Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread John McKown
On Mon, Jun 25, 2018 at 12:29 PM Farley, Peter x23353 <
peter.far...@broadridge.com> wrote:

> I do understand that all these cool things are, in fact, quite dangerous
> facilities for the uninitiated and ignorant, and well-deserving of the
> provided protection from untutored use.
>
> I don't think it's a sufficient business case for IBM purposes, but the
> lack of GUPI encapsulation for these kinds of capabilities which are
> already available in the system does at least somewhat limit the scope of
> applications that can be envisioned and implemented by programmers without
> access to private sandbox systems in which to experiment and learn.
>

​Going back to the start, I totally agree that IBM should expose some GUPI
interface to the DUCT oriented facilities used by the TRAP mechanism. After
all, they did for the "linkage stack" instructions like BAKR. And they
published caveats about using them. One big drawback to using BAKR is that
there is not a simple method to recover from a "stack full" condition.
Another drawback is that, from what I've read, BAKR is CPU intensive
compared to any of the standard linkage methods currently defined by IBM.​



>
> Sometimes I wish I still worked for a viable ISV where such
> experimentation is encouraged and rewarded, and then I remember the
> uncertainty and extraordinary work pressure of employment at such
> companies.  Very bad for one's digestion and usually detrimental to calm
> family life.
>
> Peter
>
>
-- 
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread Seymour J Metz
Did anybody submit an RFE for a safe encapsulation of TRAP and PER handling? Is 
the MC interface still available for privileged users other than GTF?

I've done software development; the pressure is no worse than at a data center, 
and in many cases you have a lot more control and more people to bounce ideas 
off of.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Farley, Peter x23353 
Sent: Monday, June 25, 2018 1:29 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

I do understand that all these cool things are, in fact, quite dangerous 
facilities for the uninitiated and ignorant, and well-deserving of the provided 
protection from untutored use.

I don't think it's a sufficient business case for IBM purposes, but the lack of 
GUPI encapsulation for these kinds of capabilities which are already available 
in the system does at least somewhat limit the scope of applications that can 
be envisioned and implemented by programmers without access to private sandbox 
systems in which to experiment and learn.

Sometimes I wish I still worked for a viable ISV where such experimentation is 
encouraged and rewarded, and then I remember the uncertainty and extraordinary 
work pressure of employment at such companies.  Very bad for one's digestion 
and usually detrimental to calm family life.

Peter

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Seymour J Metz
Sent: Monday, June 25, 2018 12:14 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

Because the raw facilities are dangerous and IBM hasn't provided services to 
safely encapsulate them. The safeguards may seem confining, but I remember too 
well what life was like without them to want to return to those days.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Farley, Peter x23353 
Sent: Monday, June 25, 2018 10:11 AM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

[Slightly OT and very much tongue-in-cheek . . .]

Why do all the cool things to play with (servers and worker spaces and TRAP and 
. . . ) require authorized code?  That keeps inquiring minds from experimenting 
and learning the cool things on our own (since no one seems to want to actually 
pay for learning anything these days).

Peter

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Peter Relson
Sent: Monday, June 25, 2018 9:44 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

Only if the attacher is authorized and asks for that to be done, by setting bit 
TCBSENVP (the "P" stands for "propagate") in its own TCB prior to the ATTACH(X).
If the bit is on, the bit and the value are propagated to the daughter TCB.

Peter Relson
z/OS Core Technology Design

--


This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread Farley, Peter x23353
I do understand that all these cool things are, in fact, quite dangerous 
facilities for the uninitiated and ignorant, and well-deserving of the provided 
protection from untutored use.

I don't think it's a sufficient business case for IBM purposes, but the lack of 
GUPI encapsulation for these kinds of capabilities which are already available 
in the system does at least somewhat limit the scope of applications that can 
be envisioned and implemented by programmers without access to private sandbox 
systems in which to experiment and learn.

Sometimes I wish I still worked for a viable ISV where such experimentation is 
encouraged and rewarded, and then I remember the uncertainty and extraordinary 
work pressure of employment at such companies.  Very bad for one's digestion 
and usually detrimental to calm family life.

Peter

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Seymour J Metz
Sent: Monday, June 25, 2018 12:14 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

Because the raw facilities are dangerous and IBM hasn't provided services to 
safely encapsulate them. The safeguards may seem confining, but I remember too 
well what life was like without them to want to return to those days.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Farley, Peter x23353 
Sent: Monday, June 25, 2018 10:11 AM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

[Slightly OT and very much tongue-in-cheek . . .]

Why do all the cool things to play with (servers and worker spaces and TRAP and 
. . . ) require authorized code?  That keeps inquiring minds from experimenting 
and learning the cool things on our own (since no one seems to want to actually 
pay for learning anything these days).

Peter

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Peter Relson
Sent: Monday, June 25, 2018 9:44 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

Only if the attacher is authorized and asks for that to be done, by setting bit 
TCBSENVP (the "P" stands for "propagate") in its own TCB prior to the ATTACH(X).
If the bit is on, the bit and the value are propagated to the daughter TCB.

Peter Relson
z/OS Core Technology Design

--


This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread Seymour J Metz
Writing requirements is a black art. If you give detail IBM claims that you're 
telling them how to it, and if you don't give detail then they implement 
something that doesn't satisfy the requirement.

BTW, I still have the shirt.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
John McKown 
Sent: Monday, June 25, 2018 1:05 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

On Mon, Jun 25, 2018 at 11:11 AM Seymour J Metz  wrote:

> None of those options help learning about z/OS internals, due to OCO. When
> logic manuals and source code become available, then it will be possible to
> legitimately discuss learning internals. I won't hold my breathe.
>

​Very true. I remember chanting, with others, "Just say NO to OCO." IBM
summarily ignored us.​ I will say that in many ways since then IBM's
attempts to make more interfaces documented and "GUPI" are nicely done. But
"use the source, Luke!" is the GNU mantra and I embrace it. IBM's thoughts
seem to be "don't tell us how to do things, tell us what you need & why".
Of course, if it doesn't have a business case, then the profit driven IBM
will feel free to either ignore or "back burner" it.



>
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
>

--
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread John McKown
On Mon, Jun 25, 2018 at 11:11 AM Seymour J Metz  wrote:

> None of those options help learning about z/OS internals, due to OCO. When
> logic manuals and source code become available, then it will be possible to
> legitimately discuss learning internals. I won't hold my breathe.
>

​Very true. I remember chanting, with others, "Just say NO to OCO." IBM
summarily ignored us.​ I will say that in many ways since then IBM's
attempts to make more interfaces documented and "GUPI" are nicely done. But
"use the source, Luke!" is the GNU mantra and I embrace it. IBM's thoughts
seem to be "don't tell us how to do things, tell us what you need & why".
Of course, if it doesn't have a business case, then the profit driven IBM
will feel free to either ignore or "back burner" it.



>
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
>

-- 
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread Seymour J Metz
Because the raw facilities are dangerous and IBM hasn't provided services to 
safely encapsulate them. The safeguards may seem confining, but I remember too 
well what life was like without them to want to return to those days.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Farley, Peter x23353 
Sent: Monday, June 25, 2018 10:11 AM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

[Slightly OT and very much tongue-in-cheek . . .]

Why do all the cool things to play with (servers and worker spaces and TRAP and 
. . . ) require authorized code?  That keeps inquiring minds from experimenting 
and learning the cool things on our own (since no one seems to want to actually 
pay for learning anything these days).

Peter

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Peter Relson
Sent: Monday, June 25, 2018 9:44 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

EXTERNAL EMAIL

Only if the attacher is authorized and asks for that to be done, by
setting bit TCBSENVP (the "P" stands for "propagate") in its own TCB prior
to the ATTACH(X).
If the bit is on, the bit and the value are propagated to the daughter
TCB.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread Seymour J Metz
None of those options help learning about z/OS internals, due to OCO. When 
logic manuals and source code become available, then it will be possible to 
legitimately discuss learning internals. I won't hold my breathe.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
John McKown 
Sent: Monday, June 25, 2018 10:27 AM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

On Mon, Jun 25, 2018 at 9:11 AM Farley, Peter x23353 <
peter.far...@broadridge.com> wrote:

> [Slightly OT and very much tongue-in-cheek . . .]
>
> Why do all the cool things to play with (servers and worker spaces and
> TRAP and . . . ) require authorized code?  That keeps inquiring minds from
> experimenting and learning the cool things on our own (since no one seems
> to want to actually pay for learning anything these days).
>

​My UNIX methods don't require APF authorization to fork()/exec() or
spawn() a new address space for a different user. It just requires the
proper RACF authorization. Which can be very granular, allowing the same
code to allow changing to "A" but not to "A1".

APF is generally a way to allow advanced facilities because misuse of those
facilities can cause a z/OS system failure. And IBM "Statement of
Integrity" is the documentation to that effect.
https://secure-web.cisco.com/1P8TX3CcswLF8KtL3ds8KORQ7V7OsVWqKy2LUq4LodxGxtzH3PFVShMXRiHJ5YA0aNgB9QjW92MxwW5poJUlyoUisao9lyauLVZw9N5ODPOpKari0xfbD3a0VcOp51MkRqoSHedHXF5saqphSj80-nLsVpeGi8_NPVuwDx9Ne3gJQ62ihsHh6qBf5OSOHFljmYBMrAOp8aqETeY-RUZyiSHVhQ62EGy3NMl1MqgiX3TMnerUUE8DlyzqX-8bKlGhjUYKVatJZ1E38iKbmA3C-4Fxzws5tJyQ1lGZ37tf69oHu7zoJvL821ItXKh-VLpxSxQfLPqZ6814Y0LgssHC4cDfPNc_OUfNXqlQ-pf5zIoi3O3deuTrja0mcjRTqM94k/https%3A%2F%2Fwww-01.ibm.com%2Fcommon%2Fssi%2Fcgi-bin%2Fssialias%3Fsubtype%3DWH%26infotype%3DSA%26htmlfid%3DZSL03361USEN%26attachment%3DZSL03361USEN.PDF

IBM’s commitment includes design and development practices intended to
prevent unauthorized application programs, subsystems, and users from
bypassing z/OS security – that is, to prevent them from gaining access,
circumventing, disabling, altering, or obtaining control of key z/OS system
processes and resources unless allowed by the installation. Specifically,
z/OS “System Integrity” is defined as the inability of any program not
authorized by a mechanism under the installation’s control to circumvent or
disable store or fetch protection, access a resource protected by the z/OS
Security Server (RACF® ), or obtain control in an authorized state; that
is, in supervisor state, with a protection key less than eight (8), or
Authorized Program Facility (APF) authorized. In the event that an IBM
System Integrity problem is reported to IBM, IBM will always take action to
resolve it in the specified operating environment for releases that have
not reached their announced End of Support 1 dates.

​​
​If you really want to learn z/OS "internals", I think that IBM's solution
is (1) have a "sandbox" system where you don't care and so APF authorize
just about anything; (2) shell out over USD 5000 ​/ year for a PD system;
(3) shell out about USD 600 (?) for a z/OS image on the Dallas Innovation
Center (ISV only?). ISV's can get the zPDT, which is a slightly different
version of the PD system. If I'm reading things correctly. I guess
"knowledge is power" and you need to pay your power bill. Or some such
thing. This is why I run Linux/Intel on an Intel XEON E3 system at home. I
have _no_ real support, but full source code and a "do whatever you want --
your gun;your foot" attitude from RedHat (I run Fedora).



>
> Peter
>

--
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread John McKown
On Mon, Jun 25, 2018 at 9:11 AM Farley, Peter x23353 <
peter.far...@broadridge.com> wrote:

> [Slightly OT and very much tongue-in-cheek . . .]
>
> Why do all the cool things to play with (servers and worker spaces and
> TRAP and . . . ) require authorized code?  That keeps inquiring minds from
> experimenting and learning the cool things on our own (since no one seems
> to want to actually pay for learning anything these days).
>

​My UNIX methods don't require APF authorization to fork()/exec() or
spawn() a new address space for a different user. It just requires the
proper RACF authorization. Which can be very granular, allowing the same
code to allow changing to "A" but not to "A1".

APF is generally a way to allow advanced facilities because misuse of those
facilities can cause a z/OS system failure. And IBM "Statement of
Integrity" is the documentation to that effect.
https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=WH=SA=ZSL03361USEN=ZSL03361USEN.PDF

IBM’s commitment includes design and development practices intended to
prevent unauthorized application programs, subsystems, and users from
bypassing z/OS security – that is, to prevent them from gaining access,
circumventing, disabling, altering, or obtaining control of key z/OS system
processes and resources unless allowed by the installation. Specifically,
z/OS “System Integrity” is defined as the inability of any program not
authorized by a mechanism under the installation’s control to circumvent or
disable store or fetch protection, access a resource protected by the z/OS
Security Server (RACF® ), or obtain control in an authorized state; that
is, in supervisor state, with a protection key less than eight (8), or
Authorized Program Facility (APF) authorized. In the event that an IBM
System Integrity problem is reported to IBM, IBM will always take action to
resolve it in the specified operating environment for releases that have
not reached their announced End of Support 1 dates.

​​
​If you really want to learn z/OS "internals", I think that IBM's solution
is (1) have a "sandbox" system where you don't care and so APF authorize
just about anything; (2) shell out over USD 5000 ​/ year for a PD system;
(3) shell out about USD 600 (?) for a z/OS image on the Dallas Innovation
Center (ISV only?). ISV's can get the zPDT, which is a slightly different
version of the PD system. If I'm reading things correctly. I guess
"knowledge is power" and you need to pay your power bill. Or some such
thing. This is why I run Linux/Intel on an Intel XEON E3 system at home. I
have _no_ real support, but full source code and a "do whatever you want --
your gun;your foot" attitude from RedHat (I run Fedora).



>
> Peter
>

-- 
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread Farley, Peter x23353
[Slightly OT and very much tongue-in-cheek . . .]

Why do all the cool things to play with (servers and worker spaces and TRAP and 
. . . ) require authorized code?  That keeps inquiring minds from experimenting 
and learning the cool things on our own (since no one seems to want to actually 
pay for learning anything these days).

Peter

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Peter Relson
Sent: Monday, June 25, 2018 9:44 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

EXTERNAL EMAIL

Only if the attacher is authorized and asks for that to be done, by 
setting bit TCBSENVP (the "P" stands for "propagate") in its own TCB prior 
to the ATTACH(X).
If the bit is on, the bit and the value are propagated to the daughter 
TCB.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread John McKown
On Mon, Jun 25, 2018 at 8:44 AM Peter Relson  wrote:

> Only if the attacher is authorized and asks for that to be done, by
> setting bit TCBSENVP (the "P" stands for "propagate") in its own TCB prior
> to the ATTACH(X).
> If the bit is on, the bit and the value are propagated to the daughter
> TCB.
>

​Thank very much. That satisfies my curiosity completely​.

Not that I would ever designed a MUSAS application in today's z/OS
environment. Possibly due to an extreme *IX infection, I'd use z/OS UNIX
services to either fork()/exec() or spawn() a new address space, using the
UNIX facilities (using the proper RACF permissions) to start a new address
space for the new user. Much like the z/OS ftp server does. Isolating the
users in separate address spaces is much much expensive, but it
significantly more secure. However, that is just my opinion.



>
> Peter Relson
> z/OS Core Technology Design
>
>

-- 
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread Peter Relson
Only if the attacher is authorized and asks for that to be done, by 
setting bit TCBSENVP (the "P" stands for "propagate") in its own TCB prior 
to the ATTACH(X).
If the bit is on, the bit and the value are propagated to the daughter 
TCB.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-25 Thread Walt Farrell
On Fri, 22 Jun 2018 09:43:15 -0500, John McKown  
wrote:

>This is strictly a curiosity question. Suppose for some unspecified &
>irrelevant to this discussion that my code is running under a TCB which has
>a non-zero TCBSENV value. If my code were to do an ATTACHX to create a
>subtask, would the new TCB have the same TCBSENV as my code, or would it be
>zero? I did RTFM but did not see anything that addresses this. And an IBM
>KC search got so many hits that I was completely befuddled.

No, in the general case ATTACH/X does not propagate TCBSENV from parent to 
child.

There is one exception I recall, but I leave research on the details (and 
proper terminology) to someone else.

I believe that WLM provides functions that allow requestors to schedule work to 
a server address space, and cooperating worker address spaces to pull requests 
off of the server queue for processing. Those WLM services also capture the 
security credentials for the requestor. When the worker pulls a request the 
system instantiates a copy of the requestor's ACEE for the worker so the 
request runs with the requestor's security credentials.

In that environment (and only in that environment, as far as I know) if the 
code running in the worker does an ATTACH/X, TCBSENV _is_ propagated to the 
daughter TCB.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-24 Thread Ed Jaffe

On 6/22/2018 7:43 AM, John McKown wrote:

This is strictly a curiosity question. Suppose for some unspecified &
irrelevant to this discussion that my code is running under a TCB which has
a non-zero TCBSENV value. If my code were to do an ATTACHX to create a
subtask, would the new TCB have the same TCBSENV as my code, or would it be
zero? I did RTFM but did not see anything that addresses this. And an IBM
KC search got so many hits that I was completely befuddled.


I've always wondered if that is what the uncommented TCBSENVP is for...

--
Phoenix Software International
Edward E. Jaffe
831 Parkview Drive North
El Segundo, CA 90245
https://www.phoenixsoftware.com/


This e-mail message, including any attachments, appended messages and the
information contained therein, is for the sole use of the intended
recipient(s). If you are not an intended recipient or have otherwise
received this email message in error, any use, dissemination, distribution,
review, storage or copying of this e-mail message and the information
contained therein is strictly prohibited. If you are not an intended
recipient, please contact the sender by reply e-mail and destroy all copies
of this email message and do not otherwise utilize or retain this email
message or any or all of the information contained therein. Although this
email message and any attachments or appended messages are believed to be
free of any virus or other defect that might affect any computer system into
which it is received and opened, it is the responsibility of the recipient
to ensure that it is virus free and no responsibility is accepted by the
sender for any loss or damage arising in any way from its opening or use.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-22 Thread Rob Scott
TCBSENV is not propagated to the daughter on ATTACH.

My suggestion would be to ATTACH DISP=NO and get the mother task to populate 
the field in the daughter.

Rob Scott
Rocket Software


 Original message 
From: Charles Mills 
Date: 22/06/2018 16:50 (GMT+00:00)
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is TCBSENV propagated to child TCB by ATTACHX

I am very familiar with TCBSENV and I don't know the answer. My "guess" would 
be that it IS propagated, but that is a guess. Easy to run an experiment if you 
wanted to.

I do know that TCBSENV is "optional" -- it is zero a lot of the time. (That is, 
if you have code that sees a lot of "random" TCB's you will see a lot of 
TCBSENV == 0.) ASXBSENV is often a fallback.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of John McKown
Sent: Friday, June 22, 2018 7:43 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Is TCBSENV propagated to child TCB by ATTACHX

This is strictly a curiosity question. Suppose for some unspecified &
irrelevant to this discussion that my code is running under a TCB which has
a non-zero TCBSENV value. If my code were to do an ATTACHX to create a
subtask, would the new TCB have the same TCBSENV as my code, or would it be
zero? I did RTFM but did not see anything that addresses this. And an IBM
KC search got so many hits that I was completely befuddled.

--
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Rocket Software, Inc. and subsidiaries ¦ 77 Fourth Avenue, Waltham MA 02451 ¦ 
Main Office Toll Free Number: +1 855.577.4323
Contact Customer Support: 
https://my.rocketsoftware.com/RocketCommunity/RCEmailSupport
Unsubscribe from Marketing Messages/Manage Your Subscription Preferences - 
http://www.rocketsoftware.com/manage-your-email-preferences
Privacy Policy - http://www.rocketsoftware.com/company/legal/privacy-policy


This communication and any attachments may contain confidential information of 
Rocket Software, Inc. All unauthorized use, disclosure or distribution is 
prohibited. If you are not the intended recipient, please notify Rocket 
Software immediately and destroy all copies of this communication. Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is TCBSENV propagated to child TCB by ATTACHX

2018-06-22 Thread Charles Mills
I am very familiar with TCBSENV and I don't know the answer. My "guess" would 
be that it IS propagated, but that is a guess. Easy to run an experiment if you 
wanted to.

I do know that TCBSENV is "optional" -- it is zero a lot of the time. (That is, 
if you have code that sees a lot of "random" TCB's you will see a lot of 
TCBSENV == 0.) ASXBSENV is often a fallback.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of John McKown
Sent: Friday, June 22, 2018 7:43 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Is TCBSENV propagated to child TCB by ATTACHX

This is strictly a curiosity question. Suppose for some unspecified &
irrelevant to this discussion that my code is running under a TCB which has
a non-zero TCBSENV value. If my code were to do an ATTACHX to create a
subtask, would the new TCB have the same TCBSENV as my code, or would it be
zero? I did RTFM but did not see anything that addresses this. And an IBM
KC search got so many hits that I was completely befuddled.

-- 
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Is TCBSENV propagated to child TCB by ATTACHX

2018-06-22 Thread John McKown
This is strictly a curiosity question. Suppose for some unspecified &
irrelevant to this discussion that my code is running under a TCB which has
a non-zero TCBSENV value. If my code were to do an ATTACHX to create a
subtask, would the new TCB have the same TCBSENV as my code, or would it be
zero? I did RTFM but did not see anything that addresses this. And an IBM
KC search got so many hits that I was completely befuddled.

-- 
There is no such thing as the Cloud. It is just somebody else’s computer.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN