Re: SYSPLEX JES2 SYSLOG processing

2024-01-04 Thread Steve Horein
Hey Paul -
Do you get any interesting results from the NetView command line (you may
need to enter INPUT 2 to get more room) if you issue:
WINDOW PIPE CC 5 $DS'SYSLOG'|TOS LAST "$HASP890"|SEP|EDIT "CB" COLOR
1.*|CONS ONLY

If you do, hope is not lost.

On Thu, Jan 4, 2024 at 12:31 PM Paul Gorlinsky  wrote:

> On a z/OS 2.5 system using z System Automation V4.3, I am trying to set a
> daily event that runs on each LPAR of the SYSPLEX.
>
> The event needs to issue a 'W L' then locate the SYSLOG output for that
> specific LPAR, start an XWTR with job selection for class and JOBID...
>
> For example,
> 'S XWTR.XWTR,END=IEF176I'
> 'F XWTR.XWTR,CLASS=L,JOBID=STC08984'
>
> Where STC08984 is the result of parsing a JES2 $DS'SYSLOG' command
>
> LPR1  2024002  02:01:00:45  STC08984   $HASP890 JOB(SYSLOG)
>
>$HASP890 JOB(SYSLOG)
> STATUS=(EXECUTING/LPR1),CLASS=STC,
>$HASP890
> PRIORITY=15,SYSAFF=(LPR1),HOLD=(NONE)
> LPR1  2024002  02:01:00:45  STC09720   $HASP890 JOB(SYSLOG)
>
>$HASP890 JOB(SYSLOG)
> STATUS=(EXECUTING/LPR2),CLASS=STC,
>$HASP890
> PRIORITY=15,SYSAFF=(LPR2),HOLD=(NONE)
> LPR1  2024002  02:01:00:45  STC06274   $HASP890 JOB(SYSLOG)
>
>$HASP890 JOB(SYSLOG)
> STATUS=(EXECUTING/LPR3),CLASS=STC,
>$HASP890
> PRIORITY=15,SYSAFF=(LPR3),HOLD=(NONE)
> LPR1  2024002  02:01:00:45  STC09125   $HASP890 JOB(SYSLOG)
>
>$HASP890 JOB(SYSLOG)
> STATUS=(EXECUTING/LPR4),CLASS=STC,
>$HASP890
> PRIORITY=15,SYSAFF=(LPR4),HOLD=(NONE)
> LPR1  2024002  02:01:00:45  STC03207   $HASP890 JOB(SYSLOG)
>
>$HASP890 JOB(SYSLOG)
> STATUS=(EXECUTING/LPR5),CLASS=STC,
>$HASP890
> PRIORITY=15,SYSAFF=(LPR5),HOLD=(NONE)
>
> I have tried using a PIPE command without success...
>
> Any ideas?
>
> Thanks
> Paul
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LE C growing heap issue

2024-01-04 Thread Bernd Oppolzer

I had similar situations a lot of times at different customers' locations.

It always turned out that when the developers at the customer's site 
telled me
that they returned all the storage requested to the heap, in fact they 
didn't.
There was always a small area left which was not returned or freed. This 
area was then

responsible for the growing heap on every call.

What I did to diagnose the problem has already been done here, as far as 
I can see.
The most interesting tool is the alternate heap manager (CEL4MCHK, 
IIRC), which allows
you to track all memory allocations and frees, and it even tells you the 
stack trace at the place

when the allocations have been done.

I then wrote a procedure (REXX, IIRC), which processed the output of 
CEL4MCHK, just to see
if there is a certain pattern in the areas which remain allocated. For 
example: I do exactly
1000 requests and then I look for areas which remain allocated (of a 
certain size) and
are present in the list 1000 times (or a multiple of 1000 times). Then I 
do the same 2000 times,
and look, if I have the same area 2000 times, and so on. (There is no 
need, BTW, to run
the tests until all the memory is used up ... if you do this, your 
traces will grow much too large).


Areas which remain constant if I change the number of calls are of no 
interest. But if I find areas,
which change the number exactly with the number of calls, I know the 
place where the allocation
without free has been done. And then I call the developer, who is 
responsible for the module

which does that allocation and ask him or her to fix it.

I've done this many times, and every time I found the module or function 
which was responsible
for the storage leak within some hours. The languages used (which lead 
to the storage leaks)
were C, C++ (often), and even PL/1 - this doesn't really matter, because 
it's all LE.


AFAIK, for Windows and Linux and similar platforms, there is a tool 
called ValGrind,

which does a similar analysis.

The REXX procedure was used primarily to sort and group the requests in 
the CEL4MCHK
output by size and caller sequence etc ... so that the numbers (like 
1000 and 2000 above)

can easily be recognized.

This said: there is of course a small chance that the problem is not 
inside the user's (or
customer's) code, but instead inside some of the vendor's functions (in 
this case: IBM,
for example the JSON processors mentioned). But IMO the probability is 
low ... although
in my career there were some rare situations, where after 4 weeks of 
examination of
error situations, it REALLY turned out that the error was in the IBM 
part ... and it took
me some time to convince IBM. If you want, I can tell you more about 
this ... but offline.


But even if this was the case in your situation, the CEL4MCHK method IMO 
would detect it.
Honestly: I believe, you will find out that the error is in the 
customer's code.


HTH, kind regards

Bernd


Am 04.01.2024 um 22:45 schrieb Eric Erickson:

We are in a bit of a quandary here with some memory issues surrounding our 
application. This is a multitasking LE C application running in 31 bit mode 
that utilizes the IBM JSON and EZNOSQL Services. Some of the attributes are:

•   z/OS V2.5 Operation System
•   POSIX(OFF) - all tasks/subtasks
•   Single address space (31 Bit Mode)
•   ATTACHX Multi-tasking model (no pthreads)
•   Execute as started task – Problem State – Key 4
•   Drop in/out of supervisor state as needed
•   3 EZNOSQL Databases are opened at application start and remain open 
until termination
•   Open EZNOSQL connections tokens are passed to the worker task(s) along 
with the unit of work to be processed

Our issue is that the total available heap grows until we end up exhausting all 
available memory and inevitable application failure, but the key here is that 
while the total heap grows with every unit of work processed by tasks, the in use 
amount only shows no or only a small (<128 bytes) increment between units of 
work. For example, here is a heap report (using LE __heaprpt function) example. So 
we are fairly confident that our application code is not leaking memory.

HeapReport: ZdpQuery @Start  - Total/In Use/Available:   1048576/888160/
 160416.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   1048576/888160/
 160416.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   1560856/888192/
 672664.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   1560856/888192/
 672664.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2073088/888224/
1184864.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2073088/888224/
1184864.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2073088/888224/
1184864.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2073088/888224/
1184864.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2585376/888256/

Re: LE C growing heap issue

2024-01-04 Thread Eric Erickson
I could understand fragmentation being any issue if we did not return all the 
memory, but during each iteration we return all the application allocated 
memory, so how can memory become fragmented?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LE C growing heap issue

2024-01-04 Thread Attila Fogarasi
Sounds like your HEAP options are inappropriate for this application,
classic fragmentation ... e.g. set to KEEP and increment size is too
small.  Check your CEE_RUNOPTS or there could be other LE config/exits
involved.   Suggest you set disp=FREE and work out increment size.
 HEAP(initial, increment, location, disp, init24, incr24)

On Fri, Jan 5, 2024 at 8:45 AM Eric Erickson  wrote:

> We are in a bit of a quandary here with some memory issues surrounding our
> application. This is a multitasking LE C application running in 31 bit mode
> that utilizes the IBM JSON and EZNOSQL Services. Some of the attributes
> are:
>
> •   z/OS V2.5 Operation System
> •   POSIX(OFF) - all tasks/subtasks
> •   Single address space (31 Bit Mode)
> •   ATTACHX Multi-tasking model (no pthreads)
> •   Execute as started task – Problem State – Key 4
> •   Drop in/out of supervisor state as needed
> •   3 EZNOSQL Databases are opened at application start and remain
> open until termination
> •   Open EZNOSQL connections tokens are passed to the worker task(s)
> along with the unit of work to be processed
>
> Our issue is that the total available heap grows until we end up
> exhausting all available memory and inevitable application failure, but the
> key here is that while the total heap grows with every unit of work
> processed by tasks, the in use amount only shows no or only a small (<128
> bytes) increment between units of work. For example, here is a heap report
> (using LE __heaprpt function) example. So we are fairly confident that our
> application code is not leaking memory.
>
> HeapReport: ZdpQuery @Start  - Total/In Use/Available:   1048576/
> 888160/ 160416.
> HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   1048576/
> 888160/ 160416.
> HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   1560856/
> 888192/ 672664.
> HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   1560856/
> 888192/ 672664.
> HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2073088/
> 888224/1184864.
> HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2073088/
> 888224/1184864.
> HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2073088/
> 888224/1184864.
> HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2073088/
> 888224/1184864.
> HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2585376/
> 888256/1697120.
> HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2585376/
> 888256/1697120.
> HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2585376/
> 888256/1697120.
> HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2585376/
> 888256/1697120.
> HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2585376/
> 888256/1697120.
> HeapReport: ZdpQuery @Finish - Total/In Use/Available:   2585376/
> 888256/1697120.
>
> The @Start and @Finish lines show the heap report results just after the
> task is attached and before it terminates. Each of the @Enter/@Exit lines
> show the heap at the unit of work start and end processing, respectively.
>
> We are at a loss to explain why the heap keeps growing. We would expect
> that the heap would grow to some high water mark and become stabilized, but
> the total size just keeps growing until the application fails due to out of
> memory condition, even though there is a significant amount of heap storage
> available. Our tasks are returning all the storage they directly allocate
> back to the heap, as indicated by in use at start & end. While there is a
> small increment in the in use number, we think that may just be LE overhead
> in managing the heap, but in any case is generally less than 128 bytes per
> iteration, and only appears then the total heap size increases. What makes
> this example even more interesting, is that we are processing the exact
> same request for each iteration.
>
> We’ve turned on all the various LE memory analysis options (HEAPCHK,
> RPTSTG) and utilized the LE alternate heap manager to detect overlays,
> corruption, etc.. This pointed us to a couple of minor leaks we plugged but
> has not led us to an answer as to the growing heap. We make heavy use of
> the IBM JSON and EZNOSQL services during processing.
>
> We are in search of any insight, recommendations as to how to proceed in
> diagnosis this issue.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


LE C growing heap issue

2024-01-04 Thread Eric Erickson
We are in a bit of a quandary here with some memory issues surrounding our 
application. This is a multitasking LE C application running in 31 bit mode 
that utilizes the IBM JSON and EZNOSQL Services. Some of the attributes are: 

•   z/OS V2.5 Operation System
•   POSIX(OFF) - all tasks/subtasks
•   Single address space (31 Bit Mode)
•   ATTACHX Multi-tasking model (no pthreads)
•   Execute as started task – Problem State – Key 4
•   Drop in/out of supervisor state as needed 
•   3 EZNOSQL Databases are opened at application start and remain open 
until termination
•   Open EZNOSQL connections tokens are passed to the worker task(s) along 
with the unit of work to be processed

Our issue is that the total available heap grows until we end up exhausting all 
available memory and inevitable application failure, but the key here is that 
while the total heap grows with every unit of work processed by tasks, the in 
use amount only shows no or only a small (<128 bytes) increment between units 
of work. For example, here is a heap report (using LE __heaprpt function) 
example. So we are fairly confident that our application code is not leaking 
memory. 

HeapReport: ZdpQuery @Start  - Total/In Use/Available:   1048576/888160/
 160416.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   1048576/888160/
 160416.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   1560856/888192/
 672664.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   1560856/888192/
 672664.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2073088/888224/
1184864.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2073088/888224/
1184864.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2073088/888224/
1184864.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2073088/888224/
1184864.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2585376/888256/
1697120.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2585376/888256/
1697120.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2585376/888256/
1697120.
HeapReport: ZdpQuery @Enter  - Total/In Use/Available:   2585376/888256/
1697120.
HeapReport: ZdpQuery @Exit   - Total/In Use/Available:   2585376/888256/
1697120.
HeapReport: ZdpQuery @Finish - Total/In Use/Available:   2585376/888256/
1697120.

The @Start and @Finish lines show the heap report results just after the task 
is attached and before it terminates. Each of the @Enter/@Exit lines show the 
heap at the unit of work start and end processing, respectively. 

We are at a loss to explain why the heap keeps growing. We would expect that 
the heap would grow to some high water mark and become stabilized, but the 
total size just keeps growing until the application fails due to out of memory 
condition, even though there is a significant amount of heap storage available. 
Our tasks are returning all the storage they directly allocate back to the 
heap, as indicated by in use at start & end. While there is a small increment 
in the in use number, we think that may just be LE overhead in managing the 
heap, but in any case is generally less than 128 bytes per iteration, and only 
appears then the total heap size increases. What makes this example even more 
interesting, is that we are processing the exact same request for each 
iteration. 

We’ve turned on all the various LE memory analysis options (HEAPCHK, RPTSTG) 
and utilized the LE alternate heap manager to detect overlays, corruption, 
etc.. This pointed us to a couple of minor leaks we plugged but has not led us 
to an answer as to the growing heap. We make heavy use of the IBM JSON and 
EZNOSQL services during processing. 

We are in search of any insight, recommendations as to how to proceed in 
diagnosis this issue. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread Steve Estle
Everyone,

I so appreciate everyone's prompt feedback on my challenge.  I ended up using 
ITschak Mugzach  solution by turning off TSO profile prefix 
and removing quotation marks from my input file.  I am now good to go.  Again 
really appreciate the prompt response!

Steve Estle
sest...@gmail.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


listdsi return code -324?

2024-01-04 Thread Seymour J Metz
I have a script that is getting a return code -324 from listdsi. The parameter 
is alloc dsn(fqdsn) inrtddn(varname) shr. I tried shr both in upper case and in 
lower case. I ccan't send any outbound e-mail fromm my work machine due to 
security. Any suggestions?

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
עַם יִשְׂרָאֵל חַי
נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


RACF and Encryption (Cross Posted

2024-01-04 Thread Steve Beaver
Basically I have to set up data at rest (encrypted on DASD).

 

In that I don't have my clearance yet, or a ID with SPECIAL my hands are
kind of tied.

 

I do know all the RACF work has to be done before anything else.  

 

Also as I understand it, we will have to unload a file, and reload the

File to get the Data at Rest.

 

 

Steve

 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread Glenn Knickerbocker
On Thu, 4 Jan 2024 13:55:22 -0600, Steve Estle  wrote:
>I've hardcoded the enclosing double quote/quote inside my file as follows:
>"'SYS1.PARMLIB'"

That's the problem.  When your exec that works correctly does this:
>   DSName = "'SYS1.PARMLIB'" 

the double quotes are part of the REXX syntax to indicate that what's between 
is a literal string, and only the single quotes are part of the value of that 
string.  When that exec then does:
>   Say DSName

you'll see in the output just the single quotes:
'SYS1.PARMLIB'

When your failing exec does:
>   Say dsn

you'll instead see both sets of quotes, because they're both part of the data 
you read from the input file:
"'SYS1.PARMLIB'"

So don't put the double quotes in your input file, because they're not part of 
your data.

¬R

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread Paul Gilmartin
On Thu, 4 Jan 2024 14:07:20 -0600, Steve Estle wrote:

>It fails on this instruction in 2nd scenario:
>
>x = LISTDSI(dsn)
> 
What is the failure message?

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread Paul Gilmartin
On Thu, 4 Jan 2024 13:55:22 -0600, Steve Estle wrote:

>
>I'm sure I'm doing something boneheaded but can't quite figure out what.  I 
>have a list of fully qualified datasets in a file that I want to read the 
>dataset names once per record and then once I've read the record with dataset 
>name then use that name in a LISTDSI command.  When I hard code name in REXX 
>exec it works fine - when I read dsname from file it fails.  I've hardcoded 
>the enclosing double quote/quote inside my file as follows:
>...
>Trace i
>...
Please show your Trace output.

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread Seymour J Metz
You need to quote the dsname in apostrophes if it's fully qualified. Try

 x = LISTDSI("'"dsn"'")

This might be more readable:

apostrophe = "'"
x = listdsi(apostrophe||dsn||apostrophe)

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
עַם יִשְׂרָאֵל חַי
נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר


From: IBM Mainframe Discussion List  on behalf of 
Steve Estle 
Sent: Thursday, January 4, 2024 2:55 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: LISTDSI - hardcoded dsn vs. read in from file

All,

I'm sure I'm doing something boneheaded but can't quite figure out what.  I 
have a list of fully qualified datasets in a file that I want to read the 
dataset names once per record and then once I've read the record with dataset 
name then use that name in a LISTDSI command.  When I hard code name in REXX 
exec it works fine - when I read dsname from file it fails.  I've hardcoded the 
enclosing double quote/quote inside my file as follows:

"'SYS1.PARMLIB'"

When it fails (2nd version) I get this error message:

IKJ56712I INVALID KEYWORD, "'SYS1.PARMLIB'"

Two scenarios:

Works Fine:

/* REXX */

/*--*/

/*S E L E C T   D S N S   &  L I S T   I N F O*/

/*--*/

   DSName = "'SYS1.PARMLIB'"

   Say DSName

   x = LISTDSI(DSName)

   SAY 'Function code from LISTDSI is: ' x

   SAY 'The data set name is:  ' sysdsname

   SAY 'The device unit on which the volume resides is:' sysunit

   SAY 'The record format is:  ' sysrecfm

   SAY 'The logical record length is:  ' syslrecl

   SAY 'The block size is: ' sysblksize

   SAY 'The allocation in space units is:  ' sysalloc


EXIT

Failing Version:

/* REXX */



INDSN = "'P69792.LISTDSI.INPUT'"

OUTDSN = "'P69792.LISTDSI.OUTPUT.CSV'"

DDNI  = "DD"||RANDOM(1,9)

DDNO  = "DD"||RANDOM(1,9)



/*--*/

/*  R E A D   D S N   L I S T   */

/*--*/

ADDRESS TSO "ALLOC DA(" INDSN ") DDNAME( " DDNI ") SHR REUSE "

ADDRESS TSO "ALLOC DA(" OUTDSN ") DDNAME( " DDNO ") OLD REUSE "

ADDRESS TSO "EXECIO * DISKR " DDNI "(STEM Dsni. FINIS"

ADDRESS TSO "FREE DDNAME(" DDNI ") "



/*--*/

/*S E L E C T   D S N S   &  L I S T   I N F O  */

/*--*/


   Trace i

DO I = 1 TO Dsni.0

   dsn = Word(Dsni.I,1)

   Say dsn

   x = LISTDSI(dsn)

   SAY 'Function code from LISTDSI is: ' x

   SAY 'The data set name is:  ' sysdsname

   SAY 'The device unit on which the volume resides is:' sysunit

   SAY 'The record format is:  ' sysrecfm

   SAY 'The logical record length is:  ' syslrecl

   SAY 'The block size is: ' sysblksize

   SAY 'The allocation in space units is:  ' sysalloc

END I


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread Steve Estle
It fails on this instruction in 2nd scenario:

x = LISTDSI(dsn)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread ITschak Mugzach
Simply remove the quote and double quotes from your input file and add
address tso prof nopref

The list Sai sees two set of quotes instead of one at a maximum. You can
try Dan=translate(dsn,' ','"') before the list Sai command

*| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere
Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux
and IBM I **|  *

*|* *Email**: i_mugz...@securiteam.co.il **|* *Mob**: +972 522 986404 **|*
*Skype**: ItschakMugzach **|* *Web**: www.Securiteam.co.il  **|*





בתאריך יום ה׳, 4 בינו׳ 2024 ב-21:55 מאת Steve Estle :

> All,
>
> I'm sure I'm doing something boneheaded but can't quite figure out what.
> I have a list of fully qualified datasets in a file that I want to read the
> dataset names once per record and then once I've read the record with
> dataset name then use that name in a LISTDSI command.  When I hard code
> name in REXX exec it works fine - when I read dsname from file it fails.
> I've hardcoded the enclosing double quote/quote inside my file as follows:
>
> "'SYS1.PARMLIB'"
>
> When it fails (2nd version) I get this error message:
>
> IKJ56712I INVALID KEYWORD, "'SYS1.PARMLIB'"
>
> Two scenarios:
>
> Works Fine:
>
> /* REXX */
>
>
> /*--*/
>
> /*S E L E C T   D S N S   &  L I S T   I N F O*/
>
> /*--*/
>
>DSName = "'SYS1.PARMLIB'"
>
>Say DSName
>
>x = LISTDSI(DSName)
>
>SAY 'Function code from LISTDSI is: ' x
>
>SAY 'The data set name is:  ' sysdsname
>
>SAY 'The device unit on which the volume resides is:' sysunit
>
>SAY 'The record format is:  ' sysrecfm
>
>SAY 'The logical record length is:  ' syslrecl
>
>SAY 'The block size is: ' sysblksize
>
>SAY 'The allocation in space units is:  ' sysalloc
>
>
> EXIT
>
> Failing Version:
>
> /* REXX */
>
>
>
> INDSN = "'P69792.LISTDSI.INPUT'"
>
> OUTDSN = "'P69792.LISTDSI.OUTPUT.CSV'"
>
> DDNI  = "DD"||RANDOM(1,9)
>
> DDNO  = "DD"||RANDOM(1,9)
>
>
>
> /*--*/
>
> /*  R E A D   D S N   L I S T   */
>
> /*--*/
>
> ADDRESS TSO "ALLOC DA(" INDSN ") DDNAME( " DDNI ") SHR REUSE "
>
> ADDRESS TSO "ALLOC DA(" OUTDSN ") DDNAME( " DDNO ") OLD REUSE "
>
> ADDRESS TSO "EXECIO * DISKR " DDNI "(STEM Dsni. FINIS"
>
> ADDRESS TSO "FREE DDNAME(" DDNI ") "
>
>
>
> /*--*/
>
> /*S E L E C T   D S N S   &  L I S T   I N F O  */
>
> /*--*/
>
>
>Trace i
>
> DO I = 1 TO Dsni.0
>
>dsn = Word(Dsni.I,1)
>
>Say dsn
>
>x = LISTDSI(dsn)
>
>SAY 'Function code from LISTDSI is: ' x
>
>SAY 'The data set name is:  ' sysdsname
>
>SAY 'The device unit on which the volume resides is:' sysunit
>
>SAY 'The record format is:  ' sysrecfm
>
>SAY 'The logical record length is:  ' syslrecl
>
>SAY 'The block size is: ' sysblksize
>
>SAY 'The allocation in space units is:  ' sysalloc
>
> END I
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread Binyamin Dissen
Which instruction fails?

Do TRACE on the whole routine.

On Thu, 4 Jan 2024 13:55:22 -0600 Steve Estle  wrote:

:>All,
:>
:>I'm sure I'm doing something boneheaded but can't quite figure out what.  I 
have a list of fully qualified datasets in a file that I want to read the 
dataset names once per record and then once I've read the record with dataset 
name then use that name in a LISTDSI command.  When I hard code name in REXX 
exec it works fine - when I read dsname from file it fails.  I've hardcoded the 
enclosing double quote/quote inside my file as follows:
:>
:>"'SYS1.PARMLIB'"
:>
:>When it fails (2nd version) I get this error message:
:>
:>IKJ56712I INVALID KEYWORD, "'SYS1.PARMLIB'"
:>
:>Two scenarios:
:>
:>Works Fine:
:>
:>/* REXX */
 
:>
:>/*--*/
:>
:>/*S E L E C T   D S N S   &  L I S T   I N F O*/
:>
:>/*--*/
:>
:>   DSName = "'SYS1.PARMLIB'" 
:>
:>   Say DSName
:>
:>   x = LISTDSI(DSName)   
:>
:>   SAY 'Function code from LISTDSI is: ' x   
:>
:>   SAY 'The data set name is:  ' sysdsname   
:>
:>   SAY 'The device unit on which the volume resides is:' sysunit 
:>
:>   SAY 'The record format is:  ' sysrecfm
:>
:>   SAY 'The logical record length is:  ' syslrecl
:>
:>   SAY 'The block size is: ' sysblksize  
:>
:>   SAY 'The allocation in space units is:  ' sysalloc
:>
:> 
:>EXIT   
:>
:>Failing Version:
:>
:>/* REXX */   
:>
:>  
:>
:>INDSN = "'P69792.LISTDSI.INPUT'" 
:>
:>OUTDSN = "'P69792.LISTDSI.OUTPUT.CSV'"   
:>
:>DDNI  = "DD"||RANDOM(1,9)
:>
:>DDNO  = "DD"||RANDOM(1,9)
:>
:>  
:>
:>/*--*/
:>
:>/*  R E A D   D S N   L I S T   */
:>
:>/*--*/
:>
:>ADDRESS TSO "ALLOC DA(" INDSN ") DDNAME( " DDNI ") SHR REUSE "   
:>
:>ADDRESS TSO "ALLOC DA(" OUTDSN ") DDNAME( " DDNO ") OLD REUSE "  
:>
:>ADDRESS TSO "EXECIO * DISKR " DDNI "(STEM Dsni. FINIS"   
:>
:>ADDRESS TSO "FREE DDNAME(" DDNI ") " 
:>
:>  
:>
:>/*--*/
:>
:>/*S E L E C T   D S N S   &  L I S T   I N F O  */
:>
:>/*--*/
:>
:>
:>   Trace i
:>
:>DO I = 1 TO Dsni.0
:>
:>   dsn = Word(Dsni.I,1)   
:>
:>   Say dsn
:>
:>   x = LISTDSI(dsn)   
:>
:>   SAY 'Function code from LISTDSI is: ' x
:>
:>   SAY 'The data set name is:  ' sysdsname
:>
:>   SAY 'The device unit on which the volume resides is:' sysunit  
:>
:>   SAY 'The record format is:  ' sysrecfm 
:>
:>   SAY 'The logical record length is:  ' syslrecl 
:>
:>   SAY 'The block size is: ' sysblksize
:>
:>   SAY 'The allocation in space units is:  ' sysalloc 
:>
:>END I 
:>  
:>
:>--
:>For IBM-MAIN subscribe / signoff / archive access instructions,
:>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
Binyamin Dissen 
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


LISTDSI - hardcoded dsn vs. read in from file

2024-01-04 Thread Steve Estle
All,

I'm sure I'm doing something boneheaded but can't quite figure out what.  I 
have a list of fully qualified datasets in a file that I want to read the 
dataset names once per record and then once I've read the record with dataset 
name then use that name in a LISTDSI command.  When I hard code name in REXX 
exec it works fine - when I read dsname from file it fails.  I've hardcoded the 
enclosing double quote/quote inside my file as follows:

"'SYS1.PARMLIB'"

When it fails (2nd version) I get this error message:

IKJ56712I INVALID KEYWORD, "'SYS1.PARMLIB'"

Two scenarios:

Works Fine:

/* REXX */  
   

/*--*/

/*S E L E C T   D S N S   &  L I S T   I N F O*/

/*--*/

   DSName = "'SYS1.PARMLIB'" 

   Say DSName

   x = LISTDSI(DSName)   

   SAY 'Function code from LISTDSI is: ' x   

   SAY 'The data set name is:  ' sysdsname   

   SAY 'The device unit on which the volume resides is:' sysunit 

   SAY 'The record format is:  ' sysrecfm

   SAY 'The logical record length is:  ' syslrecl

   SAY 'The block size is: ' sysblksize  

   SAY 'The allocation in space units is:  ' sysalloc

 
EXIT   

Failing Version:

/* REXX */   

  

INDSN = "'P69792.LISTDSI.INPUT'" 

OUTDSN = "'P69792.LISTDSI.OUTPUT.CSV'"   

DDNI  = "DD"||RANDOM(1,9)

DDNO  = "DD"||RANDOM(1,9)

  

/*--*/

/*  R E A D   D S N   L I S T   */

/*--*/

ADDRESS TSO "ALLOC DA(" INDSN ") DDNAME( " DDNI ") SHR REUSE "   

ADDRESS TSO "ALLOC DA(" OUTDSN ") DDNAME( " DDNO ") OLD REUSE "  

ADDRESS TSO "EXECIO * DISKR " DDNI "(STEM Dsni. FINIS"   

ADDRESS TSO "FREE DDNAME(" DDNI ") " 

  

/*--*/

/*S E L E C T   D S N S   &  L I S T   I N F O  */

/*--*/


   Trace i

DO I = 1 TO Dsni.0

   dsn = Word(Dsni.I,1)   

   Say dsn

   x = LISTDSI(dsn)   

   SAY 'Function code from LISTDSI is: ' x

   SAY 'The data set name is:  ' sysdsname

   SAY 'The device unit on which the volume resides is:' sysunit  

   SAY 'The record format is:  ' sysrecfm 

   SAY 'The logical record length is:  ' syslrecl 

   SAY 'The block size is: ' sysblksize

   SAY 'The allocation in space units is:  ' sysalloc 

END I 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Digital Certificates -- Site Certificate

2024-01-04 Thread Steve Beaver
I have NOT done Digital Certificates in 5 years and I have NEVER done a Site
Certificate.

 

So does anyone have a document that is a short and to the point of how to
setup 

A Site Certificate

 

 

Steve

 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


SYSPLEX JES2 SYSLOG processing

2024-01-04 Thread Paul Gorlinsky
On a z/OS 2.5 system using z System Automation V4.3, I am trying to set a daily 
event that runs on each LPAR of the SYSPLEX.

The event needs to issue a 'W L' then locate the SYSLOG output for that 
specific LPAR, start an XWTR with job selection for class and JOBID...

For example, 
'S XWTR.XWTR,END=IEF176I'
'F XWTR.XWTR,CLASS=L,JOBID=STC08984'

Where STC08984 is the result of parsing a JES2 $DS'SYSLOG' command 

LPR1  2024002  02:01:00:45  STC08984   $HASP890 JOB(SYSLOG) 

   $HASP890 JOB(SYSLOG)
STATUS=(EXECUTING/LPR1),CLASS=STC,   
   $HASP890
PRIORITY=15,SYSAFF=(LPR1),HOLD=(NONE)
LPR1  2024002  02:01:00:45  STC09720   $HASP890 JOB(SYSLOG) 

   $HASP890 JOB(SYSLOG)
STATUS=(EXECUTING/LPR2),CLASS=STC,   
   $HASP890
PRIORITY=15,SYSAFF=(LPR2),HOLD=(NONE)
LPR1  2024002  02:01:00:45  STC06274   $HASP890 JOB(SYSLOG) 

   $HASP890 JOB(SYSLOG)
STATUS=(EXECUTING/LPR3),CLASS=STC,   
   $HASP890
PRIORITY=15,SYSAFF=(LPR3),HOLD=(NONE)
LPR1  2024002  02:01:00:45  STC09125   $HASP890 JOB(SYSLOG) 

   $HASP890 JOB(SYSLOG)
STATUS=(EXECUTING/LPR4),CLASS=STC,   
   $HASP890
PRIORITY=15,SYSAFF=(LPR4),HOLD=(NONE)
LPR1  2024002  02:01:00:45  STC03207   $HASP890 JOB(SYSLOG) 

   $HASP890 JOB(SYSLOG)
STATUS=(EXECUTING/LPR5),CLASS=STC,   
   $HASP890
PRIORITY=15,SYSAFF=(LPR5),HOLD=(NONE)

I have tried using a PIPE command without success...

Any ideas?

Thanks
Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Network not working between zOS and zVM

2024-01-04 Thread Alain Benvéniste
I have removed the ethernet word on link statement. 

And it works ! Thanks !

What would be the impact if i start a z/os and a z/vm test environnement ? 
Ethernet word will not be required ?

Resiliency Services on Z Mainframe
alain.benveni...@kyndryl.com 

> Le 4 janv. 2024 à 15:49, Alan Altmark  a écrit :
> 
> On Wed, 3 Jan 2024 09:04:54 -0600, Alain Benvéniste  
> wrote:
>> I had a z/OS (10.1.106.201) under a z/VM(10.1.106.200) speaking to each 
>> other through CTC, and it worked.
>> Now I want them to speak to each other through a unique OSA card as lpars.  
>> it works but sporadically.
>> Each one can ping my PC(10.1.106.250).
> 
> It sounds like MAC address confusion of some sort, seen when two hosts have 
> the same IP address or when the external routers are confused.  If you have 
> dynamic routing, make sure those configuration reflect the direct connections 
> instead of routing override pointing to CTC.
> 
> When it is misbehaving, you need to see what the routers are telling you 
> about both systems.  It feels like there's a static route stuck somewhere.  
> "Sporadic" is the clue.
> 
> For fun, try removing the "ETHERNET" keyword from the z/VM LINK statement.   
> It's ok to mix IP and ETHERNET mode traffic on the same OSA, but it's 
> possible there is some kind of issue with the MAC address that VM is using 
> because of ETHERNET mode.  (It gets a new MAC address from the OSA.)
> 
> Alan Altmark
> IBM
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


IEAMDBLG tweak

2024-01-04 Thread Michael Oujesky
Just an FYI. but IEAMDBLG can be modified to exten the output record 
length from 132 to 255 and thereby remove split SYSLOG lines.


Michael

At 11:16 AM 1/4/2024, Radoslaw Skorupka wrote:

Content-Transfer-Encoding: 7bit

The following scenario:
z/OS 2.5, two-member parallel sysplex.

Sometimes I observe IXG251I and IXG284I
ISG251I informs the dataset is in use by another sysplex member
IXG284I says the dataset is PENDING DELETE.

It usually happens during log offload (archivization) using IEAMDBLG 
tool, however it is not predictable behavior.


The dataset is deleted later, so it is finally auto-resolved, 
however I think the above should never happen in normal circumstances.


Any clue?

--
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


OPERLOG contention

2024-01-04 Thread Radoslaw Skorupka

The following scenario:
z/OS 2.5, two-member parallel sysplex.

Sometimes I observe IXG251I and IXG284I
ISG251I informs the dataset is in use by another sysplex member
IXG284I says the dataset is PENDING DELETE.

It usually happens during log offload (archivization) using IEAMDBLG 
tool, however it is not predictable behavior.


The dataset is deleted later, so it is finally auto-resolved, however I 
think the above should never happen in normal circumstances.


Any clue?

--
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]

2024-01-04 Thread Radoslaw Skorupka

It was discussed many times.
There's even single-word German description of such disclaimer.
However  the disclaimer has almost no legal meaning.
Accidental recipient has no obligation to delete the message or keep it 
secret, etc. Nothing which is caused by the disclaimer (it can be caused 
by the law, but not disclaimer).

Recipient is not obliged to do anything, including reporting abuse, etc.

BTW: Due to some EU rights a company is obliged to have a footer with 
share capital, company address, etc. It is obligatory only for official 
documents signed by procurement people. What lawyers did? They insisted 
to put the note in every email sent by every employee or contractor. 
Needless to say the note grew up - it was getting longer and longer... 
Despite only very very few emails really needed it.


--
Radoslaw Skorupka
Lodz, Poland





W dniu 04.01.2024 o 16:49, Seymour J Metz pisze:

If they e-mail me your medical information, that is a HIPAA violation even if I 
delete it. If they e-mail me classified documents,, that is a security breach 
even if I deleted it. IANAL, but I don't think that a disclaimer would protect 
you from severe consequences, both civil and criminal. Neither does a 
disclaimer preclude the recipient reporting it to the Feds.

Protect sensitive data; don't rely on disclaimers.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
עַם יִשְׂרָאֵל חַי
נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר


From: IBM Mainframe Discussion List  on behalf of Steve 
Thompson
Sent: Thursday, January 4, 2024 10:23 AM
To:IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]

I am glad you brought this up.

I get these things on individual/entity emails sent directly to
me. I didn't sign for this. How could they prove I got it?

Per USPS regs and some other fed Agency whose name I've
forgotten, if you receive something in the mail addressed to you,
that you didn't ask for, it is yours, even if a bill is sent with
it requiring you to either return it or pay for it. Most may not
know about this. But this went back into the Sixties when
different mass marketing companies that would send out something
like a medallion to hang somewhere (just an example). Well, the
law/regs were changed to make that a free gift to you because why
should you have to return it at your cost when you hadn't asked
for it?

Enter FAX machines used by attorneys. We need to put CYA verbiage
at the bottom of this document. The question is, is it actually
enforceable? This then went to boiler plate on emails from
medical entities (HIPAA stuff). But the regs tell you that data
must be secured

So is a statement to the effect of "this being a non-disclosure
thing" enforceable since one had no other relationship to the
sender, such that no NDA had ever been signed?

So, yeah, glad you mentioned this.

Imagine if it had been marked as classified Top Secret EYES
Only. Could you be charged for having unauthorized classified
data? And just who would you report this to?

On 1/3/2024 4:08 PM, Joel C. Ewing wrote:

A test of another long-winded, non-enforceable corporate
disclaimer perhaps?   Don't you just love corporate lawyers.

The named recipient in this case is the IBM-Main list, and
since this list is echoed to a world-accessible newsgroup, no
one posting anything to this list can reasonably expect
anything on this list to be treated as "Confidential" or any
viewing of any item on this list to have been "received in
error".  That the views represented are "solely those of the
author" is the only part of the DISCLAIMER that has any
validity in this context.  By simply replying to this post
without excluding all of the original post I have violated the
non-enforceable parts of the disclaimer.

 JC Ewing

On 1/3/24 10:24, Allan Staller wrote:

Classification: Confidential

test

::DISCLAIMER::

The contents of this e-mail and any attachment(s) are
confidential and intended for the named recipient(s) only.
E-mail transmission is not guaranteed to be secure or
error-free as information could be intercepted, corrupted,
lost, destroyed, arrive late or incomplete, or may contain
viruses in transmission. The e mail and its contents (with or
without referred errors) shall therefore not attach any
liability on the originator or HCL or its affiliates. Views or
opinions, if any, presented in this email are solely those of
the author and may not necessarily reflect the views or
opinions of HCL or its affiliates. Any form of reproduction,
dissemination, copying, disclosure, modification, distribution
and / or publication of this message without the prior written
consent of authorized representative of HCL is strictly
prohibited. If you have received this email in error please
delete it and notify the sender immediately. Before opening
any email and/or attachments, please check them for viruses
and other defects.

Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]

2024-01-04 Thread Mike Schwab
HIPPA applies to medical professionals and insurance departments, and not
to anyone to whom the information was sent.

National security call FBI to retrieve, sanitize.

On Thu, Jan 4, 2024 at 9:24 AM Steve Thompson  wrote:

> I am glad you brought this up.
>
> I get these things on individual/entity emails sent directly to
> me. I didn't sign for this. How could they prove I got it?
>
> Per USPS regs and some other fed Agency whose name I've
> forgotten, if you receive something in the mail addressed to you,
> that you didn't ask for, it is yours, even if a bill is sent with
> it requiring you to either return it or pay for it. Most may not
> know about this. But this went back into the Sixties when
> different mass marketing companies that would send out something
> like a medallion to hang somewhere (just an example). Well, the
> law/regs were changed to make that a free gift to you because why
> should you have to return it at your cost when you hadn't asked
> for it?
>
> Enter FAX machines used by attorneys. We need to put CYA verbiage
> at the bottom of this document. The question is, is it actually
> enforceable? This then went to boiler plate on emails from
> medical entities (HIPAA stuff). But the regs tell you that data
> must be secured
>
> So is a statement to the effect of "this being a non-disclosure
> thing" enforceable since one had no other relationship to the
> sender, such that no NDA had ever been signed?
>
> So, yeah, glad you mentioned this.
>
> Imagine if it had been marked as classified Top Secret EYES
> Only. Could you be charged for having unauthorized classified
> data? And just who would you report this to?
>
> On 1/3/2024 4:08 PM, Joel C. Ewing wrote:
> > A test of another long-winded, non-enforceable corporate
> > disclaimer perhaps?   Don't you just love corporate lawyers.
> >
> > The named recipient in this case is the IBM-Main list, and
> > since this list is echoed to a world-accessible newsgroup, no
> > one posting anything to this list can reasonably expect
> > anything on this list to be treated as "Confidential" or any
> > viewing of any item on this list to have been "received in
> > error".  That the views represented are "solely those of the
> > author" is the only part of the DISCLAIMER that has any
> > validity in this context.  By simply replying to this post
> > without excluding all of the original post I have violated the
> > non-enforceable parts of the disclaimer.
> >
> > JC Ewing
> >
> > On 1/3/24 10:24, Allan Staller wrote:
> >> Classification: Confidential
> >>
> >> test
> >>
> >> ::DISCLAIMER::
> >> 
> >> The contents of this e-mail and any attachment(s) are
> >> confidential and intended for the named recipient(s) only.
> >> E-mail transmission is not guaranteed to be secure or
> >> error-free as information could be intercepted, corrupted,
> >> lost, destroyed, arrive late or incomplete, or may contain
> >> viruses in transmission. The e mail and its contents (with or
> >> without referred errors) shall therefore not attach any
> >> liability on the originator or HCL or its affiliates. Views or
> >> opinions, if any, presented in this email are solely those of
> >> the author and may not necessarily reflect the views or
> >> opinions of HCL or its affiliates. Any form of reproduction,
> >> dissemination, copying, disclosure, modification, distribution
> >> and / or publication of this message without the prior written
> >> consent of authorized representative of HCL is strictly
> >> prohibited. If you have received this email in error please
> >> delete it and notify the sender immediately. Before opening
> >> any email and/or attachments, please check them for viruses
> >> and other defects.
> >> 
> >>
> >> ...
> >
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]

2024-01-04 Thread Seymour J Metz
If they e-mail me your medical information, that is a HIPAA violation even if I 
delete it. If they e-mail me classified documents,, that is a security breach 
even if I deleted it. IANAL, but I don't think that a disclaimer would protect 
you from severe consequences, both civil and criminal. Neither does a 
disclaimer preclude the recipient reporting it to the Feds.

Protect sensitive data; don't rely on disclaimers.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
עַם יִשְׂרָאֵל חַי
נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר


From: IBM Mainframe Discussion List  on behalf of 
Steve Thompson 
Sent: Thursday, January 4, 2024 10:23 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]

I am glad you brought this up.

I get these things on individual/entity emails sent directly to
me. I didn't sign for this. How could they prove I got it?

Per USPS regs and some other fed Agency whose name I've
forgotten, if you receive something in the mail addressed to you,
that you didn't ask for, it is yours, even if a bill is sent with
it requiring you to either return it or pay for it. Most may not
know about this. But this went back into the Sixties when
different mass marketing companies that would send out something
like a medallion to hang somewhere (just an example). Well, the
law/regs were changed to make that a free gift to you because why
should you have to return it at your cost when you hadn't asked
for it?

Enter FAX machines used by attorneys. We need to put CYA verbiage
at the bottom of this document. The question is, is it actually
enforceable? This then went to boiler plate on emails from
medical entities (HIPAA stuff). But the regs tell you that data
must be secured

So is a statement to the effect of "this being a non-disclosure
thing" enforceable since one had no other relationship to the
sender, such that no NDA had ever been signed?

So, yeah, glad you mentioned this.

Imagine if it had been marked as classified Top Secret EYES
Only. Could you be charged for having unauthorized classified
data? And just who would you report this to?

On 1/3/2024 4:08 PM, Joel C. Ewing wrote:
> A test of another long-winded, non-enforceable corporate
> disclaimer perhaps?   Don't you just love corporate lawyers.
>
> The named recipient in this case is the IBM-Main list, and
> since this list is echoed to a world-accessible newsgroup, no
> one posting anything to this list can reasonably expect
> anything on this list to be treated as "Confidential" or any
> viewing of any item on this list to have been "received in
> error".  That the views represented are "solely those of the
> author" is the only part of the DISCLAIMER that has any
> validity in this context.  By simply replying to this post
> without excluding all of the original post I have violated the
> non-enforceable parts of the disclaimer.
>
> JC Ewing
>
> On 1/3/24 10:24, Allan Staller wrote:
>> Classification: Confidential
>>
>> test
>>
>> ::DISCLAIMER::
>> 
>> The contents of this e-mail and any attachment(s) are
>> confidential and intended for the named recipient(s) only.
>> E-mail transmission is not guaranteed to be secure or
>> error-free as information could be intercepted, corrupted,
>> lost, destroyed, arrive late or incomplete, or may contain
>> viruses in transmission. The e mail and its contents (with or
>> without referred errors) shall therefore not attach any
>> liability on the originator or HCL or its affiliates. Views or
>> opinions, if any, presented in this email are solely those of
>> the author and may not necessarily reflect the views or
>> opinions of HCL or its affiliates. Any form of reproduction,
>> dissemination, copying, disclosure, modification, distribution
>> and / or publication of this message without the prior written
>> consent of authorized representative of HCL is strictly
>> prohibited. If you have received this email in error please
>> delete it and notify the sender immediately. Before opening
>> any email and/or attachments, please check them for viruses
>> and other defects.
>> 
>>
>> ...
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: What is the PDS command?

2024-01-04 Thread Seymour J Metz
I first encountered IPCS on a 2 MiB machine (165 with MVT upgraded to 168 with 
SVS.); the dumps were a lot smaller, so IPCS was nice rather than essential. In 
today's environment, I don't want to think about living without it.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
עַם יִשְׂרָאֵל חַי
נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר


From: IBM Mainframe Discussion List  on behalf of 
Colin Paice 
Sent: Thursday, January 4, 2024 8:33 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: What is the PDS command?

I remember (45 years ago, before IPCS) someone from CICS getting a paper
dump from a US secret government department - with some of the sensitive
data cut out of the  EBCDIC translation on the right ( so it had holes in
the printout).   Clearly the people with scissors did not realise the data
was in hex on the left hand side.


On Thu, 4 Jan 2024 at 12:23, Seymour J Metz  wrote:

> Paper?! For, e.g., SYSABEND, SYSUDUMP, on SPOOL you can at least do a
> search for, e.g., eyecatchers, key addresses. On paper a large dump is
> unmanageable.
>
> When you're swamped is precisely when you need good tools. Not having
> PDS86 is bad; not having IPCS is intolerable.
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
> עַם יִשְׂרָאֵל חַי
> נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר
>
> 
> From: IBM Mainframe Discussion List  on behalf
> of Edward Gould <04bcc43af339-dmarc-requ...@listserv.ua.edu>
> Sent: Thursday, January 4, 2024 2:54 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: What is the PDS command?
>
> > On Dec 27, 2023, at 4:57 AM, David Spiegel <
> 0468385049d1-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Hi Ed,
> > You and your programmer were not impressed?!
> > How can you not be impressed by the ability to add Directory Blocks (by
> moving members out of the way), the ability to generate JCL to LinkEdit PDS
> members, the ability to copy members (with ISPF Stats) or the ability to
> recover deleted members (with selection criteria)?
> > (There are a lot more features.)
> > SMH.
> >
> > (I've been using the PDS Command Processor (File 182) for more than 40
> years.)
> >
> > Regards,
> > David
>
> David:
> I was looking at it from a typical applications programmer POV as a every
> day utility. Most of the features (I thought) were sysprog type or maybe a
> senior level programmer. I1. I do not like trust programs from the CBTTAPE
> as I did not want to try and debug anything that I had not written and
> especially at 0 dark 30 . I was working at that time 100 hours a week and
> supporting people in thee Time zones and I wanted everything to go as
> smoothly as possible. The third times zone was western Europe and as
> friendly as they were they would pull out the daggers every now and then.
> The locals were semi (except for about 20)competentand we rarely heard a
> peep out of (except for the 20). My workload at the time included going
> through about 20 standalone dumps over a week and we did not have IPCS so
> every dump was on paper and went from 2 foot thick to 5 foot. I had my
> hands full .
> Ed
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: test. please ignore -- IGNORING YOU IGNORING YOU [not]

2024-01-04 Thread Steve Thompson

I am glad you brought this up.

I get these things on individual/entity emails sent directly to 
me. I didn't sign for this. How could they prove I got it?


Per USPS regs and some other fed Agency whose name I've 
forgotten, if you receive something in the mail addressed to you, 
that you didn't ask for, it is yours, even if a bill is sent with 
it requiring you to either return it or pay for it. Most may not 
know about this. But this went back into the Sixties when 
different mass marketing companies that would send out something 
like a medallion to hang somewhere (just an example). Well, the 
law/regs were changed to make that a free gift to you because why 
should you have to return it at your cost when you hadn't asked 
for it?


Enter FAX machines used by attorneys. We need to put CYA verbiage 
at the bottom of this document. The question is, is it actually 
enforceable? This then went to boiler plate on emails from 
medical entities (HIPAA stuff). But the regs tell you that data 
must be secured


So is a statement to the effect of "this being a non-disclosure 
thing" enforceable since one had no other relationship to the 
sender, such that no NDA had ever been signed?


So, yeah, glad you mentioned this.

Imagine if it had been marked as classified Top Secret EYES 
Only. Could you be charged for having unauthorized classified 
data? And just who would you report this to?


On 1/3/2024 4:08 PM, Joel C. Ewing wrote:
A test of another long-winded, non-enforceable corporate 
disclaimer perhaps?   Don't you just love corporate lawyers.


The named recipient in this case is the IBM-Main list, and 
since this list is echoed to a world-accessible newsgroup, no 
one posting anything to this list can reasonably expect 
anything on this list to be treated as "Confidential" or any 
viewing of any item on this list to have been "received in 
error".  That the views represented are "solely those of the 
author" is the only part of the DISCLAIMER that has any 
validity in this context.  By simply replying to this post 
without excluding all of the original post I have violated the 
non-enforceable parts of the disclaimer.


    JC Ewing

On 1/3/24 10:24, Allan Staller wrote:

Classification: Confidential

test

::DISCLAIMER::

The contents of this e-mail and any attachment(s) are 
confidential and intended for the named recipient(s) only. 
E-mail transmission is not guaranteed to be secure or 
error-free as information could be intercepted, corrupted, 
lost, destroyed, arrive late or incomplete, or may contain 
viruses in transmission. The e mail and its contents (with or 
without referred errors) shall therefore not attach any 
liability on the originator or HCL or its affiliates. Views or 
opinions, if any, presented in this email are solely those of 
the author and may not necessarily reflect the views or 
opinions of HCL or its affiliates. Any form of reproduction, 
dissemination, copying, disclosure, modification, distribution 
and / or publication of this message without the prior written 
consent of authorized representative of HCL is strictly 
prohibited. If you have received this email in error please 
delete it and notify the sender immediately. Before opening 
any email and/or attachments, please check them for viruses 
and other defects.



...




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Network not working between zOS and zVM

2024-01-04 Thread Alan Altmark
On Wed, 3 Jan 2024 09:04:54 -0600, Alain Benvéniste  
wrote:
>I had a z/OS (10.1.106.201) under a z/VM(10.1.106.200) speaking to each other 
>through CTC, and it worked.
>Now I want them to speak to each other through a unique OSA card as lpars.  it 
>works but sporadically.
>Each one can ping my PC(10.1.106.250).

It sounds like MAC address confusion of some sort, seen when two hosts have the 
same IP address or when the external routers are confused.  If you have dynamic 
routing, make sure those configuration reflect the direct connections instead 
of routing override pointing to CTC.

When it is misbehaving, you need to see what the routers are telling you about 
both systems.  It feels like there's a static route stuck somewhere.  
"Sporadic" is the clue.

For fun, try removing the "ETHERNET" keyword from the z/VM LINK statement.   
It's ok to mix IP and ETHERNET mode traffic on the same OSA, but it's possible 
there is some kind of issue with the MAC address that VM is using because of 
ETHERNET mode.  (It gets a new MAC address from the OSA.)

Alan Altmark
IBM

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: What is the PDS command?

2024-01-04 Thread Colin Paice
I remember (45 years ago, before IPCS) someone from CICS getting a paper
dump from a US secret government department - with some of the sensitive
data cut out of the  EBCDIC translation on the right ( so it had holes in
the printout).   Clearly the people with scissors did not realise the data
was in hex on the left hand side.


On Thu, 4 Jan 2024 at 12:23, Seymour J Metz  wrote:

> Paper?! For, e.g., SYSABEND, SYSUDUMP, on SPOOL you can at least do a
> search for, e.g., eyecatchers, key addresses. On paper a large dump is
> unmanageable.
>
> When you're swamped is precisely when you need good tools. Not having
> PDS86 is bad; not having IPCS is intolerable.
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
> עַם יִשְׂרָאֵל חַי
> נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר
>
> 
> From: IBM Mainframe Discussion List  on behalf
> of Edward Gould <04bcc43af339-dmarc-requ...@listserv.ua.edu>
> Sent: Thursday, January 4, 2024 2:54 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: What is the PDS command?
>
> > On Dec 27, 2023, at 4:57 AM, David Spiegel <
> 0468385049d1-dmarc-requ...@listserv.ua.edu> wrote:
> >
> > Hi Ed,
> > You and your programmer were not impressed?!
> > How can you not be impressed by the ability to add Directory Blocks (by
> moving members out of the way), the ability to generate JCL to LinkEdit PDS
> members, the ability to copy members (with ISPF Stats) or the ability to
> recover deleted members (with selection criteria)?
> > (There are a lot more features.)
> > SMH.
> >
> > (I've been using the PDS Command Processor (File 182) for more than 40
> years.)
> >
> > Regards,
> > David
>
> David:
> I was looking at it from a typical applications programmer POV as a every
> day utility. Most of the features (I thought) were sysprog type or maybe a
> senior level programmer. I1. I do not like trust programs from the CBTTAPE
> as I did not want to try and debug anything that I had not written and
> especially at 0 dark 30 . I was working at that time 100 hours a week and
> supporting people in thee Time zones and I wanted everything to go as
> smoothly as possible. The third times zone was western Europe and as
> friendly as they were they would pull out the daggers every now and then.
> The locals were semi (except for about 20)competentand we rarely heard a
> peep out of (except for the 20). My workload at the time included going
> through about 20 standalone dumps over a week and we did not have IPCS so
> every dump was on paper and went from 2 foot thick to 5 foot. I had my
> hands full .
> Ed
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: What is the PDS command?

2024-01-04 Thread Seymour J Metz
Paper?! For, e.g., SYSABEND, SYSUDUMP, on SPOOL you can at least do a search 
for, e.g., eyecatchers, key addresses. On paper a large dump is unmanageable.

When you're swamped is precisely when you need good tools. Not having PDS86 is 
bad; not having IPCS is intolerable.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
עַם יִשְׂרָאֵל חַי
נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר


From: IBM Mainframe Discussion List  on behalf of 
Edward Gould <04bcc43af339-dmarc-requ...@listserv.ua.edu>
Sent: Thursday, January 4, 2024 2:54 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: What is the PDS command?

> On Dec 27, 2023, at 4:57 AM, David Spiegel 
> <0468385049d1-dmarc-requ...@listserv.ua.edu> wrote:
>
> Hi Ed,
> You and your programmer were not impressed?!
> How can you not be impressed by the ability to add Directory Blocks (by 
> moving members out of the way), the ability to generate JCL to LinkEdit PDS 
> members, the ability to copy members (with ISPF Stats) or the ability to 
> recover deleted members (with selection criteria)?
> (There are a lot more features.)
> SMH.
>
> (I've been using the PDS Command Processor (File 182) for more than 40 years.)
>
> Regards,
> David

David:
I was looking at it from a typical applications programmer POV as a every day 
utility. Most of the features (I thought) were sysprog type or maybe a senior 
level programmer. I1. I do not like trust programs from the CBTTAPE as I did 
not want to try and debug anything that I had not written and especially at 0 
dark 30 . I was working at that time 100 hours a week and supporting people in 
thee Time zones and I wanted everything to go as smoothly as possible. The 
third times zone was western Europe and as friendly as they were they would 
pull out the daggers every now and then. The locals were semi (except for about 
20)competentand we rarely heard a peep out of (except for the 20). My workload 
at the time included going through about 20 standalone dumps over a week and we 
did not have IPCS so every dump was on paper and went from 2 foot thick to 5 
foot. I had my hands full .
Ed
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN