Z/OS V2R2 Network File System Guide and Reference Contents

Total Page:16

File Type:pdf, Size:1020Kb

Z/OS V2R2 Network File System Guide and Reference Contents z/OS Network File System Guide and Reference Version 2 Release 2 SC23-6883-01 This edition applies to Version 2 Release 2 of z/OS® (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. This edition replaces SC23-6883-00. © Copyright IBM Corporation 1991, 2015. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. © Copyright IBM Corp. 1991, 2015 iii iv z/OS V2R2 Network File System Guide and Reference Contents Figures ...............xi Tested servers for the z/OS NFS client .....16 || z/OS NFS client restrictions ........17 Tables ...............xiii WebNFS support ............17 NFS versions with TCP/IP protocols ......18 Internet Protocol version 6 .........19 About this document ........xvii User-specified port range support .......20 Required product knowledge ........xvii Dynamic addressing ...........20 Where to find more information .......xvii 64-bit exploitation ............21 Access to documents ..........xvii Data transfer and conversion ........21 z/OS information ..........xviii Native ASCII support ..........21 Access to softcopy documents on CD-ROM and DVD collections and the Internet ......xix Chapter 2. Creating z/OS conventional How to look up message explanations with LookAt ..............xix MVS data sets ...........23 How to read syntax diagrams ........xx Overriding data set creation attributes .....23 Related protocol specifications .......xxii Preparing to create an MVS file........23 The z/OS Basic Skills Information Center . xxiii Naming MVS files ...........24 Creating physical sequential files .......24 How to send your comments to IBM xxv Creating direct access files .........25 Creating PDSs and PDSEs .........26 If you have a technical problem .......xxv Creating a PDS or PDSE - mkdir dsntype(pds), If you have a technical problem .......xxv dsntype(library) ............26 Removing a PDS or PDSE - rm, rmdir ....26 Summary of changes .......xxvii Accessing PDS or PDSE members ......27 Summary of changes for SC23-6883-00 ....xxviii Updating or extending a PDS or PDSE member 27 Timing out while writing a PDS or PDSE Part 1. Using z/OS Network File member ..............27 System...............1 Wildcard copy to a PDS or PDSE ......27 Limitations of a PDS ..........28 Concurrent writes to a PDSE .......28 Chapter 1. Introduction ........3 ISPF extended statistics support for PDS or PDSE Overview ...............3 members ..............28 z/OS UNIX files .............4 Creating VSAM files ...........28 z/OS UNIX advantages..........4 Exploiting SAM striped files.........30 NFS protocol compliance .........5 Exploiting large format data sets .......30 Crossing between file systems–NFS server . 5 Exploiting data sets on extended address volumes 30 z/OS conventional MVS data sets .......5 Mounting MVS data sets onto a client mount Chapter 3. Using z/OS conventional point ................5 MVS data sets ...........31 Creating z/OS conventional MVS data sets . 6 Special MVS considerations .........31 Serializing and sharing data sets.......6 Selection of an MVS data storage format . 31 NFS version 2 and version 3 statelessness.....7 File size determination and time stamps ....32 NFS version 4 state ............7 Ownership and permissions ........32 Name space and file system management.....8 File reading and writing .........33 z/OS NFS File System Type Selection ......9 Case sensitivity–maplower, nomaplower....34 Specifying the path type prefix and the Selection of text or binary processing modes–text, customer-configurable path resolution heuristic. 9 binary ...............34 Implicit prefix support restrictions ......11 MVS prefix support ..........36 Server control files ............13 Number representation .........36 Attributes data set ...........13 Partial record identification ........37 Exports data set ............13 Access to migrated files–retrieve, noretrieve; wait, Mount handle data set..........14 nowait ...............39 Log data set .............14 Access to migrated system-managed data sets . 39 Tested clients for the z/OS NFS server .....14 File handle refresh ...........40 NFS protocol attributes for the z/OS NFS server 15 Mapping between the workstation and MVS file z/OS NFS server restrictions .......15 systems................40 © Copyright IBM Corp. 1991, 2015 v File extension mapping .........40 Quick reference of AIX and UNIX commands . 69 Mounting of MVS data sets onto a client mount Accessing z/OS UNIX file systems and z/OS point ...............41 conventional MVS files ..........69 Use of a PDS or PDSE as a directory .....44 Mvslogin command examples .......70 Use of multiple mount points .......44 Mount command examples using an MVS prefix 72 Data set serialization and sharing ......45 Mount command example: overriding server NFS protocol .............45 default attributes without an MVS prefix . 73 NFS file system attributes ........45 Displaying default and mount point attributes - Delegating management of a file's resources to an showattr ...............74 NFS client ...............46 Unmounting and logging out of z/OS .....78 Disconnecting your mount point - umount . 78 Chapter 4. Using z/OS UNIX System Ending your z/OS session - mvslogout ....79 Services files ............49 z/OS UNIX file system ..........49 Chapter 7. Commands and examples POSIX compatibility ...........50 for z/OS NFS clients .........81 NFS protocol ..............51 Using commands on the z/OS NFS client ....81 Attributes specific to z/OS UNIX System Services 51 Accessing z/OS ............88 Synchronous write to a z/OS UNIX file for NFS Mvslogin command examples .......88 version 2 protocol ...........51 Mount command syntax and examples ....89 Synchronous write to a z/OS UNIX file for NFS Unmount command syntax and examples . 98 version 3 or 4 protocol..........51 Displaying client and server statistical Authorization checking when writing to a z/OS information–nfsstat ...........99 UNIX file ..............52 Displaying server mount HFSPREFIX site attribute .........52 information–showmount ........104 Protecting your z/OS UNIX System Services files . 52 Displaying default and mount point Accessing z/OS UNIX files from a client ....53 attributes–showattr ..........105 Mount examples............53 Ending your z/OS session - mvslogout....107 z/OS UNIX data transfer and conversion ....54 Data transfer under the NFS version 4 protocol 54 Chapter 8. Initialization attributes for Text or binary processing - NFS version 2 and 3 the z/OS NFS client .........109 protocols ..............54 Client attribute syntax ..........109 Linking an MVS data set to a z/OS UNIX file Datacaching attribute ...........116 system ................55 Mount processing parameters and installation Creating an external link .........55 parameters ..............117 Displaying the contents on an external link . 56 NFS client translation support ........118 Deleting an external link .........56 z/OS NFS client with z/OS NFS server ....119 Accessing symbolic links on z/OS NFS version 4 . 56 UNIX look and feel............58 NFS file system attributes .........58 Chapter 9. Initialization attributes for Displaying and modifying remote file system access the z/OS NFS server ........121 control lists ..............58 Attributes used for z/OS UNIX file access....121 Remote ACL management restrictions: ....59 Multipliers ..............122 Duplicate attributes ...........122 Chapter 5. z/OS NFS file locking and Data set creation attributes syntax ......122 access control ...........61 Processing attributes syntax ........127 Timeout attributes ...........135 Locking in NFS versions 2 and 3 (NFS server only) 61 Retrieve attributes ...........136 Using Network Lock Manager (NLM) in NFS V2 Mapped keyword processing attribute ....136 andV3...............61 Native ASCII processing attributes .....137 Using Network Status Monitor (NSM) in NFS V2 Site attributes syntax ...........139 andV3...............62 Locking in NFS version 4..........63 Byte-range locking ...........63 Part 2. Customization and Share reservations ...........63 Operations ............159 Specifying a grace period for reclaiming locks . 63 Listing locks held for a file ........64 Chapter 10. Customization......161 Releasing locks held for a file .......64 Protecting your programs and files ......161 Protecting the server control files ......161 Chapter 6. Commands and examples Setting up the z/OS NFS authorization....162 for AIX and UNIX clients .......65 Protecting the file system on z/OS with the NFS Using commands on AIX ..........65 V4 protocol .............163 vi z/OS V2R2 Network File System Guide and Reference Protecting the file system on z/OS with the Addds operand............236 Security site attribute ..........167 bufferusage operand ..........236 Customizing installation security exits ....172 bufhigh operand ...........236 Using UNIX style credentials for authentication 172 Cbsniff operand ...........237 Converting data ............173 || CONSOLEMSGS operand ........238 Creating the conversion environment for Unicode DlyDTimeout operand .........238 Services ...............174 Exportfs operand ...........238 Collecting NFS usage data .........175 Freeds operand............239 Configuring the z/OS NFS client .......176 Freeze operand ............239 Creating the PARMLIB statement for the client 176 || ID2NAME operand ..........240 Updating z/OS system data sets for the client 176 List operand.............240 Allocating client log data sets .......177
Recommended publications
  • Version 7.8-Systemd
    Linux From Scratch Version 7.8-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 7.8-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2015 Gerard Beekmans Copyright © 1999-2015, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 7.8-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book .................................................................................................................... x vi. Prerequisites
    [Show full text]
  • Oracle Solaris Security for Developers Guide • September 2010 Contents
    Oracle® Solaris Security for Developers Guide Part No: 816–4863–16 September 2010 Copyright © 2004, 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are “commercial computer software” or “commercial technical data” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms setforth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
    [Show full text]
  • Open Directory Administration for Version 10.5 Leopard Second Edition
    Mac OS X Server Open Directory Administration For Version 10.5 Leopard Second Edition Apple Inc. © 2008 Apple Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning to use such software. No part of this publication may be reproduced or transmitted for commercial purposes, such as selling copies of this publication or for providing paid-for support services. Every effort has been made to make sure that the information in this manual is correct. Apple Inc., is not responsible for printing or clerical errors. Apple 1 Infinite Loop Cupertino CA 95014-2084 www.apple.com The Apple logo is a trademark of Apple Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, iCal, iChat, Leopard, Mac, Macintosh, QuickTime, Xgrid, and Xserve are trademarks of Apple Inc., registered in the U.S. and other countries. Finder is a trademark of Apple Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. UNIX is a registered trademark of The Open Group. Other company and product names mentioned herein are trademarks of their respective companies. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products.
    [Show full text]
  • Deploying-Zones-11Gr2-Supercluster
    An Oracle Technical White Paper November 2012 Best Practices for Deploying Oracle Solaris Zones with Oracle Database 11g on SPARC SuperCluster Best Practices for Deploying Oracle Solaris Zones with Oracle Database 11g on SPARC SuperCluster Introduction ....................................................................................... 1 SPARC SuperCluster Technologies for Database Consolidation ....... 2 SPARC T4-4 Domains in the SPARC SuperCluster ...................... 3 Database Services Within the SPARC SuperCluster ..................... 3 Database Consolidation on the SPARC SuperCluster ................... 4 Oracle Solaris Zones on the SPARC SuperCluster ........................ 4 Best Practices for Deploying Oracle Database 11g Using Oracle Solaris Zones .................................................................................... 6 Choosing the Number of Database Domains ................................. 6 Oracle Solaris Zones ..................................................................... 7 ZFS File System .......................................................................... 11 Zone Deployment Using the ssc_exavm Tool ............................ 11 Operating System Tunable Parameters ....................................... 12 Database Grid Configuration ....................................................... 14 Oracle RAC Configuration ........................................................... 19 Securing the Databases in SPARC SuperCluster ........................ 20 Example Database Consolidation Scenarios
    [Show full text]
  • UNIX System Services Z/OS Version 1 Release 7 Implementation
    Front cover UNIX System Services z/OS Version 1 Release 7 Implementation z/OS UNIX overview z/OS UNIX setup z/OS UNIX usage Paul Rogers Theodore Antoff Patrick Bruinsma Paul-Robert Hering Lutz Kühner Neil O’Connor Lívio Sousa ibm.com/redbooks International Technical Support Organization UNIX System Services z/OS Version 1 Release 7 Implementation March 2006 SG24-7035-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. Second Edition (March 2006) This edition applies to Version 1 Release 7 of z/OS (5637-A01), and Version 1, Release 7 of z/OS.e (5655-G52), and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2003, 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv Preface . .xv The team that wrote this redbook. .xv Become a published author . xvi Comments welcome. xvii Chapter 1. UNIX overview. 1 1.1 UNIX fundamentals . 2 1.1.1 UNIX objectives . 2 1.1.2 What people like about UNIX . 2 1.1.3 What people don’t like about UNIX . 3 1.1.4 UNIX operating system . 3 1.1.5 UNIX file system . 4 1.1.6 Parameter files . 6 1.1.7 Daemons. 6 1.1.8 Accessing UNIX . 6 1.1.9 UNIX standards. 7 1.1.10 MVS and UNIX functional comparison . 8 1.2 z/OS UNIX System Services fundamentals .
    [Show full text]
  • Version 20160304-Systemd
    Linux From Scratch Version 20160304-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 20160304-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2016 Gerard Beekmans Copyright © 1999-2016, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 20160304-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book ...................................................................................................................
    [Show full text]
  • Apple File System Reference
    Apple File System Reference Developer Contents About Apple File System 7 General-Purpose Types 9 paddr_t .................................................. 9 prange_t ................................................. 9 uuid_t ................................................... 9 Objects 10 obj_phys_t ................................................ 10 Supporting Data Types ........................................... 11 Object Identifier Constants ......................................... 12 Object Type Masks ............................................. 13 Object Types ................................................ 14 Object Type Flags .............................................. 20 EFI Jumpstart 22 Booting from an Apple File System Partition ................................. 22 nx_efi_jumpstart_t ........................................... 24 Partition UUIDs ............................................... 25 Container 26 Mounting an Apple File System Partition ................................... 26 nx_superblock_t ............................................. 27 Container Flags ............................................... 36 Optional Container Feature Flags ...................................... 37 Read-Only Compatible Container Feature Flags ............................... 38 Incompatible Container Feature Flags .................................... 38 Block and Container Sizes .......................................... 39 nx_counter_id_t ............................................. 39 checkpoint_mapping_t ........................................
    [Show full text]
  • Oracle Minicluster S7-2 Security Guide
    Oracle MiniCluster S7-2 Security Guide Part No: E69475-12 March 2021 Oracle MiniCluster S7-2 Security Guide Part No: E69475-12 Copyright © 2018, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Mac OS X Server User Management for Version 10.4 Or Later Second Edition
    Mac OS X Server User Management For Version 10.4 or Later Second Edition K Apple Computer, Inc. Apple, the Apple logo, AirPort, AppleShare, AppleTalk, © 2006 Apple Computer, Inc. All rights reserved. FireWire, iBook, Keychain, LaserWriter, Mac, Mac OS, Macintosh, PowerBook, and QuickTime are trademarks The owner or authorized user of a valid copy of of Apple Computer, Inc., registered in the U.S. and other Mac OS X Server software may reproduce this countries. Extensions Manager, Finder, and SuperDrive publication for the purpose of learning to use such are trademarks of Apple Computer, Inc. software. No part of this publication may be reproduced or transmitted for commercial purposes, such as selling Adobe and PostScript are trademarks of Adobe Systems copies of this publication or for providing paid-for Incorporated. support services. Java and all Java-based trademarks and logos are Every effort has been made to ensure that the trademarks or registered trademarks of Sun information in this manual is accurate. Apple Computer, Microsystems, Inc. in the U.S. and other countries. Inc., is not responsible for printing or clerical errors. UNIX is a registered trademark in the United States and Apple other countries, licensed exclusively through X/Open 1 Infinite Loop Company, Ltd. Cupertino, CA 95014-2084 408-996-1010 Other company and product names mentioned herein www.apple.com are trademarks of their respective companies. Mention of third-party products is for informational purposes Use of the “keyboard” Apple logo (Option-Shift-K) for only and constitutes neither an endorsement nor a commercial purposes without the prior written consent recommendation.
    [Show full text]
  • UNIX System Servicesplanning
    z/OS Version 2 Release 3 UNIX System Services Planning IBM GA32-0884-30 Note Before using this information and the product it supports, read the information in “Notices” on page 409. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-03-26 © Copyright International Business Machines Corporation 1996, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures...................................................................................................... xv List of Tables......................................................................................................xvii About this document...........................................................................................xix Using this document..................................................................................................................................xix z/OS information........................................................................................................................................xix Discussion list.......................................................................................................................................xix How to send your comments to IBM.....................................................................xxi If you have a technical problem................................................................................................................xxi
    [Show full text]
  • Technical Overview
    9 Product Documentation Likewise Enterprise Technical Overview IN THIS DOCUMENT Abstract • Authenticating Users This overview describes how Likewise joins non-Windows computers to • Authorizing Users and Groups Active Directory, authenticates users, authorizes users and groups for Managing Users and Groups • access to resources, stores Unix and Linux user information in Active • Applying Group Policies Directory, and manages Linux and Unix computers with group policies. The • Software Components and overview also outlines Likewise's two operating modes, its use of cells, and Architecture its software components and processes. Copyright © 2008 Likewise Software. All rights reserved. 1 Product Documentation Likewise Enterprise: Technical Overview The information contained in this document represents the current view of Likewise Software on the issues discussed as of the date of publication. Because Likewise Software must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Likewise, and Likewise Software cannot guarantee the accuracy of any information presented after the date of publication. These documents are for informational purposes only. LIKEWISE SOFTWARE MAKES NO WARRANTIES, EXPRESS OR IMPLIED. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form, by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Likewise Software. Likewise may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Likewise, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • A Secure Distributed File System for Network Computers Marcus O
    JFS: A Secure Distributed File System for Network Computers Marcus O’Connell, Paddy Nixon Department of Computer Science, Trinity College Dublin email: {Marcus.OConnell, Paddy.Nixon}@cs.tcd.ie, http://www.cs.tcd.ie/ ABSTRACT Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the computing resources. With the network-centric model, applications are stored on servers and downloaded to clients as required, where they are then executed locally. User data is saved back to the remote server - local user data is only temporary. However these applications lack a standard file system where they can store their data files. For instance, when these applications are run as Java applets in a web browser, they are prevented from accessing the local storage system by the Java environment. This paper proposes the Java File System (JFS), a distributed file system for use by these applications, which provides strong security and client/server heterogeneity. 1. Introduction In computing environments today there is a shift away from the conventional client/server paradigm, to a more network-centric environment [18]. In the client/server model, user data is centralised on servers, but applications reside and execute on “fat client” desktop computers, which have local storage and full operating system. While these desktop machines provide good performance with friendly user interfaces, they are expensive in terms of their high performance requirements and maintenance is costly, as it must be performed locally. The network-centric model tries to solve the problems associated with these conventional client/server systems.
    [Show full text]