRESS TSO "EXECIO * DISKR " DDNI "(STEM Dsni. FINIS" ADDRESS TSO "FREE DDNAME(" DDNI ") " /*--*/ /*S E L E C T D S N S & L I S T I N F O */ /*--*/ Trace i DO I = 1 TO Dsni.0 dsn = Word(Dsni.I,1) Say dsn x = LISTDSI(dsn) SAY 'Function code from LISTDSI is: ' x SAY 'The data set name is: ' sysdsname SAY 'The device unit on which the volume resides is:' sysunit SAY 'The record format is: ' sysrecfm SAY 'The logical record length is: ' syslrecl SAY 'The block size is: ' sysblksize SAY 'The allocation in space units is: ' sysalloc END I -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LISTDSI - hardcoded dsn vs. read in from file
It fails on this instruction in 2nd scenario: x = LISTDSI(dsn) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LISTDSI - hardcoded dsn vs. read in from file
Simply remove the quote and double quotes from your input file and add address tso prof nopref The list Sai sees two set of quotes instead of one at a maximum. You can try Dan=translate(dsn,' ','"') before the list Sai command *| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux and IBM I **| * *|* *Email**: i_mugz...@securiteam.co.il **|* *Mob**: +972 522 986404 **|* *Skype**: ItschakMugzach **|* *Web**: www.Securiteam.co.il **|* בתאריך יום ה׳, 4 בינו׳ 2024 ב-21:55 מאת Steve Estle : > All, > > I'm sure I'm doing something boneheaded but can't quite figure out what. > I have a list of fully qualified datasets in a file that I want to read the > dataset names once per record and then once I've read the record with > dataset name then use that name in a LISTDSI command. When I hard code > name in REXX exec it works fine - when I read dsname from file it fails. > I've hardcoded the enclosing double quote/quote inside my file as follows: > > "'SYS1.PARMLIB'" > > When it fails (2nd version) I get this error message: > > IKJ56712I INVALID KEYWORD, "'SYS1.PARMLIB'" > > Two scenarios: > > Works Fine: > > /* REXX */ > > > /*--*/ > > /*S E L E C T D S N S & L I S T I N F O*/ > > /*--*/ > >DSName = "'SYS1.PARMLIB'" > >Say DSName > >x = LISTDSI(DSName) > >SAY 'Function code from LISTDSI is: ' x > >SAY 'The data set name is: ' sysdsname > >SAY 'The device unit on which the volume resides is:' sysunit > >SAY 'The record format is: ' sysrecfm > >SAY 'The logical record length is: ' syslrecl > >SAY 'The block size is: ' sysblksize > >SAY 'The allocation in space units is: ' sysalloc > > > EXIT > > Failing Version: > > /* REXX */ > > > > INDSN = "'P69792.LISTDSI.INPUT'" > > OUTDSN = "'P69792.LISTDSI.OUTPUT.CSV'" > > DDNI = "DD"||RANDOM(1,9) > > DDNO = "DD"||RANDOM(1,9) > > > > /*--*/ > > /* R E A D D S N L I S T */ > > /*--*/ > > ADDRESS TSO "ALLOC DA(" INDSN ") DDNAME( " DDNI ") SHR REUSE " > > ADDRESS TSO "ALLOC DA(" OUTDSN ") DDNAME( " DDNO ") OLD REUSE " > > ADDRESS TSO "EXECIO * DISKR " DDNI "(STEM Dsni. FINIS" > > ADDRESS TSO "FREE DDNAME(" DDNI ") " > > > > /*--*/ > > /*S E L E C T D S N S & L I S T I N F O */ > > /*--*/ > > >Trace i > > DO I = 1 TO Dsni.0 > >dsn = Word(Dsni.I,1) > >Say dsn > >x = LISTDSI(dsn) > >SAY 'Function code from LISTDSI is: ' x > >SAY 'The data set name is: ' sysdsname > >SAY 'The device unit on which the volume resides is:' sysunit > >SAY 'The record format is: ' sysrecfm > >SAY 'The logical record length is: ' syslrecl > >SAY 'The block size is: ' sysblksize > >SAY 'The allocation in space units is: ' sysalloc > > END I > > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: LISTDSI - hardcoded dsn vs. read in from file
Which instruction fails? Do TRACE on the whole routine. On Thu, 4 Jan 2024 13:55:22 -0600 Steve Estle wrote: :>All, :> :>I'm sure I'm doing something boneheaded but can't quite figure out what. I have a list of fully qualified datasets in a file that I want to read the dataset names once per record and then once I've read the record with dataset name then use that name in a LISTDSI command. When I hard code name in REXX exec it works fine - when I read dsname from file it fails. I've hardcoded the enclosing double quote/quote inside my file as follows: :> :>"'SYS1.PARMLIB'" :> :>When it fails (2nd version) I get this error message: :> :>IKJ56712I INVALID KEYWORD, "'SYS1.PARMLIB'" :> :>Two scenarios: :> :>Works Fine: :> :>/* REXX */ :> :>/*--*/ :> :>/*S E L E C T D S N S & L I S T I N F O*/ :> :>/*--*/ :> :> DSName = "'SYS1.PARMLIB'" :> :> Say DSName :> :> x = LISTDSI(DSName) :> :> SAY 'Function code from LISTDSI is: ' x :> :> SAY 'The data set name is: ' sysdsname :> :> SAY 'The device unit on which the volume resides is:' sysunit :> :> SAY 'The record format is: ' sysrecfm :> :> SAY 'The logical record length is: ' syslrecl :> :> SAY 'The block size is: ' sysblksize :> :> SAY 'The allocation in space units is: ' sysalloc :> :> :>EXIT :> :>Failing Version: :> :>/* REXX */ :> :> :> :>INDSN = "'P69792.LISTDSI.INPUT'" :> :>OUTDSN = "'P69792.LISTDSI.OUTPUT.CSV'" :> :>DDNI = "DD"||RANDOM(1,9) :> :>DDNO = "DD"||RANDOM(1,9) :> :> :> :>/*--*/ :> :>/* R E A D D S N L I S T */ :> :>/*--*/ :> :>ADDRESS TSO "ALLOC DA(" INDSN ") DDNAME( " DDNI ") SHR REUSE " :> :>ADDRESS TSO "ALLOC DA(" OUTDSN ") DDNAME( " DDNO ") OLD REUSE " :> :>ADDRESS TSO "EXECIO * DISKR " DDNI "(STEM Dsni. FINIS" :> :>ADDRESS TSO "FREE DDNAME(" DDNI ") " :> :> :> :>/*--*/ :> :>/*S E L E C T D S N S & L I S T I N F O */ :> :>/*--*/ :> :> :> Trace i :> :>DO I = 1 TO Dsni.0 :> :> dsn = Word(Dsni.I,1) :> :> Say dsn :> :> x = LISTDSI(dsn) :> :> SAY 'Function code from LISTDSI is: ' x :> :> SAY 'The data set name is: ' sysdsname :> :> SAY 'The device unit on which the volume resides is:' sysunit :> :> SAY 'The record format is: ' sysrecfm :> :> SAY 'The logical record length is: ' syslrecl :> :> SAY 'The block size is: ' sysblksize :> :> SAY 'The allocation in space units is: ' sysalloc :> :>END I :> :> :>-- :>For IBM-MAIN subscribe / signoff / archive access instructions, :>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- Binyamin Dissen http://www.dissensoftware.com Director, Dissen Software, Bar & Grill - Israel -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
LISTDSI - hardcoded dsn vs. read in from file
All, I'm sure I'm doing something boneheaded but can't quite figure out what. I have a list of fully qualified datasets in a file that I want to read the dataset names once per record and then once I've read the record with dataset name then use that name in a LISTDSI command. When I hard code name in REXX exec it works fine - when I read dsname from file it fails. I've hardcoded the enclosing double quote/quote inside my file as follows: "'SYS1.PARMLIB'" When it fails (2nd version) I get this error message: IKJ56712I INVALID KEYWORD, "'SYS1.PARMLIB'" Two scenarios: Works Fine: /* REXX */ /*--*/ /*S E L E C T D S N S & L I S T I N F O*/ /*--*/ DSName = "'SYS1.PARMLIB'" Say DSName x = LISTDSI(DSName) SAY 'Function code from LISTDSI is: ' x SAY 'The data set name is: ' sysdsname SAY 'The device unit on which the volume resides is:' sysunit SAY 'The record format is: ' sysrecfm SAY 'The logical record length is: ' syslrecl SAY 'The block size is: ' sysblksize SAY 'The allocation in space units is: ' sysalloc EXIT Failing Version: /* REXX */ INDSN = "'P69792.LISTDSI.INPUT'" OUTDSN = "'P69792.LISTDSI.OUTPUT.CSV'" DDNI = "DD"||RANDOM(1,9) DDNO = "DD"||RANDOM(1,9) /*--*/ /* R E A D D S N L I S T */ /*--*/ ADDRESS TSO "ALLOC DA(" INDSN ") DDNAME( " DDNI ") SHR REUSE " ADDRESS TSO "ALLOC DA(" OUTDSN ") DDNAME( " DDNO ") OLD REUSE " ADDRESS TSO "EXECIO * DISKR " DDNI "(STEM Dsni. FINIS" ADDRESS TSO "FREE DDNAME(" DDNI ") " /*--*/ /*S E L E C T D S N S & L I S T I N F O */ /*--*/ Trace i DO I = 1 TO Dsni.0 dsn = Word(Dsni.I,1) Say dsn x = LISTDSI(dsn) SAY 'Function code from LISTDSI is: ' x SAY 'The data set name is: ' sysdsname SAY 'The device unit on which the volume resides is:' sysunit SAY 'The record format is: ' sysrecfm SAY 'The logical record length is: ' syslrecl SAY 'The block size is: ' sysblksize SAY 'The allocation in space units is: ' sysalloc END I -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Digital Certificates -- Site Certificate
I have NOT done Digital Certificates in 5 years and I have NEVER done a Site Certificate. So does anyone have a document that is a short and to the point of how to setup A Site Certificate Steve -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
SYSPLEX JES2 SYSLOG processing
On a z/OS 2.5 system using z System Automation V4.3, I am trying to set a daily event that runs on each LPAR of the SYSPLEX. The event needs to issue a 'W L' then locate the SYSLOG output for that specific LPAR, start an XWTR with job selection for class and JOBID... For example, 'S XWTR.XWTR,END=IEF176I' 'F XWTR.XWTR,CLASS=L,JOBID=STC08984' Where STC08984 is the result of parsing a JES2 $DS'SYSLOG' command LPR1 2024002 02:01:00:45 STC08984 $HASP890 JOB(SYSLOG) $HASP890 JOB(SYSLOG) STATUS=(EXECUTING/LPR1),CLASS=STC, $HASP890 PRIORITY=15,SYSAFF=(LPR1),HOLD=(NONE) LPR1 2024002 02:01:00:45 STC09720 $HASP890 JOB(SYSLOG) $HASP890 JOB(SYSLOG) STATUS=(EXECUTING/LPR2),CLASS=STC, $HASP890 PRIORITY=15,SYSAFF=(LPR2),HOLD=(NONE) LPR1 2024002 02:01:00:45 STC06274 $HASP890 JOB(SYSLOG) $HASP890 JOB(SYSLOG) STATUS=(EXECUTING/LPR3),CLASS=STC, $HASP890 PRIORITY=15,SYSAFF=(LPR3),HOLD=(NONE) LPR1 2024002 02:01:00:45 STC09125 $HASP890 JOB(SYSLOG) $HASP890 JOB(SYSLOG) STATUS=(EXECUTING/LPR4),CLASS=STC, $HASP890 PRIORITY=15,SYSAFF=(LPR4),HOLD=(NONE) LPR1 2024002 02:01:00:45 STC03207 $HASP890 JOB(SYSLOG) $HASP890 JOB(SYSLOG) STATUS=(EXECUTING/LPR5),CLASS=STC, $HASP890 PRIORITY=15,SYSAFF=(LPR5),HOLD=(NONE) I have tried using a PIPE command without success... Any ideas? Thanks Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Network not working between zOS and zVM
I have removed the ethernet word on link statement. And it works ! Thanks ! What would be the impact if i start a z/os and a z/vm test environnement ? Ethernet word will not be required ? Resiliency Services on Z Mainframe alain.benveni...@kyndryl.com > Le 4 janv. 2024 à 15:49, Alan Altmark a écrit : > > On Wed, 3 Jan 2024 09:04:54 -0600, Alain Benvéniste > wrote: >> I had a z/OS (10.1.106.201) under a z/VM(10.1.106.200) speaking to each >> other through CTC, and it worked. >> Now I want them to speak to each other through a unique OSA card as lpars. >> it works but sporadically. >> Each one can ping my PC(10.1.106.250). > > It sounds like MAC address confusion of some sort, seen when two hosts have > the same IP address or when the external routers are confused. If you have > dynamic routing, make sure those configuration reflect the direct connections > instead of routing override pointing to CTC. > > When it is misbehaving, you need to see what the routers are telling you > about both systems. It feels like there's a static route stuck somewhere. > "Sporadic" is the clue. > > For fun, try removing the "ETHERNET" keyword from the z/VM LINK statement. > It's ok to mix IP and ETHERNET mode traffic on the same OSA, but it's > possible there is some kind of issue with the MAC address that VM is using > because of ETHERNET mode. (It gets a new MAC address from the OSA.) > > Alan Altmark > IBM > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
IEAMDBLG tweak
Just an FYI. but IEAMDBLG can be modified to exten the output record length from 132 to 255 and thereby remove split SYSLOG lines. Michael At 11:16 AM 1/4/2024, Radoslaw Skorupka wrote: Content-Transfer-Encoding: 7bit The following scenario: z/OS 2.5, two-member parallel sysplex. Sometimes I observe IXG251I and IXG284I ISG251I informs the dataset is in use by another sysplex member IXG284I says the dataset is PENDING DELETE. It usually happens during log offload (archivization) using IEAMDBLG tool, however it is not predictable behavior. The dataset is deleted later, so it is finally auto-resolved, however I think the above should never happen in normal circumstances. Any clue? -- Radoslaw Skorupka Lodz, Poland -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
OPERLOG contention
The following scenario: z/OS 2.5, two-member parallel sysplex. Sometimes I observe IXG251I and IXG284I ISG251I informs the dataset is in use by another sysplex member IXG284I says the dataset is PENDING DELETE. It usually happens during log offload (archivization) using IEAMDBLG tool, however it is not predictable behavior. The dataset is deleted later, so it is finally auto-resolved, however I think the above should never happen in normal circumstances. Any clue? -- Radoslaw Skorupka Lodz, Poland -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]
It was discussed many times. There's even single-word German description of such disclaimer. However the disclaimer has almost no legal meaning. Accidental recipient has no obligation to delete the message or keep it secret, etc. Nothing which is caused by the disclaimer (it can be caused by the law, but not disclaimer). Recipient is not obliged to do anything, including reporting abuse, etc. BTW: Due to some EU rights a company is obliged to have a footer with share capital, company address, etc. It is obligatory only for official documents signed by procurement people. What lawyers did? They insisted to put the note in every email sent by every employee or contractor. Needless to say the note grew up - it was getting longer and longer... Despite only very very few emails really needed it. -- Radoslaw Skorupka Lodz, Poland W dniu 04.01.2024 o 16:49, Seymour J Metz pisze: If they e-mail me your medical information, that is a HIPAA violation even if I delete it. If they e-mail me classified documents,, that is a security breach even if I deleted it. IANAL, but I don't think that a disclaimer would protect you from severe consequences, both civil and criminal. Neither does a disclaimer preclude the recipient reporting it to the Feds. Protect sensitive data; don't rely on disclaimers. -- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 עַם יִשְׂרָאֵל חַי נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר From: IBM Mainframe Discussion List on behalf of Steve Thompson Sent: Thursday, January 4, 2024 10:23 AM To:IBM-MAIN@LISTSERV.UA.EDU Subject: Re: test. please ignore -- IGNORING YOU IGNORING YOU [not] I am glad you brought this up. I get these things on individual/entity emails sent directly to me. I didn't sign for this. How could they prove I got it? Per USPS regs and some other fed Agency whose name I've forgotten, if you receive something in the mail addressed to you, that you didn't ask for, it is yours, even if a bill is sent with it requiring you to either return it or pay for it. Most may not know about this. But this went back into the Sixties when different mass marketing companies that would send out something like a medallion to hang somewhere (just an example). Well, the law/regs were changed to make that a free gift to you because why should you have to return it at your cost when you hadn't asked for it? Enter FAX machines used by attorneys. We need to put CYA verbiage at the bottom of this document. The question is, is it actually enforceable? This then went to boiler plate on emails from medical entities (HIPAA stuff). But the regs tell you that data must be secured So is a statement to the effect of "this being a non-disclosure thing" enforceable since one had no other relationship to the sender, such that no NDA had ever been signed? So, yeah, glad you mentioned this. Imagine if it had been marked as classified Top Secret EYES Only. Could you be charged for having unauthorized classified data? And just who would you report this to? On 1/3/2024 4:08 PM, Joel C. Ewing wrote: A test of another long-winded, non-enforceable corporate disclaimer perhaps? Don't you just love corporate lawyers. The named recipient in this case is the IBM-Main list, and since this list is echoed to a world-accessible newsgroup, no one posting anything to this list can reasonably expect anything on this list to be treated as "Confidential" or any viewing of any item on this list to have been "received in error". That the views represented are "solely those of the author" is the only part of the DISCLAIMER that has any validity in this context. By simply replying to this post without excluding all of the original post I have violated the non-enforceable parts of the disclaimer. JC Ewing On 1/3/24 10:24, Allan Staller wrote: Classification: Confidential test ::DISCLAIMER:: The contents of this e-mail and any attachment(s) are confidential and intended for the named recipient(s) only. E-mail transmission is not guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or may contain viruses in transmission. The e mail and its contents (with or without referred errors) shall therefore not attach any liability on the originator or HCL or its affiliates. Views or opinions, if any, presented in this email are solely those of the author and may not necessarily reflect the views or opinions of HCL or its affiliates. Any form of reproduction, dissemination, copying, disclosure, modification, distribution and / or publication of this message without the prior written consent of authorized representative of HCL is strictly prohibited. If you have received this email in error please delete it and notify the sender immediately. Before opening any email and/or attachments, please check them for viruses and other defects.
Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]
HIPPA applies to medical professionals and insurance departments, and not to anyone to whom the information was sent. National security call FBI to retrieve, sanitize. On Thu, Jan 4, 2024 at 9:24 AM Steve Thompson wrote: > I am glad you brought this up. > > I get these things on individual/entity emails sent directly to > me. I didn't sign for this. How could they prove I got it? > > Per USPS regs and some other fed Agency whose name I've > forgotten, if you receive something in the mail addressed to you, > that you didn't ask for, it is yours, even if a bill is sent with > it requiring you to either return it or pay for it. Most may not > know about this. But this went back into the Sixties when > different mass marketing companies that would send out something > like a medallion to hang somewhere (just an example). Well, the > law/regs were changed to make that a free gift to you because why > should you have to return it at your cost when you hadn't asked > for it? > > Enter FAX machines used by attorneys. We need to put CYA verbiage > at the bottom of this document. The question is, is it actually > enforceable? This then went to boiler plate on emails from > medical entities (HIPAA stuff). But the regs tell you that data > must be secured > > So is a statement to the effect of "this being a non-disclosure > thing" enforceable since one had no other relationship to the > sender, such that no NDA had ever been signed? > > So, yeah, glad you mentioned this. > > Imagine if it had been marked as classified Top Secret EYES > Only. Could you be charged for having unauthorized classified > data? And just who would you report this to? > > On 1/3/2024 4:08 PM, Joel C. Ewing wrote: > > A test of another long-winded, non-enforceable corporate > > disclaimer perhaps? Don't you just love corporate lawyers. > > > > The named recipient in this case is the IBM-Main list, and > > since this list is echoed to a world-accessible newsgroup, no > > one posting anything to this list can reasonably expect > > anything on this list to be treated as "Confidential" or any > > viewing of any item on this list to have been "received in > > error". That the views represented are "solely those of the > > author" is the only part of the DISCLAIMER that has any > > validity in this context. By simply replying to this post > > without excluding all of the original post I have violated the > > non-enforceable parts of the disclaimer. > > > > JC Ewing > > > > On 1/3/24 10:24, Allan Staller wrote: > >> Classification: Confidential > >> > >> test > >> > >> ::DISCLAIMER:: > >> > >> The contents of this e-mail and any attachment(s) are > >> confidential and intended for the named recipient(s) only. > >> E-mail transmission is not guaranteed to be secure or > >> error-free as information could be intercepted, corrupted, > >> lost, destroyed, arrive late or incomplete, or may contain > >> viruses in transmission. The e mail and its contents (with or > >> without referred errors) shall therefore not attach any > >> liability on the originator or HCL or its affiliates. Views or > >> opinions, if any, presented in this email are solely those of > >> the author and may not necessarily reflect the views or > >> opinions of HCL or its affiliates. Any form of reproduction, > >> dissemination, copying, disclosure, modification, distribution > >> and / or publication of this message without the prior written > >> consent of authorized representative of HCL is strictly > >> prohibited. If you have received this email in error please > >> delete it and notify the sender immediately. Before opening > >> any email and/or attachments, please check them for viruses > >> and other defects. > >> > >> > >> ... > > > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- Mike A Schwab, Springfield IL USA Where do Forest Rangers go to get away from it all? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]
If they e-mail me your medical information, that is a HIPAA violation even if I delete it. If they e-mail me classified documents,, that is a security breach even if I deleted it. IANAL, but I don't think that a disclaimer would protect you from severe consequences, both civil and criminal. Neither does a disclaimer preclude the recipient reporting it to the Feds. Protect sensitive data; don't rely on disclaimers. -- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 עַם יִשְׂרָאֵל חַי נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר From: IBM Mainframe Discussion List on behalf of Steve Thompson Sent: Thursday, January 4, 2024 10:23 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: test. please ignore -- IGNORING YOU IGNORING YOU [not] I am glad you brought this up. I get these things on individual/entity emails sent directly to me. I didn't sign for this. How could they prove I got it? Per USPS regs and some other fed Agency whose name I've forgotten, if you receive something in the mail addressed to you, that you didn't ask for, it is yours, even if a bill is sent with it requiring you to either return it or pay for it. Most may not know about this. But this went back into the Sixties when different mass marketing companies that would send out something like a medallion to hang somewhere (just an example). Well, the law/regs were changed to make that a free gift to you because why should you have to return it at your cost when you hadn't asked for it? Enter FAX machines used by attorneys. We need to put CYA verbiage at the bottom of this document. The question is, is it actually enforceable? This then went to boiler plate on emails from medical entities (HIPAA stuff). But the regs tell you that data must be secured So is a statement to the effect of "this being a non-disclosure thing" enforceable since one had no other relationship to the sender, such that no NDA had ever been signed? So, yeah, glad you mentioned this. Imagine if it had been marked as classified Top Secret EYES Only. Could you be charged for having unauthorized classified data? And just who would you report this to? On 1/3/2024 4:08 PM, Joel C. Ewing wrote: > A test of another long-winded, non-enforceable corporate > disclaimer perhaps? Don't you just love corporate lawyers. > > The named recipient in this case is the IBM-Main list, and > since this list is echoed to a world-accessible newsgroup, no > one posting anything to this list can reasonably expect > anything on this list to be treated as "Confidential" or any > viewing of any item on this list to have been "received in > error". That the views represented are "solely those of the > author" is the only part of the DISCLAIMER that has any > validity in this context. By simply replying to this post > without excluding all of the original post I have violated the > non-enforceable parts of the disclaimer. > > JC Ewing > > On 1/3/24 10:24, Allan Staller wrote: >> Classification: Confidential >> >> test >> >> ::DISCLAIMER:: >> >> The contents of this e-mail and any attachment(s) are >> confidential and intended for the named recipient(s) only. >> E-mail transmission is not guaranteed to be secure or >> error-free as information could be intercepted, corrupted, >> lost, destroyed, arrive late or incomplete, or may contain >> viruses in transmission. The e mail and its contents (with or >> without referred errors) shall therefore not attach any >> liability on the originator or HCL or its affiliates. Views or >> opinions, if any, presented in this email are solely those of >> the author and may not necessarily reflect the views or >> opinions of HCL or its affiliates. Any form of reproduction, >> dissemination, copying, disclosure, modification, distribution >> and / or publication of this message without the prior written >> consent of authorized representative of HCL is strictly >> prohibited. If you have received this email in error please >> delete it and notify the sender immediately. Before opening >> any email and/or attachments, please check them for viruses >> and other defects. >> >> >> ... > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: What is the PDS command?
I first encountered IPCS on a 2 MiB machine (165 with MVT upgraded to 168 with SVS.); the dumps were a lot smaller, so IPCS was nice rather than essential. In today's environment, I don't want to think about living without it. -- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 עַם יִשְׂרָאֵל חַי נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר From: IBM Mainframe Discussion List on behalf of Colin Paice Sent: Thursday, January 4, 2024 8:33 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: What is the PDS command? I remember (45 years ago, before IPCS) someone from CICS getting a paper dump from a US secret government department - with some of the sensitive data cut out of the EBCDIC translation on the right ( so it had holes in the printout). Clearly the people with scissors did not realise the data was in hex on the left hand side. On Thu, 4 Jan 2024 at 12:23, Seymour J Metz wrote: > Paper?! For, e.g., SYSABEND, SYSUDUMP, on SPOOL you can at least do a > search for, e.g., eyecatchers, key addresses. On paper a large dump is > unmanageable. > > When you're swamped is precisely when you need good tools. Not having > PDS86 is bad; not having IPCS is intolerable. > > -- > Shmuel (Seymour J.) Metz > http://mason.gmu.edu/~smetz3 > עַם יִשְׂרָאֵל חַי > נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר > > > From: IBM Mainframe Discussion List on behalf > of Edward Gould <04bcc43af339-dmarc-requ...@listserv.ua.edu> > Sent: Thursday, January 4, 2024 2:54 AM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Re: What is the PDS command? > > > On Dec 27, 2023, at 4:57 AM, David Spiegel < > 0468385049d1-dmarc-requ...@listserv.ua.edu> wrote: > > > > Hi Ed, > > You and your programmer were not impressed?! > > How can you not be impressed by the ability to add Directory Blocks (by > moving members out of the way), the ability to generate JCL to LinkEdit PDS > members, the ability to copy members (with ISPF Stats) or the ability to > recover deleted members (with selection criteria)? > > (There are a lot more features.) > > SMH. > > > > (I've been using the PDS Command Processor (File 182) for more than 40 > years.) > > > > Regards, > > David > > David: > I was looking at it from a typical applications programmer POV as a every > day utility. Most of the features (I thought) were sysprog type or maybe a > senior level programmer. I1. I do not like trust programs from the CBTTAPE > as I did not want to try and debug anything that I had not written and > especially at 0 dark 30 . I was working at that time 100 hours a week and > supporting people in thee Time zones and I wanted everything to go as > smoothly as possible. The third times zone was western Europe and as > friendly as they were they would pull out the daggers every now and then. > The locals were semi (except for about 20)competentand we rarely heard a > peep out of (except for the 20). My workload at the time included going > through about 20 standalone dumps over a week and we did not have IPCS so > every dump was on paper and went from 2 foot thick to 5 foot. I had my > hands full . > Ed > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]
I am glad you brought this up. I get these things on individual/entity emails sent directly to me. I didn't sign for this. How could they prove I got it? Per USPS regs and some other fed Agency whose name I've forgotten, if you receive something in the mail addressed to you, that you didn't ask for, it is yours, even if a bill is sent with it requiring you to either return it or pay for it. Most may not know about this. But this went back into the Sixties when different mass marketing companies that would send out something like a medallion to hang somewhere (just an example). Well, the law/regs were changed to make that a free gift to you because why should you have to return it at your cost when you hadn't asked for it? Enter FAX machines used by attorneys. We need to put CYA verbiage at the bottom of this document. The question is, is it actually enforceable? This then went to boiler plate on emails from medical entities (HIPAA stuff). But the regs tell you that data must be secured So is a statement to the effect of "this being a non-disclosure thing" enforceable since one had no other relationship to the sender, such that no NDA had ever been signed? So, yeah, glad you mentioned this. Imagine if it had been marked as classified Top Secret EYES Only. Could you be charged for having unauthorized classified data? And just who would you report this to? On 1/3/2024 4:08 PM, Joel C. Ewing wrote: A test of another long-winded, non-enforceable corporate disclaimer perhaps? Don't you just love corporate lawyers. The named recipient in this case is the IBM-Main list, and since this list is echoed to a world-accessible newsgroup, no one posting anything to this list can reasonably expect anything on this list to be treated as "Confidential" or any viewing of any item on this list to have been "received in error". That the views represented are "solely those of the author" is the only part of the DISCLAIMER that has any validity in this context. By simply replying to this post without excluding all of the original post I have violated the non-enforceable parts of the disclaimer. JC Ewing On 1/3/24 10:24, Allan Staller wrote: Classification: Confidential test ::DISCLAIMER:: The contents of this e-mail and any attachment(s) are confidential and intended for the named recipient(s) only. E-mail transmission is not guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or may contain viruses in transmission. The e mail and its contents (with or without referred errors) shall therefore not attach any liability on the originator or HCL or its affiliates. Views or opinions, if any, presented in this email are solely those of the author and may not necessarily reflect the views or opinions of HCL or its affiliates. Any form of reproduction, dissemination, copying, disclosure, modification, distribution and / or publication of this message without the prior written consent of authorized representative of HCL is strictly prohibited. If you have received this email in error please delete it and notify the sender immediately. Before opening any email and/or attachments, please check them for viruses and other defects. ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Network not working between zOS and zVM
On Wed, 3 Jan 2024 09:04:54 -0600, Alain Benvéniste wrote: >I had a z/OS (10.1.106.201) under a z/VM(10.1.106.200) speaking to each other >through CTC, and it worked. >Now I want them to speak to each other through a unique OSA card as lpars. it >works but sporadically. >Each one can ping my PC(10.1.106.250). It sounds like MAC address confusion of some sort, seen when two hosts have the same IP address or when the external routers are confused. If you have dynamic routing, make sure those configuration reflect the direct connections instead of routing override pointing to CTC. When it is misbehaving, you need to see what the routers are telling you about both systems. It feels like there's a static route stuck somewhere. "Sporadic" is the clue. For fun, try removing the "ETHERNET" keyword from the z/VM LINK statement. It's ok to mix IP and ETHERNET mode traffic on the same OSA, but it's possible there is some kind of issue with the MAC address that VM is using because of ETHERNET mode. (It gets a new MAC address from the OSA.) Alan Altmark IBM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: What is the PDS command?
I remember (45 years ago, before IPCS) someone from CICS getting a paper dump from a US secret government department - with some of the sensitive data cut out of the EBCDIC translation on the right ( so it had holes in the printout). Clearly the people with scissors did not realise the data was in hex on the left hand side. On Thu, 4 Jan 2024 at 12:23, Seymour J Metz wrote: > Paper?! For, e.g., SYSABEND, SYSUDUMP, on SPOOL you can at least do a > search for, e.g., eyecatchers, key addresses. On paper a large dump is > unmanageable. > > When you're swamped is precisely when you need good tools. Not having > PDS86 is bad; not having IPCS is intolerable. > > -- > Shmuel (Seymour J.) Metz > http://mason.gmu.edu/~smetz3 > עַם יִשְׂרָאֵל חַי > נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר > > > From: IBM Mainframe Discussion List on behalf > of Edward Gould <04bcc43af339-dmarc-requ...@listserv.ua.edu> > Sent: Thursday, January 4, 2024 2:54 AM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Re: What is the PDS command? > > > On Dec 27, 2023, at 4:57 AM, David Spiegel < > 0468385049d1-dmarc-requ...@listserv.ua.edu> wrote: > > > > Hi Ed, > > You and your programmer were not impressed?! > > How can you not be impressed by the ability to add Directory Blocks (by > moving members out of the way), the ability to generate JCL to LinkEdit PDS > members, the ability to copy members (with ISPF Stats) or the ability to > recover deleted members (with selection criteria)? > > (There are a lot more features.) > > SMH. > > > > (I've been using the PDS Command Processor (File 182) for more than 40 > years.) > > > > Regards, > > David > > David: > I was looking at it from a typical applications programmer POV as a every > day utility. Most of the features (I thought) were sysprog type or maybe a > senior level programmer. I1. I do not like trust programs from the CBTTAPE > as I did not want to try and debug anything that I had not written and > especially at 0 dark 30 . I was working at that time 100 hours a week and > supporting people in thee Time zones and I wanted everything to go as > smoothly as possible. The third times zone was western Europe and as > friendly as they were they would pull out the daggers every now and then. > The locals were semi (except for about 20)competentand we rarely heard a > peep out of (except for the 20). My workload at the time included going > through about 20 standalone dumps over a week and we did not have IPCS so > every dump was on paper and went from 2 foot thick to 5 foot. I had my > hands full . > Ed > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: What is the PDS command?
Paper?! For, e.g., SYSABEND, SYSUDUMP, on SPOOL you can at least do a search for, e.g., eyecatchers, key addresses. On paper a large dump is unmanageable. When you're swamped is precisely when you need good tools. Not having PDS86 is bad; not having IPCS is intolerable. -- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 עַם יִשְׂרָאֵל חַי נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר From: IBM Mainframe Discussion List on behalf of Edward Gould <04bcc43af339-dmarc-requ...@listserv.ua.edu> Sent: Thursday, January 4, 2024 2:54 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: What is the PDS command? > On Dec 27, 2023, at 4:57 AM, David Spiegel > <0468385049d1-dmarc-requ...@listserv.ua.edu> wrote: > > Hi Ed, > You and your programmer were not impressed?! > How can you not be impressed by the ability to add Directory Blocks (by > moving members out of the way), the ability to generate JCL to LinkEdit PDS > members, the ability to copy members (with ISPF Stats) or the ability to > recover deleted members (with selection criteria)? > (There are a lot more features.) > SMH. > > (I've been using the PDS Command Processor (File 182) for more than 40 years.) > > Regards, > David David: I was looking at it from a typical applications programmer POV as a every day utility. Most of the features (I thought) were sysprog type or maybe a senior level programmer. I1. I do not like trust programs from the CBTTAPE as I did not want to try and debug anything that I had not written and especially at 0 dark 30 . I was working at that time 100 hours a week and supporting people in thee Time zones and I wanted everything to go as smoothly as possible. The third times zone was western Europe and as friendly as they were they would pull out the daggers every now and then. The locals were semi (except for about 20)competentand we rarely heard a peep out of (except for the 20). My workload at the time included going through about 20 standalone dumps over a week and we did not have IPCS so every dump was on paper and went from 2 foot thick to 5 foot. I had my hands full . Ed -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN