Re: IEBPTPCH questions
On Tue, 19 Jun 2012 08:51:12 -0500, Tom Marchant wrote: I didn't see anything in the OP's query that required instream data. I'm sorry. I violated the cardinal rule of IBM-MAIN, that a followup never addresses matters not raised by the OP. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Co:Z SPTF OMVS segment duplicate
On Thu, 21 Jun 2012 10:41:59 -0500, Mark Steely wrote: I have several ID's that share the same UID. Don't do that. Would different UIDs and a common HOME directory work for you? Would separate home directories and symlinks to a project/group directory, group-writable work? Some times the wrong ID gets used and the default home directory does not contain a RSA key. Is there a way to pass which or where to look for the RSA key ... Would symbolic links from the various home directories to a shared RSA key work? But beware; some security facilities prudently decline to operate when the key cache is readable by other UIDs or even by the owning group. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Shrinking a ZFS aggregate
On Thu, 5 Jul 2012 08:50:25 -0500, McKown, John wrote: What is needed is for IBM to write a zfsresize command. This command would reorganize the internals of a zfs, compacting the used portions towards the front of the dataset, adjusting the internal pointers, and marking some portion (based on the user's input) as unusable. Once the UNIX people have written this code, the DFSMS people will need to write code which allows the excess space in a VSAM LDS file to be released. Or is this functionality already in SMS. I have a vague memory. Like so many of my memories. You neglected to say that this all must be done nondisruptively, while the filesystem may be in use and files may be open for update. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Import image to overlay
On Thu, 12 Jul 2012 00:26:49 -0400, Ed Finnell *@AOL.COM wrote: _www.printers.ibm.com_ (http://www.printers.ibm.com) redirects to the Ricoh site. ... It's worse than that. There, I see: You may have JavaScript disabled in your browser. Instructions for enabling JavaScript can be found here: http://support.microsoft.com/gp/howtoscript ... where I read: ... Mozilla Corporation’s Firefox version 2 On the Tools menu, click Options. Firefox version 2!? I have Firefox 13.0.1. And my Tools menu has no Options entry. Perhaps they mean Preferences on the Firefox menu. The instructions are Windows-centric, to be expected of Microsoft, but Infoprint errs in not providing more generic (and contemporary) instructions. On the bright side, whether by enhancements from AOL or LISTSERV, I can now follow links in your postings without editing them. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: OT Yahoo Accounts Hacked
On Thu, 12 Jul 2012 11:58:17 -0700, Lizette Koehler wrote: http://www.cnn.com/2012/07/12/tech/web/yahoo-users-hacked/index.html?hpt=hp_t2 (CNN) -- Hackers posted online what they say is login information for more than 450,000 Yahoo users. Does this imply that Yahoo is storing passwords in clear text? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Relationship of C signals to z/OS terminology?
I stand corrected about SIGKILL vs. SIGILL. On Fri, 13 Jul 2012 09:45:00 -0700, Charles Mills wrote: BTW, this is z/OS batch (STC actually). Does operator CANCEL generate a SIGKILL? Or ...? I once suggested that for compatibility with existing UNIX conventions z/OS system shutdown should send SIGTERM to all dubbed processes so they could perform orderly shutdown. The suggestion wasn't very popular. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: COBOL packed decimal
On Sat, 14 Jul 2012 14:39:04 -0400, John Gilmore wrote: Some years ago this situation changed dramatically. Mike Cowlishaw---he who designed REXX---devised what is now ANSI decimal floating point (DFP). DFP behaves consistently in ways that do not surprise accountants. (All three floating-point formats are supported by zArchitecture hardware.) I understand (I have very little firm knowledge of these things) that DFP supports setting an absolute rather than relative rounding point, and that is required by GAAP. I don't know that Rexx has such support (but I haven't sought it -- I'm a numeric rather than accounting kinda guy. And I notice you merely cited a common authorship without asserting that Rexx has the facility). Much of Rexx's numeric architecture was driven by Cowlishaw's objective of supporting no data type other than string in Rexx. Surely there must be GAAP conformance testing suites. Have DFP, Rexx, Cobol, PL/I, etc. been vetted against such? The multiplicity of choices for rounding and truncation provides a strong incentive for OO design. I could imagine different classes with methods for the various rounding conventions. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
On Mon, 16 Jul 2012 13:31:07 -0400, zMan wrote: On Mon, Jul 16, 2012 at 12:00 PM, John Gilmore wrote: Passwords or userids that may be at most 8 characters in length are unacceptable today. Passwords, yes; userids, meh -- I don't consider a userid to be a secure data point. It's not a matter of security; rather that many IT departments nowadays have a standard of 8-character userids. IBM is a tail that can no longer wag that dog; the CIO can cite refusal to comply with corporate standards as one more strike against z/OS in a purchase decision. And ID administration must be via LDAP from the corporate standard Linux server. There are 3rd party products that enable this; none AFAIK for 8-character userids. Hmm... what's the length limit of aliases in USERIDALIASTABLE? Is USERIDALIASTABLE processed for connections to FTP server, or only for logins? Does it affect the output of getpwuid()? Etc.? http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/bpxzb2c0/3.7.4.5 -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
On Tue, 17 Jul 2012 13:45:51 +0800, Timothy Sipples wrote: 4. It's a big problem when practically everybody in the security community criticizes Yahoo! for their intransigence in fixing the problem. It's an even bigger problem when my own mother suffered from Yahoo's decade plus long failure to turn on HTTPS. Of course, turn on implies commiting the CPU (micro)cycles to peform the encryption. (*) It would certainly help if the wi-fi industry adopted a Public WPA2 (a.k.a. coffee shop) addition to their standards, requiring adoption and compliance among manufacturers. Such an amendment would be similar to HTTPS, allowing simple walk up encryption of wi-fi connections. Hopefully it would also have reputation-based client evaluation of wi-fi hotspots to reduce spoofing risk. Oddly, wi-fi doesn't yet have a great, easy-to-use security solution for the coffee shop/hotel scenarios where wi-fi is so popular. Maybe Apple will figure this out. And WEP/WPA provides encryption as far as the coffee shop's router. Upstream from that the communication is still susceptible to interception. And an unscrupulous coffee shop itself could log and mine its traffic. There are enterprises providing VPN services commercially to their hubs, often geographically dispersed. But the VPN provider itself has access to all the customer's traffic. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
On Tue, 17 Jul 2012 13:13:03 +0800, Timothy Sipples wrote: You're referring to TSO/E only, which has a 7 character user ID limitation. Yes, if you're shopping for TSO/E, maybe that's a strike against TSO/E. Also (consequently?) if you're shopping for a Lockheed Martin F-22 Raptor military fighter aircraft. Its design support and parts database is limited to 7 character user IDs, too: http://www.lockheedmartin.com/us/aeronautics/materialmanagement/scm-engineering/scm-emap.html I suppose that's some kind of endorsement. The (consequently?) may be significant. Fact: Every z/OS licensee receives Tivoli Directory Server for z/OS with LDAP. There's no such limit there, and, like TSO/E, it's part of base z/OS. If you want N-character user IDs (N7), go for it. Enjoy. But do users with such IDs then have access to TSO/E? And how do IDs with N8 play with other components, such as batch? For simple examples, what ID is displayed in messages such as IRR010I? What ID does getpwuid() return as *pw_name? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
On Tue, 17 Jul 2012 07:36:49 -0500, McKown, John wrote: -Original Message- [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Timothy Sipples Sent: Tuesday, July 17, 2012 12:13 AM snip Fact: Every z/OS licensee receives Tivoli Directory Server for z/OS with LDAP. There's no such limit there, and, like TSO/E, it's part of base z/OS. If you want N-character user IDs (N7), go for it. Enjoy. Hum, I didn't know we had Tivoli Directory Server built into and free to use with z/OS. I may give a look at this. It __might__ be of some interest. But not really likely, given the MS-centric world view of everybody here who is not directly using z/OS. And, again, is that LDAP an LDAP client or an LDAP server. If IT management has decreed that IDs should be managed via LDAP hosted on, e.g., a Linux server, z/OS needs not an LDAP server but an LDAP client in order to play well with others. With such a decision a fait accompli, that management will be little moved by arguments of the technical superiority of Tivoli. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Unsetting a JCL symbol.
Just curious. Once a JCL symbol has been set, is there any way subsequently to restore it to exactly the state and behavior it had before it was set? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Unsetting a JCL symbol.
On Tue, 17 Jul 2012 16:43:32 -0500, Bass, Walter W wrote: Try this ... //* SAVE CURRENT VALUE OF MYSYM // SET SAVESYM=MYSYM //* SET MYSYM TO A NEW VALUE // SET MYSYM='NEWVAL' ... //* RESTORE MYSYM // SET MYSYM=SAVESYM Probably not the answer you wanted, but it works. Actually, it doesn't work: 3 //BEFORE EXEC PGM=IEFBR14,PARM='MYSYM.X' //* //* SAVE CURRENT VALUE OF MYSYM 4 // SET SAVESYM=MYSYM //* SET MYSYM TO A NEW VALUE 5 // SET MYSYM='NEWVAL' 6 //DURING EXEC PGM=IEFBR14,PARM='MYSYM.X' //* //* RESTORE MYSYM IEFC653I SUBSTITUTION JCL - PGM=IEFBR14,PARM='NEWVALX' 7 // SET MYSYM=SAVESYM IEFC653I SUBSTITUTION JCL - MYSYM=MYSYM 8 //AFTEREXEC PGM=IEFBR14,PARM='MYSYM.X' IEFC653I SUBSTITUTION JCL - PGM=IEFBR14,PARM='MYSYMX' 9 // ... notice the difference between lines 3 and 8. Another possibility is to take advantage of the fact that symbols that are SET within a PROC automatically revert to their former value after the PROC terminates. That one I believe. Steve suggested it too. But in open code, there seems to be no solution. Symbols are initially in a Garden of Eden state (which John G. dislikes). Once they leave they can never return. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: REXX ISPF edit FIND failing
On Thu, 19 Jul 2012 10:19:28 +0100, Rupert Reynolds wrote: There is no need to send edit commands via ISPEXEC anyway:-) What was the rationale for making the initial host command environment when an edit macro is entered TSO rather than the obvious ISREDIT? Was it merely that the ISPF developers were not well versed in Rexx lore when Rexx burst upon the TSO/E v.2 (whatever) scene? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: REXX ISPF edit FIND failing
On Thu, 19 Jul 2012 09:12:54 -0700, John Mattson wrote: And the grand prize goes to Tom Ambros Yes, use DOUBLE AMPERSANDS in REXX and the FINDs work properly. So simple when we finally see it. Many thanks to everyone. So is the behavior of EDIT different when identical command strings are issued from Rexx vs. CLIST? Ugh! But might this be because the ISPF developers recognized that '' symbolics would be elaborated by CLIST but not by Rexx and made a misguided attempt to make the Rexx behavior superficially more CLIST-like by processing Rexx command strings in a front-end? Did they break an API to offset their misunderstanding of Rexx? What's the behavior when the macro is written in Assembler/ PL/I/C using the CALL interface? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: COBOL packed decimal
On Fri, 20 Jul 2012 11:43:45 -0400, Shmuel Metz (Seymour J.) wrote: Is this because Unisys is deficient in conformance to the standard, or because IBM's implementation contains an extension to the standard? No, it's because UNIVAC used ones complement arithmetic on most of its lines, Including the 1108 et al that Unisys inherited. That's pretty vague. Does the standard specify the behavior as implementation defined, in which case a conforming program intended to be portable should avoid relying on either vendor's behavoir; or does one of the vendors deviate from the standard? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: REXX ISPF edit FIND failing
On Fri, 20 Jul 2012 15:55:28 -0700, John Mattson wrote: Shmuel ! Its amazing how much you contribute without access to a z system. Hope my memory and research is that good when we go off zOS (we're being SAPonified). So, are you on a slippery slope? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Passwords and user-ids was Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
On Fri, 20 Jul 2012 23:22:38 -0300, Clark Morris wrote: If you believe that user-ids should be larger than 7 characters or even 8, then what are the implications for SMF records and various control blocks in z/OS? Many modern products use XML to avoid such hard limits. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: REXX ISPF edit FIND failing
On Sun, 22 Jul 2012 13:50:25 +0100, CM Poncelet wrote: Same question as earlier: Do identical command strings issued to ISREDIT from CLIST and CALL have identical effect? I would expect the ISREDIT effects of REXX/Clist v. ISPLINK calls to be identical, because the command strings in the call are passed as data constants. But if issuing identical commands issued from Rexx vis-a-vis CLIST produce different results, the result from ISPLINK must differ from at least one of them. I suppose I can consider myself blessed never to have encountered this problem, possibly because I have never attempted a FIND command containing an ampersand. I shall continue to strive to avoid doing so. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Submitting a requirement for z/OS to at least acknowledge SIGNAL SHUTDOWN by printing a message
On Sun, 22 Jul 2012 15:17:11 -0500, David Boyes wrote: For those of you who haven't seen it, VM, VSE and Linux register for a specific fully-architected hardware external interrupt (in the PoPs) that indicates that the LPAR is being shut down. VSE issues a message, VM reflects the interrupt to all virtual machines which are registered to receive it, and Linux (if configured to register for it) triggers a user-specified command (usually 'shutdown -h now'). I'd like to have z/OS register for that interrupt, and at least print a unique message if/when that specific interrupt arrives. In Linux, which process handles the shutdown signal? Init? Or is it sent to all processes with a default of ignore, with at least one superuser process handling it by issuing shutdown? Some years ago, I suggested in MVS-OE that MVS shutdown should send SIGTERM to all dubbed processes so that processes coded to UNIX conventions could perform orderly shutdown. The suggestion was not well received. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Submitting a requirement for z/OS to at least acknowledge SIGNAL SHUTDOWN by printing a message
On Sun, 22 Jul 2012 18:23:36 -0400, zMan wrote: Some years ago, I suggested in MVS-OE that MVS shutdown should send SIGTERM to all dubbed processes so that processes coded to UNIX conventions could perform orderly shutdown. The suggestion was not well received. Can you elaborate? Why would orderly shutdown not be A Good Thing? They didn't say. Too UNIXy for them. But I'll conjecture: Many address spaces get dubbed nowadays by incidental use of UNIX services such as TCP/IP. The default action for SIGTERM if a process doesn't handle it is that the process is terminated. This would be unwelcomed by a process that was waiting rather for a legacy MODIFY command to shut itself down. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: AW: Cbttape Freeware isn't available
On Mon, 23 Jul 2012 08:50:35 -0400, Shmuel Metz (Seymour J.) wrote: Could someone post the IP, the problem still seems to exist for some of us. Maybe DNS corruption. I'd guess a firewall issue. Does yours allow ICMP packets through? Have you tried a tracerte[1] for the same sites? [1] The name may vary depending on system. There are sites that will do these things for you. E.g.: http://network-tools.com/ -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Gordon Crovitz: Who Really Invented the Internet?
On Mon, 23 Jul 2012 15:57:16 -0400, Mitch wrote: you mean it wasn't Al Gore? No, he just eponymously supplied some of the algorithms. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Authorized Rexx Assembler Function
On Mon, 23 Jul 2012 19:35:04 -0700, Garry G. Green wrote: Also TSO has an APF list. When you request invocation of a program that is on the APF list (today this is in Parmlib IKJTSO; in the SPF days it was a zap to IKJEFTE2/8) - instead of running the program, IKJEFT02 posts IKJEFT01 (remember, it IS running APF) that you want to run a program APF. IKJEFT01 then ATTACHs a 2nd copy of IKJEFT02, referred to as a Parallel TMP, the same as the first one except it is told which program to execute, and the 2nd IKJEFT02 has a JSCB whose JSCBAUTH flag is on. Why have such a special list rather than merely verifying that the program resides in an APF authorized library and was linked with AC=1? (TMI -- Is ISPF better, now? How?) -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: AW: Cbttape Freeware isn't available
On Tue, 24 Jul 2012 06:11:45 -0400, Shmuel Metz (Seymour J.) wrote: There are sites that will do these things for you. There are sites that do DNS and whois lookups for you. There are no sites that analyze what your own firewall is blocking. Granted. And the firewall design probably considers it a security feature not to disclose to users what it blocks because otherwise they'd be able to infer more easily what it doesn't block. But introducing a third party helps isolate the problem. If you can access network-tools but network-tools can't access cbttape, there's stronger reason to suspect cbttape. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: REXX ISPF edit FIND failing
On Tue, 24 Jul 2012 08:39:35 -0400, Shmuel Metz (Seymour J.) wrote: Address ISREDIT does not in general require quotes either. The quotes are only needed because you want constants with special characters. And remembering that Rexx considers lower case characters special. Had you wanted, e.g., Address ISREDIT F NEXT then you wouldn't have needed quotes, assuming that you haven't assigned values to F or NEXT. And assuming you're not trapping references to undefined variables. By IPCS call and ISREDIT call do you mean expressions beginning with IPCS or ISREDIT? If so, it's indirect. OTOH, if you mean expressions recognized by IPCS or ISREDIT, then it's direct. Address ISREDIT ISREDIT foo/* indirect */ foo/* direct */ Do these have different semantics? No; there's a clash between the way ISPF works and your preconceptions about how it works. From an ISPF and CLIST perspective, REXX is just a consumer of strings; how it interprets those string is beyond the scope of the scripting language. If ISPF assumes that an ampersand in a command string has special meaning to the scripting language to the scripting language, and allows its behavior to be influenced by that (sometimes incorrect) assumption, ISPF is overstepping its proper scope. But I'm accustomed to accessing script variables (in Rexx) by coding their names in parentheses, e.g.: ILine = 42 '(L) = LINE' ILine Is this yet another convention? Is it not sufficient? Why do we need idiosyncratic treatment of ampersands also? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Who's blacklisting IBM-MAIN
Attempting to connect to the archives from my employer's WAN, I get: Compliance Alert:URL - http://listserv.ua.edu/cgi-bin/wa?A0=ibm-main; Category - Malicious Sites And access to the archives is unbearably slow to impossible from elsewhere. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using SSH or SCP in REXX under TSO
On Wed, 25 Jul 2012 22:12:01 +, Uriel Carrasquilla wrote: Does anybody have a sample REXX that can be shared to either scp or ssh to remote Unix from TSO? I have seen JCL to that effect using BPXBATCH but I have not tried it since I need the REXX. Crudely (error recovery is left as an exercise for the student), but it works: /* Rexx */ signal on novalue; /* Doc: Using ssh from a Rexx EXEC. run on or */ trace R user_host = *** /* Sorry! */ source_file = *** parse source . RC = SYSCALLS( 'ON' ) address 'SYSCALL' 'open /dev/null' O_RDWR /* busy out stdin, stdout, stderr. */ 'open /dev/null' O_RDWR 'open /dev/null' O_RDWR say RC RETVAL 'open (source_file)' O_RDONLY stdin = RETVAL map.0 = stdin map.1 = 1 map.2 = 2 arg.1 = 'ssh' arg.2 = user_host arg.3 = 'set -x; cat foo-sshtest; echo done' arg.0 = 3 env.1 = 'PATH=/bin:/usr/sbin' env.0 = 1 'spawn /bin/ssh 3 map. arg. env.' say RC RETVAL 'close' stdin say RC RETVAL exit( RC ) -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using SSH or SCP in REXX under TSO
On Thu, 26 Jul 2012 09:55:07 -0500, McKown, John wrote: Remember! that scp on z/OS does an EBCDIC to ASCII translation. If you need a binary transfer, you'll need to use sftp. I've not tried sftp. I'd expect that sftp and scp are both variants of ssh, and the EBCDIC-ASCII translation is intrinsic to the socket interface. Does z/OS sftp have a BINARY subcommand? Are you extrapolating too much from Co:z? I used ssh rather than sftp or scp in the example I posted (I've enhanced it since) partly because of familiarity; partly it gives most control with least terminal interaction. Between two ASCII systems, I have done: ssh remote-host cd wherever amp; tar -cf - . | tar -xvf - With EBCDIC, I'd need an iconv in the pipe. I believe that if ssh (or kindred) needs to prompt for confirmation or password it will write the prompt to stderr and read the response from /dev/tty. This might work from native z/OS UNIX (USS), perhaps even from TSO OMVS. It's less likely from TSO or BPXWUNIX. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using SSH or SCP in REXX under TSO
On Thu, 26 Jul 2012 10:37:28 -0500, McKown, John wrote: No. sftp uses a separate SSH subsystem which does not do the code translation. IIRC, sftp as distributed by IBM only does a binary transfer. The Dovetailed Technologies enhancments to z/OS sftp allows for code translation. And, in addition, allows transfers to/from z/OS legacy data sets and access to the JES SPOOL (get output and put, as in submit, jobs). Thanks. I was unaware of that. ssh remote-host cd wherever amp;amp; tar -cf - . | tar -xvf - With EBCDIC, I'd need an iconv in the pipe. You mean to do the equivalent of a binary transfer? I don't think you'd succeed. I almost never use ssh for file transfer. I guess because I find scp easier, for me. I take that as a challenge. scp /wherever/* user@remote-host:/wherever/ On Linux, I've also done: cd /wherever; echo -e 'cd /wherever\nmput *\nquit\n' | sftp user@remote; cd - But will either of those do a recursive copy of an entire directory hierarchy? You cannot do ssh under TSO OMVS. That is documented by IBM in the OpenSSH manual. The reason given on one of the forums was the fact that there is no way to nodisplay what you type in for the passphrase or password when running under TSO OMVS. Another challenge? If my Rexx works from the ISPF command line, I'd hardly expect it to fail from TSO OMVS. Need to try. I believe ftp (not sftp) successfully masks the password from the TSO OMVS command line. There's a Rexx utility, getpass(prompt) to do that. But years ago I submitted a PMR that neither stty -echo nor the underlying syscall masked the command line for password entry. IBM fixed stty but not the underlying syscall. Go figger. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using SSH or SCP in REXX under TSO
On Thu, 26 Jul 2012 16:13:12 +, Uriel Carrasquilla wrote: For the source_file, is it a USS file? or can it be a zOS file? open() requires a USS file. 'open (source_file)' O_RDONLY reads the file but where is it used? The descriptor gets assigned to map.0 map.1 = 1 map.2 = 2 shouldn't these two parameters be pointing to STDOUT and STDERR recpectively? It was hasty. I'll attach an enhanced instance. Or I may have to use: 'waitpid (spid) waitpid. 0' xrc = waitpid.W_EXITSTATUS To get the actual return code for the spawn child. Ah, but that's error handling, left as an exercise ... John M.: They fixed password masking ad hoc in ftp long ago. They never fixed ioctl/fcntl/whatever where the real problem that should have been fixed lies. They feel that getpass() is a satisfactory circumvention. /* -*/ trace R signal on novalue parse source sys invoked exfn exft exfm excmd subenv . RC = SYSCALLS( 'ON' ) address 'SYSCALL' 'open (source_file)' O_RDONLY stdin = RETVAL if subenv=='SH' then do stdout = 1 stderr = 2 end; else do 'pipe P.' stdout = P.2 stderr = P.2; end map.0 = stdin map.1 = stdout map.2 = stderr arg.1 = 'ssh' arg.2 = user_host arg.3 = 'set -x; cat foo-sshtest; : Done' arg.0 = 3 env.1 = 'PATH=/bin:/usr/sbin' env.0 = 1 'spawn /bin/ssh 3 map. arg. env.' say RC RETVAL 'close' stdin if subenv'SH' then do 'close' P.2 'readfile /dev/fd/'P.1 'L.' 'close' P.1 do I = 1 to L.0 say L.I; end I; end exit( RC ) -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Is it possible to open a ZIP file with PAX?
On Thu, 26 Jul 2012 12:24:34 -0400, Bill Ashton wrote: Is it possible to use the PAX program to open a .zip file on the mainframe, or does anyone have any other suggestions? I know I can open it on the PC and transfer the file components over...just looking to see if I can cut out a step. No. Use jar. Or if your PC utility will do it, repack it in pax/tar format and transfer that. Beware ASCII-EBCDIC problems; I hate EBCDIC! -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Who's blacklisting IBM-MAIN
On Wed, 25 Jul 2012 15:16:38 -0500, Jonathan Goossen wrote: When I click the first link, it gets translated to https and works fine. Which is probably redirection by LISTSERV, so you got that far. From: Farley, Peter x23353 Date: 07/25/2012 02:23 PM Interesting. I get the same results using my employer's network, which uses McAfee WebWasher to intercept non-business web browsing. The second url works fine but the first url is blocked. Maybe it's the fact that the second url you provided is https and thus is (potentially) secure in some fashion? Why would access to a non-secured university web page be considered non-business or bad reputation? What if you are trying to discover if the university has courses for your professional career development? I really hate it when the nanny-techs interfere. We're mcAfee, too. Darren says: Subject: Re: IBM-MAIN archives unresponsive? From: Darren Evans-Young Date: 07/26/12 16:28 To: Paul Gilmartin I'll look into it. Slow for me too. Probably related to the new server they migrated Listserv to. Darren (I know; I'm violating etiquette by distributing a private communication. Judgment call; I'm not very sorry.) -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Friday: What you've been waiting for! Build an 80 column punched card reader!
On Fri, 27 Jul 2012 07:21:26 -0500, McKown, John wrote: For the truly strange hardware hackers among us. Hardware: http://codeincluded.blogspot.co.nz/2012/07/punch-card-reader-hardware.html software: http://codeincluded.blogspot.co.nz/2012/07/punchcard-reader-software.html Ummm... USB interface. For Herc on Raspberry Pi? Driver? What code page? For that matter, what was the code page for IBM card readers? I doubt that it was selectable. Almost as easy to put 3 at a time on a scanner with black construction paper backing. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Top posting
On Sun, 29 Jul 2012 11:32:19 -0400, Gord Tomlin wrote: While there is an RFC (I'm not going to hunt for the number on a Sunday) that specifies that bottom posting is correct, as a reader I find bottom posting to be hugely counterproductive. When reading a thread in order, bottom posting requires the reader to scroll past what has already been written. The longer the thread gets, the more painful this becomes. I do not use the web interface, so I am not aware of the problems its users are encountering, but bottom posting is enough of an annoyance for me in my email client. RFCs of the same vintage also deprecate quoting the entire preceding thread in each ply. This was almost self-enforcing when bandwidth and storage were expensive. I have always followed that practice. Perhaps LISTSERVs and Majordomos are obsolete and should be replaced by blogs or wikis. Painful? What's painful? With a good reader, scrolling to the bottom is a single keystroke. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Friday: What you've been waiting for! Build an 80 column punched card reader!
On Sun, 29 Jul 2012 22:03:06 -0400, Shmuel Metz (Seymour J.) wrote: Paul Gilmartin is almost right. Both the reader and the punch read and punched what they were presented with. What is that supposed to mean? Bit 2 of the CCW opcode selected whether to read/punch EBCDIC or column binary. Was that uniformly true? A colleague of mine who had been using a CDC 6400 as a graduate student took a job with IBM in NY. He took some useful information with him in CDC column binary format; two CDC Display Code characters per column. He set himself his first IBM Assembler exercise reading the data and converting to EBCDIC. When he got there, he was dismayed to be told that the CDC binary format could not be read on IBM equipment, at least not without a (separately priced?) feature. (Hardware? Software?) True? Or just brush off of a newbie by an admin who didn't want to make a configuration change to enable a feature? No S/360 operating system used column binary for object decks. I don't recall whether SOS, FMS and IBSYS used column binary or row binary on the earlier 704, 709, 704x and 709x. IIRC, data were generally column binary. Some readers read row binary with software matrix transposition. Hard as it may be to do so, let's also try to avoid 'punch card', using 'punched card' instead. Why? It is a card that you can punch holes in, but it is not punched when you initially take it out of the box. Punchable card? Is motor oil not motor oil until it's installed in a motor? Is cat food not cat food until ...? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Unix file system - space release question
On Mon, 30 Jul 2012 15:31:13 +1000, NAIDOO, Raleigh wrote: SSBoYXZlIGNvbmZpZ3VyZWQgc2Z0cCB0byBydW4gdW5kZXIgVVNTIG9uIG15IHovT1MgVjEuMTEg c3lzdGVtLiBUaGUgcGh5c2ljYWwgSEZTIGZpbGUgc3lzdGVtIGFzc29jaWF0ZWQgd2l0aCBzZnRw A. C'mon! Are you using the df -v command to investigate this further? As long as any process holds a file open, its space is not released, even after it's unlinked. I would not expect sftp to misbehave in this respect. But do you have other processes, perhaps batch jobs, that may be holding files open? I believe there's a utility (fuser? perhaps on the Tools and Toys page?) that shows open files. But I don't know whether it reports unlinked files. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Unix file system - space release question
On Mon, 30 Jul 2012 09:05:44 +0200, Miklos Szigetvari wrote: Hi I don't know if it is an sftp specific issue or not We have here never used sftp, but we are using ZFS instead of HFS. For me it would be interesting to know who is writing full the file system. Maybe a TRAP on errno2 if it is not clear On 30.07.2012 07:31, NAIDOO, Raleigh wrote: I have configured sftp to run under USS on my z/OS V1.11 system. The physical HFS file system associated with sftp files seems to continuously run out of space. The data in this physical file system is transient in that it is removed once it has been copied to the mainframe for inbound files and sent on for outbound files. Therefore, we should not see any cumulative growth in size of the physical file system but there is. I read somewhere that there is a sync daemon which runs at specified intervals which release unused space. How does work and what can I check to see if it setup correctly? Any other suggestions on how to manage this fragmentation like space creep. Sync typically runs every few seconds. http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/bpxza4c0/17.15 Title: z/OS V1R13.0 UNIX System Services User's Guide Document Number: SA22-7801-14 describes 17.15 Listing process IDs of processes with open files It appears that fuser -cu might provide useful information. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Top posting
Synthesizing a compromise: On Mon, 30 Jul 2012 10:42:02 -0500, Mark Zelden wrote: Sorry, I use the web interface and I still hate (is that too strong a word) top posting. I naturally read from the top down and scrolling down, reading, then scrolling up, while scrolling down again to read a post, then scrolling up again gets me dizzy. I use NoScript to disable scripts as much as feasible, in a vain attempt to send a message to web authors (who are making it ever less feasible.) So I don't see mouseovers. Except I see (some of) xkcd's mousovers. How? I enabled scripts for ua.edu. Still no mouseovers. Something in Preferences? (LISTSERV's or Firefox's?) Wouldn't it be neat if LISTSERV provided a synopsis option, either as an auxiliary text entry box, or by markup in the message body? But this effect might be achieved by top-posting a synopsis, then reverting to interspersed bottom-posting for the remainder of the ply. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Authorized Rexx Assembler Function
Storage protection in other OSes: On Mon, 30 Jul 2012 22:09:07 -0600, Steve Comstock wrote: Sigh. I keep forgetting (wishful thinking?) what a primitive OS z/OS is; that it provides no simple way a program can protect its storage from meddling by others. z/OS still thinks it's running on a s/360. I never saw an answer from you regarding my question for some examples of how other non-primitive OS's provide a simple way a program can protect its storage from meddling by others We're both familiar with UNIX, which classically runs each process in a separate address space. How much simpler or more effective could it be? Likewise z/VM. z/OS UNIX (USS) has compromised that classic UNIX model for reasons of performance, running multiple processes in shared address spaces. But I suspect (with no evidence whatever) that Linux for z can run a number of processes in private address spaces with better performance than USS can run the same processes in shared address spaces. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Authorized Rexx Assembler Function
What about TSO? On Jul 31, 2012, at 10:17, Steve Comstock wrote: We're both familiar with UNIX, which classically runs each process in a separate address space. How much simpler or more effective could it be? Likewise z/VM. Yes, well, each batch job runs in a separate address space, too. Isn't that the same approach? ... But for basic applications (batch and TSO, most CICS and IMS), the application programmer has his/her storage protected from meddling by other applications automatically by address space isolation. Not really. You're ignoring the convolutions TSO performs to execute an authorized program such as IEBCOPY (well, prior to 1.13). Why can't TSO just launch IEBCOPY in a separate address space where it would be perfectly safe? Why are programmers compelled to invent magic SVCs and back doors? Why can't TSO CLISTs and EXECs run commands in background as I can with POSIX shell , and let me use my terminal in the meantime? Submitting to a batch queue is a stopgap. There's no simple and standard way to get completion status from a program submitted to a batch queue, or even to tell when it completes. With POSIX shell, it's as simple as: ( command1; command2 ) PID=$! # ... Do other stuff with terminal session wait $PID echo $? # display status from command2 command1 and command2 are completely isolated from the terminal session and, if _BPX_SHAREAS=NO, from each other. In z/OS, I can't even run an authorized program from an EXEC except with severe constraints: o It must be under TSO, not USS or IRXJCL o It must be invoked with CALL, not ATTCHMVS or LINKMVS. UNIX provides isolation for interactive commands similar to that z/OS provides for batch jobs. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Rexx Exec Help Desperately Sought!
On Aug 1, 2012, at 06:42, Roger Bolan wrote: The XMITIP doc says that it will handle dsnames the same as TSO, that is, partially qualified names get your prefix added, and fully qualified dsnames must be inside single quotes. I think you are just running into the way TSO parses the quotes. You may need to make sure the quotes get passed into XMITIP by doubling them. For example: EX 'SYS2.LOCAL.CLIST(XMITIP)' '''TM#T.M.XMITIP.PARMCARD.userid1''' You might benefit by putting SYS2.LOCAL.CLIST in your SYSPROC concatenation (or using ALTLIB) (SYSEXEC if XMITIP is Rexx). Then write your script in Rexx instead of CLIST. Rexx allows both double and single quotes, so the command becomes: 'XMITIP' 'TM#T.M.XMITIP.PARMCARD.userid1' ... perhaps more legible. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Rexx Exec Help Desperately Sought!
On Aug 1, 2012, at 12:07, Lizette Koehler wrote: The User's Guide for XMITIP is fairly comprehensive on how to run this in batch. The JCL and samples are good. What if the exec is being run from a batch program, what do I need to change? Rexx Exec ID2EMAIL calls via an EX the XMITIP Rexx Exec. //STEP0030 EXEC PGM=IKJEFT1B,DYNAMNBR=50 Some rules are different if you use IRXJCL instead of IKJEFT%% //SYSEXEC DD DISP=SHR,DSN=SYS2.LOCAL.CLIST // DD DISP=SHR,DSN=SYS2.LOCAL.REXX If either of those data sets contains CLISTs as opposed to Rexx, it must be in SYSPROC, not SYSEXEC. If a Rexx EXEC starts with /* Rexx ... */, it may be in either SYSPROC or SYSEXEC. HT ('05'x) characters are treated as whitespace in SYSPROC, but invalid in SYSEXEC (empirical; not documented). //STEPLIB DD DISP=SHR,DSN=SYS2.LOCAL.LINKLIB //SYSPRINT DD SYSOUT=* //SYSTSPRT DD SYSOUT=* //REPORT DD DSN=TEMP1, //DISP=(OLD,DELETE,DELETE), Hmmm... You delete it even if the step ABENDS. No do-overs. I never code DELETE on a temporary DSN since I once had a Bad Experience when I overrode to a member of a library PDS. They go away by themselves when they're supposed to. //RECFM=VBA, //LRECL=137, //UNIT=SYSDA //SYSTSIN DD * ID2EMAIL GRODRIG If XMITP is Rexx, and ID2EMAIL is Rexx and you own it, you can use a Rexx CALL instruction and bypass the ugly TSO/CLIST EX syntax entirely. I would. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Why ain't there no XILL?
Serialization, performance, auxiliary storage and a related hardware realization: On Aug 2, 2012, at 07:46, Wayne Driscoll wrote: I would assume the pother is because OIL and NIL are macros that provide or and and processing with serialization. Your notation fails to provide serialization. It should be relatively easy to create an XIL macro based on OIL or NIL however. I was about to write that, then I RTFM. The P[ro]Ops describes NILL and OILL as quite different from NIL and OIL. A cursory reading does not show whether they are atomic for serialization in a MP environment. From: John Gilmore jwgli...@gmail.com Date: 08/02/2012 07:12 AM Any standard logic text establishes that o AND, inclusive OR, and NOT are together universal, o NOR alone is universal, and o NAND alone is universal. Thus, in an obvious notation, XOR(a,b) =df (a | b) (¬(a b)) What is all the pother about? That such a scheme requires auxiliary storage. That it is slower than a likely hardware implementation. That it may further require locking in a MP environment. Back in the Day of TTL SSI/MSI logic components, I looked at the spec sheets of two chips. The specs included low level circuit diagrams. One vendor called its component MSI and used roughly the formula you give. The other called its component SSI (fewer transistors) and accomplished the function by connecting a to the emitter of one transistor and b to its base, giving (a ¬b). b was connected to the emitter and a to the base of a second transistor, giving (b ¬a). The collectors were connected in parallel for (a ¬b) | (b ¬a), give or take a totem-pole output stage and a liberal seasoning with De Morgan's laws. A very clever and efficient disuse of what any standard logic text establishes. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using NOTE and POINT simulation macros on CMS?
OS simulation is dreadfully deficient. On 2012-08-02 15:00, Thomas David Rivers wrote: Then, a POINT to return to the beginning of the file, using the TTR retrieved from just after the OPEN (with +1 added because the NOTE occurs after OPEN but before any READ.) I believe that NOTE is specified to work only after a READ has been issued (but I haven't RTFM lately), and all outstanding READs have been CHECKed. And, as you might expect - this approach works just great on z/OS. Eons ago it used not to work for me. Does anyone know of any vagaries with the OS simulation of NOTE/POINT? OS simulation was implemented only to the extent necessary to support (some of) the supported utilities. For example, PDS member statistics (the user info area) were deemed unnecessary and not implemented. ISPF/VM goes to outrageous gyrations with side-files to simulate them. Long ago, a co-worker said VM would do well to abandon CMS and support MVT proper in a VM. But he's an acknowledged OS partisan. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using NOTE and POINT simulation macros on CMS?
The Strategic Interactive Platform: On Thu, 2 Aug 2012 19:44:25 -0400, Anne Lynn Wheeler wrote: ... later when company declared CMS strategic interactive platform (and abondoned TSO for that purpose) ... there was quite a bit of efforts getting CMS running on MVS. it was operational but because of all sorts of structural issues in MVS ... it would never achieve human factors and interactive characteristics. Somehow this brings to mind Unix System Services (USS). -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Auditors Don't Know Squat!
What does the vendor recommend? On Thu, 2 Aug 2012 14:11:03 -0500, zOSdude wrote: Our auditors (Feds) say we need to apply all new PTF's within 30 days of availability. I'm speechless. Does anyone have the patience to form a cogent argument without laughing, crying, or tying one on? I told my boss that if I did that, we'd be about as stable as a windows PC. Does IBM recommend that customers age PTFs before APPLYing? For how long? What would be the effect if no customer applied any PTF until (e.g.) 60 days after availability in order that bugs would be discovered by other customers? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using NOTE and POINT simulation macros on CMS?
On Fri, 3 Aug 2012 06:42:54 -0400, Shmuel Metz (Seymour J.) wrote: Are you referring to the OS rules or to the OS simulation in CMS? NOTE has always been valid in OS after a checked write. I stand corrected. READ or WRITE. But IIRC, the OP said he did NOTE before either I/O operation. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Auditors Don't Know Squat!
On Mon, 6 Aug 2012 18:09:05 -0400, Shmuel Metz (Seymour J.) wrote: at 01:41 PM, Paul Gilmartin said: Sounds like a standard to me. Not even close. A finding is a statement that they found something they didn't like. A standard is a published policy, not something the auditor makes up. My conjecture is that in the Federal instance the auditor was also guided by a standard, not inventing one; at worst taking it out of context. Were that the case then the findings would have identified the relevant standards. Granted that in prior plies the writers may have, in informal and indirect quotations, neglected to say the auditors identified the relevant standards, that is quite different from saying the auditors omitted identification of the standards. You have no evidence for what you're implying. -- gil “I didn't say that I didn't say it. I said that I didn't say that I said it. I want to make that very clear.” -- George Romney -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using NOTE and POINT simulation macros on CMS?
On 2012-08-07 11:11, Bill Fairchild wrote: So presumably when the control records were created, CA software did a NOTE of the TTR of the beginning of each volser range and saved the results of the NOTE in the control record. This saved NOTE value was the base to which the offset, calculated from the user's input, was added. Ah! Something that can't be converted to PDSE. Well, maybe you could if you kept it open all the time. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using NOTE and POINT simulation macros on CMS?
On 2012-08-07 19:10, Robert A. Rosenberg wrote: At 22:24 -0500 on 08/06/2012, Dale R. Smith wrote about Re: Using NOTE and POINT simulation macros on CMS?: So it sounds like the NOTE Macro will only work after a Read or a Write has been done to the dastaset, not after an OPEN Macro. If the system knows where the first record in the file is so that the first READ done after the OPEN will read it, it seems to me that a NOTE done prior to that READ but just after the OPEN should return the location of that first record. Errr... no. After the first READ, it returns the location of the first record. Before the first read, for consistency, it would need to return the location of something before the first record. There is no such thing. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using NOTE and POINT simulation macros on CMS?
On Aug 8, 2012, at 01:04, Alan Altmark wrote: First pointer: We welcome your CMS questions over on IBMVM! ;-) Sorry I haven't been watching IBM-MAIN as closely as I should, but the TTR isn't. It's the CMS file system record number of the record that was just read (shifted left 8 bits) i.e. rr00. At OPEN, no records have been read, so the record number is zero. You NOTEd the zero value and added 1. Then you POINTed to 0x01, but that low-order byte isn't used, so you are effectively pointing to record zero. ... IIRC, there's an OS convention that setting the lowest byte (Z) of the TTRZ to '01'x causes reading of the block following thenone POINTed to by the TTR. Does CMS respect this? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Aug 8, 2012, at 06:06, R.S. wrote: BTW: your allocation request was illogical - you wanted to have 80-byte records and requested 1 byte. Such request has to be re-interpreted or canceled. ;-) I believe the block specification is an average. As such, it's not required to be a multiple of LRECL. If half the blocks are 80 bytes and half are 160, an average of 120 is possible. Granted, 1 can never occur, not even as an average. I suppose allocation simply calculates the tracks necessary to hold the requested number of 1-byte blocks plus gaps. It might be a courtesy for allocation to issue a warning, but how much validity checking should it be expected to perform? What about RECFM=VB? What's the smallest valid block? 9? 8? 4? (That would be a BDW with no records.) Does Using Data Sets allow this? I bet I could write one with BSAM; I wonder how QSAM would handle reading it? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Aug 8, 2012, at 09:11, Mike Schwab wrote: A zero byte VB record is expanded to 1 blank x'40' so the minimum is a block of 9 bytes including block size and record size field. ??? No. http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/dgt2d490/3.1.3.1.2 Title: z/OS V1R12 DFSMS Using Data Sets Document Number: SC26-7410-10 3.1.3.1.2 Record Descriptor Word (RDW) A variable-length logical record consists of a record descriptor word (RDW) followed by the data. The record descriptor word is a 4 byte field describing the record. The first 2 bytes contain the length (LL) of the logical record (including the 4 byte RDW). The length can be from 4 to 32 760. All bits of the third and fourth bytes must be 0, because other values are used for spanned records. A length of 4 implies zero bytes of data; no blank. It's easy to create such records with EXECIO, FTP, or vi. I do not find a stated minimum for the BDW. Absent firm information, I'll assume 4-byte blocks (nothing but BDW) are permissible. I tried to allocate a FB 6 0 to hold a list of volsers for a table, LRL under 10 would not work. I had no such problem: Data Set Information More: + Data Set Name . . . . : user.SHORT.BLOCKS General Data Current Allocation Management class . . : **None**Allocated blocks . : 86 Storage class . . . : **None**Allocated extents . : 1 Volume serial . . . : TSO005 Device type . . . . : 3390 Data class . . . . . : **None** Organization . . . : PS Current Utilization Record format . . . : F Used blocks . . . . : 3 Record length . . . : 6 Used extents . . . : 1 Block size . . . . : 6 Command === F1=HelpF3=Exit F12=Cancel . . . . . . . . . . . . . . . . . . . . . . . . . . . File Edit Edit_Settings Menu Utilities Compilers Test Help ——— VIEW user.SHORT.BLOCKS Columns 1 6 ** * Top of Data ** =PROF BLOCKS (FIXED - 6)RECOVERY OFF WARNNUMBER OFF... 01 these 02 are 03 recrds ** Bottom of Data -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using NOTE and POINT simulation macros on CMS?
On Wed, 8 Aug 2012 09:18:35 -0400, Shmuel Metz (Seymour J.) shmuel+...@patriot.net wrote: To increment the record number by one, add 256 to the TTR. ITYM add 256 to the TTRz. Does this work when you cross a track boundary? I might expect it to work less well for TTRz than for relative block number. And, in Using Data Sets: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/dgt2d490/3.8.7.8 3.8.7.8 Using the POINT Macro to Position to a Block ... If the current record spans blocks, setting the z byte of the TTRz field to one lets you access the next record (not the next segment). Does this mean that if the current record spans several blocks, setting the z byte causes enough intervening blocks containing enough segments to be skipped that the block read contains the first segment of the next record? Wow! Does this apply to RECFM=VBS only? Does CMS support setting the z byte? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Using NOTE and POINT simulation macros on CMS?
On Aug 8, 2012, at 18:51, Shmuel Metz (Seymour J.) wrote: Does this mean that if the current record spans several blocks, setting the z byte causes enough intervening blocks containing enough segments to be skipped that the block read contains the first segment of the next record? No; TTR1 will access the next physical record. BSAM doesn't deal with the RDW. In: http://publibz.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/DGT2D4A0/3.8.7.8 (which I trimmed too much and, now that I read the outline hierarchy, refers to PDSEs), I read: 3.8.7 Processing a Member of a PDSE 3.8.7.8 Using the POINT Macro to Position to a Block The POINT macro positions to the first segment of a spanned record even if the NOTE was done on another segment. If the current record spans blocks, setting the z byte of the TTRz field to one lets you access the next record (not the next segment). So I conclude that if the current block (itself a slippery concept with PDSEs) contains only an interior segment of a spanned record, POINT to a TTRz will cause the following READ to read the block containing the first segment of that [logical] record, and POINT to a TTR1 will cause the following READ to read the block containing the first segment of the next [logical] record. It's still pretty amazing. THis could be a point of incompatibility between PDSE and PDS. Who keeps spanned records in a PDSE or PDS, anyway? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: GUIfication of tn3270 screens
On Fri, 10 Aug 2012 13:36:42 -0400, Frank Chu wrote: It's for an application that has already been written by us. The app is an assembler debugger and we want to add the ability/option of displaying it's contents on the PC with something other than in a 3270 emulator. There's not a lot of real estate in a 3270 screen and there are limitations on how we display things. This is becoming more of an issue as we move beyond just debugging HLASM programs. It sounds as if you need something beyond the capabilities of 3270 data streams. With regards to the multiple tabs/windows. The general idea behind the GUI on the PC would be that in a single debugging session, you can have a window open for displaying the code as you are stepping through it. Another window to display register contents, another one for variables, another one for displaying storage that your program will modify, another window for HELP, etc. If you have used Eclipse or Visual Studio, it's similar to something like that. How about X11, then? Servers available at attractive prices for almost any platform you care to name. HOD? On what platforms are people running HOD? If it's a Java applet, it should be quite portable. Is it a priced product? Is anyone out there attaching multiple 327xs to a TSO session? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Listserv Web Archive Text Box
Well, the web archive is temporarily working, so not that. Rather, is there any way to make the text entry box for Post/Reply narrower. I don't operate my browser fullsreen; I need other things on the screen. But when I operate the browser in a restricted window, some of the controls such as scroll, quote, and submit are hidden; out-of-window by default. It's as if the page formats the text box according to the width of the screen, ignoring that the window may be narrower. Thanks, gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: modifying secondary space allocation
On Aug 13, 2012, at 06:26, Kerneels wrote: Only works , if there is are no active job with an ENQUE on the dataset ex. Parmlib. Silly question? How about DISP=SHR? If you can create a data set without exclusive ENQ (it has happened to me), why not extend one? On 8/13/2012 4:21 AM, Binyamin Dissen wrote: Use JCL (IEBGENER is fine) - anything that OPENs it for OUTPUT) with DISP=MOD and secondary space allocation with a new member name. The works with sequential, probably with PDS as well. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: X86 server
On Mon, 13 Aug 2012 14:16:14 +0200, Henri Kuiper wrote: Or are you hinting at running z/OS from x86 hardware? If the latter is the case : feel free to contact me. You can take a sneak peak at http://zdevops.com We do z/OS virtualizations on x86 hardware :). Would this be more like Platform Solutions Inc., or like Hercules, or like Neon ZPrime? Or more like Wine or Citrix? Perhaps it virtualizes only the APIs, but that itself is a heroic task. What compilers and other middleware such as data base servers are available for license? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Valid DATACLAS names - where documented?
On Mon, 13 Aug 2012 15:30:01 -0400, Gross, Randall [GCG-PFS] wrote: Subparameter Definition --- data-class-name Specifies the name of a data class to be used for allocating the data set. The name, one to eight characters, is defined by the storage administrator at your installation. That's not very helpful; actually somewhat circular; if you _are_ the storage administrator. So maybe it's in the ICAG/Tuna? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
DNS lookup failures (was: ESCON)
DNS squatting and recycling On Mon, 13 Aug 2012 20:10:19 -0400, Tony Harminc wrote: SSA was an industry standard for a few milliseconds in 1997. It's sad/amusing to scan the Wayback Machine for the quondam SSA Industry Association site www.ssaia.org . From 1997 to early 1998, it's there, along with an impressive list of industry members, from Adaptec through DEC (heh), Dell, IBM, and Zitel, with more in between. Then it's stagnant through 2000, domain available in 2001, and then Cindy and various others would like you to explore their charms after that. Doesn't Cindy obtain statistics on failed DNS lookups so she can optimize the ROI on the resource she spends registering domain names. I know OpenDNS, e.g., squats on failed lookups (typos?) and redirects to ads (this is a nightmare for auto-proxy). Does OpenDNS also sell its list to Cindy? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: How to update the last referenced date in the VTOC
On Tue, 14 Aug 2012 16:24:31 -0500, Tim Hare wrote: Don't know how super-efficient it is, but use DCOLLECT input (or FDREPORT extract if you have FDREPORT), then in Rexx under IKJEFT01 Read a record set dataset_name_variable to the DSN If you're worried about uncataloged also set unit and volume variable ALLOC FI(X) DA(dataset_name_variable) SHR REUSE == add UNIT and VOLUME if necessary EXECIO 0 DISKR X (OPEN EXECIO 0 DISKW X (FINIS in a loop until end of file on the input. You can of course use program logic to just filter the volumes and/or datasets you want. I'd be afraid to do this, lest it write an end-of-file at the beginning of every data set. In fact, I've done approximately that (two DISKWs instead of DISKR; DISKW) intentionally to empty data sets. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: ISPF Panel and LPAR name
On Wed, 15 Aug 2012 17:15:21 -0700, Skip Robinson wrote: I didn't know you allocate ISPPROF to DUMMY in batch. I've always used a temporary data set to achieve the same goals. //ISPPROF DD SPACE=(TRK,(1,1,2)),UNIT=SYSALLDA,DCB=SYS1.PROCLIB I stand corrected; I just reviewed my own code. It's: //ISPPROFDD UNIT=VIO,SPACE=(TRK,(10,0,5)),DSN=amp;ISPPROF, I suppose there are different flavors of nothing, and some nothings are too nothing for ISPF. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Auditors Don't Know Squat!
On Fri, 17 Aug 2012 16:40:28 +, Ward, Mike S wrote: Way back when, we used to call a memory leak something else on the mainframe. I have used memory leak for so long I forgot what that term was. Oh well. Back in that day, IBM never said memory, but always storage. Language evolves; we must evolve with it. Try going into your local auto parts store and asking to buy an oleo strut. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: ISPF Panel and LPAR name
On Mon, 20 Aug 2012 02:01:57 +0100, CM Poncelet wrote: Gosh. The ISPPLIB DD must be allocated in the JCL. No; a dynamic allocation before ISPSTART will work just as well. There are contrary valid points of view here: o Not to require the programmer to provide resources he doesn't intend to use. o To require the programmer to supply in advance all resources he might potentially use, in order to preclude a failure later in the process. ISPF apparently elects the latter; many programs elect the former e.g. with respect to SYSLIB DD. Fortunately, ISPF doesn't require that a display be available when the programmer intends not to use one. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Some fun with IBM acronyms and jargon (was Re: Auditors Don't Know Squat!)
On Aug 20, 2012, at 10:04, zMan wrote: On Mon, Aug 20, 2012 at 8:35 AM, Rupert Reynolds wrote: Does anyone have a copy of the old JARGON FILE that buzzed around the IBM VM network in the '90s when i was working in Portsmouth North Harbour? I'd love to see it again. I think it included discussion of Bubblegum vs. Boeblingen. If only there was a way to search the Web for things like this... GIYF. http://www.google.com/url?sa=trct=jq=esrc=ssource=webcd=7sqi=2ved=0CFkQFjAGurl=http%3A%2F%2Fwww.comlay.net%2Fibmjarg.pdfei=KmEyUJGPHoLe9AS7soCQDAusg=AFQjCNHc7BKJApfJHJnvV2jzCZ6joGl1Ogcad=rja (Wrap likely. Might unwrap as): http://www.comlay.net/ibmjarg.pdf -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: GOFF
A zero-PDS system? On Tue, 21 Aug 2012 18:54:00 -0300, Clark Morris wrote: Can PDSE be in the linklist or lpalist? If not, this is like IBM not having a way for SNA channel attached 3270s as console devices because VTAM was set up as a started task. If PDSE is a basic access method, somehow having it as a started task seems weird to me. Is PDSE a reliable access method now with no greater error rate than PDS? In contrast, in a Galaxy Far, Far Away, I was amazed to see OpenSolaris boot from ZFS (very different from zFS; GIYF). I mentioned this to a Solaris developer who said, Oh, sure; it just takes about a quarter megabyte support code in the boot record. If IBM had a similar level of commitment to PDSE it would be possible to IPL a system with _no_ PDS; only PDSE (or even only zFS (that one)). But it all depends on proper layering; it would require that very early in Nucleus Initialization components begin using access methods, not STARTIO nor RYO channel programs. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: ISPF Panel and LPAR name
On Wed, 22 Aug 2012 04:57:25 +0100, CM Poncelet wrote: IBM have recognized that 99% of users are computer illiterate, but have 99% of the money. So they are following Microsoft's 'lead' and, step-by-step, implementing Windoze for mainframes. And this, were it to happen, would be entirely a Bad Thing because ...? I love Google's query completion. As soon as I've typed 3 characters in the text box, it presents me with a dropdown menu of a handful of plausible completions (all wrong). A few more keystrokes and it shows me the one I want, among others, not only on Windows, but likewise on OS X and Linux. This is not a bad thing. And it would be a good thing (disputed only by laudator temporis acti ©) if ISPF were to do similarly on every panel which allows a data set name to be typed. I suspect Dave S. can explain to us why this is unlikely to happen soon if ever. And spelling correction. I like the way Google presents me an option; I detest the way Firefox makes the correction, willy-nilly. It could be done well. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: ISPF Panel and LPAR name
ISPF _is_ Windows for z/OS. On Wed, 22 Aug 2012 08:22:17 +0100, CM Poncelet wrote: ... because it is moving back towards suppressing intelligence (as Mao Tse Tung did in China, in the 1960s). We should not all be obliged to look at pictures just because the majority of people cannot read. But isn't ISPF itself a large step moving TSO in the direction of what Windows later became? And is it not suppressing intelligence to relieve users of the burden of learning the syntax of TSO line commands? You may continue to use the OUTPUT command if that's your preference. I'll use SDSF. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: ISPF Panel and LPAR name
Can I throw away my keyboard and use only my mouse? On Wed, 22 Aug 2012 11:02:36 -0400, Dave Salt wrote: Paul Gilmartin wrote: I love Google's query completion. And it would be a good thing if ISPF were to do similarly on every panel which allows a data set name to be typed. I suspect Dave S. can explain to us why this is unlikely to happen soon if ever. ISPF already supports auto-completion of data set names (kinda sorta), but it's extremely clunky. Better and easier to use SimpList and not have to type anything at all. Dave Salt Sometimes it might be less tedious to type than to use point-and-shoot (is that what you mean?) to drill down through a hierarchy of data set names. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: X86 server
Which costs less? On Wed, 22 Aug 2012 13:40:01 -0700, Edward Jaffe wrote: On 8/13/2012 10:01 PM, Jake anderson wrote: Does IBM provides support running Z/OS on X86 ? Yes, with its RDT offering: http://www.ibm.com/software/rational/products/devtest/systemz/ What's IBM's economic rationale here? If it's cheaper for them to make z/OS available on X86, then much that I read in this forum about the economic advantages of zSeries is untrue, and IBM's motive for not licensing z/OS for X86 is simply to compel customers to buy the more expensive hardware from IBM. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: JES/2 Spool
On Thu, 23 Aug 2012 08:23:57 -0700, Lizette Koehler wrote: Several options ... You could write a rexx and use SDSF REXX to get it There's much sample code in: Title: z/OS V1R12.0 SDSF Operation and Customization Document Number: SA22-7670-14 http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/isf4csa0/13.14 -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: static const arrays in C
What the ANSI standard says. On Fri, 24 Aug 2012 12:37:05 +0200, Bernd Oppolzer wrote: we have some modules written in C that have large arrays with constants. For some reasons we are forced to compile those modules using the RENT compiler option, which moves those arrays to the WSA (writable storage area) at runtime, which is not a desired behaviour, because this way, the storage is occupied twice - once �n the WSA and second in the initialization area in the STATIC CSECT - and there is coding needed at startup to move the constants into the WSA. We are not able to move to NORENT due to site conventions. Now my question: is it sufficient to mark those arrays with the const attribute, that is static const double tab [10] = { ... values follow ... }; or are there special #pragmas needed to prevent this table from being moved to the WSA, given the RENT compiler option? Years ago, I investigated such behavior with an ISV compiler, not IBM's. In that case, yes, if an object was declared const it was not moved to writable storage area. I looked further at the ANSI standard which says, IIRC, that if an object is declared const in one translation unit and declared not const in another translation unit (of course you would _never_ do that), and the latter modifies the object, the result is undefined. It stated no restriction if the object is never modified. I concluded that the ISV compiler might be stretching the standard by allowing the two translation units to refer to different instances of the object. I didn't press the point. But an object declared static shouldn't be accessible by name from more than one translation unit. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: static const arrays in C
Make initializers page-aligned? On Fri, 24 Aug 2012 14:41:16 +0200, Bernd Oppolzer wrote: Using the compiler option ROCONST (which is NOT the default with C programs), ... to avoid treading, however lightly, on the ANSI standard. you can specify that variables with the const attribute not be moved to the WSA - that is, the const attribute is respected. Otherwise (NOROCONST) it is ignored. This is the default with C (not with C++). I suspect const is not entirely ignored. Won't the compiler warn you if you modify, or even threaten to modify, a const object? But is it moved to WSA even if it's declared static const? There would seem to be no reason for that. Another way is using #pragma variable (variable_name, norent) for every such large read-only table, which has the same effect. Any further suggestions? No, but it occurs to me that a #pragma to page-align the initial values so the storage could be reclaimed once initialization is complete might be valuable. This might even be reasonable default behavior. Even better if numerous small initializers could be gather-loaded into a disposable page. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: static const arrays in C
On Fri, 24 Aug 2012 10:13:21 -0400, Thomas David Rivers wrote: As Gil mentioned - this is only really true for static data... extern data can't be trusted because the user might have put the 'const' keyword in one declaration, and left it off in another... which would mean that the extern reference might be a RENT one, while, say, the definition was non-RENT. ANSI seems to allow this as long as no translation unit modifies the data. Otherwise the effect is undefined. So a conforming implementation is free to put the object in write-protected storage. S0C4 fits within the notion of undefined. In your situation - where you are declaring a large array of doubles - putting the data in non-RENT memory can be a big win. non-RENT? ITYM RENT so it doesn't get copied. This is only supported by the assumption that if the programmer says const - he really means it... that's the point of the ROCONST option in the IBM compiler. So, you can say oh - I guess the programmer didn't _really_ mean it. I would hate to have to support such misbehavior. But, I suppose, The customer is always right. This is reminiscent of the OS's not loading modules marked REFR into write-protected storage because so many programmers didn't _really_ mean it I think that's been fixed. Installation option? REFRPROT comes to mind. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: X86 server
On Thu, 23 Aug 2012 22:13:49 -0400, Anne Lynn Wheeler wrote: ... max configured z196 with 80 processors is rated for 50BIPS and goes for $28M (about $560,000/BIPS) ... ibm has base price of $1815 for e5-2600 blade ... which have ratings at 527BIPS (about $3.44/BIPS), ... A factor of 160,000. The mind boggles. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Wed, 8 Aug 2012 14:06:04 +0200, R.S. wrote: BTW: your allocation request was illogical - you wanted to have 80-byte records and requested 1 byte. Such request has to be re-interpreted or canceled. ;-) As in: DD LRECL=80,SPACE=(1,...),... Seveal contributors argued that there was no way a 1-byte block could be written if LRECL=80, and the construct should result in an error. The JCL RM says: blklgth -- (only if AVGREC is not coded) Specifies the average block length of the data, in bytes. The blklgth is a decimal number from 0 through 65535. Really!? In fact by experiment, in JCL: DD SPACE=(0,1),... and in TSO ALLOCATE AVBLOCK(0) ... are both accepted without complaint. I suppose allocation adds a count and an IBG; divides track size by that; takes the ceiling and requests the resulting number of tracks (almost certainly 1). I have little problem with that. I haven't investigated whether SPACE=(0,9) allocates fewer tracks than SPACE=(1,9). It's possible that integer arithmetic or 32-byte chunking gives the same result for both. Perhaps I'll start coding SPACE=(0,1) in JCL to allocate minimal data sets, just to startle readers. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Sat, 25 Aug 2012 08:49:49 -0700, Skip Robinson wrote: Zero space allocation is perfectly valid. As is SPACE (0,1) also. The result is just as requested. In either case, the data set exists in the VTOC but takes up no space on disk. Ummm... no. By experiment, it allocates one track. There has to be room for the count field. And SPACE=(65535,1) allocates two tracks. This surprises me. Does 3390 support blocks spanning tracks? Also surprisingly, SPACE=(0,9) allocates 8,334 tracks; SPACE=(1,9) allocates 1,163 tracks. Did I do something wrong? Did someone divide by zero? The data set is treated as 'real', including GRS enqueue. Hence it can be used like any other exclusively held data set to serialize execution. The data set's being 'real' has little to do with GRS enque. I can code: //GRS EXEC PGM=WOMBAT,COND=(0,LE) //SERIALDD DISP=OLD,DSN=NONE.SUCH The data set needn't exist; the step isn't executed; yet I believe an exclusive ENQ is issued for its name which could be used to serialize execution. From: Paul Gilmartin Date: 08/25/2012 08:27 AM The JCL RM says: blklgth -- (only if AVGREC is not coded) Specifies the average block length of the data, in bytes. The blklgth is a decimal number from 0 through 65535. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Was: X86 server - Competitive economic advantage of System z plus z/OS compared with x86 plus (Linux or windoze)
On Sun, 26 Aug 2012 13:06:13 +0200, Arthur Fichtl wrote: OTOH, if you look at the global big new companies (e.g. Google, Amazon, Facebook), nobody of them is running MF systems because these companies are not captivated by legacy systems. Instead, Google (as known to the public) is running a cluster version of Linux based on commodity machines, Amazon is a pioneer in cloud computing (see: http://www.datacenterknowledge.com/archives/2012/08/15/amazon-direct-connect-comes-to-new-york/ ) Which mostly shows a photograph of an empty computer room. They could put anything in there. , and Facebook’s architecture is described here: http://www.datacenterknowledge.com/archives/2012/06/27/facebook-server-storage-designs/ What's impressive here is that they don't buy off-the-shelf hardware systems; they design their own. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: X86 server
Batch on other systems: (can Darren or someone please report to L-SOFT problems replying via the web interface to plies such as Rex's that have: Content-Transfer-Encoding: base64 Content-Type: text/plain; charset=utf-8 They can be read clearly. When replying, quoted text appears as unrendered base64. I'd do it myself, but IIRC, L-Soft requires customer ID. Thanks.) On Aug 27, 2012, at 07:18, Pommier, Rex R. wrote: ... Unless you specifically background a task, when you run a script it ties up your terminal session, whether it be for a transaction or a task that updates millions of rows in a database. ... But the *NIXen let the programmer background a process with a single keystroke and later to wait for its completion and sense its exit status; something extraordinarily (PoV) difficult in TSO. command-name # indicates background PID=$! # Save process-ID; repeat if desired ... # do whatever you want in meantime wait $PID # Wait for completion echo command-name completed with status $? What would be necessary to do this with CLIST or Rexx with e.g. IEFBR14 as command-name? Please enumerate any additional files (JCL) or nonstandard (ISV, CBBTAPE) commands that would be needed. And the command language for *NIX batch is identical to the foreground scripting language; newcomers may devote that part of their learning resouce to more productive areas. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: execs or scripts
On Mon, 27 Aug 2012 11:33:01 +, Bob Shannon wrote: CLIST stands for Command List i.e., a means to string a series of TSO commands together. It was rudimentary. Although some improvements have been added since its inception, it's no Rexx. Both CLIST and CMS EXEC, but not EXEC 2 nor Rexx are so closely coupled to the terminal input routine that they are the only true script facilities, scarcely deserving of independent recognition as languages. This results in the sometimes useful behavior that the programmer can invoke a utility (often EDIT, but not PDF nor XEDIT) and continue with inline subcommands to that utility. This is qualitatively different from *NIX here-documents or JCL SYSIN in that the status from each subcommand is available for testing in the parent script. (Can one execute a CLIST loop from the terminal rather than from a CLIST file?) Rexx is the furthest from a true scripting language, suffering the design defect (Shmuel considers it an advantage) of allowing reference to functions prior to their definition. This would engender the misbehavior were Rexx to be used as a terminal scripting language (some programmers have tried to implement this with wrapper scripts) that a typo in a function name could cause an endless input loop as the interpreter looked ahead for the function definition. I had some conceptual difficulty when I was first learing UNIX (Bourne) shell scripting because I failed to grasp that I was communicating with the same command interpreter from the terminal as from a script file; I often wanted to use too many quotes in the latter. Rexx habit. I understand that Warnock initially envisioned PostScript as a general purpose scripting language, not merely for document rendering. In fact, SunOS 4 had a PostScript-like shell language available. It interested me because I had some knowledge of PostScript at the time. But I was never able to find its analog of the system() command, and lost interest. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Mon, 27 Aug 2012 13:36:58 -0700, Skip Robinson wrote: I'm curious about the experiment that shows something on disk. ZAP command says 'DATA SET UNAVAILABLE OR NON-EXISTENT'. IEHLIST says 'THE ABOVE DATASET HAS NO EXTENTS'. What view of the disk shows something on a data track? I'm trying for an example. But what command can I use to list SPACE? Neither LISTDS nor LISTCAT seems to do it for me. (But do I just not know the correct options? Something under IDCAMS?) Thanks, gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Mon, 27 Aug 2012 16:26:40 -0700, Lizette Koehler wrote: What kind of space are you looking for? LISTC name ALL will provide space info on VSAM but not NON VSAM It's NONVSAM. If you want space on NON VSAM then I think the PDS utility on the CBTTAPE.ORG would work. So I have to go out and get a nonstandard utility ... Or create a REXX and use the LM functions to list the space or LISTDSI. ... or go through IKJEFT01; ISPSTART; LM*; ... Of course, I can do this easily with foreground ISPF; DSLIST; Info. But I had set myself the goal of doing it all in a _simple_ (self-contained) batch job so I could post here a refutation to the doubter. Why does MVS make simple things so damned hard!? OK. Here's the hybrid solution; batch JCL: // //EMPTY JOB 505303JOB,'Paul Gilmartin', // MSGLEVEL=(1,1),REGION=0M //* //USERCOUTPUT JESDS=ALL,DEFAULT=YES, // CLASS=R,PAGEDEF=V0648Z,CHARS=GT12 //* //STEP EXEC PGM=IEFBR14 //SYSUT0DD DISP=(MOD,DELETE),UNIT=SYSALLDA,SPACE=(0,1), // DSN=SYSUID..TEMP.ALMOST.EMPTY //SYSUT2DD DISP=(,CATLG),UNIT=SYSALLDA,SPACE=(0,1), // DSN=SYSUID..TEMP.ALMOST.EMPTY // (de)allocation messages: IEF142I EMPTY STEP - STEP WAS EXECUTED - COND CODE IEF285I user.TEMP.ALMOST.EMPTY UNCATALOGED IEF285I VOL SER NOS= TSO022. IEF285I user.TEMP.ALMOST.EMPTY DELETED IEF285I VOL SER NOS= TSO022. IEF285I user.TEMP.ALMOST.EMPTY CATALOGED IEF285I VOL SER NOS= TSO005. and data set info: Data Set Information Data Set Name . . . . : user.TEMP.ALMOST.EMPTY General Data Current Allocation Management class . . : **None**Allocated tracks . : 1 Storage class . . . : **None**Allocated extents . : 1 Volume serial . . . : TSO005 Device type . . . . : 3390 Data class . . . . . : **None** Organization . . . : NONE Current Utilization Record format . . . : ? Used tracks . . . . : 0 Record length . . . : 0 Used extents . . . : 0 Block size . . . . : 0 1st extent tracks . : 1 ... so SPACE=(0,1) does allocate space. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: The IBM zEnterprise EC12 announcment
On Tue, 28 Aug 2012 05:11:56 -0500, Shane Ginnane wrote: So IBM obviously couldn't use the z11 name and so the marketing intelligentsia came up with that marvellous ploy to fill the gap. Let's hope they have dibs on the next few iterations of znumber, so we can avoid this farce again in future. Who cares!? What's in a name? ... -- WS Actually, some things. IBM didn't understand that the output of uname -s is customarily used as an API by UNIX scripts when they changed it from OS/390 to z/OS. But IBM relented, and uname now says we're at OS/390 1.23. And even OS/390 has problems; the solidus breaks GNU autoconfigure. IBM does not much care to play well with others. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Tue, 28 Aug 2012 00:45:25 -0700, Lizette Koehler wrote: Peter, I works fine if working in ISPF. But when the question of line command is requested, I am thinking along the lines of a simple interface that could be used batch or foreground. Thanks for your understanding. Simply, there are too many disjoint ways of retrieving not enough information about a data set. These include HLIST, LISTDS, LISTCAT, BPXWDYN(INFO), Rexx LISTDSI, ISPF DSLIST, ISPF DDLIST, ... probably many others. There should be a single simple interface to retrieve any of the information supplied by any of the above. It should be accessible with: o JCL EXEC PGM= o TSO CALL o Assembler CALL o Rexx address LINKMVS (the above interfaces are all very similar.) o Other Rexx interfaces. It should be able to direct its output to: o TSO terminal. o DDNAME if OUTDD() specified o Rexx compound variable if STEM() specified. o Reply buffer supplied by assembler CALL or Rexx LINKMVS. It should accept as argument: o Catalogued data set name - even with the extended syntax allowed by DISABLE(DSNCHECK) o Uncatalogued data set name if UNIT and VOL are specified - again even with nonstandard name syntax o DDNAME, which may refer to: - catalogued data set - uncatalogued data set - temporary DSN - VIO data set - UNIT and VOL with no DSN coded - UNIX path (have I missed any?) With DDNAME specified it should (be able to) return attributes which will be used in the DCB merge at OPEN, not necessarily those in the DSCB. DDNAME should be allowed to be any 8-character string that could have been allocated by SVC 99; not restricted to JCL syntax (the latter could be retrieved if desired by issuing a second call with DSN, UNIT, and VOL supplied by a previous call). The values returned should be sufficient to allow reallocation of the same entity to a different DDNAME with TSO ALLOCATE or BPXWDYN. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: The IBM zEnterprise EC12 announcment
On Tue, 28 Aug 2012 13:55:43 +, Meral Temel (Garanti Teknoloji) wrote: One cryptographic/compression co-processor per core Presumably optionally disabled to comply with export restrictions? I'm told we have the cryptographic PRNG disabled on most of our processors because it's separately priced. Is that true? Will it ever change? Cryptography support of UTF8UTF16 conversions Shouldn't that be UTF-8? I had never heard of UTF-16, but apparently Microsoft uses it, so it must be OK. Is UTF8UTF16 properly deemed cryptography? What about ROT-13? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: The IBM zEnterprise EC12 announcment
On Tue, 28 Aug 2012 10:49:21 -0400, Tony Harminc wrote: Presumably optionally disabled to comply with export restrictions? Is there really anywhere these days you can send a mainframe to that you can't send a crypto processor to? Surely no one in Cuba or Iran can order up a zEC12 in any case, even if a handful of cheap GPUs have more computing power. I had thought restrictions applied anywhere outside the U.S. and Canada. But I may be operating on outdated misinformation. You forgot North Korea. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: The IBM zEnterprise EC12 announcment
On Tue, 28 Aug 2012 10:44:32 -0500, Todd Last wrote: According to today's virtual event, the EC12 is the 12th generation of modern mainframes. Can anyone list out the 11 previous generations? Something like: Matthew 1 King James Version (KJV) 1 The book of the generation of Jesus Christ, the son of David, the son of Abraham. 2 Abraham begat Isaac; and Isaac begat Jacob; and Jacob begat Judas and his brethren; 3 And Judas begat Phares and Zara of Thamar; and Phares begat Esrom; and Esrom begat Aram; 4 And Aram begat Aminadab; and Aminadab begat Naasson; and Naasson begat Salmon; ... -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: The IBM zEnterprise EC12 announcment
On Tue, 28 Aug 2012 11:29:48 -0500, Kirk Wolf wrote: From: http://java.sun.com/javase/technologies/core/basic/intl/faq.jsp#core-textrep The primitive data type char in the Java programming language is an unsigned 16-bit integer that can represent a Unicode code point in the range U+ to U+, or the code units of UTF-16http://java.sun.com/javase/technologies/core/basic/intl/faq.jsp#utf-16 . Which does describe UTF-16 as a variable-length encoding of which Java uses a subset. Confusing eh? I guess you would call what Java uses internally a UTF-16 subset. So, technically not UTF-16, but practically UTF-16 (a two-byte UTF-16 subset) That's more like UCS-2. Big-endian or little-endian? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: execs or scripts
On Tue, 28 Aug 2012 13:21:14 -0400, John Gilmore wrote: Other people's parsing machinery is, in my experience, usable only for context-free 'languages'; and since I devise and use only context-sensitive--yes, PL/I-like--languages, I have found that I must build my own parsing machinery; and this is easy enough to do using REXX. No language that requires identifiers to be declared is context-free, though some phrases in such languages may be parsed by context-unaware machinery, usually subject to availability of a symbol table. In effect, the symbol table converts declared identifiers to terminal symbols in the parser's view. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Tue, 28 Aug 2012 15:33:15 -0500, Richard Peurifoy wrote: But for CKD doesn't there have to be some place to write the EOF? I think BSAM/QSAM will simulate an EOF without doing any I/O to the data set if you try to read it. Yup. As I said here lately, I've depended on that behavior in the past. And I believe that if the primary extent is exactly filled, the OS will not allocate a secondary merely to write that EOF. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Space Allocation In Bytes
On Tue, 28 Aug 2012 14:45:42 -0700, Skip Robinson wrote: I know that ISPF Browse will show 'no data' if it judges from the VTOC that utilization is zero, as in 3.2, regardless of what might be there physically. OTOH IEBGENER attempts read a file until EOF regardless of VTOC info. I ran GENER to print a zero-space data set:. The result is the same as if the only data on the first track were EOF. I believe this is the behavior of QSAM. BSAM at least in the past behaved otherwise; cheerfully reading residual, likely invalid, data. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
TSO LOGON Reconnect confirmation.
In the TSO graphic LOGON panel, I can either S Reconnect, in which it preempts any active session, or I can not select Reconnect, in which case it rejects the LOGON if another session is active. Either of these behaviors is extreme. If there's another session, I'd like it to prompt me: Another session is active. R(econnect) or C(ancel)? Is there any way to achieve this? Bonus points if it were to tell me if the active session has a compatible terminal type, and if not which, since if I reconnect to ISPF with an incompatible terminal type chaos ensues. Dumb ISPF. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: TSO LOGON Reconnect confirmation.
On Tue, 28 Aug 2012 21:04:24 -0400, Gerhard Postpischil wrote: I'd like it to prompt me: Another session is active. R(econnect) or C(ancel)? Yes, but you probably won't like it. The method is to implement a pre-logon exit, which entails doing your own screen I/O, error recovery, prompting for user id and password, etc. You're right. I don't like it. How did you guess? Actually, in HLASM I could do anything, even write my own TMP. If I wanted to. If I knew how. Couldn't I? And If I can prompt for passwords, I can copy them. Sounds like a security exposure to me. As a bonus you can allow multiple TSO sessions on the same system, something not recommended for the faint of heart. Is this more frightening than multiple TSO sessions on separate processors, which I do regularly? Thanks, gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: DFDSS
On Sat, 1 Sep 2012 21:46:36 -0400, Doug wrote: Gill Agreed! HFS/zFS With DFDSS should be made to honor user allocation specifications for data set restore. No. I'll go further than that. It should allocate as the primary extent the largest available eligible extent. It should allocate as the first secondary extent, if needed, the largest remaining eligible extent. It should allocate as the next secondary extent ... and so on. It's a computer; it should employ the program do the dirty work, but do it correctly. Typical work around is to reallocate and manually copy the zFS. Last PMR with IBM on this topic just gave me the run around. So, that is why I am asking this brain trust the question. Sheesh! I assume run around is spelled WAD. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: iSeries
On Mon, 3 Sep 2012 10:19:57 -0700, Charles Mills wrote: Two identical tradenames do not necessarily infringe on each other. The test is the likelihood of customer confusion. Would a mattress buyer be likely to think IBM was behind a Serta iSeries? Would a computer buyer impute Serta's reputation to an IBM iSeries? The question has gotten tougher in recent years. Fifty years ago you probably could have called a clothing line Coke or MacDonald's, but now every company wants their brand known in every line of business. A line in the sand was drawn here: Amstar Corp. v. Domino's Pizza Inc., 615 F.2d 252 (5th Cir. 04/08/1980) [1] UNITED STATES COURT OF APPEALS, FIFTH CIRCUIT [2] No. 79-3650 [3] 1980.C05.41966 http://www.versuslaw.com; 615 F.2d 252 [4] April 8, 1980 [5] AMSTAR CORPORATION, PLAINTIFF-APPELLEE, v. DOMINO'S PIZZA, INC. AND ATLANTA PIZZA, INC., PIZZA ENTERPRISES, INC. AND PIZZA SERVICES, INC., HANNA CREATIVE ENTERPRISES, INC., DEFENDANTS-APPELLANTS. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: The IBM zEnterprise EC12 announcment
On Tue, 4 Sep 2012 15:01:37 -0400, Thomas David Rivers wrote: cxx: t.c line 3:Error #144: a value of type const char [7] cannot be used to initialize an entity of type char [6] char s6[ 6 ] = wombat; Is there any convenient way to perform this initialization? (I don't consider either overallocating the array or enumerating individual chars in a multiple initializer convenient.) Thanks, gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Strings (hijacked from: The IBM zEnterprise EC12 announcment)
On Tue, 4 Sep 2012 14:32:12 -0500, Kirk Wolf wrote: (BTW - strncpy() also zeros bytes after the terminator, if necessary) For more information, see: http://www.courtesan.com/todd/papers/strlcpy.html under Common Misconceptions There's no discernible date of publication of that paper save for some interior references to events ca. 1996. And strlcpy() and strlcat() appear not to have made it into POSIX. That paper mentions performance consequences of strncpy()'s zeroing bytes after the terminator when the target buffer may be much larger than the source. It does not mention that str(l|n)cat() suffers a similar performance impact when concatenating multiple strings into a single buffer because the content previously concatenated must be re-scanned to find the null terminator. Of course, the programmer could bypass this by using the length returned by strlcat()/strlcpy() as an offset in the target. But this reintroduces the hazard of programmer arithmetic errors. If strlcat() were inline rather than a library function, an optimizing compiler could take care of much of this by remembering the length of the previous call. You, Lynn, and John G. are correct to distrust null-terminated strings. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Preventing the installation of unapproved software
What about IP liability concerns? On Sep 5, 2012, at 06:47, R.S. wrote: W dniu 2012-09-05 14:21, Greg Dorner pisze: Man, the auditors came up with a new one! Gap noted. Automated controls to prevent the installation of unapproved software were not documented. 1. The requirement is plain stupid. There is no reason to analyse case like Smith did bring and uploaded some CBT program. [*] 2. There is automated control: RACF or other security server. With proper setup only authorized personnel is able to install the software in terms of APF, SSI, proclib and parmlib members. I assume you have your security server set up properly. [*] Note: theorethically I can write 10 lines script, call it software product, copyright it and sell it for 1000$ per machine (MIPS, whatever). On every platform - MVS, Windows, Unix, Linux, VMS, VSE, VM there are folks who are able to create text file/dataset. So, they are able to upload my very copyrighted and extremely expensive (and possibly dangerous) software product. Of course on some platforms, like z/OS a product to be working, especially if it's considered as dangeours - do need authorities like APF, etc. So, the product in the regular file is NOT installed. BTW: it need not do be script. I can put myprg.exe to a dataset. theorethically Is that a portmanteau word? (Your English is good enough that it might be a deliberate construct.) There's a genuine IP concern here. An employee might bring in from a former employer an SD RAM with a TSO TRANSMIT unloaded library containing a licensed program product, not licensed at the new site and expose the new employer to significant legal liability with no need for particular authorization. There might be an argument here for vendors' requiring APF authorization of their products not because of any intrinsic integrity concerns, but simply to force an audit of the installation. (But this might easily be bypassed with AMASPZAP's changing one BC instruction. Perhaps the auditor should require that use of AMASPZAP be restricted.) -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN