Abcs of Z/OS System Programming Volume 10

Total Page:16

File Type:pdf, Size:1020Kb

Abcs of Z/OS System Programming Volume 10 Front cover ABCs of z/OS System Programming Volume 10 Alvaro Salla Patrick Oughton Redbooks International Technical Support Organization ABCs of z/OS System Programming Volume 10 May 2018 SG24-6990-05 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Sixth Edition (May 2018) This edition applies to version 2 release 3 of IBM z/OS (product number 5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2017, 2018. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team who wrote this book . ix Now you can become a published author, too! . .x Comments welcome. .x Stay connected to IBM Redbooks . .x Chapter 1. Introduction to z/Architecture . 1 1.1 z/Architecture historical path . 2 1.2 Computer architecture overview . 3 1.3 Concept of a process . 5 1.4 System components . 7 1.4.1 System Assist Processor (SAP) . 8 1.4.2 Channels. 9 1.4.3 Dynamic Switch . 9 1.4.4 IBM Virtual Flash Memory (VFM) . 9 1.4.5 Pervasive encryption. 9 1.5 Processing units (PUs) . 10 1.6 Microcode Concepts . 11 1.7 z/Architecture Components. 12 1.8 PU Registers . 13 1.8.1 General purpose registers (GPR) . 14 1.8.2 Floating point registers . 15 1.9 Instruction set and its formats . 16 1.10 Program status word (PSW) . 17 1.10.1 PSW format. 18 1.11 Multiprocessing . 24 1.12 z/Architecture Data Formats . 24 1.12.1 Binary integers . 25 1.12.2 Decimal numbers . 25 1.12.3 Floating-point numbers . 26 1.12.4 EBCDIC data . 26 1.12.5 ASCII data. 27 1.12.6 Unicode. 27 1.12.7 UTF-8 . 27 1.13 IPL of a z/OS logical partition . 27 1.14 CPC memory addressing . 27 1.15 Addresses and address spaces . 28 1.16 Addressing mode . 30 1.16.1 AMODE. 30 1.16.2 RMODE. 31 1.17 Interrupts . 31 1.17.1 Reasons for interrupts. 33 1.17.2 Types of interrupts . 33 1.17.3 Interrupt processing . 37 1.18 Prefix Storage Area (PSA) . 38 1.19 Storage protection. 39 © Copyright IBM Corp. 2017, 2018. All rights reserved. iii 1.19.1 Storage key. 39 1.19.2 PSW key field . 40 1.19.3 Storage protection logic . 41 1.20 Virtual Storage initial concepts . 42 1.21 Segmenting a virtual address . 44 1.22 Dynamic address translation (DAT) (I) . 45 1.23 Dynamic Address Translation (DAT) (II) . 46 1.24 Translating large virtual address . 47 1.25 Page faults and page data sets. 49 1.26 A 64-bit Address Space . 51 1.27 Cross memory. 53 1.28 Access register mode (data spaces). 54 1.29 z/Architecture time facilities. 55 1.30 Server Time Protocol (STP) . 58 1.31 Hardware Configuration Definition (HCD) . 59 1.32 Logical channel subsystem (LCSS) . 61 1.33 Start Subchannel (SSCH) instruction logic . 62 1.34 I/O Interrupt processing. 66 1.35 DASD controllers (aka DASD controller ) . 67 1.36 Device number . ..
Recommended publications
  • Z/OS ICSF Overview How to Send Your Comments to IBM
    z/OS Version 2 Release 3 Cryptographic Services Integrated Cryptographic Service Facility Overview IBM SC14-7505-08 Note Before using this information and the product it supports, read the information in “Notices” on page 81. This edition applies to ICSF FMID HCR77D0 and Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2020-05-25 © Copyright International Business Machines Corporation 1996, 2020. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................ vii Tables.................................................................................................................. ix About this information.......................................................................................... xi ICSF features...............................................................................................................................................xi Who should use this information................................................................................................................ xi How to use this information........................................................................................................................ xi Where to find more information.................................................................................................................xii
    [Show full text]
  • Hardware Realization of an FPGA Processor – Operating System Call Offload and Experiences
    Downloaded from orbit.dtu.dk on: Oct 02, 2021 Hardware Realization of an FPGA Processor – Operating System Call Offload and Experiences Hindborg, Andreas Erik; Schleuniger, Pascal; Jensen, Nicklas Bo; Karlsson, Sven Published in: Proceedings of the 2014 Conference on Design and Architectures for Signal and Image Processing (DASIP) Publication date: 2014 Link back to DTU Orbit Citation (APA): Hindborg, A. E., Schleuniger, P., Jensen, N. B., & Karlsson, S. (2014). Hardware Realization of an FPGA Processor – Operating System Call Offload and Experiences. In A. Morawiec, & J. Hinderscheit (Eds.), Proceedings of the 2014 Conference on Design and Architectures for Signal and Image Processing (DASIP) IEEE. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Hardware Realization of an FPGA Processor – Operating System Call Offload and Experiences Andreas Erik Hindborg, Pascal Schleuniger Nicklas Bo Jensen, Sven Karlsson DTU Compute – Technical University of Denmark fahin,pass,nboa,[email protected] Abstract—Field-programmable gate arrays, FPGAs, are at- speedup of up to 64% over a Xilinx MicroBlaze based baseline tractive implementation platforms for low-volume signal and system.
    [Show full text]
  • Ubuntu Installation Guide
    Ubuntu Installation Guide Ubuntu Installation Guide Copyright © 2004 – 2020 the Debian Installer team Copyright © 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2015, 2018 Canonical Ltd. This document contains installation instructions for the Ubuntu 20.04 system (codename “‘Focal Fossa’”), for the S/390 (“s390x”) architecture. It also contains pointers to more information and information on how to make the most of your new Ubuntu system. This manual is free software; you may redistribute it and/or modify it under the terms of the GNU General Public License. Please refer to the license in Appendix F. Table of Contents Installing Ubuntu 20.04 “Focal Fossa” For s390x...........................................................................ix 1. Welcome to Ubuntu ........................................................................................................................1 1.1. What is Ubuntu?...................................................................................................................1 1.1.1. Sponsorship by Canonical .......................................................................................1 1.2. What is Debian? ...................................................................................................................1 1.2.1. Ubuntu and Debian..................................................................................................2 1.2.1.1. Package selection........................................................................................2 1.2.1.2. Releases.......................................................................................................3
    [Show full text]
  • Ubuntu Server for IBM Z and Linuxone
    Ubuntu Server for IBM Z and LinuxONE What’s New - June 2021 Frank Heimes, Tech. Lead Z, Canonical Ltd. Ubuntu on Big Iron: ubuntu-on-big-iron.blogspot.com Ubuntu Server for IBM Z and LinuxONE (s390x) Mission and Philosophy - In a nutshell Freedom to download Ubuntu - study, use, share, (re-)distribute, contribute, improve and innovate it! Mapped to Ubuntu Server for IBM Z and LinuxONE (s390x) - the goal is: ● to expand Ubuntu’s ease of use to the s390x architecture (IBM Z and LinuxONE) ● unlock new workloads, especially in the Open Source, Cloud and container space ● to tap into new client segments ● quickly exploit new features and components - in two ways: ○ promptly supporting new hardware ○ releases built and based on the latest kernels, tool-chain and optimized libraries ● provide parity across architectures, in terms of release and feature parity and closing gaps ● provide a uniform user experience and look-and-feel ● be part of the collective world-wide Open Source power in action ● deal with upstream work and code only - no forks ● offer a radically new subscription pricing with drawer-based pricing, or alternatively provide entry-level pricing based on up to 4 IFLs Release Cadence - Ubuntu https://wiki.ubuntu.com/Releases https://wiki.ubuntu.com/LTS https://en.wikipedia.org/wiki/List_of_Ubuntu_releases 16.04 16.10 17.04 17.10 18.04 18.10 19.04 19.10 20.04 20.10 21.04 20.10 in development Ubuntu 20.04 LTS end-of-life 19.10 in service with s390x support 19.04 upgrade path 18.10 Ubuntu 18.04 LTS 5 years ESM 17.10 17.04 18 months 16.10 5 years Ubuntu 16.04 LTS 5 years ESM Ubuntu 18.04 LTS (Bionic Beaver) ● The codename for the current LTS (Long Term Support) release 18.04 is 'Bionic Beaver' or in short 'Bionic': https://launchpad.net/ubuntu/bionic ● Bionic Release Schedule: https://wiki.ubuntu.com/BionicBeaver/ReleaseSchedule Release date: April, 26th 2018 ● Updated major components: ○ Kernel 4.15 (linux-generic) + HWE kernels ○ docker.io 17.12.1 → 18.09.5 ○ Qemu-KVM 2.11.x / Libvirt (libvirt-bin) 4.0.0 ○ Open vSwitch 2.9 → 2.9.2 ○ LXD 3.0.0 (incl.
    [Show full text]
  • IBM Z Systems Introduction May 2017
    IBM z Systems Introduction May 2017 IBM z13s and IBM z13 Frequently Asked Questions Worldwide ZSQ03076-USEN-15 Table of Contents z13s Hardware .......................................................................................................................................................................... 3 z13 Hardware ........................................................................................................................................................................... 11 Performance ............................................................................................................................................................................ 19 z13 Warranty ............................................................................................................................................................................ 23 Hardware Management Console (HMC) ..................................................................................................................... 24 Power requirements (including High Voltage DC Power option) ..................................................................... 28 Overhead Cabling and Power ..........................................................................................................................................30 z13 Water cooling option .................................................................................................................................................... 31 Secure Service Container .................................................................................................................................................
    [Show full text]
  • 1994 Hearings on Software Patents
    United States Patent and Trademark Office Public Hearing on Use of the Patent System to Protect Software-Related Inventions Transcript of Proceedings Wednesday, January 26, 1994 Thursday, January 27, 1994 9:00 a.m. to 5:00 p.m. Before Bruce A. Lehman Assistant Secretary of Commerce and Commissioner of Patents and Trademarks Location: San Jose Convention Center 408 Almaden Avenue San Jose, California UNITED STATES PATENT AND TRADEMARK OFFICE Public Hearing on Patent Protection for Software-Related Inventions San Jose, California -- January 26-27, 1994 Table of Participants Before: Bruce A. Lehman Assistant Secretary of Commerce and Commissioner of Patents and Trademarks United States Patent and Trademark Office The Panel: Ginger Lew General Counsel-Designate United States Department of Commerce Lawrence Goffney Assistant Commissioner for Patents-Designate United States Patent and Trademark Office Micheal K. Kirk Assistant Commissioner for External Affairs United States Patent and Trademark Office Jeffrey P. Kushan Attorney-Advisor United States Patent and Trademark Office Recording Technicians: Karl Henderscheid Support Office Services 52 Second Street, Third Floor San Francisco, CA 94104 (415) 391-4578 Trascriber: Milton Hare Rogershare Transcribers 541 Maud Avenue San Leandro, CA 94577 (510) 357-8220 - ii - UNITED STATES PATENT AND TRADEMARK OFFICE Public Hearing on Patent Protection for Software-Related Inventions San Jose, California -- January 26-27, 1994 Witnesses January 26, 1994 January 27, 1994 Mr. Clark Mr. Fiddler VideoDiscovery Wind River Systems Mr. Poppa Mr. Warren StorageTek Autodesk, Inc. Mr. Ryan Ms. O'Hare Intellectual Property Owners, Inc. Mr. Glenn Mr. LeFaivre Intellectual Property Section of the State Bar of California Apple Computer Mr.
    [Show full text]
  • Detection Method of Data Integrity in Network Storage Based on Symmetrical Difference
    S S symmetry Article Detection Method of Data Integrity in Network Storage Based on Symmetrical Difference Xiaona Ding School of Electronics and Information Engineering, Sias University of Zhengzhou, Xinzheng 451150, China; [email protected] Received: 15 November 2019; Accepted: 26 December 2019; Published: 3 February 2020 Abstract: In order to enhance the recall and the precision performance of data integrity detection, a method to detect the network storage data integrity based on symmetric difference was proposed. Through the complete automatic image annotation system, the crawler technology was used to capture the image and related text information. According to the automatic word segmentation, pos tagging and Chinese word segmentation, the feature analysis of text data was achieved. Based on the symmetrical difference algorithm and the background subtraction, the feature extraction of image data was realized. On the basis of data collection and feature extraction, the sentry data segment was introduced, and then the sentry data segment was randomly selected to detect the data integrity. Combined with the accountability scheme of data security of the trusted third party, the trusted third party was taken as the core. The online state judgment was made for each user operation. Meanwhile, credentials that cannot be denied by both parties were generated, and thus to prevent the verifier from providing false validation results. Experimental results prove that the proposed method has high precision rate, high recall rate, and strong reliability. Keywords: symmetric difference; network; data integrity; detection 1. Introduction In recent years, the cloud computing becomes a new shared infrastructure based on the network. Based on Internet, virtualization, and other technologies, a large number of system pools and other resources are combined to provide users with a series of convenient services [1].
    [Show full text]
  • Linux Data Integrity Extensions
    Linux Data Integrity Extensions Martin K. Petersen Oracle [email protected] Abstract The software stack, however, is rapidly growing in com- plexity. This implies an increasing failure potential: Many databases and filesystems feature checksums on Harddrive firmware, RAID controller firmware, host their logical blocks, enabling detection of corrupted adapter firmware, operating system code, system li- data. The scenario most people are familiar with in- braries, and application errors. There are many things volves bad sectors which develop while data is stored that can go wrong from the time data is generated in on disk. However, many corruptions are actually a re- host memory until it is stored physically on disk. sult of errors that occurred when the data was originally written. While a database or filesystem can detect the Most storage devices feature extensive checking to pre- corruption when data is eventually read back, the good vent errors. However, these protective measures are al- data may have been lost forever. most exclusively being deployed internally to the de- vice in a proprietary fashion. So far, there have been A recent addition to SCSI allows extra protection infor- no means for collaboration between the layers in the I/O mation to be exchanged between controller and disk. We stack to ensure data integrity. have extended this capability up into Linux, allowing filesystems (and eventually applications) to be able to at- An extension to the SCSI family of protocols tries to tach integrity metadata to I/O requests. Controllers and remedy this by defining a way to check the integrity of disks can then verify the integrity of an I/O before com- an request as it traverses the I/O stack.
    [Show full text]
  • Introducing Linux on IBM Z Systems IT Simplicity with an Enterprise Grade Linux Platform
    Introducing Linux on IBM z Systems IT simplicity with an enterprise grade Linux platform Wilhelm Mild IBM Executive IT Architect for Mobile, z Systems and Linux © 2016 IBM Corporation IBM Germany What is Linux? . Linux is an operating system – Operating systems are tools which enable computers to function as multi-user, multitasking, and multiprocessing servers. – Linux is typically delivered in a Distribution with many useful tools and Open Source components. Linux is hardware agnostic by design – Linux runs on multiple hardware architectures which means Linux skills are platform independent. Linux is modular and built to coexist with other operating systems – Businesses are using Linux today. More and more businesses proceed with an evolutionary solution strategy based on Linux. 2 © 2016 IBM Corporation What is IBM z Systems ? . IBM z Systems is the family name used by IBM for its mainframe computers – The z Systems families were named for their availability – z stands for zero downtime. The systems are built with spare components capable of hot failovers to ensure continuous operations. IBM z Systems paradigm – The IBM z Systems family maintains full backward compatibility. In effect, current systems are the direct, lineal descendants of System/360, built in 1964, and the System/370 from the 1970s. Many applications written for these systems can still run unmodified on the newest z Systems over five decades later. IBM z Systems variety of Operating Systems – There are different traditional Operating Systems that run on z Systems like z/OS, z/VSE or TPF. With z/VM IBM delivers a mature Hypervisor to virtualize the operating systems.
    [Show full text]
  • Systems Management Performance Reference Information 7.1
    IBM IBM i Systems management Performance reference information 7.1 IBM IBM i Systems management Performance reference information 7.1 Note Before using this information and the product it supports, read the information in “Notices,” on page 267. This edition applies to IBM i 7.1 (product number 5770-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. © Copyright IBM Corporation 1998, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Reference information for Performance 1 Disk Watcher data files: QAPYDWSTAT ... 237 Collection Services data files ......... 1 Disk Watcher data files: QAPYDWTDER ... 239 Collection Services data files containing time Disk Watcher data files: QAPYDWTRC .... 240 interval data ............. 1 Data files: File abbreviations ........ 244 Collection Services data files: Field data for CL commands for performance ....... 244 configuration database files........ 221 Intelligent Agents ............ 247 Collection Services database files: Field data for Intelligent Agent concepts ........ 247 trace database files .......... 229 Developing agents........... 250 Collection Services data files: System category Set up your agent environment ...... 252 and file relationships .......... 229 Managing agents ........... 260 Collection Services data files: Task type extender 231 Disk
    [Show full text]
  • Archiving Online Data to Optical Disk
    ARCHIVING ONLINE DATA TO OPTICAL DISK By J. L. Porter, J. L. Kiesler, and D. A. Stedfast U.S. GEOLOGICAL SURVEY Open-File Report 90-575 Reston, Virginia 1990 U.S. DEPARTMENT OF THE INTERIOR MANUEL LUJAN, JR., Secretary U.S. GEOLOGICAL SURVEY Dallas L. Peck, Director For additional information Copies of this report can be write to: purchased from: Chief, Distributed Information System U.S. Geological Survey U.S. Geological Survey Books and Open-File Reports Section Mail Stop 445 Federal Center, Bldg. 810 12201 Sunrise Valley Drive Box 25425 Reston, Virginia 22092 Denver, Colorado 80225 CONTENTS Page Abstract ............................................................. 1 Introduction ......................................................... 2 Types of optical storage ............................................... 2 Storage media costs and alternative media used for data archival. ......... 3 Comparisons of storage media ......................................... 3 Magnetic compared to optical media ............................... 3 Compact disk read-only memory compared to write-once/read many media ................................... 6 Erasable compared to write-once/read many media ................. 7 Paper and microfiche compared to optical media .................... 8 Advantages of write-once/read-many optical storage ..................... 8 Archival procedure and results ........................................ 9 Summary ........................................................... 13 References ..........................................................
    [Show full text]
  • 2020 Linux on IBM Z and Linuxone Client Workshop November 9-13
    2020 Linux on IBM Z and LinuxONE Client Workshop November 9-13 Securing Workloads with Red Hat OpenShift Container Platform on IBM Z / LinuxONE — Pradeep Parameshwaran Security & Compliance Lead, Linux on IBM Z & LinuxONE [email protected] Linux on IBM Z and LinuxONE Client WS 2020 / © 2020 IBM Corporation Contents • Why OpenShift on IBM Z ? • The cloud with the Privacy and Security • Deployment architecture: OpenShift on IBM Z • Security blueprint: OpenShift on IBM Z • Summary of native and augmented security capabilities IDC estimates that 71% of organizations are in the process of implementing containers and orchestration or are already using them regularly. Containers are the next generation of software-defined compute that enterprises will leverage to accelerate their digital transformation initiatives,” says Gary Chen, Research Director at IDC. “IDC estimates that 71% of organizations are in the process of implementing containers and orchestration or are already using them regularly, and IDC forecasts that the worldwide container infrastructure software opportunity is growing at a 63.9 % 5-year CAGR and is predicted to reach over $1.5B by 2022. 3 Why Red Hat OpenShift on IBM Z? OpenShift a smart Kubernetes platform 5 Build once • Fully integrated and automated architecture • Seamless Kubernetes deployment on any cloud or on-premises environment • Fully automated installation, from cloud infrastructure to OS to application services • One click platform and application updates • Auto-scaling of cloud resources • Enterprise-grade security
    [Show full text]