zOS V2R5 Upgrade Workflow from zOS V2R3 - OA64212
Description :zOS V2R5 Upgrade Workflow from zOS V2R3
  • Status: In Progress
  • Owner: IBMUSER
  • System: IBMSYS.NODE
  • Version: HSMA257;PH43962;2022-12-22T06:07:35
  • Steps complete: 0 of 224
  • Export time: 2023-03-01 15:22:38

Filters :


Contents

< Note: Page numbers may not be accurate. >

Step 1 : Introducing the z/OS V2R5 Upgrade Workflow


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This level of the z/OS Upgrade Workflow corresponds to z/OS V2R5.

Introducing the z/OS V2R5 Upgrade Workflow

Using the z/OS V2R5 Upgrade Workflow, you can perform a z/OS V2R5 upgrade as an interactive, step-by-step process. The workflow uses the latest functions in z/OSMF to provide a smooth upgrade experience for each new release of z/OS.

The z/OS V2R5 Upgrade Workflow is provided as a pair of two z/OS Management Facility (z/OSMF) workflows. Depending on whether you are upgrading from z/OS V2R3 or z/OS V2R4, you select the workflow that applies to your upgrade path and download its corresponding files to your system to create the workflow.

IBM no longer provides a z/OS Migration publication. Since z/OS V2R2, the preferred method for learning about upgrade actions is the z/OS Upgrade Workflow. Discovering, performing, and verifying many upgrade actions through the z/OSMF Workflows UI instead of a more traditional book format allows for a tailored and specific upgrade path that is associated with a particular system.

Along with the change of format—from a book to a workflow—is a change in terminology: upgrade instead of migrate. In our industry, the process of replacing software with a newer level is most often referred to as upgrading the software. In contrast, the phrase migrating the software can be understood to mean moving software from one server to another. When you perform the actions that are described in this workflow, you are upgrading z/OS to a newer level of function than the prior release. Thus, upgrade is the appropriate term for what this workflow does.

Usage tips

  • Enhanced discovery functions are available. Follow the instructions in the first step "Discover z/OS features in use" to allow z/OSMF to skip as many inapplicable steps as possible, thus reducing the number of steps for you to perform. The additional discovery includes the option to skip steps that are empty (which have actions that are shown as "None"). In addition, discovery is enhanced to skip over the hardware server levels that you have already upgraded to.

  • Some upgrade actions have associated health checks. For those steps, the health check is invoked to determine whether the upgrade action is applicable for your system. Read the instructions carefully on the Perform tab before running the health check for important information about each check.

  • For the individual upgrade actions and for the entire upgrade effort, you can optionally provide your feedback to IBM. Follow the instructions that are shown in the workflow. You do not need to provide feedback to complete each step of the workflow.

Summary of changes for z/OS V2R5 Upgrade Workflow, Version 4.0 (March 2023)

This new version of the z/OS V2R5 Upgrade Workflow is installed when you apply the PTF for APAR OA64212.

Version 4.0 replaces the previous version, Version 3.0, which was provided by IBM in April 2022.

New information

The following upgrade actions are new.


  • DFSMSdfp: Accommodate change to SAF checking during open of VSAM volume data sets
  • IP Services: Ensure that FTP users have access to JES mode
  • IP Services: Implement the AT-TLS server-allowed KEX curves list
  • JES2: Ensure that programs access checkpoint data in 64-bit storage
  • SDSF: Plan to stop using a non-scrollable main panel
  • Security Server: Stop sharing RACF databases between z/OS and z/VM
  • Security Server: Determine whether IRRUT200 users require READ access to IDCAMS
  • XL C/C++: Update programs to use the __NORETURN macro

Changed information

The following upgrade actions are changed.


  • The following general upgrade actions are changed:
    • Remove deleted data sets, paths, and references

  • The following IBM z16 upgrade actions are changed:
    • Evaluate the new extended counters in CPU Measurement Facility

  • The following z/OS upgrade actions are changed:
    • BCP: Evaluate the changed default for system logger use of IBM zHyperwrite
    • SNA services: Stop using the VTAM Common Management Information Protocol
    • IP Services: Make changes for Netstat enhancements
    • SDSF: Use dynamic statements for ISFPARMS to avoid reassembly

Summary of changes for z/OS V2R5 Upgrade Workflow, Version 3.0 (April 2022)

This new version of the z/OS V2R5 Upgrade Workflow is installed when you apply the PTF for APAR OA62703.

Version 4.0 replaces the previous version, Version 3.0, which was provided by IBM in October 2021.

New information

This workflow contains the steps for upgrading a z/OS system in support of the IBM z16™ server.

Changed information

The following upgrade actions are changed for z/OS V2R5 Upgrade Workflow, Version 3.0:

  • BCP: Removal of support for user key common areas

Summary of changes for z/OS V2R5 Upgrade Workflow, Version 2.0 (October 2021)

This new version of the z/OS V2R5 Upgrade Workflow is installed when you apply the PTF for APAR OA61406.

Version 2.0 replaces the previous version, Version 1.0, which was provided by IBM in April 2021.

New information

The following upgrade actions are new for z/OS V2R5 Upgrade Workflow, Version 2.0:

  • Update processing to include usage of new SMF record types
  • BDT: Plan for the removal of the Bulk Data Transfer (BDT) File-to-File feature
  • BDT: Plan for the removal of the Bulk Data Transfer (BDT) SNA NJE feature
  • SNA and IP services: Prepare for the removal of support for LSA and LCS devices
  • IP Services: Prepare for the removal of support for OSA DEVICE/LINK/HOME configuration
  • ICSF: Update references to deprecated ICSF SMF and PKDS header fields
  • DFSMSdfp: Plan for the removal of z/OS Global Mirror Extended Remote Copy (XRC)
  • DFSMSdfp: Update the OAM FSDELETE table
  • ICSF: Negotiation of the extended master secret extension enabled by default
  • JES2: Respond to PENCRYPT conflict notifications
  • NFS: Update references to NFS samples, macros, and utility source parts
  • RMF: Determine updates for RMF structural changes
  • SDSF: Update path environment variables to refer to the 64-bit JVM
  • Security Server: Be aware of new restriction on the use of certificates with long RDNs
  • Security Server: Accommodate the removal of RACF TSO/E HELP text
  • Security Server: Define a PTKTDATA profile to allow PassTicket-based password changes
  • Security Server: Remove RACF dynamic classes named IZP and ZOWE

Changed information

The following upgrade actions are changed for z/OS V2R5 Upgrade Workflow, Version 2.0:

  • Add references to new data sets and paths
  • Remove deleted data sets, paths, and references
  • Accommodate new address spaces

Summary of changes for z/OS V2R5 Upgrade Workflow, Version 1.0 (April 2021)

This workflow contains the steps for upgrading to z/OS V2R5 from a previous level of the operating system. This workflow includes new and changed upgrade actions (listed below), and changes for terminology, maintenance, and editorial corrections.

New information

The following upgrade action is new for the IBM z15 server:

  • Prepare for the removal of support for TLS 1.0 and TLS 1.1 for SE, HMC, and OSC

The following upgrade actions are new for z/OS V2R5:

  • Accommodate the z/OS V2R5 architecture level set and supported storage devices
  • Ensure that z/OS V2R5 is running as a guest under z/VM V7.1 if applicable
  • BCP: Define exits USER4 and USER5 for IFASMFDP and IFASMFDL
  • BCP: The ASCB and WEB are backed in 64-bit real storage by default
  • BCP: Accommodate the removal of the binder transport utility IEWTPORT
  • BCP: Running z/OS V2R5 as a guest requires z/VM V7.1
  • BCP: Accommodate the new CHECKREGIONLOSS default
  • BCP: Accommodate the new DSLIMITNUM default
  • IP Services: Accommodate the removal of native TLS/SSL support from DCAS
  • IP Services: Accommodate the removal of native TLS/SSL support from TN3270E
  • TCP/IP: Removal of Sysplex Distributor support for Cisco Multi-Node Load Balancer (MNLB)
  • TCP/IP: Removal of Sysplex Distributor support for IBM DataPower Gateway products
  • HCD: Remove configurations for unsupported processor types
  • ICSF: Update references to the old ICSF library
  • z/OSMF: Remove references to z/OSMF mobile notification service
  • z/OSMF: Be aware that error message details are no longer displayed by default
  • z/OSMF: Use the z/OSMF desktop interface
  • z/OSMF: Use the Diagnostic Assistant to collect diagnostic data about z/OSMF
  • z/OSMF: Upgrading the IBM zERT Network Analyzer
  • z/OSMF: Remove STGADMIN SAF authorization requirements for Software Management
  • z/OSMF: Ensure that workflow users are authorized to read workflow files
  • Network Authentication Service: Use the stronger NDBM database encryption types
  • RMF: Remove references to deprecated ports for the RMF DDS server
  • SDSF: Use only SAF-based security to protect SDSF functions
  • Security Server: Accommodate the removal of RACF TSO/E HELP text
  • z/OS UNIX: Accommodate the new LIMMSG default
  • z/OS UNIX: Remove references to the MAXSHAREPAGES option in BPXPRMxx

Changed information

The following upgrade actions are changed for z/OS V2R5:

  • Add references to new data sets and paths
  • Remove deleted data sets, paths, and references
  • BCP: Stop using z/OS Batch Runtime
  • BCP: Use the recommended values for WLM service coefficients
  • BCP: Removal of support for user key common areas
  • SNA services: Stop using VTAM Common Management Information Protocol
  • IP Services: Upgrade TLS/SSL support for FTP server to AT-TLS
  • ISPF: Remove any dependencies on Workstation Agent from your system
  • Plan for the removal of support for EIM, OCSF, OCEP, and PKITP
  • JES2: Activate z22 mode
  • OpenSSH: Accommodate a new level of OpenSSH
  • Security Server: Check for duplicate class names
  • XL C/C++: Review the z/OS XL C/C++ Compiler and Runtime Migration Guide

Deleted information

Upgrade actions that were introduced in z/OS V2R3 and do not apply to the z/OS V2R5 path have been removed.

The following upgrade actions are removed for z/OS V2R5:

  • Ensure that the CustomPac Installation Dialog is updated
  • Consider using the new JOB statement for the CustomPac installation dialog
  • Prepare for the discontinuation of tape delivery
  • BCP: Ensure that enough real memory is installed
  • BCP: Ensure that TVSAMCOM or TVSMSG are not used as job statement symbols
  • BCP: Regenerate the Unicode conversion image
  • DFSMSdfp: Check for an out-of-synch condition in the OAM configuration
  • DFSMSdfp: Accommodate code 4 for empty objects in the IDCAMS LISTCAT command
  • DFSMSdfp: Prepare for the encryption of data sets

z/OS V2R5 requires an IBM z13 or later to IPL. Therefore, the following upgrade actions for the IBM zEC12 and zBC12 processors are removed:

  • Upgrade to an IBM zEnterprise EC12 or IBM zEnterprise BC12 server
  • General recommendations and considerations for a zEC12 or zBC12 server
  • Restrictions for a zEC12 or zBC12 server
  • Actions you can take before you order a zEC12 or zBC12 server
  • Migration and exploitation considerations for zEC12 and zBC12 server functions
  • Accommodate functions for the zEC12 and zBC12 servers to be discontinued on future servers


Step 1.1 : Typical upgrade steps


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackz/OS Systems ProgrammerNo

Description:

It is possible to make upgrade changes at the same time you make the changes necessary to exploit new functions in the new release. However, the more prudent approach is to do your upgrade first and then exploit new functions. The typical steps to accomplish this are:

  1. Learn about z/OS V2R5. Good sources of information include:
  2. Perform as many of the upgrade actions as you can on your existing ( old) system so that you have fewer actions to perform after you install z/OS V2R5. In this workflow, the actions you can perform on your existing system are identified by headings that say Actions to perform before installing z/OS V2R5. Note that not all of the actions are required. Some depend on your environment, configuration, and workload, and are identified accordingly. These actions should be made to, or copied (cloned) to, all existing systems that will be migrated to z/OS z/OS V2R5.

    Use IBM Health Checker for z/OS to assist with some upgrade actions. For more information, see the workflow step called "Using IBM Health Checker for z/OS for migration checking."

  3. Order and install coexistence and fallback service for any system that will share resources with a z/OS V2R5 system. (See the step called "Install coexistence and fallback PTFs." This service needs to be installed on all systems that will coexist with z/OS V2R3 and all systems that will be migrated to z/OS V2R5 (and which you might fall back to).
  4. Prepare the driving system. For driving system requirements, see the topic about preparing the driving system in z/OS Planning for Installation.
  5. Order and install z/OS V2R5. If you use a ServerPac, refer to ServerPac: Installing Your Order. If you use a CBPDO, see z/OS Program Directory in the z/OS Internet library.
  6. Prepare target system hardware and software. During this step, perform the upgrade actions identified by headings that say Actions to perform before the first IPL of z/OS V2R5. (Again, not all of the actions are required. Some depend on your environment, configuration, and workload, and are identified accordingly.)
  7. IPL the new z/OS V2R5 system with your updated customization and configuration files.
  8. Perform any upgrade actions identified by headings that say Actions to perform after the first IPL of z/OS V2R5. (Again, not all of the actions are required. Some depend on your environment, configuration, and workload, and are identified accordingly.)

    Use IBM Health Checker for z/OS to assist with some upgrade actions. For more information, see the workflow step called "Using IBM Health Checker for z/OS for migration checking."

  9. Deploy z/OS V2R5 to other systems within a sysplex, data center, and enterprise.

    The upgrade is now complete.

  10. When you are confident that a system, or in some cases all systems in a sysplex, are not going to fall back to z/OS V2R4 or z/OS V2R3, you can exploit the functions introduced in z/OS V2R5.
  11. Deploy this exploitation on other systems (again within a sysplex, data center, and eventually enterprise).

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 1.2 : Using IBM Health Checker for z/OS for migration checking


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackz/OS Systems ProgrammerNo

Description:

Before you upgrade to a new z/OS release, you can use IBM Health Checker for z/OS to assist with planning. Migration checks can help you determine the applicability of various upgrade actions to your current system. As with other checks provided by IBM Health Checker for z/OS, no updates are made to the system. Migration checks report only on the applicability of specific upgrade actions on a system, and only on the currently active system.

IBM Health Checker for z/OS is started automatically during system initialization.

Migration checks are similar to the other checks provided by IBM Health Checker for z/OS. The only differences are:

  • Migration checks are inactive by default.
  • The names of migration checks begin with the characters ZOSMIG. Following this prefix is a value to help you plan the timing of the upgrade action, as follows:
    ZOSMIGVvRr_NEXT
    Upgrade action is recommended, but will become a required upgrade action in the release after VvRr.
    ZOSMIGVvRr_NEXT2
    Upgrade action is recommended, but will become a required upgrade action two releases after VvRr.
    ZOSMIGVvRr
    Upgrade action is required in the release indicated by VvRr.
    ZOSMIGVvRrPREV
    Upgrade action is required in the release indicated by VvRr and in prior releases, with the appropriate service.
    ZOSMIGREC
    Upgrade action is recommended for the foreseeable future. The upgrade action might never be required.
    ZOSMIGREQ
    Upgrade action that is recommended now, but will be required in a future release.

    Note: In previous releases, the names of migration checks followed a different set of naming conventions: one for ICSF, which used the convention ICSFMIGnnnn_component_program_name, and one for the rest of z/OS, which used the convention ZOSMIGVvvRrr_component_program_name.

On your current z/OS release, follow these steps:

  1. Install the latest migration checks. Review all the latest health checks for both best practices and migration by using the SMP/E FIXCAT IBM.Function.HealthChecker.

    You might want to install the PTFs during a regular service window, so that an IPL is scheduled afterward. Checks are often added by a function when it is started or restarted, so you might find that installing the PTFs before a scheduled IPL works best for you. More migration checks can be added at different times, so having all the latest checks installed before making your migration plans is recommended.

  2. Activate the migration checks that are appropriate to your upgrade path. Because the naming convention for migration checks indicates which release introduced the corresponding upgrade actions, you can activate only the checks that are appropriate for your upgrade path. Using SDSF (or another method for viewing checks, such as filters), you can view ahead of time which migration checks you have available on your system. For example, if you are upgrading from z/OS V2R3 to z/OS V2R5, you must activate the migration checks for changes that occurred in both z/OS V2R4 and z/OS V2R5. If you are upgrading from z/OS V2R4 to z/OS V2R5, you need to activate only the migration checks for changes that occurred in z/OS V2R5. There are many ways to make a check active, and many ways to use wild cards to include specific checks.

    Here are some examples of using the MODIFY command to make checks active:

    • F HZSPROC,ACTIVATE,CHECK=(IBM*,*MIG*)
    • F HZSPROC,ACTIVATE,CHECK=(IBM*,ICSFMIG*)
    • F HZSPROC,ACTIVATE,CHECK=(IBM*,ZOSMIG*)
  3. Review the migration check output and rerun checks. Any exceptions should be addressed in your migration plan. If you can complete the upgrade action before you move to the new z/OS release, you can rerun the check to verify that it was completed correctly on your current system. In some cases, the check might be available for running on the new z/OS release for verification after that release is IPLed.
  4. Deactivate the migration checks if you want. If you no longer desire to have the migration checks active, you can deactivate them similar to the way you activated them. For example:
    • F HZSPROC,DEACTIVATE,CHECK=(IBM*,*MIG*)
    • F HZSPROC,DEACTIVATE,CHECK=(IBM*,ICSFMIG*)
    • F HZSPROC,DEACTIVATE,CHECK=(IBM*,ZOSMIG*)

Within this document, the upgrade actions that have checks are clearly identified within the upgrade actions.

Not all upgrade actions in this document are addressed by checks; many upgrade actions do not lend themselves to programmatic checking. Therefore, use this document to prepare your migration plan and do not rely on checks only.

System REXX considerations

Several IBM Health Checker for z/OS migration health checks are written in compiled System REXX. These health checks rely on System REXX customization and runtime activities being completed. If System REXX and the security environment that System REXX requires has not been properly customized, the System REXX health checks will not run successfully. Also, the compiled REXX execs must have the proper runtime support from the Alternate Library for REXX (available in z/OS since V1R9) or from IBM Library for REXX on zSeries (5695-014).

Note:

To allow System REXX to use JES services, the AXRnn address spaces are started under the primary subsystem. Therefore, you must end the AXRnn address spaces before you shut down JES2. You do not have to stop the AXR address space; this action only affects the secondary AXRnn address spaces.

More information is available in the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 1.3 : Elements and features that do not have upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackz/OS Systems ProgrammerNo

Description:

For an upgrade from z/OS V2R3 to z/OS V2R5, the following z/OS elements and features do not have upgrade actions:

  • Alternate Library for REXX
  • Communications Server Security Level 3
  • DFSORT
  • EREP
  • FFST
  • GDDM
  • GDDM-PGF
  • GDDM-REXX
  • IBM HTTP Server
  • IBM Tivoli Directory Server
  • ICKDSF (Device Support Facility)
  • Metal C Runtime Library
  • MICR/OCR
  • NFS
  • Runtime Library Extensions
  • TIOC
  • z/OS Font Collection
  • z/OS Security Level 3
  • 3270 PC File Transfer Program

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 2 : Discover z/OS features in use


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackz/OS Systems ProgrammerNo

Description:

In this step, you execute a JCL job to generate an output property file that will reflect the current status of a priced feature on your system.

Instructions:

This step of the workflow will determine which z/OS priced features are currently enabled on the running system. Using this information (which you control with your IFAPRDxx parmlib member), associated steps with DISABLED features will be marked as Skipped. The objective of this step is to automatically reduce the number of non-applicable upgrade steps that you need to review.

Review the output of this step to see which priced features were determined to be disabled on this system, and to see which steps have had their state changed.

If you determine that you later want to perform those steps that were marked as Skipped, you can change the status and perform those steps, after they have been assigned.

Note: This step writes the output property file to the location indicated in Output File Path. You can modify the file path as appropriate for your environment. If you are running the workflow on another z/OS system, ensure that the output file path is shared with the system that you are upgrading. If you are using the tmp directory, be sure to include the system name in the directory path. Example: /SYSTEM/tmp/migration_inputfile.txt


Step 3 : General upgrade actions for z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This section of the workflow describes general upgrade actions that apply to everyone, regardless of which z/OS elements and features you use.


Step 3.1 : Upgrade actions for everyone moving to z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes general upgrade actions that apply to everyone, regardless of which z/OS elements and features you use.


Step 3.1.1 : Upgrade actions for everyone before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This section of the workflow describes general upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 3.1.1.1 : Review PSP buckets


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Check the preventive service planning (PSP) buckets for important software and hardware installation and maintenance information that occurs too late in the development cycle to be included in the product publications. Included are PTFs for both service and small programming enhancements (SPEs).

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Identify which PSP buckets to review. For this task you will need to know:

    • PSP bucket upgrade IDs (or upgrades). The most relevant upgrades are those related to z/OS V2R5 and its servers. The z/OS V2R5 upgrade is ZOSV2R5; the server upgrades are shown in the table below.

    • FIXCAT values if you use the SMP/E REPORT MISSINGFIX command in conjunction with the FIXCAT type of HOLDDATA (as mentioned in the tip that follows). The FIXCAT values are shown in the table below. Note:
      • The values shown are for the minimum support necessary for the servers. If you exploit additional functions on a server, the FIXCAT value will have additional qualifiers.
      • You must run z/OS V2R5 on an IBM z13 or later processor. For more information, see the step called "Ensure that you are using supported servers, storage controllers, and machine facilities."

  2. Obtain the PSP buckets at Preventive Service Planning buckets or from IBMLink.

  3. Review the PSP buckets and take whatever actions are prescribed.

Tip: To simplify finding the appropriate PSP bucket and identifying which minimum PTFs listed in the PSP bucket need to be installed on your system, you can use SMP/E FIXCATs and the REPORT MISSINGFIX command. The FIXCAT values are shown in the following table.

Server

Upgrade

FIXCAT value

z15

8561DEVICE

IBM.Device.Server.z15-8561

z15 T02

8562DEVICE

IBM.Device.Server.z15T02-8562

z14

3906DEVICE

IBM.Device.Server.z14-3906

z14 ZR1

3907DEVICE

IBM.Device.Server.z14ZR1-3907

z13®

2964DEVICE

IBM.Device.Server.z13-2964

z13s™

2965DEVICE

IBM.Device.Server.z13S-2965

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.1.2 : Install coexistence and fallback PTFs


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

By installing coexistence and fallback PTFs on your pre-z/OS V2R5 systems, you allow the systems to coexist with z/OS V2R5 systems during your upgrade. Installing coexistence and fallback PTFs also allows for fallback to the previous systems, if necessary. Coexistence and fallback are important because they allow you to migrate systems in a multisystem configuration to z/OS V2R5 using rolling IPLs (one system at a time), which allows for continuous application availability.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

Install the appropriate PTFs.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Before you introduce z/OS V2R5 into your environment, install coexistence and fallback PTFs on all pre-z/OS V2R5 systems with which your z/OS V2R5 system will coexist.

Use the SMP/E REPORT MISSINGFIX command with the Fix Category (FIXCAT) type of HOLDDATA as follows:

  1. Obtain and RECEIVE the latest HOLDDATA onto your pre-z/OS V2R5 systems. Use your usual service acquisition portals or download the HOLDDATA directly from Enhanced HOLDDATA for z/OS. Select the Full from the Download NOW column to receive the FIXCAT HOLDDATA. The other files do not contain FIXCATs.

  2. Run the SMP/E REPORT MISSINGFIX command on your pre-z/OS V2R5 systems and specify a FIXCAT value of IBM.Coexistence.z/OS.V2R5. The report identifies the missing coexistence and fallback PTFs for that system. For more information about the REPORT MISSINGFIX command, see z/OS SMP/E Commands.

  3. Periodically, you might want to obtain the latest HOLDDATA and rerun the REPORT MISSINGFIX command to find out whether there are any new coexistence and fallback PTFs.

Obtain the latest PTFs for the z/OS Upgrade Workflow

Updates and fixes for the z/OS V2R5 Upgrade Workflow are delivered through the standard z/OS service process. To obtain the latest PTFs for the z/OS V2R5 Upgrade Workflow, run the SMP/E REPORT MISSINGFIX command on your z/OS systems and specify a FIXCAT value of IBM.Coexistence.z/OS.V2R5. The z/OS V2R5 Upgrade Workflow can be run on z/OS releases V2R3, V2R4, and V2R5.

Reference information

For an explanation of the z/OS coexistence-migration-fallback policy, see the coexistence and fallback topic in z/OS Planning for Installation.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.1.3 : Use zSoftCap to identify the effect of capacity changes


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The zSoftware Migration Capacity Planning Aid (zSoftCap) is a PC-based tool that evaluates the effects of software release migrations.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended to help with assessing processor capacity and available resources when you are migrating to new software levels.

Target system hardware requirements:

This tool runs on your workstation. The requirements are:

  • A dual-core technology, or faster, processor.
  • An SVGA display 1024 x 768 or better.
  • Approximately 5 MB of hard disk space for the zSoftCap application and user's guide, plus 80 MB for the IBM Java 1.6 runtime environment.

Target system software requirements:

This tool runs on your workstation. Requirements are:

  • Windows 7 or later.
  • IBM Java™ 1.6, or later, runtime environment. This environment is available with the tool.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Download zSoftCap from the IBM Techdocs website IBM Techdocs. Search for Techdoc PRS268.
  2. Run zSoftCap to determine your expected increase in CPU utilization, if any.

Reference information

For more information, see zSoftCap User's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.1.4 : Add or change volumes to keep your z/OS root file system in a single data set


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Because of release enhancements and service, the size of the z/OS root file system (or version root file system) continues to grow from release to release. The size of the z/OS root file system, whether HFS or zFS, is expected to closely approach, if not exceed, the limit of 3339 cylinders on a 3390-3 device.

It is advisable to have the z/OS root file system within a single data set for ease of management.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended for ease of management if your z/OS root file system resides on a 3390-3 volume (or another DASD volume that is close to the 3390-3 limit of 3339 cylinders).

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

Use IBM Health Checker for z/OS check CHECK(IBMUSS, ZOSMIGREC_ROOT_FS_SIZE) to determine whether a volume has enough space for the z/OS root file system.

Steps to take

To keep the z/OS root file system in a single data set, do one of the following:

  • Move your z/OS root file system to a larger DASD volume geometry
  • Use multiple volumes for the z/OS root file system data set.

If your z/OS root data set cannot fit on the volume or volumes you have defined for it, divide the z/OS root, with the smaller file systems being managed together.

Remember that all systems to which you deploy the z/OS root file system need sufficient DASD space to hold the z/OS root.

Tip: File systems for subsystems and products other than the z/OS product itself might also increase in size. When examining the volume for how much space your z/OS file system is using, check other product file system sizes too.

Reference information

For more information, see z/OS DFSMS Implementing System-Managed Storage.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMUSS,ZOSMIGREC_ROOT_FS_SIZE.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 3.1.1.5 : Update processing to include usage of new SMF record types


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R3, SMF supports both Standard record types (0-255) and Extended or Standard record types (0-2047). As z/OS exploits more SMF record types above 255, ensure that your collection and usage of SMF records is up-to-date and continues to meet the needs of your business.

As of z/OS V2R5, JES2 generates SMF record type 1153 for JES2 resource usage and performance data.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you want to process new SMF records that are available for use.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Do the following:

  1. Ensure that your SMFPRMxx TYPE specification is set to collect any newly generated SMF record types.

  2. Review how you have coded the TYPE option in the SMF dump utilities IFASMFDP and IFASMFDL. The default for the dump utilities is TYPE(0:2047). If you have explicitly coded TYPE(0:255) and you want to include all of the recorded record types, verify that you use the default, or explicitly code TYPE(0:2047). Otherwise, record types above 255 are excluded from the selection criteria.

Note: When you code an IFASMFDL ARCHIVE or DELETE request, take care to include (explicitly or implicitly by default) all of the record types that exist in the log stream in the requested date/time range. IFASMFDL will fail ARCHIVE or DELETE requests with message IFA845I if any of the records in the requested date/time range do not match the selection criteria.

Reference information

For more information, see z/OS MVS System Management Facilities (SMF).

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.1.6 : Verify that you have enough XCF groups and XCF group members


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Over time, as various z/OS functions and applications exploit XCF services, you must ensure that there is enough space in the sysplex couple data set for all the XCF groups and members that are to be defined by the exploiters. It is possible that your sysplex couple data set could contain an inadequate number of XCF groups or members.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended to ensure that you have an adequate number of XCF groups and members formatted in your sysplex couple data sets.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

Use Health Checker for z/OS check IBMXCF,XCF_SYSPLEX_CDS_CAPACITY, which checks the adequacy of the number of groups, members, and systems for which a sysplex CDS is formatted.

Steps to take

Follow these steps:

  1. Enter the DISPLAY XCF,COUPLE command on your current system. Notice the values of MAXGROUP and PEAK for your sysplex couple data sets. These values show you the maximum number of XCF groups that the couple data sets can support, and the peak number of XCF groups ever in use in the sysplex. Also notice the values of MAXMEMBER and PEAK for your sysplex couple data sets. These values show you the maximum number of members that the couple data set can support in one group, and the greatest number of members ever in use in the largest group in the sysplex.
  2. If your peak member value is close to the maximum member value, you might want to reformat your sysplex couple data sets to support a larger maximum number of members to be used by any one group.

Reference information

For more information, see the following references:

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMXCF,XCF_SYSPLEX_CDS_CAPACITY.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 3.1.1.7 : Remove dependencies on unsupported z/OS national language translations


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R4, z/OS is provided only in U.S. English (ENU), Uppercase English (ENP), and Japanese (JPN).

The following optional language features are no longer shipped with z/OS:

  • Brazilian Portuguese
  • Canadian French
  • Danish
  • French
  • German
  • Italian
  • Korean
  • Netherlands Dutch
  • Norwegian
  • Simplified Chinese
  • Spanish
  • Swedish
  • Swiss German
  • Traditional Chinese

This change affects the subset of z/OS elements that provided translations in previous releases:

  • GDDM
  • ISPF
  • TSO/E
  • z/OS UNIX

Therefore, as of z/OS V2.4, the following translated elements and features are sent when you specify the language feature number in your order.

Language

Base elements

Japanese, which also includes Uppercase English support for ISPF only.

  • Alternate Library for REXX
  • BCP
  • DFSMSdfp
  • GDDM
  • HCD
  • IBM TDS
  • Integrated Security Services
  • ICKDSF
  • ISPF
  • JES2
  • Language Environment
  • NFS
  • Runtime Library Extensions
  • SMP/E
  • SSL component of Cryptographic Services
  • TSO/E
  • z/OS File System
  • z/OS UNIX

This change does not affect fonts. z/OS continues to provide double-byte fonts for China, Japan, Korea, and so on.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

GDDM, ISPF, TSO/E, z/OS UNIX

When change was introduced:

z/OS V2R4. Announced as a Statement of Direction in IBM Software Announcement Letter 217-246, dated July 2017.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use any of the removed languages.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Stop using the removed languages from the affected elements.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2 : Upgrade actions for everyone before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes general upgrade actions that you can perform after you have installed z/OS V2R5 but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 3.1.2.1 : Accommodate the z/OS V2R5 architecture level set and supported storage devices


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

z/OS V2R5 is supported on the following IBM Z® servers:

  • IBM z15™ models T01 and T02
  • IBM z14™ (z14) models M01 through M05
  • IBM z14™ Model ZR1 (z14 ZR1)
  • IBM z13
  • IBM z13s™

z/OS V2R5 supports these and later IBM storage control units:

  • 3990 Model 3 and 3990 Model 6
  • 9393
  • 2105
  • 2107
  • 2421
  • 2422
  • 2423
  • 2424

z/OS uses particular machine facilities on these servers, depending on the z/OS release. Though additional machine facilities might be available on a server, it does not mean that z/OS supports those facilities. For a list of the machine facilities that are supported for each release of z/OS, see z/OS Planning for Installation.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

General upgrade action not tied to a specific element or feature.

When change was introduced:

z/OS V2R5

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Anytime

Is the upgrade action required?

Yes, if you use any of the servers, controllers, or machine facilities that are no longer supported to run with z/OS V2R5.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

  • During IPL/NIP processing, if you try to use an unsupported control unit for z/OS V2R5, you receive the following error condition for devices under the control unit.
    IEA434I (nnnn) ONLINE IS NOT ALLOWED, INVALID CONTROL UNIT MODEL

    During VARY ONLINE command processing after IPL/NIP, you receive the following error condition for devices under the unsupported control unit:

    IEA434I DEVICE ONLINE IS NOT ALLOWED, INVALID CONTROL UNIT MODEL
  • If you IPL z/OS V2R5 on a server that it does not support, you might receive wait state 07B-1E (decimal 30). Note:

    The number of IEA434I messages is limited to 32 during IPL/NIP to avoid exhausting initial ESQA. An IEA444I message is reported one time during IPL/NIP to indicate that more IEA434I messages are suppressed:

    IEA444I NUMBER OF IEA434I MESSAGES EXCEEDS NIP MAXIMUM

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Determine whether the servers, control units, and machine facilities that you use are supported for z/OS V2R5. If you have a question about support for any hardware that are not listed, contact your IBM representative.
  2. Install replacement servers and control units. Detach unsupported servers and control units from the system and delete their corresponding definitions from the input/output definition file (IODF).

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies

This step will be in the Complete(Override) state if the server is at least a z13, indicating that this requirement has been met.

This step will be in the Ready state if the server not a z13, z14 or z15, indicating that a higher server is required for z/OS V2R5.


Step 3.1.2.2 : Ensure that z/OS V2R5 is running as a guest under z/VM V7.1 if applicable


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Running z/OS V2R5 as a guest requires z/VM V7.1 or later.

Information about this upgrade action.

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

General upgrade action not tied to a specific element or feature.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you are running z/OS under z/VM V6R4 or earlier.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

This requirement is enforced at system IPL.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you plan to run z/OS V2R5 under z/VM, ensure that you are running z/VM V7.1 or later. Otherwise, you have no action to take.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.1.2.3 : Set up an IPCS environment


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The interactive problem control system (IPCS) is a tool in the BCP that provides formatting and analysis support for dumps and traces. You must set up an IPCS environment so that you can process any dumps taken on the newly-built z/OS system.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if the target system cannot be used for native IPCS and usage of IPCS for information produced by the target system is necessary.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

The version and release level of IPCS must match the level of the system that produced the dump. You must use the z/OS MVS libraries of IPCS code, for example, to analyze a dump or trace produced by that level of the z/OS MVS system.

Tip: If it is necessary to have unique IPCS data set names for your current system (because you already have the IPCS data sets with similar names on your earlier system), you can create a unique alias in your catalog that resolves to the current IPCS data sets. This will allow you to have duplicately-named IPCS data sets that are uniquely referenced.

When using unique aliases, you might have to update the security definition for the unique high-level qualifier used in the catalog.

Restrictions

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Set up an IPCS environment; for guidance, see the documents that are listed in "Reference information." During setup, ensure that your logon procedure points to the target system's level of IPCS data sets, which are shown in the following table.

DD name

Data set name

Notes

IATTABL

SYS1.SIATTBL0, if applicable

This is a JES3 data set.

IPCSPARM

Note: This DD name is needed if one of the following is true:

  • The system on which the dump was taken has different BCP and JES levels than the system on which the dump will be examined using IPCS.
  • You have not specified these data sets in your system's parmlib concatenation.

SYS1.PARMLIB

This is the data set that contains all the shipped z/OS V2R5 parmlib IPCS members. If the copies of BLSCECT and all the other IPCS members are not at the z/OS V2R5 level, IPCS might fail when you attempt to use it.

IPCSPARM

SYS1.SHASPARM, if applicable

This is a JES2 data set.

IPCSPARM

SYS1.SIATPARM, if applicable

This is a JES3 data set.

ISPMLIB

SYS1.SBLSMSG0

 

ISPMLIB

SYS1.SIATMSG0, if applicable

This is a JES3 data set.

ISPPLIB

SYS1.SBLSPNL0

 

ISPPLIB

SYS1.SHASPNL0, if applicable

This is a JES2 data set.

ISPPLIB

SYS1.SIATPNL0, if applicable

This is a JES3 data set.

ISPSLIB

SYS1.SBLSKEL0

 

ISPTLIB

SYS1.SBLSTBL0

 

STEPLIB

Note: This DD name is needed if the system on which the dump was taken has different BCP and JES levels than the system on which the dump will be examined using IPCS.

SYS1.MIGLIB

 

STEPLIB

SYS1.SIEAMIGE

This data set was added in z/OS V1R7. It is a PDSE data set that complements SYS1.MIGLIB. This data set is used along with SYS1.MIGLIB for IPCS.

STEPLIB

SYS1.SHASMIG, if applicable

This is a JES2 data set.

STEPLIB

SYS1.SIATMIG, if applicable

This is a JES3 data set.

SYSEXEC

SYS1.SIATCLI0, if applicable

This is a JES3 data set.

SYSPROC

SYS1.SBLSCLI0

 

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.4 : Use IBM-supplied parmlib and proclib members


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Ensure that all new and changed parmlib and proclib members that are shipped in z/OS V2R5 are updated in your parmlib and proclib concatenations.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  • For parmlib, add the data set pointed to by the z/OS V2R5 PARMLIB DDDEF to your parmlib concatenation. Generally, the data set should be added last in the concatenation, and you should ensure that the other data sets in the concatenation do not have members with the same names as the IBM-supplied members. If you place the data set on the system residence volume and use an indirect catalog entry, future migrations will not require this particular migration step.
  • For proclib:
    1. Ensure that the default proclib members are copied to your default proclib to pick up the new and changed members.
    2. Update the individual sample members that are provided and ensure that they are accessible to the system, as shown in the table of proclib member updates in z/OS Program Directory.
    3. Ensure that the procedure libraries that are listed in the table of libraries to be added to the proclib concatenation in z/OS Program Directory in the z/OS Internet library are placed in the necessary procedure library concatenations and are available to the system.

Reference information

For the parmlib and proclib members that are shipped with z/OS, see z/OS Program Directory in the z/OS Internet library.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.5 : Migrate /etc, /global, and /var system control files


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The /etc, /global, and /var directories contain system control files. The /etc directory contains customization data that you maintain. The /global and /var directories contain customization data that IBM maintains.

The following elements and features use /etc:

  • BCP (Predictive Failure Analysis).
  • CIM.
  • Communications Server (IP Services component). See the step called "IP Services: Update /etc configuration files."
  • Cryptographic Services (PKI Services and System SSL components).
  • DFSMSrmm.
  • IBM HTTP Server.
  • IBM Tivoli Directory Server (TDS). The LDAP server component uses /etc/ldap.
  • Infoprint Server. See the step called "Remount the Printer Inventory and copy files that were customized."
  • Integrated Security Services. The Network Authentication Service component uses /etc/skrb.
  • z/OS UNIX.

The following elements and features use /global:

  • IBM Knowledge Center for z/OS
  • IBM z/OS Management Facility (z/OSMF).

The following elements and features use /var:

  • DFSMSrmm.
  • IBM Tivoli Directory Server (TDS). The LDAP server component uses /var/ldap.
  • Infoprint Server. See the step called "Remount the Printer Inventory and copy files that were customized."
  • Integrated Security Services. The Network Authentication Service component uses /var/skrb.

During installation, subdirectories of /etc, /global, and /var are created. If you install z/OS with ServerPac, some files are loaded into /etc, /global, and /var because of the customization that is performed in ServerPac. You must merge the files in /etc, /global, and /var with those on your previous system. If you install z/OS with CBPDO, copy the files from your old system to the z/OS V2R5 /etc, /global, and /var subdirectories.

After merging or copying the contents of /etc, /global, and /var, you must inspect and modify the files as necessary to reflect z/OS V2R5 requirements.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Copy files from your old system to the z/OS V2R5 /etc, /global, and /var subdirectories, and then modify the files as required for z/OS V2R5. If you have other files under your existing /var directory, you must merge the old and new files under /var. The easiest way to do this is to create a clone of your current /var file system and then copy the new /var files into the clone.

Many z/OS UNIX utilities are available for comparing and copying directory structures and files. Two that are especially helpful for /etc, /global, and /var migration work are:

  • diff (with the -r option, for recursion). This utility is useful for comparing the path structures and file contents, and has many options available. The dircmp utility has fewer options for directory comparisons, and the cmp utility stops after the first difference in a file comparison and has output that is more cumbersome.
  • pax . The -rw option works like a copy (instead of making or extracting from a single file archive) for directories, symbolic links, and files. Consider the -pe option for saving the attributes when doing the copy. The -k option prevents overwriting of existing files. The -c option causes pax to continue after encountering an error on the source file system. That is, pax prints an error message and returns a nonzero value after the command ends. Errors on the target file system (such as out of space or write errors) still cause the pax command to end as it always has.

To determine what you need to migrate, first compare the ServerPac /etc, /global, and /var file systems with your existing /etc, /global, and /var file systems. Mount a copy of your existing /etc, /global, and /var file systems to a location outside of the ServerPac file system. For instance, you might have your ServerPac file systems at /ServerPac/zOS_Rx/etc and /ServerPac/zOS_Rx/var, and your existing file systems at /Service/ImageX/etc and /Service/ImageX/var. You might have several file systems to mount that are copies of each of your image's /etc and /var file systems (ImageX, ImageY, and ImageZ, for instance). To compare the ServerPac and existing system's /etc and /var, you can run two z/OS UNIX commands, such as:

diff -r /ServerPac/zOS_Rx/etc /Service/ImageX/etc diff -r /ServerPac/zOS_Rx/var /Service/ImageX/var

These command results give you a list of the changes that your existing system's /etc and /var file systems are missing, including both the structure differences and the file content differences.

After you determine which directories, symbolic links, and files you are missing from your existing system, you can use one of several ways to propagate the ServerPac information forward:

  • You can use the pax command (with the -k option) to copy from the ServerPac /etc, /global, and /var file systems to each of your existing system's /etc, /global, and /var file systems. For example:
    cd /ServerPac/zOS_Rx/etc pax -rvwkC -pe * /Service/ImageX/etc

    Another example:

    cd /ServerPac/zOS_Rx/var pax -rvwkC -pe * /Service/ImageX/var

    The pax command is a good choice because it copies all files, directories, and symbolic links for each file system from the ServerPac system using a single command without overlaying any existing files.

  • You can rerun the product-supplied MKDIR jobs to recreate the directories and symbolic links on each of your existing system's /etc, /global, and /var file systems. A list of the MKDIR jobs is found in z/OS Program Directory in the z/OS Internet library and the other program directories for the products that were in your ServerPac order. MKDIR jobs can be run multiple times without damaging your existing file system. Or, you can combine these jobs and script them into a single batch job to make the execution more consolidated and repeatable.

After you make changes to a copy of your existing image's /etc, /global, and /var file systems, you can unmount them and use them for your deployment of the ServerPac system, as your schedule indicates. Remember, you are using copies of your existing /etc, /global, and /var file systems, and you are preserving what you had previously by modifying copies, so your customization for those specific existing images is not lost.

Reference information

For more information, see z/OS Program Directory in the z/OS Internet library.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.6 : Update automation and procedures for changed and deleted messages


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Every release, many messages change and some are deleted. If you use automation programs to handle messages, or you have operator or other procedures that deal with messages, you should update the programs or procedures.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use automation programs or other procedures to handle messages.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review the lists of changed and deleted messages in z/OS Release Upgrade Reference Summary. Update programs that automate based on these messages, and make other necessary accommodations.

Reference information

For a list of new, changed, and deleted messages, see z/OS Release Upgrade Reference Summary.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.7 : Rework and install user modifications


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

A user modification is a change that is constructed by a user to modify an existing function, add to an existing function, or add a user-defined function.

Common types of user modifications are:

  • User-written and vendor-written exit routines.
  • User-written and vendor-written SVCs.
  • User-written and vendor-written termination routines.
  • Modifications of IBM source code.
  • Unit information modules (UIMs) for non-IBM hardware.
  • User-written and vendor-written modules that are listed in a NUCLSTxx parmlib member.
  • Updates to default modules to set site defaults differently than the IBM-supplied defaults, such as for the following element and features:
    • DFSORT. Consider using ICEPRMxx parmlib members to eliminate the assembler language installation option modules.
    • High Level Assembler (HLASM).
    • ISPF configuration table.
    • SDSF. For more information, see the workflow step "SDSF: Use dynamic statements for ISFPARMS to avoid reassembly."
    • z/OS XL C/C++.

If you made any user modifications, you must determine which ones need to be reworked and which ones need only to be reinstalled.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5

Is the upgrade action required?

Yes, if you made any user modifications.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine which user modifications need to be reworked and which need only to be reinstalled. You can use SMP/E LIST commands to retrieve information about installed products and features.

Note: IBM recommends that you use exit routines for any user modifications where possible. You can install the exit routines by using SMP/E. With SMP/E, it is easier to bring forward modifications to the z/OS release you are installing.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.8 : Reconnect non-IBM products


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you use any independent software vendor (ISV) products, you must make them usable with the new system.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use any ISV products and need to reconnect them after performing a ServerPac installation.

Target system hardware requirements:

None.

Target system software requirements :

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check with your ISVs to make sure the product levels you are using support the new z/OS release, and then reconnect your ISV products to the new release of z/OS following the instructions provided by the ISVs. If any ISV products do not need to be installed in the same libraries and zones as z/OS, place them in their own sets of libraries and SMP/E zones. This means that, unless you have to change ISV product code, such as installing PTFs, or obtain a new level of the product, you will not need to reinstall it after you install a new ServerPac.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.9 : Reconnect subsystems


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you use subsystems, you must make them usable with the new system.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use CICS®, DB2®, IMS, or NCP on your new system.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Ensure that any required target system PTFs are installed before you use the subsystem with the new z/OS system. This work includes any required SVCs, system modifications, parmlib setup, and proclib setup. Follow the instructions for the subsystem that you plan to reconnect.

Tip: The required IBM PTFs for z/OS V2R5 are identified with the FIXCAT IBM.TargetSystem-RequiredService.z/OS.V2R5

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.10 : Update operational and other procedures


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Depending on which method you used to install (ServerPac, CBPDO, or another deliverable), and which functions you plan to exploit, you might need to update the operation, automation, administration, security, backup, and recovery procedures for your site.

Information about this upgrade action

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review your operation, automation, administration, security, backup, and recovery procedures, and make any necessary changes depending on how you installed and which functions you plan to exploit. Some possible changes are:

  • Allowing applicable users access to new high-level qualifiers. The default new high-level qualifiers are shown in the workflow step called "Add references to new data sets and paths."
  • Updating and testing your backup and recovery procedures to accommodate the new target system.
  • Updating and testing any disaster recovery procedures.
  • Updating and testing any automation procedures to take advantage of new functions.
  • Updating security system definitions, such as defining new users and resources, permitting users to use new resources, and defining new profiles in the RACF® FACILITY class.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.11 : Verify that virtual storage limits are set properly


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Because virtual storage requirements can increase from release to release, it is recommended that you review your current settings for virtual storage limits.

Consider the following areas of potential concern:

  • Common areas (above and below the 16 MB line). An increase in virtual storage for the common areas reduces the virtual storage size of all address spaces.
  • Individual address spaces. An increase in virtual storage for individual address spaces impacts only the individual address spaces.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether your virtual storage limits are set properly, use the health check IBMRSM,RSM_MEMLIMIT. It checks the current setting for the MEMLIMIT parameter in SMFPRMxx, which affects the amount of virtual storage above the 2 GB bar that is available to jobs. This check verifies that a nonzero MEMLIMIT value is in use.

Steps to take

Determine how much virtual storage use above the 2 GB bar to allow. Though there is no practical limit to the number of virtual addresses an address space can request above the bar, the system can limit the amount of virtual storage above the bar that an address space can use.

The amount of virtual storage above the bar is determined as follows:

  • The MEMLIMIT parameter in parmlib member SMFPRMxx sets the default system-wide limit, which defaults to 2 GB.
  • MEMLIMIT can be overridden for particular jobs by specifying REGION=0M or MEMLIMIT on JOB or EXEC statements in JCL.

To set a limit on the use of virtual storage above the bar, use the SMF exit IEFUSI or the parmlib member SMFLIMxx. For more information, see the topic on limiting the use of memory objects in z/OS MVS Programming: Extended Addressability Guide.

If you want to control the use of virtual storage above the 2 GB bar, do one or more of the following:

  • If the MEMLIMIT default of 2 GB is acceptable to you, no change to SMFPRMxx is necessary.

  • You can specify MEMLIMIT explicitly in JCL to override the system default that was set (or allowed to default) in SMFPRMxx.

  • You can specify REGION=0M on the job statement in JCL to implicitly set MEMLIMIT to NOLIMIT, which also overrides the system default (from SMFPRMxx).

  • You can use IEFUSI or parmlib member SMFLIMxx to establish a system default MEMLIMIT for different classes of work (for example, JOB, TSO, STC) and limit the amount of virtual storage that can be used above the bar, if an explicit or implicit nonzero MEMLIMIT is in effect from JCL or SMFPRMxx. The keyword HONORIEFUSIREGION NOHONORIEFUSIREGION is available in SCHEDxx to identify if the region and MEMLIMIT settings that are specified through or otherwise affected by the IEFUSI exit are to take effect for a program. If you are overriding the attribute of HASJES20 (JES2) in SCHEDxx parmlib member, specify NOHONORIEFUSIREGION explicitly so the default of HONORIEFUSIREGION is not used for this program.

Note: When calculating the large frame area (LFAREA) for your system, be aware of the following considerations:

  • z/OS with JES2 requires a minumum of 2M of LFAREA
  • z/OS without JES2 requires a minimum of 1M of LFAREA.

Reference information

For more information, see the following references:

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMRSM,RSM_MEMLIMIT.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".

NOTE: The successful running of this IBM Health Checker for z/OS check only partially covers this upgrade action. Refer to the upgrade action text for the complete list of steps to take.


Step 3.1.2.12 : Back virtual storage with sufficient real and auxiliary storage


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As you use more virtual storage by defining additional address spaces or by exploiting memory objects, ensure that you have enough real and auxiliary storage defined.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Using an RMF report, determine whether more real or auxiliary storage is needed by checking the following real storage concentration indicators:

  • UIC and average available frames
  • Demand page rates
  • Percentage of auxiliary slots in use.

Reference information

For more information about memory objects, see z/OS MVS Programming: Extended Addressability Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.13 : Update your check customization for modified IBM Health Checker for z/OS checks


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Changes that IBM makes to the checks provided by IBM Health Checker for z/OS can affect any updates that you might have made.

The following health checks are new in z/OS V2R5:

  • ZOSMIGV2R4_NEXT_WLM_ServCoeff
  • IBMCS,ZOSMIGV2R4_NEXT_CS_DCAS_NTVSSL
  • IBMCS,ZOSMIGV2R4_NEXT_CS_TN3270_NTVSSL
  • IBMCS,ZOSMIGV2R4_NEXT_CS_FTPSRV_NTVSSL
  • IBMVSM,VSM_CHECKREGIONLOSS

The following health checks were added by IBM in z/OS V2R4:

  • IBMCS,ZOSMIGV2R4_NEXT_CS_OSIMGMT
  • IBMCS,ZOSMIGV2R4PREV_CS_IWQSC_tcpipstackname
  • IBM_JES2,JES2_UPGRADE_CKPT_LEVEL_JES2
  • IBMICSF,ICSF_PKCS_PSS_SUPPORT
  • IBMINFOPRINT,INFOPRINT_CENTRAL_SECURE_MODE
  • IBMINFOPRINT,ZOSMIGV2R3_NEXT_INFOPRINT_IPCSSL
  • IBMISPF,ISPF_WSA
  • IBMRSM,RSM_MINIMUM_REAL
  • IBMSDSF,SDSF_CLASS_SDSF_ACTIVE
  • IBMVSM,ZOSMIGV2R3_NEXT_VSM_USERKEYCOMM

The following health checks were changed by IBM in z/OS V2R4:

  • IBMUSS,ZOSMIGV2R3_NEXT_USS_SMB_DETECTED
  • IBMCS,CSVTAM_CSM_STG_LIMIT

The following health checks were deleted by IBM in z/OS V2R4:

  • ZOSMIGV1R12_INFOPRINT_INVSIZE

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended to ensure that your checks continue to work as you intend them to work.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

See "Steps to take."

Steps to take

Follow these steps:

  1. Refer to the updated checks in IBM Health Checker for z/OS User's Guide.
  2. Review changes you made for those checks, such as in HZSPRMxx parmlib members.
  3. Make any further updates for the checks to ensure that they continue to work as intended.

Reference information

For information about updating the checks, see IBM Health Checker for z/OS User's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.1.2.14 : Remove deleted data sets, paths, and references


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Data sets and paths are routinely removed from z/OS for reasons such as consolidation of data sets and removal of elements and features. You must determine whether these changes affect your environment.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Using the tables in this workflow step as a guide, remove data sets and paths that do not exist in the current release (z/OS V2R4). Also, remove references to them. You might find references in the following places:

  • Parmlib
  • Proclib
  • Logon procedures
  • Catalogs
  • Security definitions, including program control definitions
  • DFSMS ACS routines
  • /etc/profile
  • SMP/E DDDEF entry
  • Backup and recovery procedures, as well as any references to them

In the tables, the data sets are identified as distribution library (DLIB) data sets or target library data sets.

Note: Do not remove any data sets, paths, or references that are needed by earlier-level systems until those systems no longer need them.

The following data sets and paths were deleted from z/OS V2R5.

Data sets and paths that were deleted from z/OS V2R5 (in alphabetical order by DDDEF name)

DDDEF

Data set name or path (high-level qualifiers are defaults)

DLIB or target

From element or feature

When deleted

Why deleted

ACDSHFS

CDS.ACDSHFS

DLIB

OCSF

z/OS V2R5

Element is withdrawn from z/OS.

ACDSSAMP

CDS.ACDSSAMP

DLIB

OCSF

z/OS V2R5

Element is withdrawn from z/OS.

ACSFOBJ

CSF.ACSFOBJ

DLIB

ICSF

z/OS V2R5

Obsolete data set is removed from z/OS.

ACSFHDRS

CSF.ACSFHDRS

DLIB

ICSF

z/OS V2R5

Obsolete data set is removed from z/OS.

AERBMOD1

SYS1.AERBMOD1

DLIB

RMF

z/OS V2R5

Obsolete data set is removed from z/OS.

AISPGUI

ISP.AISPGUI

DLIB

ISPF

z/OS V2R5

Obsolete data set is removed from z/OS.

AISTASGD

SYS1.AISTASGD

DLIB

Communications Server

z/OS V2R5

VTAM CMIP services is removed from z/OS.

AISTASN1

SYS1.AISTASN1

DLIB

Communications Server

z/OS V2R5

VTAM CMIP services is removed from z/OS.

AISTCMIP

SYS1.AISTCMIP

DLIB

Communications Server

z/OS V2R5

VTAM CMIP services is removed from z/OS.

AISTGDMO

SYS1.AISTGDMO

DLIB

Communications Server

z/OS V2R5

VTAM CMIP services is removed from z/OS.

AITYHFS

SYS1.AITYHFS

DLIB

EIM

z/OS V2R5

Element is withdrawn from z/OS.

ANFSMAC

SYS1.ANFSMAC

DLIB

NFS

z/OS V2R5

Obsolete due to library restructure.

ANFSSAMP

SYS1.ANFSSAMP

DLIB

NFS

z/OS V2R5

Obsolete due to library restructure.

NFSMAC

SYS1.NFSMAC

Target

NFS

z/OS V2R5

Library is deleted because shared target and distribution libraries are used in z/OS V2R5.

NFSSAMP

SYS1.NFSSAMP

Target

NFS

z/OS V2R5

Library is deleted because shared target and distribution libraries are used in z/OS V2R5.

NFSTARB

SYS1.NFSTARB

Target

NFS

z/OS V2R5

Library is deleted because shared target and distribution libraries are used in z/OS V2R5.

SAOPICTE

/usr/lpp/Printsrv/InfoprintCentral/html/En_US/IBM

Infoprint Server

z/OS V2R5

Obsolete path is removed.

SAOPICTE

/usr/lpp/Printsrv/InfoprintCentral/html

Infoprint Server

z/OS V2R5

Obsolete path is removed.

SAOPICTE

/usr/lpp/Printsrv/InfoprintCentral/html/En_US

Infoprint Server

z/OS V2R5

Obsolete path is removed.

SCDSHFS

/usr/lpp/ocsf/IBM/

OCSF

z/OS V2R5

Element is withdrawn from z/OS.

SCDSSAMP

CDS.SCDSSAMP

Target

OCSF

z/OS V2R5

Element is withdrawn from z/OS.

SCSFHDRS

CSF.SCSFHDRS

Target

ICSF

z/OS V2R5

Obsolete data set is removed from z/OS.

SCSFOBJ

CSF.SCSFOBJ

Target

ICSF

z/OS V2R5

Obsolete data set is removed from z/OS.

SERBLINK

SYS1.SERBLINK

Target

RMF

z/OS V2R5

Obsolete data set is removed from z/OS.

SISPGUI

ISP.SISPGUI

Target

ISPF

z/OS V2R5

Obsolete data set removed from z/OS.

SISTASGD

SYS1.SISTASGD

Target

Communications Server

z/OS V2R5

VTAM CMIP services is removed from z/OS.

SISTASN1

SYS1.SISTASN1

Target

Communications Server

z/OS V2R5

VTAM CMIP services is removed from z/OS.

SISTCMIP

SYS1.SISTCMIP

Target

Communications Server

z/OS V2R5

VTAM CMIP services is removed from z/OS.

SISTGDMO

SYS1.SISTGDMO

Target

Communications Server

z/OS V2R5

VTAM CMIP services is removed from z/OS.

SITYHFS

/usr/lpp/eim/IBM/

EIM

z/OS V2R5

Element is withdrawn from z/OS.

The following data sets and paths were deleted from z/OS V2R4.

Data sets and paths that were deleted from z/OS V2R4 (in alphabetic order by DDDEF name)

DDDEF

Data set name or path (high-level qualifiers are defaults)

DLIB or target

From element or feature

When deleted

Why deleted

ABPXMCHS

SYS1.ABPXMCHS

DLIB

BCP

z/OS V2R4

FMID was removed from z/OS

ABPXPCHS

SYS1.ABPXPCHS

DLIB

BCP

z/OS V2R4

FMID was removed from z/OS

ABPXTCHS

SYS1.ABPXTCHS

DLIB

BCP

z/OS V2R4

FMID was removed from z/OS

AMSGCHS

SYS1.AMSGCHS

DLIB

BCP

z/OS V2R4

FMID was removed from z/OS

APHELP

SYS1.APHELP

DLIB

BCP

z/OS V2R4

FMID was removed from z/OS

 

 

 

 

 

 

AEOXFONT

EOY.AEOXFONT

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOXIENU

EOY.AEOXIENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOXOENU

EOY.AEOXOENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOX1ENU

EOY.AEOX1ENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOX2ENU

EOY.AEOX2ENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOX3ENU

EOY.AEOX3ENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOX4ENU

EOY.AEOX4ENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOXINLD

EOY.AEOXINLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOXONLD

EOY.AEOXONLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOX1NLD

EOY.AEOX1NLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOX2NLD

EOY.AEOX2NLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOX3NLD

EOY.AEOX3NLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOX4NLD

EOY.AEOX4NLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOYBNLD

EOY.AEOYBNLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOYGNLD

EOY.AEOYGNLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOYLNLD

EOY.AEOYLNLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOYMNLD

EOY.AEOYMNLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOYPNLD

EOY.AEOYPNLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOYSNLD

EOY.AEOYSNLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOYTNLD

EOY.AEOYTNLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

AEOYXNLD

EOY.AEOYXNLD

DLIB

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOXIFRA

EOY.AEOXIFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOXOFRA

EOY.AEOXOFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOX1FRA

EOY.AEOX1FRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOX2FRA

EOY.AEOX2FRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOX3FRA

EOY.AEOX3FRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOX4FRA

EOY.AEOX4FRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOYBFRA

EOY.AEOYBFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOYGFRA

EOY.AEOYGFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOYLFRA

EOY.AEOYLFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOYMFRA

EOY.AEOYMFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOYPFRA

EOY.AEOYPFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOYSFRA

EOY.AEOYSFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOYTFRA

EOY.AEOYTFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

AEOYXFRA

EOY.AEOYXFRA

DLIB

BookManager READ French

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOXIDEU

EOY.AEOXIDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOXODEU

EOY.AEOXODEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOX1DEU

EOY.AEOX1DEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOX2DEU

EOY.AEOX2DEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOX3DEU

EOY.AEOX3DEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOX4DEU

EOY.AEOX4DEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOYBDEU

EOY.AEOYBDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOYGDEU

EOY.AEOYGDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOYLDEU

EOY.AEOYLDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOYMDEU

EOY.AEOYMDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOYPDEU

EOY.AEOYPDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOYSDEU

EOY.AEOYSDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOYTDEU

EOY.AEOYTDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

AEOYXDEU

EOY.AEOYXDEU

DLIB

BookManager READ German

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOXIESP

EOY.AEOXIESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOXOESP

EOY.AEOXOESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOX1ESP

EOY.AEOX1ESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOX2ESP

EOY.AEOX2ESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOX3ESP

EOY.AEOX3ESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOX4ESP

EOY.AEOX4ESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOYBESP

EOY.AEOYBESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOYGESP

EOY.AEOYGESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOYLESP

EOY.AEOYLESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOYMESP

EOY.AEOYMESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOYPESP

EOY.AEOYPESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOYSESP

EOY.AEOYSESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOYTESP

EOY.AEOYTESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

AEOYXESP

EOY.AEOYXESP

DLIB

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOXIITA

EOY.AEOXIITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOXOITA

EOY.AEOXOITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOX1ITA

EOY.AEOX1ITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOX2ITA

EOY.AEOX2ITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOX3ITA

EOY.AEOX3ITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOX4ITA

EOY.AEOX4ITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOYBITA

EOY.AEOYBITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOYGITA

EOY.AEOYGITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOYLITA

EOY.AEOYLITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOYMITA

EOY.AEOYMITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOYPITA

EOY.AEOYPITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOYSITA

EOY.AEOYSITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOYTITA

EOY.AEOYTITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

AEOYXITA

EOY.AEOYXITA

DLIB

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOXIPTB

EOY.AEOXIPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOXOPTB

EOY.AEOXOPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOYBPTB

EOY.AEOYBPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOX1PTB

EOY.AEOX1PTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOX2PTB

EOY.AEOX2PTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOX3PTB

EOY.AEOX3PTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOX4PTB

EOY.AEOX4PTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOYGPTB

EOY.AEOYGPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOYLPTB

EOY.AEOYLPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOYMPTB

EOY.AEOYMPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOYPPTB

EOY.AEOYPPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOYSPTB

EOY.AEOYSPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOYTPTB

EOY.AEOYTPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

AEOYXPTB

EOY.AEOYXPTB

DLIB

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOXIFRC

EOY.AEOXIFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOXOFRC

EOY.AEOXOFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOX1FRC

EOY.AEOX1FRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOX2FRC

EOY.AEOX2FRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOX3FRC

EOY.AEOX3FRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOX4FRC

EOY.AEOX4FRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOYBFRC

EOY.AEOYBFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOYGFRC

EOY.AEOYGFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOYLFRC

EOY.AEOYLFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOYMFRC

EOY.AEOYMFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOYPFRC

EOY.AEOYPFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOYSFRC

EOY.AEOYSFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOYTFRC

EOY.AEOYTFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

AEOYXFRC

EOY.AEOYXFRC

DLIB

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOXIDAN

EOY.AEOXIDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOXODAN

EOY.AEOXODAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOX1DAN

EOY.AEOX1DAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOX2DAN

EOY.AEOX2DAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOX3DAN

EOY.AEOX3DAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOX4DAN

EOY.AEOX4DAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOYBDAN

EOY.AEOYBDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOYGDAN

EOY.AEOYGDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOYLDAN

EOY.AEOYLDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOYMDAN

EOY.AEOYMDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOYPDAN

EOY.AEOYPDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOYSDAN

EOY.AEOYSDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOYTDAN

EOY.AEOYTDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

AEOYXDAN

EOY.AEOYXDAN

DLIB

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AEOYBENU

EOY.AEOYBENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYCLIB

EOY.AEOYCLIB

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYGENU

EOY.AEOYGENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYLENU

EOY.AEOYLENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYLEXS

EOY.AEOYLEXS

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYLOAD

EOY.AEOYLOAD

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYMENU

EOY.AEOYMENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYPENU

EOY.AEOYPENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYPROC

EOY.AEOYPROC

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYSAMP

EOY.AEOYSAMP

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYSENU

EOY.AEOYSENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYTENU

EOY.AEOYTENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEOYXENU

EOY.AEOYXENU

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEPHBOK1

EOX.AEPHBOK1

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEPHCLB1

EOX.AEPHCLB1

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEPHDAT1

EOX.AEPHDAT1

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEPHLOD1

EOX.AEPHLOD1

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEPHMSG1

EOX.AEPHMSG1

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEPHPNL1

EOX.AEPHPNL1

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEPHSAM1

EOX.AEPHSAM1

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

AEPHTBL1

EOX.AEPHTBL1

DLIB

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AIOEHSAM

IOE.AIOEHSAM

DLIB

DFS/SMB

z/OS V2R4

Element was removed from z/OS

AIOEHSHL

IOE.AIOEHSHL

DLIB

DFS/SMB

z/OS V2R4

Element was removed from z/OS

AIOEHSRC

IOE.AIOEHSRC

DLIB

DFS/SMB

z/OS V2R4

Element was removed from z/OS

AIOEHJPN

IOE.AIOEHJPN

DLIB

DFS/SMB

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AISPGDES

ISP.AISPGDES

DLIB

ISPF Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

AISPMDES

ISP.AISPMDES

DLIB

ISPF Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

AISPPDES

ISP.AISPPDES

DLIB

ISPF Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

AISPSDES

ISP.AISPSDES

DLIB

ISPF Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

AISPTDES

ISP.AISPTDES

DLIB

ISPF Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

 

 

 

 

 

 

AISPGDEU

ISP.AISPGDEU

DLIB

ISPF German

z/OS V2R4

FMID was withdrawn from z/OS

AISPMDEU

ISP.AISPMDEU

DLIB

ISPF German

z/OS V2R4

FMID was withdrawn from z/OS

AISPPDEU

ISP.AISPPDEU

DLIB

ISPF German

z/OS V2R4

FMID was withdrawn from z/OS

AISPSDEU

ISP.AISPSDEU

DLIB

ISPF German

z/OS V2R4

FMID was withdrawn from z/OS

AISPTDEU

ISP.AISPTDEU

DLIB

ISPF German

z/OS V2R4

FMID was withdrawn from z/OS

 

 

 

 

 

 

AEPHBOOK

EPH.AEPHBOOK

DLIB

Library Server

z/OS V2R4

Element was removed from z/OS

AEPHCLIB

EPH.AEPHCLIB

DLIB

Library Server

z/OS V2R4

Element was removed from z/OS

AEPHLOAD

EPH.AEPHLOAD

DLIB

Library Server

z/OS V2R4

Element was removed from z/OS

AEPHSAMP

EPH.AEPHSAMP

DLIB

Library Server

z/OS V2R4

Element was removed from z/OS

AEPHTAB

EPH.AEPHTAB

DLIB

Library Server

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AIOAIBIN

IOA.AIOAIBIN

DLIB

OSA/SF

z/OS V2R4

Element was removed from z/OS

AIOALMOD

IOA.AIOALMOD

DLIB

OSA/SF

z/OS V2R4

Element was removed from z/OS

AIOAMMOD

IOA.AIOAMMOD

DLIB

OSA/SF

z/OS V2R4

Element was removed from z/OS

AIOASAMP

IOA.AIOASAMP

DLIB

OSA/SF

z/OS V2R4

Element was removed from z/OS

AIOAJAVA

IOA.AIOAJAVA

DLIB

OSA/SF

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

AICQPAB

SYS1.AICQPAB

DLIB

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

AICQPILB

SYS1.AICQPILB

DLIB

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

AICQPMA1

SYS1.AICQPMA1

DLIB

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

AICQPMA3

SYS1.AICQPMA3

DLIB

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

AICQPMA4

SYS1.AICQPMA4

DLIB

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

AICQPMA5

SYS1.AICQPMA5

DLIB

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

APLIB

SYS1.APLIB

DLIB

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

 

 

 

 

 

 

AGHELP

SYS1.AGHELP

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

AGLIB

SYS1.AGLIB

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

AICQGAB

SYS1.AICQGAB

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

AICQGILB

SYS1.AICQGILB

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

AICQGMA1

SYS1.AICQGMA1

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

AICQGMA3

SYS1.AICQGMA3

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

AICQGMA4

SYS1.AICQGMA4

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

AICQGMA5

SYS1.AICQGMA5

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

AMSGDEU

SYS1.AMSGDEU

DLIB

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

 

 

 

 

 

MSGCHS

SYS1.MSGCHS

Target

BCP

z/OS V2R4

FMID was removed from z/OS

PHELP

SYS1.PHELP

Target

BCP

z/OS V2R4

FMID was removed from z/OS

SBPXMCHS

SYS1.SBPXMCHS

Target

BCP

z/OS V2R4

FMID was removed from z/OS

SBPXPCHS

SYS1.SBPXPCHS

Target

BCP

z/OS V2R4

FMID was removed from z/OS

SBPXTCHS

SYS1.SBPXTCHS

Target

BCP

 

FMID was removed from z/OS

 

 

 

 

 

 

SEOXFONT

EOY.SEOXFONT

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOXIENU

EOY.SEOXIENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOXOENU

EOY.SEOXOENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOX1ENU

EOY.SEOX1ENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOX2ENU

EOY.SEOX2ENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOX3ENU

EOY.SEOX3ENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOX4ENU

EOY.SEOX4ENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYBENU

EOY.SEOYBENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYCLIB

EOY.SEOYCLIB

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYGENU

EOY.SEOYGENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYLENU

EOY.SEOYLENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYLEXS

EOY.SEOYLEXS

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYLOAD

EOY.SEOYLOAD

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYLPA

EOY.SEOYLPA

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYMENU

EOY.SEOYMENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYPENU

EOY.SEOYPENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYPROC

EOY.SEOYPROC

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYSAMP

EOY.SEOYSAMP

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYSENU

EOY.SEOYSENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYTENU

EOY.SEOYTENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEOYXENU

EOY.SEOYXENU

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEPHBOK1

EOX.SEPHBOK1

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEPHCLB1

EOX.SEPHCLB1

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEPHDAT1

EOX.SEPHDAT1

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEPHLOD1

EOX.SEPHLOD1

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEPHMSG1

EOX.SEPHMSG1

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEPHPNL1

EOX.SEPHPNL1

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEPHSAM1

EOX.SEPHSAM1

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

SEPHTBL1

EOX.SEPHTBL1

Target

BookManager READ Base and English

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SEOXINLD

EOY.SEOXINLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOXONLD

EOY.SEOXONLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOX1NLD

EOY.SEOX1NLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOX2NLD

EOY.SEOX2NLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOX3NLD

EOY.SEOX3NLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOX4NLD

EOY.SEOX4NLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOYBNLD

EOY.SEOYBNLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOYGNLD

EOY.SEOYGNLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOYLNLD

EOY.SEOYLNLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOYMNLD

EOY.SEOYMNLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOYPNLD

EOY.SEOYPNLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOYSNLD

EOY.SEOYSNLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOYTNLD

EOY.SEOYTNLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

SEOYXNLD

EOY.SEOYXNLD

Target

BookManager READ Dutch

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SEOXIFRA

EOY.SEOXIFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOXOFRA

EOY.SEOXOFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOX1FRA

EOY.SEOX1FRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOX2FRA

EOY.SEOX2FRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOX3FRA

EOY.SEOX3FRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOX4FRA

EOY.SEOX4FRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOYBFRA

EOY.SEOYBFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOYGFRA

EOY.SEOYGFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOYLFRA

EOY.SEOYLFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOYMFRA

EOY.SEOYMFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOYPFRA

EOY.SEOYPFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOYSFRA

EOY.SEOYSFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOYTFRA

EOY.SEOYTFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

SEOYXFRA

EOY.SEOYXFRA

Target

BookManager READ French

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SEOXIDEU

EOY.SEOXIDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOXODEU

EOY.SEOXODEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOX1DEU

EOY.SEOX1DEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOX2DEU

EOY.SEOX2DEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOX3DEU

EOY.SEOX3DEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOX4DEU

EOY.SEOX4DEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOYBDEU

EOY.SEOYBDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOYGDEU

EOY.SEOYGDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOYLDEU

EOY.SEOYLDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOYMDEU

EOY.SEOYMDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOYPDEU

EOY.SEOYPDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOYSDEU

EOY.SEOYSDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOYTDEU

EOY.SEOYTDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

SEOYXDEU

EOY.SEOYXDEU

Target

BookManager READ German

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SEOXIESP

EOY.SEOXIESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOXOESP

EOY.SEOXOESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOX1ESP

EOY.SEOX1ESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOX2ESP

EOY.SEOX2ESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOX3ESP

EOY.SEOX3ESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOX4ESP

EOY.SEOX4ESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOYBESP

EOY.SEOYBESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOYGESP

EOY.SEOYGESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOYLESP

EOY.SEOYLESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOYMESP

EOY.SEOYMESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOYPESP

EOY.SEOYPESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOYSESP

EOY.SEOYSESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOYTESP

EOY.SEOYTESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

SEOYXESP

EOY.SEOYXESP

Target

BookManager READ Spanish

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SEOXIITA

EOY.SEOXIITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOXOITA

EOY.SEOXOITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOX1ITA

EOY.SEOX1ITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOX2ITA

EOY.SEOX2ITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOX3ITA

EOY.SEOX3ITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOX4ITA

EOY.SEOX4ITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOYBITA

EOY.SEOYBITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOYGITA

EOY.SEOYGITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOYLITA

EOY.SEOYLITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOYMITA

EOY.SEOYMITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOYPITA

EOY.SEOYPITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOYSITA

EOY.SEOYSITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOYTITA

EOY.SEOYTITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

SEOYXITA

EOY.SEOYXITA

Target

BookManager READ Italian

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SEOXIPTB

EOY.SEOXIPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOXOPTB

EOY.SEOXOPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOX1PTB

EOY.SEOX1PTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOX2PTB

EOY.SEOX2PTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOX3PTB

EOY.SEOX3PTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOX4PTB

EOY.SEOX4PTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOYBPTB

EOY.SEOYBPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOYGPTB

EOY.SEOYGPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOYLPTB

EOY.SEOYLPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOYMPTB

EOY.SEOYMPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOYPPTB

EOY.SEOYPPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOYSPTB

EOY.SEOYSPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOYTPTB

EOY.SEOYTPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

SEOYXPTB

EOY.SEOYXPTB

Target

BookManager READ Brazilian Portuguese

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SEOXIFRC

EOY.SEOXIFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOXOFRC

EOY.SEOXOFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOX1FRC

EOY.SEOX1FRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOX2FRC

EOY.SEOX2FRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOX3FRC

EOY.SEOX3FRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOX4FRC

EOY.SEOX4FRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOYBFRC

EOY.SEOYBFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOYGFRC

EOY.SEOYGFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOYLFRC

EOY.SEOYLFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOYMFRC

EOY.SEOYMFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOYPFRC

EOY.SEOYPFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOYSFRC

EOY.SEOYSFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOYTFRC

EOY.SEOYTFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

SEOYXFRC

EOY.SEOYXFRC

Target

BookManager READ Canadian French

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SEOXIDAN

EOY.SEOXIDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOXODAN

EOY.SEOXODAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOX1DAN

EOY.SEOX1DAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOX2DAN

EOY.SEOX2DAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOX3DAN

EOY.SEOX3DAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOX4DAN

EOY.SEOX4DAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOYBDAN

EOY.SEOYBDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOYGDAN

EOY.SEOYGDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOYLDAN

EOY.SEOYLDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOYMDAN

EOY.SEOYMDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOYPDAN

EOY.SEOYPDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOYSDAN

EOY.SEOYSDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOYTDAN

EOY.SEOYTDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

SEOYXDAN

EOY.SEOYXDAN

Target

BookManager READ Danish

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SIOEHJPN

IOE.SIOEHJPN - Japanese

Target

DFS/SMB

z/OS V2R4

Element was removed from z/OS

SIOEHLIB

usr/lpp/dfs/global/lib/IBM/

Target

DFS/SMB

z/OS V2R4

Element was removed from z/OS

SIOEHSAM

usr/lpp/dfs/global/examples/IBM/

Target

DFS/SMB

z/OS V2R4

Element was removed from z/OS

SIOEHSHL

usr/lpp/dfs/global/scripts/IBM/

Target

DFS/SMB

z/OS V2R4

Element was removed from z/OS

SIOEHSRC

usr/lpp/dfs/global/src/IBM/

Target

DFS/SMB

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SAOPICSE

/usr/lpp/Printsrv/InfoprintCentral/Scripts/nls/IBM/

Target

Infoprint Server

z/OS V2R4

Function was removed from the z/OS element.

SAOPICSJ

/usr/lpp/Printsrv/InfoprintCentral/Scripts/nls/ja/IBM/

Target

Infoprint Server

z/OS V2R4

Function was removed from the z/OS element.

SAOPICXC

/usr/lpp/Printsrv/InfoprintCentral/xsl/Controls/IBM/

Target

Infoprint Server

z/OS V2R4

Function was removed from the z/OS element.

SAOPICXP

/usr/lpp/Printsrv/InfoprintCentral/xsl/Page/IBM/

Target

Infoprint Server

z/OS V2R4

Function was removed from the z/OS element.

 

 

 

 

 

 

SISPGDES

ISP.SISPGDES

Target

ISPF - Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

SISPMDES

ISP.SISPMDES

Target

ISPF - Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

SISPPDES

ISP.SISPPDES

Target

ISPF - Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

SISPSDES

ISP.SISPSDES

Target

ISPF - Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

SISPTDES

ISP.SISPTDES

Target

ISPF - Swiss German

z/OS V2R4

FMID was withdrawn from z/OS

SISPGDEU

ISP.SISPGDEU

Target

ISPF - German

z/OS V2R4

FMID was withdrawn from z/OS

SISPMDEU

ISP.SISPMDEU

Target

ISPF - German

z/OS V2R4

FMID was withdrawn from z/OS

SISPPDEU

ISP.SISPPDEU

Target

ISPF - German

z/OS V2R4

FMID was withdrawn from z/OS

SISPSDEU

ISP.SISPSDEU

Target

ISPF - German

z/OS V2R4

FMID was withdrawn from z/OS

SISPTDEU

ISP.SISPTDEU

Target

ISPF - German

z/OS V2R4

FMID was withdrawn from z/OS

 

 

 

 

 

 

SEPHBOOK

/usr/lpp/booksrv/books/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHCASE

/usr/lpp/booksrv/cases/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHCLIB

EPH.SEPHCLIB

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHGIF

/usr/lpp/booksrv/public/bookmgr/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHLOAD

/usr/lpp/booksrv/cgi-bin/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHPLIB

/usr/lpp/booksrv/plugins/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHPUB

/usr/lpp/booksrv/public/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHSAMP

EPH.SEPHSAMP

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHSHLF

/usr/lpp/booksrv/public/bookmgr/shelves/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHSRVR

/usr/lpp/booksrv/public/bookmgr/libraryserver/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHTAB

EPH.SEPHTAB

Target

Library Server

z/OS V2R4

Element was removed from z/OS

SEPHTPLT

/usr/lpp/booksrv/public/bookmgr/templates/IBM/

Target

Library Server

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

SIOAIBIN

IOA.SIOAIBIN

Target

OSA/SF

z/OS V2R4

Element was removed from z/OS

SIOALMOD

IOA.SIOALMOD

Target

OSA/SF

z/OS V2R4

Element was removed from z/OS

SIOAMMOD

IOA.SIOAMMOD

Target

OSA/SF

z/OS V2R4

Element was removed from z/OS

SIOASAMP

IOA.SIOASAMP

Target

OSA/SF

z/OS V2R4

Element was removed from z/OS

SIOAJAVA

IOA.SIOAJAVA

Target

OSA/SF

z/OS V2R4

Element was removed from z/OS

 

 

 

 

 

 

CHSLIB

SYS1.CHSLIB

Target

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

ICQPABTX

ICQ.ICQPABTX

Target

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

ICQPCLIB

ICQ.ICQPCLIB

Target

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

ICQPILIB

ICQ.ICQPILIB

Target

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

ICQPMLIB

ICQ.ICQPMLIB

Target

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

ICQPPLIB

ICQ.ICQPPLIB

Target

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

ICQPTABL

ICQ.ICQPTABL

Target

TSO/E Chinese

z/OS V2R4

FMID was withdrawn from z/OS

GERLIB

SYS1.GERLIB

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

GHELP

SYS1.GHELP

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

ICQGABTX

ICQ.ICQGABTX

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

ICQGCLIB

ICQ.ICQGCLIB

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

ICQGILIB

ICQ.ICQGILIB

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

ICQGMLIB

ICQ.ICQGMLIB

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

ICQGPLIB

ICQ.ICQGPLIB

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

ICQGTABL

ICQ.ICQGTABL

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

MSGDEU

SYS1.MSGDEU

Target

TSO/E German

z/OS V2R4

FMID was withdrawn from z/OS

 

 

 

 

 

 

SFSUMCHS

/usr/lib/nls/msg/Zh_CN/IBM/

Target

z/OS UNIX

z/OS V2R4

FMID is withdrawn from z/OS

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.1.2.15 : Add references to new data sets and paths


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

New data sets and paths are routinely added to z/OS for reasons such as consolidation of data sets and addition of new elements and features. You must determine whether these additions affect your environment.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Using the tables in this workflow step as a guide, add references in the following places for data sets and paths that have been added to z/OS:

  • Parmlib
  • Proclib
  • Logon procedures
  • Catalogs
  • Security definitions, including program control definitions
  • DFSMS ACS routines
  • /etc/profile
  • SMP/E DDDEF entry
  • Backup and recovery procedures, as well as any references to them

Restriction: Some of the data sets shipped with z/OS are PDSEs and are most likely in your LNKLST. If one or more are in your LNKLST and on your system residence volume, adhere to the following PDSE sharing rules to avoid data set corruption:

  • If you specified PDSESHARING(NORMAL), do not share PDSE data sets beyond the scope of the global resource serialization complex.
  • If you specified PDSESHARING(EXTENDED), do not share PDSE data sets beyond the scope of the sysplex.

In the tables that follow, the data sets are identified as distribution library (DLIB) data sets or target library data sets.


The following table lists the data sets that were added to z/OS V2R5. The data sets are listed in alphabetic order by DDDEF name.

Data sets that were added to z/OS V2R5 (in alphabetic order by DDDEF name)

DDDEF

Data set name (high-level qualifiers are defaults) or path

DLIB or target

To element or feature

When added

Why added

AERBMOD2

SYS1.AERBMOD2

DLIB

RMF

z/OS V2R5

New feature in z/OS V2R5

AGRBCLS

SYS1.AGRBCLS

DLIB

z/OS Data Gatherer

z/OS V2R5

Element was added to z/OS

AGRBMAC1

SYS1.AGRBMAC1

DLIB

z/OS Data Gatherer

z/OS V2R5

Element was added to z/OS

AGRBMOD1

SYS1.AGRBMOD1

DLIB

z/OS Data Gatherer

z/OS V2R5

Element was added to z/OS

SAOPICSM

/usr/lpp/Printsrv/InfoprintCentral/samples/IBM/

Infoprint Server

z/OS V2R5

New path in z/OS V2R5

SERBLNKE

SYS1.SERBLNKE

Target

RMF

z/OS V2R5

New feature in z/OS V2R5

SGRBLINK

SYS1.SGRBLINK

Target

z/OS Data Gatherer

z/OS V2R5

Element was added to z/OS

SGRBCLS

SYS1.SGRBCLS

Target

z/OS Data Gatherer

z/OS V2R5

Element was added to z/OS

SGRBLPA

SYS1.SGRBLPA

Target

z/OS Data Gatherer

z/OS V2R5

Element was added to z/OS



The following table lists the data sets that were added to z/OS V2R4. The data sets are listed in alphabetic order by DDDEF name.

Data sets that were added to z/OS V2R4 (in alphabetic order by DDDEF name)

DDDEF

Data set name (high-level qualifiers are defaults) or path

DLIB or target

To element or feature

When added

Why added

AAZDFFS

AZD.AAZDFFS

DLIB

z/OS Container Extensions (zCX)

V2R4

Element was added to z/OS

ABPNLIB

SYS1.BPN.ABPNLIB

DLIB

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

ABPNEXEC

SYS1.BPN.ABPNEXEC

DLIB

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

ABPNSAMP

SYS1.BPN.ABPNSAMP

DLIB

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

ABPNCFG

SYS1.BPN.ABPNCFG

DLIB

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

ABPNPNL

SYS1.BPN.ABPNPNL

DLIB

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

SAZDFFS

/usr/lpp/zcx_zos/IBM/

Target

z/OS Container Extensions (zCX)

V2R4

Element was added to z/OS

SBPNLOAD

SYS1.BPN.SBPNLOAD

Target

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

SBPNEXEC

SYS1.BPN.SBPNEXEC

Target

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

SBPNSAMP

SYS1.BPN.SBPNSAMP

Target

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

SBPNCFG

SYS1.BPN.SBPNCFG

Target

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

SBPNPNL

SYS1.BPN.SBPNPNL

Target

z/OS Authorized Code Scanner (zACS)

V2R4

Feature was added to z/OS

/usr/include/zos

Target

BCP

V2R4

New C header path

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.1.2.16 : Accommodate new address spaces


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The MAXUSER value in parmlib member IEASYSxx specifies a value that the system uses to limit the number of jobs and started tasks that can run concurrently during a particular IPL. To accommodate the new address spaces in this release, you might want to increase your MAXUSER value.

The following elements are features are new in z/OS V2R4:

  • The IBM z/OS Authorized Code Scanner (zACS). This new priced feature is used for testing PC and SVC routines to determine whether they create security vulnerabilities.
  • z/OS Container Extensions (zCX). This new element provides the runtime support for deploying and running Linux on IBM Z applications that are packaged as Docker Container images on z/OS.

The following address spaces were added in z/OS V2R4:

  • BPNZACS is the zACS address space.
  • zCX creates one address space for each provisioned server that is started by the user.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

  • IBM z/OS Authorized Code Scanner (zACS)
  • z/OS Container Extensions (zCX)

When change was introduced:

  • z/OS V2R4 for the following:
    • zACS
    • ZCX

Applies to upgrade from:

z/OS V2R3 (zACS and zCX) and z/OS V2R4 (zACS).

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended to ensure that the MAXUSER parameter in parmlib member IEASYSxx is set to an adequate value.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If necessary, increase your MAXUSER value in parmlib member IEASYSxx to accommodate the new address spaces. One way to determine how many address spaces you use is to enter the DISPLAY A,L command. Then, add the number of address spaces in the output messages CNZ4015I and CNZ4016I on the old and new systems to determine the total number.

Notes:

  • A modest over-specification of MAXUSER should not affect system performance.
  • The number of total address spaces is the sum of M/S, TS USERS, SYSAS, and INITS.
  • If you change the MAXUSER value, you must re-IPL to make the change effective.

Reference information

For more information about the MAXUSER parameter, see z/OS MVS Initialization and Tuning Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2 : Hardware upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes hardware upgrade actions. The information in this topic is not specifically related to upgrading to z/OSV2R5; it applies only if you are changing hardware. Therefore, this topic does not categorize the actions in terms of when they should be performed (before installing, before the first IPL, or after the first IPL).


Step 3.2.1 : Upgrade to an IBM z16™ server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

Description

The newest member of the IBM Z® family, IBM z16™ fits seamlessly in your cloud data center, with industry standard sizing, power, and networking. The system features the IBM Telum Processor with its dedicated on-chip accelerator for AI inference to enable real time artifical intelligence embedded directly in transactional workloads, as well as improvements for performance, security, and availability.

The IBM z16™ builds on the IBM Z platform traditional strengths in security, resiliency, performance, and scale, and extends these capabilities with breakthrough technologies, such as:

  • On-chip artifical intelligence (AI)
  • Quantum-safe technologies, crypto discovery tools, and end-to-end data encryption, to protect against future attacks
  • Continuous compliance solution to help keep up with changing regulations, reducing cost and risk
  • Consistent cloud experience to enable accelerated modernization, rapid delivery of new services and end-to-end automation
  • New options in flexible and responsible consumption to manage system resources across geographical locations, and with sustainability built in across its lifecycle.

The IBM z16™ uses a 19-inch form factor and industry-standardized power and networking hardware. The system is configurable as a one-to-four 19-inch frame system, which easily aligns with the modern cloud data center.

The IBM z16™ server is one hardware model (A01) and machine type (3931), with five feature codes to represent the processor capacity. The feature codes are 0667, 0668, 0668, 0669, and 0670 with (respectively) 39, 82, 125, 168, and 200 processors.

z/OS base support for specific IBM z16™ functions depends on the z/OS release. Not all IBM z16™ functions are available in every z/OS release, as shown in the tables that follow.

Many functions are enabled or disabled, based on the presence or absence of the required hardware and software. If you plan to use new IBM z16™ functions, you can install the software and hardware in either order. That is, there is no requirement to install either software or hardware first to use a specific function. However, because of outage windows and testing considerations, you might want to consider installing all of the software and PTFs required for the machine and the functions you plan to use first. Then, upgrade the hardware and, finally, update your customization to use the new functions.

z/OS base support for specific IBM z16™ functions

Table 1 summarizes the z/OS base support for specific IBM z16™ functions, by z/OS release. Functions are either supported in the base operating system (Yes or No), or require a PTF (PTF) or a web deliverable (web).

Note: The IBM z16™ server supports z/OS V2R5, z/OS V2R4, and z/OS V2R3. Most IBM z16™ functions are supported on z/OS V2R2 systems with the purchase of an extended support contract for IBM Software Support Services and PTFs (see the Table Notes). Earlier releases, such as z/OS V2R1, are not supported for use with an IBM z16™.

Table 1. IBM z16™ server functions included in the base support for z/OS releases V2R2 through V2R5.

IBM z16™ function included in base z/OS support (Y/N)

V2R22

V2R32

V2R42

V2R52

Base support 1

PTF

PTF

PTF

Yes, and in PTFs

Coupling Facility code level 25 (CFLEVEL 25) recovery for non-retriable CF commands 1.

PTF

PTF

PTF

PTF

IBM Z Integrated Accelerator for AI (AIU) enablement.

No

No

PTF

Yes

FICON® Express32S (CHPID type FC) when using FICON or channel-to-channel (CTC)

  • FICON Express32S LX
  • FICON Express32S SX

PTF

PTF

PTF

Yes

OSA-Express7S 1.2 Gigabit Ethernet (GbE)

  • OSA-Express7S 1.2 GbE LX (CHPID type OSC or OSD)
  • OSA-Express7S 1.2 GbE SX (CHPID type OSC or OSD)
  • OSA-Express7S 1.2 10 GbE LR (CHPID type OSD)
  • OSA-Express7S 1.2 10 GbE SR (CHPID type OSD)
  • OSA-Express7S 1.2 25 GbE SR1 (CHPID type OSD)
  • OSA-Express7S 1.2 25 GbE LR1 (CHPID type OSD)

PTF

PTF

PTF

Yes

OSA-Express7S 1.2 1000BASE-T Ethernet (CHPID type OSC or OSD)

PTF

PTF

PTF

Yes

Table Notes:
  1. For z/OS V2R2 systems, this support requires the purchase of an extended support contract for IBM Software Support Services, plus PTFs.

  2. For base support PTFs, see the fix category (FIXCAT) IBM.Device.Server.z16-3931.RequiredService, plus the FIXCATs for earlier processors.

IBM z16™ functions available for exploitation by z/OS release

The exploitation of specific IBM z16™ server functions depends on the z/OS release. Functions are either supported in the base operating system (Yes or No), or require a PTF (PTF) or a web deliverable (web).

Some functions have upgrade or exploitation considerations. Information about the applicable upgrade actions is provided in the workflow steps and substeps for "Actions you can take before you order an IBM z16™ server." and "Actions you can take after installing an IBM z16™ server."

For information about finding the appropriate PTFs, see the workflow step "Actions you can take before you order an IBM z16™ server." For information about z/OS V2R2 support, see the Notes at the bottom of the table.

Table 2. Exploitation of the IBM z16™ server functions by z/OS release.

IBM z16™ function

V2R22

V2R32

V2R42

V2R52

Maximum number of processors that is configurable per server:

  • Up to 200 processors can be configured as CPs, zIIPs, IFLs, ICFs, or optional SAPs.

  • The sum of CPs and zIIPs configured in a single z/OS LPAR cannot exceed:
    • 200 on z/OS V2R2 or later in non-SMT mode.
    • 128 cores/256 threads on z/OS V2R2 or later in SMT mode.

Yes

Yes

Yes

Yes

Two-way simultaneous multithreading (SMT) for zIIPs, IFLs, ICFs, or SAPs.

Yes

Yes

Yes

Yes

Maximum number of channel subsystems (CSS) that can be configured per server.

  • Up to six channel subsystems
  • Four subchannel sets per CSS.

Yes

Yes

Yes

Yes

Up to 40 TB of Redundant Array of Independent Memory (RAIM) per server.

Yes

Yes

Yes

Yes

Up to 16 TB per z/OS LPAR through usage of the 2 GB large frame area (LFAREA). 3

No

No

No

Yes

Up to 4 TB per z/OS LPAR.

Yes

Yes

Yes

Yes

Up to 85 LPARs can be configured per server.

Yes

Yes

Yes

Yes

CPU measurement facility new extended counters

No

PTF

PTF

Yes

New IBM z16™ machine instructions (assembly language support) 1

PTF

PTF

PTF

PTF

z/OS Data Gatherer core topology metrics for logical partitions and physical processors.

No

PTF

PTF

PTF

System Recovery Boost:
New boosts for recovery and diagnostic events.

No

No

PTF

PTF

System Recovery Boost:
Enhancements for display and monitoring.

PTF

PTF

PTF

PTF

Crypto Express8S toleration

Yes

Yes

Yes

Yes

Crypto Express8S support of Quantum Safe algorithms

Web: Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCR77D1) and PTFs

Web: Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCR77D1) and PTFs

Web: Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCR77D1) and PTFs

PTF

Crypto Express8S support of VISA Format Preserving Encryption (VFPE)

Yes

Yes

Yes

Yes

Crypto Express8S support of PCI-HSM compliance

Web: Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCR77D1)

Web: Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCR77D1)

Web: Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCR77D1)

PTF

25 GbE RoCE Express3 for Shared Memory Communications - Remote Direct Memory Access (SMC-R)

No

PTF

PTF

Yes

IBM Open XL C/C++ for z/OS

No

No

Web

Web

Coupling Facility code level 25 (CFLEVEL 25).

Includes support for:

  • Structure Full recovery processing can be reserved for use after a structure full condition occurs
  • Additional cache structure metrics.

No

PTF

PTF

PTF

Coupling Express2 LR (CX6-DX) adapter

PTF

PTF

PTF

Yes

Support for 384 Coupling CHPIDs, 96 physical ICA SR coupling links, and 64 ICP internal coupling channels

Yes

Yes

Yes

Yes

Support for High-Performance FICON (zHPF) single-track or multitrack operations (CHPID type FC)

PTF

PTF

PTF

PTF

CHPID type OSC supporting TN3270E and non-SNA DFT

Yes

Yes

Yes

Yes

CHPID type OSD with exploitation of two ports per CHPID

Yes

Yes

Yes

Yes

CHPID type OSD without maximum port exploitation (one port on the PCIe adapter is available for use)

Yes

Yes

Yes

Yes

CHPID type OSE supporting 4 or 2 ports per feature

Yes

Yes

Yes

Yes

FICON Express32 (CHPID type FC) when using FICON or channel-to-channel (CTC)

PTF

PTF

PTF

PTF

FICON Express32 (CHPID type FC) for support of zHPF single track or multi-track operations

PTF

PTF

PTF

PTF

Checksum offload for IPV6 packets (CHPID type OSD) 1

Yes

Yes

Yes

Yes

Checksum offload for LPAR-to-LPAR traffic for IPv4 and IPV6 packets (CHPID type OSD) 1

Yes

Yes

Yes

Yes

Large Send for IPV6 packets (CHPID type OSD) 1

Yes

Yes

Yes

Yes

IBM Integrated Coupling Adapter (ICA SR1.1) Fanout (CHPID type CS5)

Yes

Yes

Yes

Yes

zHyperLink Express1.1 Reads support

PTF

PTF

PTF

Yes

zHyperLink Express1.1 Writes support

PTF

PTF

PTF

Yes

IBM Fibre Channel Endpoint Security 1

PTF

PTF

PTF

Yes

Table Notes:
  1. For z/OS V2R2 systems, this support requires the purchase of an extended support contract for IBM Software Support Services, plus PTFs.

  2. PTFs have the following fix categories:
    • For required service, use FIXCAT value IBM.Device.Server.z16-3931.RequiredService and the FIXCATs for earlier processors.
    • Exploitation of many functions is provided by PTFs; use FIXCAT value IBM.Device.Server.z16-3931.Exploitation
    • For recommended service, use FIXCAT value IBM.Device.Server.z16-3931.RecommendedService

  3. Starting with z/OS V2R5, z/OS supports an architectural limit of 16 terabytes (TB) of processor storage per LPAR. If more than 4 terabytes (4 TB) is defined to a z/OS LPAR, all memory beyond 4 TB is taken from the 2 GB large frame area. For information about the large frame area and the associated LFAREA parameter, see z/OS MVS Initialization and Tuning Reference. Earlier supported releases of z/OS support up to 4 TB of processor storage per LPAR.
  4. .

Web deliverables are available from the z/OS downloads page at z/OS downloads.

Table 3 provides more details about this upgrade action. Use this information to plan your changes to the system.

Table 3. Information about this upgrade action

Element or feature:

Multiple.

When change was introduced:

IBM z16™, which is available May, 2022.

Applies to upgrade from:

z/OS V2R5, z/OS V2R4, and z/OS V2R3.

Timing:

Before you introduce an IBM z16™ server into your environment.

Is the upgrade action required?

Yes, if you want to run z/OS V2R5, z/OS V2R4, or z/OS V2R3 on an IBM z16™ server, or if you want to run a coupling facility on an IBM z16™ server. If you plan to run only a coupling facility on an IBM z16™ system, only the sysplex-related actions are relevant. However, you must install the appropriate z/OS service for systems that are running on other servers that use the IBM z16™ coupling facilities.

Target system hardware requirements:

The IBM z16™ server requires IBM Hardware Management Console (HMC) 2.16.0, plus required microcode change levels (MCLs) and the Support Element Version 2.16.0. The IBM Z Hardware Management Appliance feature code 0129 can be ordered to provide HMC/SE functions within the CPC frame, eliminating the need for separate HMCs outside of the frame.

z/OS requires a minimum of 8 GB of memory to IPL. When running as a z/VM guest or on an IBM Z® Personal Development Tool (zPDT), z/OS requires a minimum of 2 GB of memory. If the minimum is not met, a warning WTOR is issued at IPL.

Additional hardware is required for specific functions:

  • IBM devices that are attached to z15, z14, and z14 ZR1 servers are supported for attachment to the IBM z16™ channels, unless otherwise noted. The subject I/O devices must meet FICON architecture requirements.

  • If you plan to enable the temporary activation of additional physical zIIP processors to be used with System Recovery Boost, you require the following feature codes:
    • Boost Authorization feature (FC #9930)
    • System Recovery Boost Record feature (FC #6802).

  • IBM Virtual Flash Memory requires FC #0644.

  • New RoCE Express3 adapters require the following feature codes:
    • 10 GbE RoCE Express3 SR requires FC #0440.
    • 10 GbE RoCE Express3 LR requires FC #0441.
    • 25 GbE RoCE Express3 SR requires FC #0452.
    • 25 GbE RoCE Express3 LR requires FC #0453.

  • New OSA-Express7S 1.2 adapters require the following feature codes:
    • OSA-Express7S 1.2 GbE LX requires FC #0454
    • OSA-Express7S 1.2 GbE SX requires FC #0455
    • OSA-Express7S 1.2 10 GbE LR requires FC #0456
    • OSA-Express7S 1.2 10 GbE SR requires FC #0457
    • OSA-Express7S 1.2 1000BASE-T requires FC #0458.

  • New FICON Express32 cards require the following feature codes:
    • FICON Express32 LX requires FC #0461
    • FICON Express32 SX requires FC #0462.

  • Coupling Express2 LR requires FC #0434.

  • IBM Integrated Coupling Adapter (ICA SR1.1) requires FC #0176.

  • zHyperLink Express1.1 requires FC #0451.

  • New Crypto Express8S adapters require the following feature codes:
    • Crypto Express8S (1 HSM) requires FC #0908
    • Crypto Express8S (2 HSM) requires FC #0909.

  • Use of hardware acceleration for cryptographic operations, including the use of Visa, Inc. Data Secure Platform (DSP) functions, requires CP Assist for Cryptographic Function (CPACF) (#3863). See Table Note 1.

  • Use of a new Trusted Key Entry (TKE) workstation requires TKE Rack Mount (FC #0057). The TKE workstation is a combination of hardware and software, with other features required, depending on which functions you plan to use. Different feature codes are required if you are upgrading an existing TKE workstation from an earlier server.

  • TKE 10.0 is required if you want to manage Crypto Express8S using the TKE. A TKE is required to manage any Crypto Express feature that runs in IBM Enterprise PKCS #11 (EP11) mode. CCA in PCI-HSM mode and EP11 also require a smartcard reader, plus FIPS certified smart cards.

Target system software requirements:

For more information, see the workflow step "Support is delivered by service, z/OS features, and web deliverables". You install the required service updates on your system when you perform the workflow step "Install the necessary z/OS service".

Other system (coexistence or fallback) requirements:

Observe the following considerations:

  • It is recommended that you install and run the required service on your existing server. This action enables you to fall back from a hardware perspective, yet maintain your software level.

  • If you have not installed the preconditioning and exploitation PTFs for coupling facility code level (CFLEVEL) 18-24, be aware that those PTFs are required to be installed throughout your sysplex before you implement CFLEVEL 25. For required service, use FIXCAT value "IBM.Device.Server.z16-3931.RequiredService".

  • No ICSF coexistence PTFs are necessary for the IBM z16™ server. However, if you are using ICSF and plan to share keys with a z/OS system that uses an earlier level of ICSF, you must install the ICSF coexistence PTFs on the earlier level of ICSF. To identify the ICSF coexistence PTFs, see the workflow step "Determine the level of cryptographic support you require on an IBM z16™ server" for the appropriate SMP/E fix category values to use.

Restrictions:

See the steps under "Restrictions for an IBM z16™ server."

System impacts:

None.

Related IBM Health Checker for z/OS check:

Use health check IBMRSM,RSM_MINIMUM_REAL, which issues a warning for a system that is configured with less than 8 GB of real memory.
Table Note:
  1. IBM Z® cryptography features include VISA Format Preserving Encryption (VFPE) technology, which forms part of the Visa, Inc. Data Secure Platform (DSP). The use of VFPE technology requires a service agreement with Visa, Inc. For details, contact your Visa account manager or Visa at P2PE@visa.com. Clients who use IBM Z® cryptography features, but do not make use of the FPE functionality, are not required to enter into any such agreement with Visa.

Steps to take

Continue your upgrade to the IBM z16™ by performing the remaining steps in this workflow.

Reference information

For more information about new functions to exploit, see the IBM z16™ Library, which is available online in Resource Link™.


Step 3.2.1.1 : Check compatibility of servers in the sysplex


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

In this step, you run a JCL job to determine whether the servers in your sysplex are compatible with the new IBM z16™ server.

A IBM z16™ server can co-exist with the following IBM Z servers in a Parallel Sysplex®:

  • Other IBM z16™ servers
  • IBM z15 (models T01 and T02)
  • IBM z14 and z14 ZR1

This requirement applies to both direct CPC-CPC connectivity and indirect connectivity anywhere in the syslex.

If you have any z/OS images or coupling facility images on a z13, z13s, or earlier server, and you plan to introduce a IBM z16™ server into the sysplex, you must move those images to a z14 or later server before you can add a IBM z16™ server to the sysplex.

Instructions:

To verify that the servers in your sysplex are compatible with the IBM z16™ server, run this job. In the job log, return code zero (0) indicates that no downlevel servers were found in the sysplex. Otherwise, you have earlier servers in the sysplex, which must be upgraded to z14 or later before you can add a IBM z16™ server to the sysplex.


Step 3.2.1.2 : General recommendations and considerations for an IBM z16™ server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

As you plan your migration to an IBM z16™ server, observe the recommendations and considerations in the steps that follow.


Step 3.2.1.2.1 : Upgrade actions for IBM servers are cumulative


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you are upgrading to an IBM z16™ server from a z15, z14, or z14 ZR1, and have performed the upgrade actions that are associated with these servers, you have fewer upgrade actions to perform than if you were to upgrade from an earlier generation server. For example, if you are upgrading from a z13 or z13s server, you should ensure that the upgrade actions described in the z14 Upgrade Workflow and z15 Upgrade Workflow are completed on your z/OS system before you use the IBM z16™ workflow.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.2.2 : Run the SMP/E REPORT MISSINGFIX command


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The base support for the IBM z16™ server is delivered through service PTFs.

To determine which PTFs are required, obtain the current enhanced HOLDDATA file, either by using the SMP/E RECEIVE ORDER command or by downloading the 2-year file and using the SMP/E RECEIVE command to process it. Then, use this workflow step to run the SMP/E REPORT MISSINGFIX command to identify the missing PTFs on your system for the IBM z16™.

The following SMP/E fix categories (FIXCATs) identify the PTF support for the IBM z16™ server:

  • Required service:  IBM.Device.Server.z16-3931.RequiredService
  • Recommended service:  IBM.Device.Server.z16-3931.RecommendedService
  • Exploitation:  IBM.Device.Server.z16-3931.Exploitation

The required service FIXCATs identify the minimum PTFs that are required to use z/OS on the IBM z16™ --- you must install these PTFs. The recommended service FIXCATs group the PTFs that the IBM Service organization recommends that you install. The exploitation FIXCATs include the new functions that are provided on the IBM z16™, which you can choose to exploit.

By default, this step runs the SMP/E REPORT MISSINGFIX command for required fixes. You can optionally include the exploitation and recommended service FIXCATs in your report.

For descriptions of the fix categories, see the Values and Descriptions page at IBM Fix Category Values and Descriptions. For more information about the REPORT MISSINGFIX command, see z/OS SMP/E Commands.

Notes:

  1. If you choose not to use the Recommended Service fix category for your server, you can find lists of the recommended PTFs in the preventive service planning (PSP) buckets for the applicable hardware and software. The PSP buckets for the IBM z16™ are identified by the upgrade name 3931DEVICE and subset name 3931/ZOS. To find the PSP buckets on the internet, search on “3931DEVICE z/OS”.

  2. Using PSP buckets and checking the status of the PTFs listed in them is more time-consuming and potentially error-prone than using REPORT MISSINGFIX with the appropriate fix category. Also, not all PTFs are documented in the IBM z16™ PSP bucket. The bucket includes only the recommended PTFs, not the required or exploitation PTFs. Therefore, it is strongly recommended that you use the SMP/E FIXCATs to verify that you have all categories of PTFs installed on your system. The SMP/E FIXCAT process is easier and potentially more accurate than using the PSP bucket to manually verify that your system includes all needed PTFs.

Instructions:

This step is used to verify that the required PTFs are installed on your system. You must specify the target zone and CSI data set for the SMP/E REPORT MISSINGFIX to run against. By default, this step uses the RequiredService FIXCAT. You can optionally include the Exploitation and RecommendedService FIXCATs, too.


Step 3.2.1.2.3 : Install the necessary z/OS service


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Earlier in this workflow, you ran the step "Run the SMP/E REPORT MISSINGFIX command" to identify missing PTFs for the IBM z16™ server. Now use this information to install the IBM z16™ required service on your z/OS system prior to upgrading to the new server.

In a sysplex, install all required PTFs on the z/OS systems before introducing a IBM z16™ server.

Notes:

  1. Besides PTFs, exploitation of some functions might require installing a web deliverable. For example, Crypto Express8S on z/OS releases V2R2, V2R3, and V2R4 requires the Cryptographic Support for z/OS V2R2 - z/OS V2R4 (FMID HCR77D1) web deliverable. If you use this web deliverable and are sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs that are identified by the following fix category: IBM.Coexistence.ICSF.z/OS_V2R2-V2R4-HCR77D1.

    Exploitation of Crypto Express8S on z/OS release V2R5 requires PTFs only (no web deliverable).

  2. If you are exploiting the IBM z16™ capabilities by installing a web deliverable, more PTFs might be required. Follow the instructions in the Program Directory that is associated with each web deliverable to identify the required PTFs.

  3. To run z/OS V2R2 on an IBM z16™ server, you require IBM Software Support Services for extended z/OS V2R2 support.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.2.4 : Support is delivered by service, z/OS features, and web deliverables


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The base support for the IBM z16™ is delivered through service (PTFs). To determine which PTFs are required, obtain the current enhanced HOLDDATA file, either by using the SMP/E RECEIVE ORDER command or by downloading the 2-year file and using the SMP/E RECEIVE command to process it.

Then, use the SMP/E REPORT MISSINGFIX command to identify the missing PTFs on your system for the IBM z16™. For example:

				SET BDY(GLOBAL).				REPORT MISSINGFIX ZONES( target_zone)				FIXCAT(IBM.Device.Server.z16*.**).				

The following SMP/E fix categories (FIXCATs) identify the PTF support for the IBM z16™ server:

  • Required service:  IBM.Device.Server.z16-3931.RequiredService
  • Recommended service:  IBM.Device.Server.z16-3931.RecommendedService
  • Exploitation:  IBM.Device.Server.z16-3931.Exploitation

The required service FIXCATs identify the minimum PTFs that are required to use z/OS on the IBM z16™ server --- you must install these PTFs. The recommended service FIXCATs group the PTFs that the IBM Service organization recommends that you install. The exploitation FIXCATs include the new functions that are provided on the IBM z16™, which you can choose to exploit.

The preventive service planning (PSP) buckets for the IBM z16™ server are identified by the upgrade name 3931DEVICE and subset name 3931/ZOS. To find the PSP buckets on the internet, search on “3931DEVICE z/OS”.

Be aware that not all PTFs are documented in the IBM z16™ PSP bucket. The bucket includes only the recommended PTFs, not the required or exploitation PTFs. Therefore, it is strongly recommended that you use the SMP/E FIXCATs to verify that you have all categories of PTFs installed on your system. The SMP/E FIXCAT process is easier and potentially more accurate than using the PSP bucket to manually verify that your system includes all needed PTFs.

To run z/OS V2R2 on an IBM z16™ server, you require IBM Software Support Services for extended z/OS V2R2 support.

Exploitation of some functions might require installing a web deliverable. For example:

  • Exploitation of Crypto Express8S on z/OS releases V2R2, V2R3, and V2R4 requires the Cryptographic Support for z/OS V2R2 - z/OS V2R4 (FMID HCR77D1) web deliverable.

    If you use this web deliverable and are sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs that are identified by the following fix category: IBM.Coexistence.ICSF.z/OS_V2R2-V2R4-HCR77D1

    Exploitation of Crypto Express8S on z/OS release V2R5 requires PTFs only (no web deliverable).

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.2.5 : Larger coupling facility structure sizes might be necessary


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Because coupling facility structure memory size requirements often increase when you upgrade to a new coupling facility control code level (CFLEVEL), it is recommended that you evaluate your CF structure sizes as part of upgrading to CFLEVEL 25. With CFLEVEL 25, the structure size increases might be more noticeable than for some previous CFLEVEL upgrades, particularly for structures of less than 100MB in size.

If your CFLEVEL does not change, structure sizes are not expected to change when you upgrade from a previous server to a newer generation server.

In addition, ensure that the coupling facility LPAR has at least 512MB of storage.

To determine whether you must increase coupling facility structure sizes, use the web-based CF structure sizing service (https://www.ibm.com/ support/pages/cfsizer), or run the batch SIZER utility, which can be downloaded from the CF Sizer website. These tools can help you recalculate CF structure sizes for the new CFLEVEL, so that you can make the appropriate changes to your Coupling Facility Resource Management (CFRM) policy INITSIZE and SIZE specifications.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.2.6 : Use the same software level throughout a sysplex


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Having members of a sysplex at the same software level (other than during brief upgrade periods) is good software management policy.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.2.7 : Upgrade hardware and software at different times


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

To minimize the amount of change that you experience at one time, do not upgrade your software release level at the same time that you upgrade your hardware.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.2.8 : Use the latest version of SCRT


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R3, you do not need to update SCRT because it is included in the z/OS base. If you are running an earlier release of z/OS, and you use SCRT, make sure that SCRT is at the latest level. This is a requirement for sub-capacity pricing.

The latest level of SCRT for releases prior to z/OS V2R3 can be downloaded from the SCRT website at IBM Z software pricing - Licensing - Sub-capacity licensing.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.3 : Restrictions for an IBM z16™ server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

For a description of each restriction, perform the steps that follow.


Step 3.2.1.3.1 : IBM z16™ servers in a sysplex


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Observe the following considerations for adding an IBM z16™ server to a sysplex:

  • GRS supports the use of FICON CTCs for ring configurations. However, if you are currently using ESCON CTCs for GRS ring configurations within a sysplex, consider converting to GRS Star if possible, or using XCF signaling in a GRS ring configuration. XCF sysplex signaling is preferred instead of GRS CTC connections.

  • Starting with IBM z15, the IBM Z Hardware Management Appliance (FC #0100) can be ordered to provide HMC/SE functions within the CPC frame, eliminating the need for a separate HMC outside of the frame.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.3.2 : HCD and HCM support for the IBM z16™


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As with previous servers, hardware can be defined on any supported operating system and server. However, dynamic activation of new server and new adapter types should be done only on the IBM z16™ server.

The IBM z16™:

  • Supports the definition and activation of up to 85 logical partitions.
  • Supports a maximum of:
    • 32 coupling LR adapters (64 ports)
    • 4 CHPIDs per port
    • 384 coupling CHPIDs per CPC

Note: Each coupling LR adapter contains 2 ports. Each port is treated as one link.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4 : Actions you can take before you order an IBM z16™ server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

These are the upgrade actions that you perform on your current system in preparation for upgrading to the IBM z16™ server. You do not need the IBM z16™ server to make these changes, and the changes do not require the IBM z16™ server after they are made. For example, discontinuing use of hardware that is no longer supported.


Step 3.2.1.4.1 : Review the Large Systems Performance Reference (LSPR)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The Large Systems Performance Reference (LSPR) is designed to provide comprehensive z/Architecture® processor capacity ratios for different configurations of central processors (CPs) across a wide variety of system control programs and workload environments.

The LSPR is available in IBM Resource Link™ at the following site: Large Systems Performance Reference for IBM Z.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.2 : Implement an STP timing network


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM Z® servers that require time synchronization (for example, to support a base or Parallel Sysplex) must be configured in Server Time Protocol (STP) mode. This mode is designed to allow multiple servers and coupling facilities to maintain time synchronization with each other, in a coordinated timing network (CTN). STP is a hardware feature of the IBM z16™, z15, z14, and z14 ZR1; these servers must participate in an STP-only CTN.

Sysplex Timers (9037-002) are not supported on IBM z16™ or z15™ servers.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.3 : Upgrade from unsupported hardware features to newer technology


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The following hardware features are no longer available or supported on the IBM z16™ server.

These features cannot be ordered on the IBM z16™ and cannot be carried forward from an earlier server to the IBM z16™:

  • Prepaid On/Off Capacity on Demand (On/Off CoD) temporary CP resource tokens do not carry forward.

  • Internal Battery Feature (IBF), which is an internal short term uninterruptible power supply (UPS).

  • Use of the Transport Layer Security protocol versions 1.0 (TLS 1.0) and version 1.1 (TLS 1.1) for establishing secure connections to the Support Element (SE), Hardware Management Console (HMC), and Open Systems Adapter (OSA) Integrated Console Controller (channel path type OSC).

  • RoCE Express (CX3). SMC-R connections must be upgraded to use function type ROCE-2.

  • PCIe function type ROCE.

  • FICON Express 16S and FICON Express 8S

  • Coupling Express LR (CX3) must be upgraded to Coupling Express2 LR (CX6-DX)

  • Crypto Express 5S

  • OSA Express 5S features

  • OSA Express 7S 25 Gigabit Ethernet SR

Notes:

  • The IBM z16™ server requires all PCHIDs on the same FICON adapter to be the same CHPID type. It is not possible to mix FICON (FC) and FICON Channel Protocol (FCP) channels on the same FICON adapter; doing so will result in an error.

  • Starting with the IBM z15, Host Channel Adapter (Infiniband) coupling links are no longer supported. Enterprises must upgrade from HCA channels to the following types of coupling links:

    • For short-range coupling connectivity, use the IBM Integrated Coupling Adapter (ICA SR)
    • For long-range coupling connectivity, use the Coupling Express® Long Reach (CE LR) adapter.

    Servers such as the z14 or z14 ZR1 can connect to the IBM z16™ or z15 by using the ICA SR and the CE LR coupling links.

  • As of HMC version 2.15.0, new builds of the Hardware Master Console (HMC) and the Support Element (SE) no longer include a CD/DVD drive as part the HMC server hardware. Instead, the HMC provides two options for installing functional updates: USB media and electronic delivery.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.4 : Carry forward hardware features


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The following hardware features are not orderable on the IBM z16™ servers. If they are installed on your existing server at the time of an upgrade to the IBM z16™ server, they can be retained or carried forward.

  • HMC #0062 or #0082
  • HMC Rack Mount #0063 or #0083
  • HMC Table Top KMM #0148
  • HMC Rack Keyboard/Monitor/Mouse #0154
  • TKE workstation #0085 and #0086
  • TKE Rack Mount #0087, #0087, or #0145
  • TKE Rack Keyboard/Monitor/Mouse #0156
  • TKE Table Top KMM #0157
  • Internal Coupling Adapter Short Reach (ICA SR) #0172
  • PCIe+ Fanout #0175
  • ICA SR1.1 #0176
  • 10 GbE RoCE Express2 #0412
  • PCIe Interconnect Gen4 #0421
  • OSA-Express6S GbE LX #0422
  • OSA-Express6S GbE SX #0423
  • OSA-Express6S 10 GbE LR #0424
  • OSA-Express6S 10 GbE SR #0425
  • OSA-Express6S 1000BASE-T #0426
  • FICON Express16S+ LX #0427
  • FICON Express16S+ SX #0428
  • 25GbE RoCE Express2 #0430
  • zHyperLink Express #0431
  • 10GbE RoCE Express2.1 #0432
  • FICON Express16SA LX #0436
  • FICON Express16SA SX #0437
  • OSA-Express7S GbE LX #0442
  • OSA-Express7S GbE SX #0443
  • OSA-Express7S 10 GbE LR #0444
  • OSA-Express7S 10 GbE SR #0445
  • OSA-Express7S 1000BASE-T #0446
  • OSA-Express7S 25 SR1.1 #0449
  • 25 GbE RoCE Express2.1 #0450
  • zHyperLink Express1.1 #0451
  • TKE Smart Card Reader #0885 and #0891
  • TKE additional smart cards #0892 and #0900
  • Crypto Express6S #0893
  • Crypto Express7S (2 port) #0898
  • Crypto Express7S (1 port) #0899
  • Capacity for Planned Event #6833
  • Container Hosting Foundation #0104

For information about supported storage controllers, see the workflow step called "Ensure that you are using supported servers, storage controllers, and machine facilities" in the z/OS V2R5 Upgrade Workflow.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.5 : Determine the level of cryptographic support you require on the IBM z16™ server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The level of function that is provided for cryptographic support differs by z/OS release and the installed ICSF web deliverable. Also, toleration PTFs are available for some cryptographic web deliverables.

For z/OS V2R5, consider the following:

  • If you are using the level of ICSF that is shipped as part of z/OS V2R5 (FMID HCR77D2), you can use all of the functions of the Crypto Express8S feature on the IBM z16™ server.

  • Exploitation of new function is supplied by PTFs. No web deliverable is required. Install the PTFs that are identified by the SMP/E fix category for the IBM z16™ server:
    IBM.Device.Server.z16-3931.Exploitation.

  • ICSF support is required to administer a CEX8 coprocessor (which is new to the IBM z16™) using a TKE workstation. Otherwise, existing workloads will run on the IBM z16™ without requiring ICSF support.

  • If you are exploiting new Quantum Safe Algorithms and sharing a KDS in a sysplex, ensure that all ICSF PTFs are installed on all systems in the sysplex.

For z/OS V2R4, consider the following:

  • If you are using the level of ICSF that is shipped as part of z/OS V2R4 (FMID HCR77D0), you can use most functions of the Crypto Express8S feature on the IBM z16™ server.

  • ICSF Web Deliverable HCR77D1 - Cryptographic Support for z/OS V2R2 – z/OS V2R4 (FMID HCR77D1) provides some additional function and also incorporates enhancements that are available in PTFs for the base level of ICSF included in z/OS V2R4. This web deliverable includes support for:
    • Ability to use CP Assist for Cryptographic Functions (CPACF) for certain clear key ECC operations
    • CCA Release 5.5 and CCA Release 6.3

    If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs that are identified by SMP/E fix category IBM.Coexistence.ICSF.z/OS_V2R2-V2R4-HCR77D1.

For z/OS V2R3, consider the following:

  • If you are using the level of ICSF that is shipped as part of z/OS V2R3 (FMID HCR77C0), you can use most functions of the Crypto Express8S feature on the IBM z16™ server.

  • ICSF Web Deliverable HCR77D1 - Cryptographic Support for z/OS V2R2 – z/OS V2R4 (FMID HCR77D1) provides additional function and enhancements. If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs that are identified by SMP/E fix category IBM.Coexistence.ICSF.z/OS_V2R2-V2R4-HCR77D1.

  • ICSF Web Deliverable HCR77C1 - Cryptographic Support for z/OS V2R1 - z/OS V2R3 provides some additional function and also incorporates enhancements that are available in PTFs for the base level of ICSF included in z/OS V2R3.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.6 : Run the CFSIZER tool


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you are moving your coupling facilities, and the coupling facility structures are on a higher CFLEVEL than they were previously, run the Coupling Facility Structure Sizer (CFSIZER) tool to find out whether you must increase coupling facility structure sizes. Prepare to make the necessary changes to the CFLEVEL as indicated by the tool.

You can download the CFSIZER tool at: Coupling Facility sizer.

Also, see the following step in the z/OS V2R5 Upgrade Workflow:

  • "Update your CFRM policy with coupling facility structure size changes"

Note: After you make a coupling facility available on the new hardware, you can run the Sizer utility, which is an authorized z/OS program that you can use to evaluate structure size changes. The Sizer utility is distinct from CFSizer, and should be run after the new hardware (CFLEVEL) is installed, but before any CF LPAR on the new hardware is populated with structures. You can download the Sizer utility at CFSizer Alternate Sizing Techniques.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.7 : Prepare for the new machine instruction mnemonics


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The instruction set has been expanded on the IBM z16™ server, as is usual for new servers. Each machine instruction is represented by a mnemonic in Assembler language.

It is possible that the new mnemonics can match names that you chose for Assembler macro instructions. If such naming collisions occur, the Assembler default opcode table (UNI) processes new mnemonics as instructions, not as macros, after IBM z16™ required service is installed. If this situation occurs, it is likely to cause Assembler error messages and incorrect object code to be generated.

If you write programs in Assembler Language, compare the names of your existing Assembler macro instructions to the new machine instructions, to identify any such conflicts or collisions that would occur. The Assembler macro instructions are documented in z/Architecture Principles of Operation. For information about a tool to help in identifying mnemonic conflicts, see the IBM Techdocs web site under Presentations and Tools. Search for the Techdoc PRS5289.

If a conflict is identified, take one of these actions:

  • Change the name of your macro instruction.
  • Specify PARM='...OPTABLE(YOP)...' (or some other earlier opcode table).
  • Specify a separate ASMAOPT file containing assembler options such as in the previous method (this method requires no changes to source code or JCL).
  • Add as the first statement of your source program: *PROCESS OPTABLE(YOP) (or some other earlier opcode table).
  • Specify the PROFILE option either in JCL or the ASMAOPT file, and the specified or default member of the SYSLIB data set is copied into the front of the source program.
  • If you must use both a new instruction and a macro with the same name in an assembly, use a coding technique that allows the use of a new instruction and a macro with the same name in an assembly, such as HLASM mnemonic tags ( :MAC:ASM).

To help you associate the OPTABLE levels with IBM Z processor generations:

  • HLASM APAR PH39324 provides exploitation support for HLASM 1.6 (all z/OS releases), adding the new mnemonics for the IBM z16™. For example, both MACHINE(z16) and MACHINE(ARCH-14) are supported with the installation of HLASM APAR PH39324.
  • HLASM APAR PH03536 defines OPTABLE names Z9 through Z14 as synonyms for ZS3 through ZS8.
  • HLASM APAR PH00902 adds OPTABLE name Z15 and synonym ZS9.

Similarly, HLASM APAR PH00902 extended the MACHINE option to support server names, based on short forms of the IBM machine name. This APAR added support for values in the form ARCH-n, to select the table that most closely corresponds to the ARCH(n) option in IBM compilers for C, COBOL, and PL/I.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.8 : Accommodate change to dynamic dispatching options for shared-processor CFs


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Coupling Thin Interrupts enable the CF to be used for efficient processing with shared-engine coupling facilities (CFs). DYNDISP THIN uses interrupt driven CF dispatching to provide the most efficient processor sharing for CF images, and the best overall shared-processor CF performance and service times.

On z15 systems, shared-processor CF images used Thin-Interrupt-based dispatching (DCFD=THIN) by default. However, support for the older DYNDISP OFF and ON dynamic dispatching options was still available for use. With the IBM z16™, DYNDISP THIN becomes the only available dynamic dispatching option for use with shared-processor CF images.

If either DYNDISP=OFF or DYNDISP=ON is specified for use on the IBM z16™ CF image, a warning message is issued to indicate that the CF image will use DYNDISP THIN instead.

Note that for production environments, the use of dedicated-processor CF images remains highly recommended to provide the best possible CF image performance and service times.

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.9 : Learn about the new processor topology related metrics


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In the IBM z16™ server, the zArchitecture is enhanced to provide topology related metrics for logical partitions and physical processors. You might find the metrics to be useful for diagnostics and performance management.

z/OS Data Gatherer retrieves the new metrics from the IBM z16™ server and stores them in the following places:

  • SMF record type 70 subtype 1, PR/SM Logical Processor data section. This section shows the entire processor topology (logical and physical) for all LPARs for z/OS and other operating systems.

  • CPC logical processor section of Monitor III CPC data control block (ERBCPCDB)

With the new processor topology information, you can more easily correlate LPAR logical / physical processor topology changes with system performance. From one z/OS system SMF record type 70s, you can see the entire processor topology (logical and physical) for all LPARs. The record indicates whether a topology change occurred, such as a weight change, or new LPAR was added. This information allows you to correlate topology changes to variations in performance.

Alternatively, it is possible to obtain processor topology information on z14 and later servers by using either of the following approaches:

  • From the Hardware Management Console (HMC), display View Partition Resource Assignments.

  • SMF record type 99 subtype 14. However, these records must be combined manually.

As in previous releases, it is recommended that you continue to collect SMF record type 99 subtype 14 for processor topology. SMF 70, subtype 1 provides complementary information.

Note that CPU topology location related metrics are not available when z/OS runs as a guest under z/VM.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.10 : Evaluate the new extended counters in CPU Measurement Facility


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As a suggested practice, it is recommended that you gather CPU Measurement Facility counters for your IBM server. CPU Measurement Facility counters can provide you with useful information for:

  • Capacity planning
  • Performance analysis
  • Matching your production workload to the LSPR workloads

With each new IBM Z server family, the set of extended counters in CPU Measurement Facility is updated: Counters are added, removed, or relocated.

For the IBM z16, z/OS Hardware Instrumentation Services (HIS) collects z16 extended counters for performance problem diagnosis. The extended counters are prefixed with HISCTR_KEXT7_ * in the HISYCTRS mapping, which is described in the IBM publication z/OS MVS Data Areas, Volume 1.

To enable this capability, you must have HIS set up and started in each each LPAR. For instructions, see the document called "(Counters) on z/OS – Detailed Instructions," which is available on the following IBM website: CPU MF - 2022 Update and WSC Experiences.

HIS writes the extended counters in SMF record 113. Therefore, if you use the CPU Measurement Facility, it is recommended that your installation collect SMF 113 subtype 1 and 2 records. IBM also recommends that products process SMF 113 subtype 1 records when available because that is where enhancements are made. If subtype 1 records are not available, products can process subtype 2 records.

If you have programs that rely on extended counters that are changed in the IBM z16, the programs might require updates. Otherwise, if the extended counters that you use are not changed, no program changes are necessary.

Note: z/OS does not collect CPU Measurement Facility data when z/OS runs as a z/VM guest.

APAR OA60036 provides further exploitation of CPUMF

APAR OA60036 introduces changes to the Hardware Instrumentation Services (HIS) component to exploit the enhancements to the CPU Measurement Facility (CPUMF) for the IBM z16, including the following support:

  • CPUMF counter second version number (CSVN) 7. Macro HISYCTRS is updated for this support.

  • CPUMF diagnostic sample data format code 7. Macro HISYSMPX is updated for this support.

It is recommended that you apply the PTF for APAR OA60036 to have correct mapping macros for the updated extended counter set, and to collect diagnostic sample data entries of the expected length. It is further recommended that you apply service for products that interpret SMF type 113 extended counters.

CPUMF counter second version number (CSVN) 7

The CSVN is found in SMF type 113 records, in fields SMF113_1_CtrVersion2 and SMF113_2_CTRVN2.

  • Counter second version number (CSVN) 7 contains the same numbers of counts as CSVN 6 in the crypto-activity, extended, and MT-diagnostic counter sets.
  • The Crypto-activity counter set contains the same counts in CSVN 7 and CSVN 6. Equates were added for HisCtr_kCrypto7_* but these have the same descriptions as HisCtr_kCrypto6_*
  • The Extended counter set is different in z16 as it is for most servers. Equates were added for HisCtr_kExt7_*. Note that the meanings of the counts are changed from an IBM z15 and HisCtr_kExt6_*.
  • The MT-diagnostic counter set contains the same counts in CSVN 7 and CSVN 6. Equates were created for HisCtr_kMTDiag7_* but these have the same descriptions as HisCtr_kMTDiag6_*

The SMF type 113 record is not changed by APAR OA60036.

CPUMF diagnostic sample data format code 7

Hardware Instrumentation Services (HIS) can collect both basic and diagnostic samples and write this information to a file. Diagnostic samples might be requested by IBM Support for problem determination.

For the IBM z16, no changes are made to basic sampling.

For more information, see: The Load-Program-Parameter and the CPU-Measurement Facilities.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS BCP Harware Instrumentation Services.

When change was introduced:

z/OS V2R3, V2R4, V2R5, all with the PTF for APAR OA60036 installed.

Applies to upgrade from:

z/OS V2R3, V2R4, V2R5, without the PTF for APAR OA60036 installed.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended. Though the fields of SMF type 113 records are fully compatible, the values in the extended counts are different on an IBM z16 from previous machines. In addition, on an IBM z16 without the PTF for OA60036, it is possible to infer the wrong length for diagnostic sample data entries.

Target system hardware requirements:

IBM z16.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you have programs that process CPU Measurement Facility (CPUMF) values in SMF type 113 records, determine whether program changes are needed to support counter second version number (CSVN) 7:

HisCtr_kCrypto*
Programs that support constants for HisCtr_kCrypto6_* are not required to change to HisCtr_kCrypto7_*. The contents are the same in both versions.
HisCtr_kMTDiag*
Programs that support constants for HisCtr_kMTDiag6_* are not required to change to HisCtr_kMTDiag7_*. The contents are the same in both versions.
HisCtr_kExt*
Programs that support constants for HisCtr_kExt6_* must change to support HisCtr_kExt7_*. The contents are different when counts are collected from an IBM z16. These counts could be at different locations or have different meanings.
HisCtr_kVersion2_*
Determine whether changes are needed to support HisCtr_kVersion2_7.

For programs that process diagnostic samples, determine whether program changes are needed to support diagnostic sample format code 7, which adds the following fields:

  • HisSmpEntryFormat_kDiag7
  • HisSmpEntryLength_kDiag7

Also, determine whether changes are needed to support the larger length of 173 bytes, up from 165 in version 6.

Reference information

For information about the CPU Measurement Facility and how the counters can help you improve efficiency, see the documents at the following IBM website: CPU MF - 2022 Update and WSC Experiences.

See the updated macros HISYCTRS and HISYSMPX:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.11 : Accommodate the changes to the default ARCH level


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The IBM z16™ supports the new level ARCH(14), which is needed to take advantage of new or enhanced vector instructions available on the IBM z16™ in z/Architecture mode.

Application developers can recompile their applications with the ARCH 14 compiler option to instruct the compiler to generate code that uses the instructions available on the IBM z16™. This action can bring performance improvements for applications without requiring any changes to source code.

It is recommended that you upgrade to the latest compilers, which contain support for IBM z16™:

  • Enterprise COBOL Compiler 6.4
  • Enterprise PL/I Compiler 6.1
  • IBM Open XL C/C++ for z/OS, which is available as a web deliverable
  • Automatic Binary Optimizer for z/OS 2.2

The new compiliers for COBOL, PL/I, and binary optimization use the IBM z16™ facilities to:

  • Accelerate both directions of fixed/floating point conversions, which are typically found in financial applications
  • Accelerate handling of numeric editing types used for formatted numeric output
  • Enable new optimizations for the common computational type of zoned decimal in COBOL and PL/I.

The Open XL C/C++ compiler uses a new set of built-in functions (BIFs) to exploit the IBM Z Integrated Accelerator for AI (AIU) in the IBM z16™. The Open XL C/C++ compiler web download is available as a no-charge add-on for installations that have enabled the XL C/C++ compiler (an optionally priced feature) on z/OS V2R5.

For the latest offerings from the IBM XL C/C++ compiler family on z/OS, see the z/OS downloads page at z/OS downloads.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.12 : Ensure that zCX dependencies are satisfied if necessary


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

To use z/OS Container Extensions (zCX) on an IBM z14 or z15 server, you require either of the following to be installed:

  • Container Hosting Foundation hardware feature code 0104

  • Monthly Licensed Charge (MLC) product IBM Container Hosting Foundation for z/OS (product number 5655-HZ1).

On the IBM z16™ server, no hardware feature code exists for Container Hosting Foundation. Therefore, the zCX dependency must be satisfied with the installation of MLC product IBM Container Hosting Foundation for z/OS (5655-HZ1).

For information about zCX, see z/OS Container Extensions (zCX).

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.13 : Learn about IBM Z Deep Neural Network (zDNN) library enablement


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM z16™ includes the Z Integrated Accelerator for AI (zAIU), which is an on-chip accelerator for high speed inferencing. zAIU is designed to reduce the overall time required to run CPU operations for neural networking processing functions and helps to support real-time applications like fraud detection.

The IBM Z Deep Neural Network (zDNN) is an IBM standard C library that provides APIs that enable programs to accessing the zAIU. Specifically, zDNN provides software functions that enable a program to:

  • Transform tensor memory layout from standard layout to non-standard layout, which is required by NNPA.
  • Convert tensor element data type from standard types to the NNPA required DLFloat16 format.
  • Call deep learning primitives supported on NNPA.

zDNN is available on z/OS and Linux on Z distributions.

Applications that exploit zDNN must implement the DL primitives.

z/OS exploits zDNN through IBM Deep Learning Compiler, which generates a neural network (NN) model optimized library that can switch between the zAIU and normal CPU based models. The compiler generates a call to zDNN (if zAIU is present). Otherwise, it generates optimized program code using vector instructions for the model.

For example, the Db2 SQL Data Insights feature uses zAIU (through zDNN) when it is available.

zDNN is available for z/OS V2R4 and later systems with the installation of APAR nnnnnn (TBD).

For more information, see the IBM publication IBM Z Deep Neural Network Library Programming Guide and Reference.

.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.4.14 : Upgrade the I/O Configuration Program (IOCP) for IBM z16™


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

You must create a new I/O configuration data set (IOCDS) for the IBM z16™ server. It is not possible to carry forward an IOCDS from an earlier server, such as the z15 or z14.

To use the new I/O hardware that is available only on the IBM z16™, you must apply the required PTFs, which are identified by the SMP/E fix category IBM.Device.Server.z16-3931.RequiredService.

z/OS V2R5 uses the IOCP FMID HIO1105, which is new. z/OS V2R4 and earlier releases continue to use IOCP FMID HIO1104.

As with the z15 server, the IBM z16™ provides support for a maximum of 384 coupling CHPIDs per CPC/system, a maximum of 64 ICP internal coupling CHPIDs per CPC/system, and a maximum of 4 CHPIDs per coupling link port.

The IBM z16™ server:

  • Requires all PCHIDs on the same FICON adapter to be the same CHPID type. It is not possible to mix FICON (FC) and FICON Channel Protocol (FCP) channels on the same FICON adapter; doing so will result in an error.

  • Removes support for OSA-Express CHPID type OSM, FID type ROCE.

  • Removes support for PCIe function type ROCE.

For more information, see Input/Output Configuration Program User's Guide. This book is included in the IBM z16™ Library, which is available online in Resource Link™.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.5 : Actions you can take after installing an IBM z16™ server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

These are upgrade actions that you perform only after you have installed the IBM z16™ server. You need a running IBM z16™ server to perform these actions.


Step 3.2.1.5.1 : Learn about FICON Express32S


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

FICON Express32S supports a link data rate of 32 gigabits per second (Gbps) for high-speed connectivty between servers, directors, switches, and devices in a storage area network (SAN). With support for native FICON, High Performance FICON for z Systems (zHPF) architecture, and the Fibre Channel Protocol (FCP) architecture, the IBM z16™ server is designed to help you to prepare for an end-to-end 32 Gbps infrastructure to meet the lower latency and increased bandwidth demands of your applications.

The FICON Express32S LX feature is encryption capable in support of IBM Fibre Channel Endpoint Security. The FICON Express32S LX feature also supports cascading (the connection of two FICON Directors in succession) to minimize the number of cross-site connections and help reduce implementation costs for disaster recovery applications, GDPS, and remote copy.

The FICON Express32S adapter works with your existing fiber optic cabling environment, both single mode and multimode optical cables.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.5.2 : Upgrade actions for Hardware Instrumentation Services (HIS)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

New extended and crypto counters and diagnostic samples are added for the IBM z16™. If you want to enable them, you must have Hardware Instrumentation Services (HIS) set up on z/OS.

To start or stop collecting extended or crypto counters or diagnostic sampling, enter the command MODIFY HIS.

No toleration support is needed.

If you want to ignore the HIS enhancements, you might need to update your HIS profilers. For more information, see the topic about starting, configuring, and stopping hardware event data collection. in z/OS MVS System Commands.

Note: If you use the CPU Measurement Facility, IBM recommends that your installation collect SMF 113 subtype 1 and 2 records. IBM also recommends that products process SMF 113 subtype 1 records when available because that is where future enhancements are made. If subtype 1 records are not available, products can process subtype 2 records.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.5.3 : Learn about the new enhancements to System Recovery Boost


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Introduced in the IBM z15 server, System Recovery Boost can provide faster operating system IPL, middleware and workload restart and recovery, and planned shutdown. System Recovery Boost works by providing additional processor capacity and parallelism during a boost period, using your installation's already-entitled CPUs and zIIPs. System Recovery Boost does this without increasing the four-hour rolling average (4HRA) IBM software billing cost or MSU consumption associated with your workload during this time.

Now, with your upgrade to an IBM z16™, IBM extends the System Recovery Boost solution with additional types of Recovery Process boosts for a new set of recovery and diagnostic events. These new boosts are available only for an IBM z16™ or later systems:

  • SVC dump boost: Boosts systems that are performing diagnostic data capture using an SVC Dump that is estimated to be over a certain size threshold. By default, no dumps are boosted, but you can configure this function for use by using the CHNGDUMP command to set a dump size threshold over which SVC Dumps will be boosted. To disable boosting, use size “NA” to request that no SVC Dumps are boosted.

    z/OS will boost both program-requested and operator-initiated SVC dumps, including those resulting from a SLIP trap.

  • Customer-identified middleware shutdown/restart boost: Boosts systems that are performing startup/restart for customer-selected started-task middleware regions. By default, no middleware regions are boosted, but you can configure this function for use by specifying which started-task middleware regions are boost-eligible by using WLM policy Classification Rules.

  • Hyperswap configuration load boost: Boosts systems that are participating in a load/reload of a HyperSwap configuration policy. The Recovery Process boost is also designed to minimize the impact of the HyperSwap configuration change processing on your running workloads and provides additional capacity for workload catch-up following the completion of the configuration change process.

As with other types of Recovery Process boosts, these boosts are limited to 30 minutes per LPAR, per day, in aggregate.

Use of the new boosts requires PTFs for z/OS V2R5 and V2R4. For the related PTFs, use the following SMP/E fix category (FIXCAT): IBM.Function.SystemRecoveryBoost.

Additional enhancements to System Recovery Boost are available in z/OS V2R5 and z/OS V2R4 systems. These enhancements are not specific to the IBM z16™ server, unless otherwise noted.

  • Support for dynamic enabling and disabling all Recovery Process boosts for better control over when to use boosts. For example, at certain times of day or under particular operating conditions. This capability is enabled through the use of a new started procedure called IEASRB:
    • To dynamically disable Recovery Process boosts, enter the command
      IEASRB,[CLASS=RP,]REQ=DISABLE|D
    • To dynamically enable Recovery Process boosts, enter the command
      S IEASRB,[CLASS=RP,]REQ=ENABLE|E

    When Recovery Process boosts are disabled, z/OS will issue messages to document boosts that did not occur because boosts are disabled.

  • Monitor and display commands for obtaining usage information about Recovery Process boosts.
    • The existing D IPLINFO,BOOST,STATE display command is enhanced to display:
      • Current Recovery Process boost enablement/disablement state–Usage of Recovery Process boost time
      • Recovery Process boost time Actual, Potential-while-enabled, and Potential regardless-of-enablement values for capacity planning purposes since IPL.

    • New Support Element / HMC display command for displaying current usage of Recovery Process boost time on a per-LPAR basis. This enhancement requires an IBM z16™ server.

    • SMF logging of Recovery Process boost usage summary information

Reference

You can learn more about System Recovery Boost at: IBM Z System Recovery Boost.

Also, see the following IBM publications:

  • IBM z15 Technical Introduction, SG24-8850
  • IBM Z Capacity on Demand User's Guide, SC28-6985-03

These books are included in the IBM z16™ Library, which is available online in Resource Link™.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.6 : Accommodate functions to be discontinued on future servers


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

The steps in this section involve changes in hardware support that could affect your environment. Make the appropriate changes, as needed.

Note: IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.


Step 3.2.1.6.1 : Prepare for the removal of support for OSE CHPID Type


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM z16™ is planned to be the last IBM Z server family to to support OSE networking channels. IBM Z support for the Systems Network Architecture (SNA) protocol being transported natively out of the server using OSA-Express 1000BASE-T adapters configured as channel type “OSE" will be eliminated after IBM z16™.

Client applications that rely on the SNA protocol and use OSE networking channels as the transport, as opposed to FICON CTC, must either migrate to TCP/IP, or the networking configuration of the operating system image must be updated to make use of some form of SNA over IP technology, where possible, such as z/OS Enterprise Extender.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.6.2 : Prepare for the removal of support for OSA Express 1000BASE-T hardware adapters


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM z16™ is planned to be the last IBM Z server to support OSA-Express 1000BASE-T hardware adapters (#0426, #0446, and #0458) on new build servers. Definition of all valid OSA CHPID types will be allowed only on OSA-Express GbE adapters. IBM plans to continue moving forward with OSA CHPID types on higher bandwidth fiber Ethernet adapters on future servers.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.6.3 : Prepare for the removal of support for legacy Capacity on Demand (CoD) automation


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM z16™ is planned to be the last IBM Z server family to support legacy Capacity on Demand (CoD) unique record type automation interfaces. It is recommended that your installation begin migrating to the new CoD flexible record structure interface.

For more information, see IBM Z Capacity on Demand User's Guide, SC28-6985-03. This book is included in the IBM z16™ Library, which is available online in Resource Link™.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.1.6.4 : Prepare for changes to the SSR onsite method for firmware updates


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM z16™ is planned to be the last IBM Z server family to support the SSR onsite method for firmware updates without the purchase of an additional premium service contract. As an alternative, IBM recommends that you use the IBM Z Remote Code Load option, which was introduced in IBM z15, and is available without an additional service contract.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2 : Upgrade to an IBM z15 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

Description

With the new IBM® z15™ (z15™) server as the infrastructure, your business has the power to optimize digital services delivery, accelerate business innovation, and ultimately improve the bottom line. The z15 can help you adapt to planned or unplanned events while keeping services and operations running smoothly and continuously, on premises or in the cloud.

The z15 ™ uses a 19-inch form factor and industry-standardized power and networking hardware. The system is configurable as a one-to-four 19-inch frame system, which easily aligns with the modern cloud data center.

The IBM z15 Model T02 (z15 T02) is the newest addition to the IBM z15 family. The z15 T02 is designed for clients who do not need the capacity of the larger T01 models.

The IBM z15 family of mainframes includes the following hardware models:

  • Model T01 (machine type 8561), with five feature codes to represent the processor capacity. The feature codes are Max34, Max71, Max108, Max145, and Max190 with (respectively) 34, 71, 108, 145, and 190. This system is configurable as a one-to-four 19-inch frame system.
  • Model T02 (machine type 8562), with five CPC size features (one or two drawers). The system is configurable as a 19-inch frame system.

In this workflow, references to "z15" pertain to all models of the IBM z15, including the z15 T02, unless otherwise noted.

z/OS base support for specific z15 functions depends on the z/OS release. Not all z15™ functions are available in every z/OS release, as shown in the tables:

  • Table 1 lists the z15 functions and indicates whether each function is included in a specific z/OS release (Yes or No), or whether the function requires a PTF (PTF) or a web deliverable (Web). For information about z/OS V2R1 support, see the Table Notes. Information about finding the appropriate PTFs is provided in the workflow step "Actions you can take before you order an IBM z15 server" and its substeps.
  • Table 2 shows a summary view of which z15 functions are available for exploitation in each z/OS release. Some functions have upgrade or exploitation considerations. Information about the applicable upgrade actions is provided in the steps and substeps for "Actions you can take before you order an IBM z15 server" and "Actions you can take after installing an IBM z15 server."

Many functions are enabled or disabled, based on the presence or absence of the required hardware and software. If you plan to use new z15 functions, you can install the software and hardware in either order. That is, there is no requirement to install either software or hardware first to use a specific function. However, because of outage windows and testing considerations, you might want to consider installing all of the software and PTFs required for the machine and the functions you plan to use first. Then, upgrade the hardware and, finally, update your customization to use the new functions.

The following table shows a summary view of which z15 server functions are included in the base support for z/OS V2R3, z/OS V2R4, and z/OS V2R5.

Table 1. z15 server functions included in the base support for z/OS V2R3, z/OS V2R4, and z/OS V2R5.

z15 function included in base z/OS support (Y/N)

V2R3 3

V2R4 3

V2R5 3

Base support ¹

PTF

Yes, and in PTFs

Yes, and in PTFs

System Recovery Boost

PTF

PTF

Yes

CPU measurement facility

PTF

PTF

Yes

FICON® Express16S+ (CHPID type FC) when using FICON or channel-to-channel (CTC) 1

  • FICON Express16S+ LX
  • FICON Express16S+ SX

PTF

Yes

Yes

New z15 machine instruction (assembly language support) 2

PTF

PTF

Yes

OSA-Express7S 1

  • OSA-Express7S GbE LX (CHPID type OSC or OSD)
  • OSA-Express7S GbE SX (CHPID type OSC or OSD)
  • OSA-Express7S 10 GbE LR (CHPID type OSD)
  • OSA-Express7S 10 GbE SR (CHPID type OSD)
  • OSA-Express7S 25 GbE SR (CHPID type OSD)

PTF

Yes

Yes

OSA-Express7S 1000BASE-T Ethernet 1 (CHPID type OSC or OSD)

PTF

Yes

Yes

CHPID type CS5 for coupling

Yes

Yes

Yes

CHPID type OSE supporting 4 or 2 ports per feature

Yes

Yes

Yes

CFCC Fair Latch Manager

PTF

PTF

Yes

Table Notes:
  1. z/OS V2R1 (compatibility only). Extended support contract for IBM Software Support Services for z/OS is required with PTFs.
  2. z/OS V2R1 with an extended support contract for IBM Software Support Services and PTFs.
  3. PTFs for base support have the following fix categories:
    • For IBM z15 Model T01, use FIXCAT value IBM.Device.Server.z15-8561.RequiredService and the FIXCATs for earlier processors.
    • For IBM z15 Model T02, use FIXCAT value IBM.Device.Server.z15T02-8562.RequiredService and the FIXCATs for earlier processors.

The exploitation of specific z15 server functions depends on the z/OS release. The following table lists the z15 functions and indicates whether each function is exploited by a specific z/OS release (Yes or No), or whether the function requires a PTF (PTF) or a web deliverable (Web). For information about finding the appropriate PTFs, see the workflow step "Actions you can take before you order an IBM z15 server." For more information about z/OS V2R1 support, see the Table Notes.

The following table shows a summary view of which z15 server functions can be exploited in z/OS V2R3, z/OS V2R4, and z/OS V2R5.

Table 2. Exploitation of z15 server functions supported by z/OS V2R3, z/OS V2R4, and z/OS V2R5.

z15 function included in base z/OS support (Y/N)

V2R3 ²

V2R4 ²

V2R5 ²

Processors: The maximum number of processors that can be configured per server.

For the z15 Model T01 (machine type 8561):

  • Up to 190 processors configurable as CPs, zIIPs, IFLs, ICFs, or optional SAPs.
  • The sum of CPs and zIIPs configured in a single z/OS LPAR cannot exceed:
    • 190 on z/OS V2R1 or later in non-SMT mode
    • 128 on z/OS V2R1 or later in SMT mode.

For the IBM z15 Model T02 (machine type 8562):

  • Up to 65 processors configurable as CPs, zIIPs, IFLs, ICFs, or optional SAPs.
  • The sum of CPs and zIIPs configured in a single z/OS LPAR cannot exceed 65 on z/OS V2R1 or later (in either SMT or non-SMT mode).

Yes

Yes

Yes

Two-way simultaneous multithreading (SMT) for zIIPs, IFLs, ICFs, or SAPs.

Yes

Yes

Yes

Channel subsystems.

The maximum number of channel subsystems (CSS) that can be configured per server.

  • For the z15 Model T01 (machine type 8561):
    • Up to six channel subsystems
    • Four subchannel sets per CSS.
  • For the z15 Model T02 (machine type 8562):
    • Up to three channel subsystems
    • Three subchannel sets per CSS.

Yes

Yes

Yes

Up to 40 TB of Redundant Array of Independent Memory (RAIM) per server. Up to 4 TB per z/OS LPAR with z/OS V2R1 or later.

Yes

Yes

Yes

2 GB Large Pages

Yes

Yes

Yes

Logical partitions.

The maximum number of logical partitions (LPARs) that can be configured per server:

  • For the z15 Model T01 (machine type 8561), up to 85 LPARs can be configured.
  • For the z15 Model T02 (machine type 8562), up to 40 LPARs can be configured.

Yes

Yes

Yes

Coupling Facility Control Code Level 24 (CFLEVEL 24). 3

Includes support for:

  • CFCC Fair Latch Manager
  • CFCC Message Path Resiliency Enhancement

PTF

PTF

Yes

Coupling Express3 (CX3) LR 3

PTF

Yes

Yes

Support for 384 Coupling CHPIDs, 96 physical ICA SR coupling links, and 64 ICP internal coupling channels 3

Yes

Yes

Yes

Support of High-Performance FICON (zHPF) single-track or multitrack operations (CHPID type FC)

PTF

PTF

Yes

CHPID type OSC supporting TN3270E and non-SNA DFT

Yes

Yes

Yes

CHPID type OSD with exploitation of two ports per CHPID

Yes

Yes

Yes

CHPID type OSD without maximum port exploitation (one port on the PCIe adapter is available for use)

Yes

Yes

Yes

CHPID type OSE supporting 4 or 2 ports per feature

Yes

Yes

Yes

FICON Express16SA (CHPID type FC) when using FICON or channel-to-channel (CTC)¹

PTF

PTF

Yes

FICON Express16SA (CHPID type FC) for support of zHPF single track or multi-track operations 1

PTF

PTF

Yes

Checksum offload for IPV6 packets (CHPID type OSD) 1

Yes

Yes

Yes

Checksum offload for LPAR-to-LPAR traffic for IPv4 and IPV6 packets (CHPID type OSD) 1

Yes

Yes

Yes

Large Send for IPV6 packets (CHPID type OSD) 1

Yes

Yes

Yes

Crypto Express7S Toleration

Yes

Yes

Yes

Crypto Express7S support of VISA Format Preserving Encryption (VFPE)

Yes

Yes

Yes

Crypto Express7S support of greater than 16 Domains

Web: Cryptographic Support for V2R2 - V2R4 (HCR77D1) with PTFs

Web: Cryptographic Support for V2R2 - V2R4 (HCR77D1) with PTFs

Yes

Crypto Express6S Exploitation

Web: Enhanced Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCD77D1)

Web: Enhanced Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCD77D1)

Yes

Crypto Express7S support of PCI-HSM compliance

Web: Enhanced Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCD77D1)

Web: Enhanced Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCD77D1)

Yes

10 GbE RoCE Express2.1 for Shared Memory Communications-Remote Direct Memory Access (SMC-R)

PTF

Yes

Yes

25 GbE RoCE Express2.1 for Shared Memory Communications - Remote Direct Memory Access (SMC-R)

PTF

Yes

Yes

IBM Integrated Coupling Adapter (ICA SR1.1) (CHPID type CS5) 3

Yes

Yes

Yes

zHyperLink Express Reads support 3

PTF

Yes

Yes

zHyperLink Express Writes support

PTF

Yes

Yes

IBM Virtual Flash Memory

Yes

Yes

Yes

IBM z/OS XL C/C++ support of the ARCH(13) and TUNE(13) parameters

No

Yes

Yes

Integrated Accelerator for z Enterprise Data Compression

PTF

PTF

Yes

IBM Fibre Channel Endpoint Security 4

Yes

Yes

Yes

IBM Z Data Privacy for Diagnostics

PTF

PTF

Yes

Quantum Safe Support

Web: Enhanced Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCD77D1) and coexistence PTFs for SMF.

Web: Enhanced Cryptographic Support for z/OS V2.2 – z/OS V2.4 (HCD77D1) and coexistence PTFs for SMF.

Yes

Table Notes:
  1. z/OS V2R1 (compatibility only). Extended support contract for IBM Software Support Services for z/OS is required with PTFs.
  2. PTFs for base support have the following fix categories:
    • For IBM z15 Model T01, use FIXCAT value IBM.Device.Server.z15-8561.RequiredService and the FIXCATs for earlier processors.
    • For IBM z15 Model T02, use FIXCAT value IBM.Device.Server.z15T02-8562.RequiredService and the FIXCATs for earlier processors.
  3. z/OS V2R1 with PTFs.
  4. IBM Fibre Channel Endpoint Security is supported on the z15 Model T01 (machine type 8561), but not on the z15 Model T02 (machine type 8562).

Web deliverables are available from the z/OS downloads page at z/OS downloads.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

IBM z15 (September 2019).

Applies to upgrade from:

z/OS V2R5, z/OS V2R4, and z/OS V2R3.

Timing:

Before you introduce a z15 server into your environment.

Is the upgrade action required?

Yes, if you want to run z/OS V2R5, z/OS V2R4, or z/OS V2R3 on a z15 server, or if you want to run a coupling facility on a z15 server. If you plan to run only a coupling facility on a z15 system, only the sysplex-related actions are relevant. However, you must install the appropriate z/OS service for systems that are running on other servers that use the z15 coupling facilities.

Target system hardware requirements:

  • z/OS requires a minimum of 8 GB of memory to IPL. When running as a z/VM guest or on an IBM Z® Personal Development Tool (zPDT), at least 2 GB is required for z/OS. If the minimum is not met, a warning WTOR is issued at IPL.
  • A z15 with Hardware Management Console (HMC) Version 2.15.0 plus microcode change levels (MCLs) and the Support Element Version 2.15.0. The IBM Z Hardware Management Appliance feature code 0100 can be ordered to provide HMC/SE functions within the CPC frame, eliminating the need for separate HMCs outside of the frame.
  • Additional hardware required for specific functions:
    • IBM devices that are attached to z14, z14 ZR1, z13, and z13s servers are supported for attachment to z15 channels, unless otherwise noted. The subject I/O devices must meet FICON architecture requirements.
    • IBM Virtual Flash Memory requires FC #0643.
    • 10 GbE RoCE Express2.1 requires FC #0432.
    • 25 GbE RoCE Express2.1 requires FC #0450.
    • New OSA-Express7S adapters require the following feature codes:
      • OSA-Express7S GbE LX requires FC #0442
      • OSA-Express7S GbE SX requires FC #0443
      • OSA-Express7S 10 GbE LR requires FC #0444
      • OSA-Express7S 10 GbE SR requires FC #0445
      • OSA-Express7S 25 GbE SR1.1 requires FC #0449
      • OSA-Express7S 1000BASE-T requires FC #0446.
      Note:

      For storage related requirements for OSA-Express7S 25GbE, refer to the topic about fixed storage considerations for OSA-Express interfaces in QDIO mode in IP Configuration Guide.

    • New FICON Express16SA cards require the following feature codes:
      • FICON Express16SA LX requires FC #0436
      • FICON Express16SA SX requires FC #0437.
    • zHyperLink Express1.1 adapter requires FC #0451.
    • Coupling Express LR requires FC #0433.
    • IBM Integrated Coupling Adapter (ICA SR1.1) requires FC #0176.
    • zHyperLink Express1.1 requires FC #0451.
    • If you plan to enable the temporary activation of additional physical zIIP processors to be used with System Recovery Boost, you require the Boost Authorization feature (FC #9930) and the Sys Recovery Boost Record feature (FC ##6802).
    • Crypto Express7S adapter: Crypto Express7S (2 port) requires FC #0898; Crypto Express7S (1 port) requires FC #0899.
    • Use of hardware acceleration for cryptographic operations, including the use of Visa, Inc. Data Secure Platform (DSP) functions requires CP Assist for Cryptographic Function (CPACF) (#3863) or a supported cryptographic feature, such as Crypto Express7S, or both. See Table Note 1.
    • Use of a new Trusted Key Entry (TKE) workstation requires TKE Rack Mount w/4768 (FC #0087) or TKE w/4768 (FC #0086). The TKE workstation is a combination of hardware and software, with other features required, depending on which functions you plan to use. Different feature codes are required if you are upgrading an existing TKE workstation from an earlier server.

      Trusted Key Entry (TKE) 9.2 License Internal Code (FC ##0881) is required if you plan to use the TKE to manage a Crypto Express7S. For example, TKE 9.2 is required to:

      • Manage any Crypto Express feature that is running in IBM Enterprise PKCS #11 (EP11) mode.
      • Manage Common Cryptographic Architecture (CCA) mode PCI-HSM settings that are available on the Crypto Express7S.

      CCA in PCI-HSM mode and EP11 also require a smart card reader (FC #0885 or #0891), plus FIPS certified smart cards (FC #0892).

Target system software requirements:

For more information, see the step "Support is delivered by service, z/OS features, and web deliverables" under "General recommendations and considerations for a z15 server." You will install the required service updates on your system when you perform the step "Install the necessary z/OS service" under "Actions you can take before you order an IBM z15 server."

Other system (coexistence or fallback) requirements:

  • The suggested practice is to install and run the required service on your existing server. This action enables you to fall back from a hardware perspective, yet maintain your software level.
  • If you have not installed the preconditioning and exploitation PTFs for CFLEVEL 17-23, note that those PTFs are required to be installed throughout your sysplex before implementing CFLEVEL 24.

    Use the appropriate fix category, as follows:

    • For IBM z15 Model T01, use FIXCAT value IBM.Device.Server.z15-8561.RequiredService
    • For IBM z15 Model T02, use FIXCAT value IBM.Device.Server.z15T02-8562.RequiredService.

  • No ICSF coexistence PTFs are necessary for the z15 models T01 or T02. However, if you are using ICSF and plan to share keys with other z/OS systems that use an earlier level of ICSF, you must install the ICSF coexistence PTFs on those earlier levels of ICSF. To identify the ICSF coexistence PTFs, see the workflow step called "Determine the level of cryptographic support you require on a z15 server" for the appropriate SMP/E fix category values to use.

Restrictions:

See the substeps in the workflow step "Restrictions for a z15 server."

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.
Table Note:
  1. IBM Z® cryptography features include VISA Format Preserving Encryption (VFPE) technology, which forms part of the Visa, Inc. Data Secure Platform (DSP). The use of VFPE technology requires a service agreement with Visa, Inc. For details, contact your Visa account manager or Visa at P2PE@visa.com. Clients who use IBM Z® cryptography features, but do not make use of the FPE functionality, are not required to enter into any such agreement with Visa.

Steps to take

Continue your upgrade to the z15 by performing the following steps in this workflow. Each step contains a number of sub-steps.

  • "General recommendations and considerations for a z15 server"
  • "Restrictions for a z15 server"
  • "Actions you can take before you order an IBM z15 server"
  • "Actions you can take after installing an IBM z15 server"
  • "Accommodate functions for the z15 to be discontinued on future servers"

Reference information

For more information about new functions to exploit, see the IBM z15 Library, which is available online in Resource Link™.


Step 3.2.2.1 : General recommendations and considerations for a z15 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

As you plan your migration to an IBM z15™ server, observe the recommendations and considerations in the steps that follow.


Step 3.2.2.1.1 : Migration actions for IBM servers are cumulative


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you upgrade to a z15™ server from a z14™ or z14 ZR1 server, and have performed the upgrade actions that are associated with the z14 or z14 ZR1, you have fewer upgrade actions than if you upgrade from an earlier generation server. Thus, if you upgrade from an earlier generation server, you might need to perform more upgrade actions. For example, if you are upgrading from a z13 and z13s server, you should perform the "z14 Upgrade Workflow" or the "Upgrade to an IBM z14 server" steps in the "z/OS V2R4 Upgrade Workflow".

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.1.2 : Support is delivered by service, z/OS features, and web deliverables


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The base support for the z15™ is delivered through service (PTFs). To determine which PTFs are required, obtain the current enhanced HOLDDATA file, either by using the SMP/E RECEIVE ORDER command or by downloading the 2-year file and using the SMP/E RECEIVE command to process it.

Then, use the SMP/E REPORT MISSINGFIX command to identify the missing PTFs on your system for the IBM z15. For example:

				SET BDY(GLOBAL).				REPORT MISSINGFIX ZONES( target_zone)				FIXCAT(IBM.Device.Server.z15*.**).				

The following SMP/E FIXCATs identify the PTF support for the IBM z15:

  • For the IBM z15 Model T01 server:
    • FIXCAT for required service is: IBM.Device.Server.z15-8561.RequiredService
    • FIXCAT for recommended service is: IBM.Device.Server.z15-8561.RecommendedService
    • FIXCAT for exploitation is: IBM.Device.Server.z15-8561.Exploitation
  • For the IBM z15 Model T02 server:
    • FIXCAT for required service is: IBM.Device.Server.z15T02-8562.RequiredService
    • FIXCAT for recommended service is: IBM.Device.Server.z15T02-8562.RecommendedService
    • FIXCAT for exploitation service is: IBM.Device.Server.z15T02-8562.Exploitation

The RequiredService FIXCATs identify the minimum PTFs that are required to use z/OS on the z15 --- you must install these PTFs. The RecommendedService FIXCATs group the PTFs that the IBM Service organization recommends that you install. The Exploitation FIXCATs include the new functions that are provided on the z15, which you can choose to exploit.

The Preventive Service Planning (PSP) buckets for the z15 servers are identified by an upgrade name and one or more subset names, as follows:

  • For the IBM z15 Model T01 server, the PSP Upgrade name is 8561DEVICE, and the z/OS support can be found in Subset 8561/ZOS.
  • For the IBM z15 Model T02 server, the PSP Upgrade name is 8562DEVICE, and the z/OS support can be found in Subset 8562/ZOS.

Exploitation of some functions requires a web deliverable. Specifically:

  • Exploitation of Crypto Express7S requires the Cryptographic Support for z/OS V2R2 - z/OS V2R4 (FMID HCR77D1) web deliverable.

    If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs identified by the following fix category: IBM.Coexistence.ICSF.z/OS_V2R2-V2R4-HCR77D1

  • If you are running z/OS V2R1 and require Crypto Express6S exploitation support for the next Generation Coprocessor support or VISA Format Preserving Encryption (FPE), you must download and install the Enhanced Cryptographic Support for z/OS V2R1-z/OS V2R3 web deliverable (FMID HCR77C0) or the Cryptographic Support for z/OS V2R1 - z/OS V2R3 web deliverable (HCR77C1).

    If you are using either of these web deliverables (HCR77C0 or HCR77C1) and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs identified by the appropriate fix category: IBM.Coexistence.ICSF.z/OS_V2R1-z/OS_V2R3-HCR77C0 or IBM.Coexistence.ICSF.z/OS_V2R1-z/OS_V2R3-HCR77C1.

  • If you are running z/OS V2R1 and require Crypto Express5S exploitation support for the next Generation Coprocessor support or VISA Format Preserving Encryption (FPE), you must download and install the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77B0) or the Cryptographic Support for z/OS V1R13 - z/OS V2R2 web deliverable (HCR77B1).

    If you are using either of these web deliverables (HCR77B0 or HCR77B1) and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs identified by the appropriate fix category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B0 or IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B1.

  • To run z/OS V2R1 on a z15™ server, you require IBM Software Support Services for extended z/OS V2R1 support.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.1.3 : Larger coupling facility structure sizes might be necessary


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

When you change the coupling facility control code level (CFLEVEL), your coupling facility structure sizes might change.

If, as part of your upgrade to a z15™ server, you change the CFLEVEL, you might have larger structure sizes than you did previously. If your CFLEVEL is identical, structure sizes are not expected to change when you upgrade from a previous server to a newer generation server.

In addition, similar to CFLEVEL 17 and later, ensure that the CF LPAR has at least 512MB of storage. CFLEVEL 24, introduced on the z15, supports the Coupling Facility use of Large Memory to improve availability for larger CF cache structures and data sharing performance with larger DB2 Group Buffer Pools (GBP). This support removes inhibitors to using large CF cache structures, enabling use of Large Memory to scale to larger DB2 Local Buffer Pools (LBP) and Group Buffer Pools (GBP) in data sharing environments.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.1.4 : Use the same software level throughout a sysplex


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Having members of a sysplex at the same software level (other than during brief upgrade periods) is good software management policy.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.1.5 : Migrate hardware and software at different times


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

To minimize the amount of change that you experience at one time, do not upgrade your software release level at the same time that you upgrade your hardware.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.1.6 : Use the latest version of SCRT


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R3, you do not need to update SCRT because it is included in the z/OS base. If you are running an earlier release of z/OS, and you use SCRT, make sure that SCRT is at the latest level. This is a requirement for sub-capacity pricing.

The latest level of SCRT for releases prior to z/OS V2R3 can be downloaded from the SCRT web site at IBM Z software pricing - Licensing - Sub-capacity licensing.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.2 : Restrictions for a z15 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

For a description of each restriction, perform the steps that follow.


Step 3.2.2.2.1 : z15 servers in a sysplex


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Be aware of the following considerations:

  • A Parallel Sysplex® that contains a z15™ server, either for a z/OS image or a coupling facility (CF) image, can contain only z13 or later servers.
  • The z15 requires ICA-SR and CE-LR fanouts. The older HCA3-O or the HCA3-O LR coupling fanouts are not supported on the z15 server.
  • Servers such as the z14, z14 ZR1, z13, or z13s, can connect to the z15 by using the Integrated Coupling Adapter Short Reach (ICA SR) and the Coupling Express Long Reach (CE LR) coupling links. Earlier systems, such as the zEC12 and zBC12, do not support ICA SR or CE LR, and therefore cannot have coupling link connectivity to the z15 server.
  • If you are running z/OS on any servers earlier than a z13 or z13s, you cannot add a z15 to that sysplex; that is, you will not be able to perform rolling IPLs to introduce a z15 server if you have any of the earlier servers as z/OS images or coupling facility images in the sysplex.
  • The earlier servers in the sysplex must be upgraded to z13 or z13s or later to have z15™ servers supported in the sysplex. If you have any z/OS images or coupling facility images on an earlier server, and you intend to introduce a z15 server into that sysplex, you must move those images to a z13 or z13s or later server before introducing the z15 server.
  • GRS supports the use of FICON CTCs for Ring configurations. However, if you are currently using ESCON CTCs for GRS ring configurations within a sysplex, consider converting to GRS Star if possible, or using XCF signaling in a GRS ring configuration. XCF sysplex signaling is preferred instead of GRS CTC connections.
  • IBM Z® servers that require time synchronization (for example, to support a base or Parallel Sysplex) must be configured in Server Time Protocol (STP) mode. STP is designed to allow multiple servers and coupling facilities to maintain time synchronization with each other, in a coordinated timing network (CTN). STP is a hardware feature of the z15, z14, z14 ZR1, z13, z13s, zEC12, and zBC12. The most recent servers (z15, z14, z14 ZR1, z13, and z13s) can participate only in an STP-only CTN.
  • Starting with IBM z15, the IBM Z Hardware Management Appliance (FC #0100) can be ordered to provide HMC/SE functions within the CPC frame, eliminating the need for separate HMCs outside of the frame.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.2.2 : HCD and HCM support for the z15


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As with previous servers, hardware can be defined on any supported operating system and server. However, dynamic activation of new server and new adapter types can be done only on z15™ and future high-end IBM Z® servers. Dynamic activation is supported on z/OS V2R1 and later releases.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3 : Actions you can take before you order an IBM z15 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

These are the upgrade actions that you perform on your current system, either because they require the current system or because they are possible on the current system. You do not need the z15™ server to make these changes, and the changes do not require the z15™ server once they are made. For example, discontinuing use of hardware that is no longer supported.


Step 3.2.2.3.1 : Review the Large Systems Performance Reference (LSPR)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The Large Systems Performance Reference (LSPR) is designed to provide comprehensive z/Architecture® processor capacity ratios for different configurations of central processors (CPs) across a wide variety of system control programs and workload environments.

The LSPR is available in IBM Resource Link™ at the following site: Large Systems Performance Reference for IBM Z.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.2 : Implement an STP timing network


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

This action is needed because Sysplex Timers (9037-002) are not supported on z15™ servers.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.3 : Upgrade from unsupported hardware features to newer technology


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

This action is needed because specific features are not available on the z15™ server.

The following hardware features are not supported on the z15™ server. They cannot be ordered on the z15 and cannot be carried forward from an upgrade on an earlier server to the z15.

  • Host Channel Adapter (HCA) for InfiniBand is no longer supported, including the following features:
    • HCA2-O and HCA2-O LR features
    • HCA3-O and HCA3-O LR features

    Enterprises must upgrade from HCA channels to one of the following coupling links:

    • For high-speed short-range coupling connectivity, the IBM Integrated Coupling Adapter (ICA SR) is a two-port, short-distance coupling fanout that uses a new coupling channel type: CS5. The ICA SR can only be used for coupling connectivity between z15, z14, z14 ZR1, z13, and z13s servers. The ICA SR fanout requires new cabling, and can connect only to another ICA SR.
    • For long-range coupling connectivity, the Coupling Express® Long Reach (CE LR) is a two-port, long-distance coupling adapter that uses a new coupling channel type: CL5. The CE LR can be used only for coupling connectivity between z15, z14, z14 ZR1, z13, and z13s servers.

    The suggested practice is to order ICA SR (#0172) or CE LR (#0433) on the z15™ servers that are used in a Parallel Sysplex to help ensure coupling compatibility with future server generations.

  • CHPID type OSN (OSA-Express for NCP) is not supported on the OSA-Express5S GbE LX feature
  • OSA-Express4S features
  • Crypto Express3 and Crypto Express4S
  • InterSystem Channel-3 (ISC-3) coupling links feature
  • FICON Express4
  • zEDC Express (FC #0420). In the z15, the compression functions are moved into the processor chip, which is referred to as IBM Integrated Accelerator for z Enterprise Data Compression (zEDC). As an integrated part of the z15™ processor chip, the Integrated Accelerator for zEDC does not require the purchase of a hardware feature or usage of I/O slots.
  • IBM Flash Express (features #0402 and #0403), which is replaced by IBM Virtual Flash Memory (VFM), starting with the z14. VFM implements Extended Asynchronous Data Mover (EADM) Architecture that uses HSA-like memory instead of Flash card pairs. No application changes are required to change from IBM Flash Express to VFM.
  • As of HMC version 2.15.0, new builds of the Hardware Master Console (HMC) and the Support Element (SE) no longer include a CD/DVD drive as part the HMC server hardware. Instead, the HMC provides two options for installing functional updates: USB media and electronic delivery. These solutions are available for:
    • Firmware for the HMC or Support Element
    • eBusiness on Demand (eBoD) records, such as On/Off Capacity on Demand (On/Off CoD)
    • Operating system code, as used for Load from Removable Media or the Server task.

    If you select to use USB media, the appropriate USB Flash Memory Drive Media is provided with the particular feature, using either of the following feature codes:

    • Feature code 0843: USB Load media that can be used for IBM Z operating system code
    • Feature code 0848: USB Backup media that can be used for an HMC or SE Critical Data Backup task.

    If USB media is not acceptable for your environment, choose electronic delivery instead. Order feature code 0846 (No Physical Media Option) and follow the instructions on how to electronically deliver the required content over the network by using any of the following options:

    • Z Remote Support Facility (zRSF)
    • IBM Resource Link
    • FTP/SFTP/FTPS Server connections from the HMC.

    For an electronic only delivery environment, two HMCs are required on every unique network subnet on which an HMC, SE, or TKE workstation is connected.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.4 : Carry forward hardware features


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The following hardware features are not orderable on z15™ servers. If they are installed on your existing server at the time of an upgrade to a z15 server, they can be retained or carried forward.

  • TKE with/4768 #0080 or #0081
  • TKE workstation #0085 and #0086
  • HMC #0082, #0083, #0095, #0096
  • HMC Rack KMM #0154
  • TKE Rack Keyboard/Monitor/Mouse #0156
  • Internal Coupling Adapter Short Reach (ICA SR) #0172
  • Fanout Airflow PCIe #0174
  • FICON Express8S 10KM LX #0409
  • FICON Express8S SX #0410
  • 10 GbE RoCE Express #0411
  • 10 GbE RoCE Express #0412
  • OSA-Express5S GbE LX #0413
  • OSA-Express5S GbE SX #0414
  • OSA-Express5S 10 GbE LR #0415
  • OSA-Express5S 10 GbE SR #0416
  • OSA-Express5S 1000BASE-T #0417
  • FICON Express16S LX #0418
  • FICON Express16S SX #0419
  • OSA-Express6S GbE LX #0422
  • OSA-Express6S GbE SX #0423
  • OSA-Express6S 10 GbE LR #0424
  • OSA-Express6S 10 GbE SR #0425
  • OSA-Express6S 1000BASE-T #0426
  • FICON Express16S+ LX #0427
  • FICON Express16S+ SX #0428
  • OSA-Express7S 25 GbE SR #0429
  • 25 GbE RoCE Express2 #0430
  • zHyperLink Express #0431
  • Coupling Express LR #0433
  • Addl smart cards #0884
  • TKE Smart Card Reader #0885
  • Crypto Express5S #0890
  • TKE Smart Card Reader #0891
  • NXP Smart Card w/FIPS #0892
  • Crypto Express6S #0893
  • 512 GB MEM DIMM(5/FEAT) #1631.

For information about supported storage controllers, see the step "Ensure that you are using supported servers, storage controllers, and machine facilities" in the z/OS V2R4 Upgrade Workflow.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.5 : Determine the level of cryptographic support you require on a z15 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The level of function that is provided for cryptographic support differs by z/OS release and the installed ICSF web deliverable. Also, toleration PTFs are available for some cryptographic web deliverables.

For z/OS V2R5, the base level of ICSF (HCR77D2) is included in z/OS.

For z/OS V2R4, consider the following:

  • If you are using the level of ICSF that is shipped as part of z/OS V2R4 (FMID HCR77D0), you can use most functions of the Crypto Express7S feature on a z15™ server.
  • ICSF Web Deliverable HCR77D1 - Cryptographic Support for z/OS V2R2 – z/OS V2R4 (FMID HCR77D1) provides some additional function and also incorporates enhancements that are available in PTFs for the base level of ICSF included in z/OS V2R4. This web deliverable includes support for:
    • Crypto Express7S adapter
    • Ability to use CP Assist for Cryptographic Functions (CPACF) for certain clear key ECC operations
    • CCA Release 5.5 and CCA Release 6.3

    If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs that are identified by SMP/E fix category IBM.Coexistence.ICSF.z/OS_V2R2-V2R4-HCR77D1.

  • If you require support for more than 16 domains on Crypto Express7S, you must install the PTFs that are identified by the SMP/E fix category for the z15™ server: IBM.Device.Server.z15-8561.Exploitation.

For z/OS V2R3, consider the following:

  • If you are using the level of ICSF that is shipped as part of z/OS V2R3 (FMID HCR77C0), you can use most functions of the Crypto Express6S feature on a z15™ server.
  • ICSF Web Deliverable HCR77D1 - Cryptographic Support for z/OS V2R2 – z/OS V2R4 (FMID HCR77D1) provides additional function and enhancements. If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs that are identified by SMP/E fix category IBM.Coexistence.ICSF.z/OS_V2R2-V2R4-HCR77D1.
  • ICSF Web Deliverable HCR77C1 - Cryptographic Support for z/OS V2R1 - z/OS V2R3 provides some additional function and also incorporates enhancements that are available in PTFs for the base level of ICSF included in z/OS V2R3. The web deliverable includes support for a PCI HSM (“ Payment Card Industry Hardware Security Module”) configured CCA coprocessor. Crypto Express6S also introduces the use of X.509 certificates in CCA. If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs that are identified by SMP/E fix category IBM.Coexistence.ICSF.z/OS_V2R1-V2R3-HCR77C1

For z/OS V2R2, consider the following:

  • If you are using the level of ICSF that is shipped as part of z/OS V2R2 (FMID HCR77B0), you can use most functions of the Crypto Express6S feature on a z15™ server.
  • ICSF Web Deliverable HCR77D1 - Cryptographic Support for z/OS V2R2 – z/OS V2R4 (FMID HCR77D1) provides additional function and enhancements. If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs that are identified by SMP/E fix category IBM.Coexistence.ICSF.z/OS_V2R2-V2R4-HCR77D1.
  • ICSF Web Deliverable HCR77C1 - Cryptographic Support for z/OS V2R1 – z/OS V2R3 provides some additional function and also incorporates enhancements that are available in PTFs for the base level of ICSF included in z/OS V2R2. The web deliverable includes support for a PCI HSM (“ Payment Card Industry Hardware Security Module”) configured CCA coprocessor. Crypto Express6S also introduces the use of X.509 certificates in CCA.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.6 : Install the necessary z/OS service


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM recommends that you use the SMP/E REPORT MISSINGFIX command to identify PTFs for the z15™ server that you do not already have installed. To do so, specify IBM.Device.Server.* and IBM.Function.* as the fix categories for the REPORT MISSINGFIX command. This command identifies not only the z15™ support PTFs, but also the PTFs for prior generations of IBM servers that you might need, and those required to enable various functions. Also, REPORT MISSINGFIX creates a batch job for the SMP/E RECEIVE ORDER command that you can use to get any PTFs you do not already have. SMP/E also provides an Explorer function that you can use to find new fix categories that might be of interest.

For descriptions of the fix categories, see the Values and Descriptions page at IBM Fix Category Values and Descriptions. For more information about the REPORT MISSINGFIX command, see z/OS SMP/E Commands.

Here is an example of the SMP/E control statements you can use for REPORT MISSINGFIX:

				SET BDY(GLOBAL).                REPORT MISSINGFIX ZONES( target zone)                FIXCAT(IBM.Device.Server.**, IBM.Function.*).                

If you want to use specific fix categories, you can specify the following fix categories either individually or together for the z/OS PTFs that are required to use a z15™ server, exploit its functions and features, and those that IBM recommends that you install if you are using a z15™ server. Also needed are the fix categories for intermediate servers.

  • For the IBM z15 Model T01:
    • IBM.Device.Server.z15-8561.RequiredService
    • IBM.Device.Server.z15-8561.Exploitation
    • IBM.Device.Server.z15-8561.RecommendedService
  • For the IBM z15 Model T02:
    • IBM.Device.Server.z15T02-8562.RequiredService
    • IBM.Device.Server.z15T02-8562.Exploitation
    • IBM.Device.Server.z15T02-8562.RecommendedService

If you are exploiting z15™ capabilities by installing a web deliverable, more PTFs might be required. Follow the instructions in the Program Directory that is associated with each web deliverable to identify the required PTFs.

If you choose not to use the Recommended Service fix category for your z15 server, you can, alternatively, find lists of the recommended PTFs in the Preventive Service Planning (PSP) “buckets” for the applicable hardware and software. However, note that using PSP buckets and checking the status of the PTFs listed in them is more time-consuming and potentially error-prone than using REPORT MISSINGFIX with the appropriate fix category:

  • For the IBM z15 Model T01, the PSP Upgrade name is 8561DEVICE, and the z/OS support can be found in Subset 8561/ZOS.
  • For the IBM z15 Model T02, the PSP Upgrade name is 8562DEVICE, and the z/OS support can be found in Subset 8562/ZOS.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.7 : Run the CFSIZER tool


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you are moving your coupling facilities, and the coupling facility structures are on a higher CFLEVEL than they were previously, run the Coupling Facility Structure Sizer (CFSIZER) tool to find out whether you must increase coupling facility structure sizes. Prepare to make the necessary changes to the CFLEVEL as indicated by the tool.

You can download the CFSIZER tool at: Coupling Facility sizer.

Also, see the following step in the z/OS V2R4 Upgrade Workflow:

  • "Update your CFRM policy with coupling facility structure size changes"

Note: After you make a coupling facility available on the new hardware, you can run the Sizer utility, which is an authorized z/OS program that you can use to evaluate structure size changes. The Sizer utility is distinct from CFSizer, and should be run after the new hardware (CFLEVEL) is installed, but before any CF LPAR on the new hardware is populated with structures. You can download the Sizer utility at CFSizer Alternate Sizing Techniques.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.8 : Prepare for the new machine instruction mnemonics


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The instruction set has been expanded on the z15™ server, as is usual for new servers. Each machine instruction is represented by a mnemonic in Assembler language. It is possible that the new mnemonics can match names that you chose for Assembler macro instructions. If such naming collisions occur, the Assembler default opcode table (UNI) processes new mnemonics as instructions, not as macros, after z15™ required service is installed. If this occurs, it is likely to cause Assembler error messages and can cause incorrect object code to be generated. If you write programs in Assembler Language, compare the names of your existing Assembler macro instructions to the new machine instructions, to identify any such conflicts or collisions that would occur. The Assembler macro instructions are documented in z/Architecture Principles of Operation. For information about a tool to help in identifying mnemonic conflicts, see the IBM Techdocs web site under Presentations and Tools. Search for the Techdoc PRS5289.

If a conflict is identified, take one of these actions:

  • Change the name of your macro instruction.
  • Specify PARM='...OPTABLE(YOP)...' (or some other earlier opcode table).
  • Specify a separate ASMAOPT file containing assembler options such as in the previous method (this method requires no changes to source code or JCL).
  • Add as the first statement of your source program: *PROCESS OPTABLE(YOP) (or some other earlier opcode table).
  • Specify the PROFILE option either in JCL or the ASMAOPT file, and the specified or default member of the SYSLIB data set is copied into the front of the source program.
  • If you must use both a new instruction and a macro with the same name in an assembly, use a coding technique that allows the use of a new instruction and a macro with the same name in an assembly, such as HLASM mnemonic tags ( :MAC:ASM).

To help you associate the OPTABLE levels with IBM Z processor generations:

  • HLASM APAR PH03536 defines OPTABLE names Z9 through Z14 as synonyms for ZS3 through ZS8.
  • HLASM APAR PH00902 adds OPTABLE name Z15 and synonym ZS9.

Similarly, HLASM APAR PH00902 extends the MACHINE option to support various other names, based on short forms of the IBM machine name, such as zEC12 and z990. This APAR adds support for values in the form ARCH-n, to select the table that most closely corresponds to the ARCH(n) option in IBM compilers for C, COBOL, and PL/I. For example, both MACHINE(z15) and MACHINE(ARCH-13) are supported with the installation of HLASM APAR PH00902.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.9 : Learn about the HiperDispatch enhancement


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In HiperDispatch processing, changes in LPAR weight can cause I/O enabled vertical-high (Vh) and vertical-medium (Vm) processors to be converted to vertical-low (Vl) processors, and immediately parked by HiperDispatch. That is, the Vh and Vm processors can be pushed to the lowest configured online processors.

Starting with z/OS V2R4, the system resources manager (SRM) component of z/OS reverses the search direction that is used to find processors for I/O enablement. SRM enables processors for I/O interrupts from the lowest configured CPU ID to the highest configured CPU ID. This enhancement keeps Vh or Vm processors enabled for I/O interrupts after processor topology changes.

The HiperDispatch enhancement is included in the base for z/OS V2R5 and z/OS V2R4 base. It can be added to z/OS V2R3 by installing the PTF for APAR OA55935. It is identified by the following SMP/E fix categories:

  • For the IBM z15 Model T01, use fix category IBM.Device.Server.z15-8561.Exploitation
  • For the IBM z15 Model T02, use fix category IBM.Device.Server.z15T02-8562.Exploitation

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.10 : Learn about the z/OS SLIP enhancements


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The z/OS SLIP command is enhanced to monitor an address or range of addresses for a key change and in response take a memory dump or set a trace. This behavior is supported in z/OS V2R4 running on the z15. No toleration support is required on earlier releases.

To enable the SLIP function, enter the SLIP command with new options, as follows:

SLIP SET[,options],END

To disable the SLIP function, enter the SLIP command with new options, as follows:

SLIP DEL[,options]

For more information, see SLIP command in z/OS MVS System Commands.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.11 : Accommodate the changes to default ARCH and TUNE level


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The z15™ supports the new levels ARCH(13) and TUNE(13), which are needed to take advantage of most of the enhanced vector instructions available on the z15™ in z/Architecture mode. ARCH(13) produces code that uses instructions that are available on the z15, such as the following:

  • Vector Enhancement Facility 2
  • Miscellaneous-Instruction-Extension Facility 3
  • Aligned Vector Load/Store Hint instructions
  • Limited exploitation of Vector Packed Decimal Enhancement Facility.

Application developers can recompile their applications with the ARCH 13 compiler option to instruct the compiler to generate code that uses the instructions available on the z15. This action can bring performance improvements for applications without requiring any changes to source code.

It is recommended that you upgrade to the IBM z/OS XL C/C++ V2.4.1 web deliverable for IBM z/OS V2.4, which became available on December 13, 2019. This new compiler supports the C11, C++11, and C++14 language standards. It combines the C language (Clang) infrastructure with the existing advanced optimization technology in the IBM XL compilers to exploit the latest z/Architecture, including the IBM z15. The z/OS XL C/C++ V2.4.1 compiler supports English messages and EBCDIC and ASCII execution character sets, and generates AMODE 64 code, making it ideal for z/OS UNIX users who are porting applications from distributed platforms.

The XL C/C++ V2.4.1 web download is available as a no-charge add-on for installations that have enabled the XL C/C++ compiler (an optionally priced feature) on z/OS V2.4 only. It coexists with and does not replace the base XL C/C++ V2.4 compiler. XL C/C++ V2.4 and V2.4.1 compilers are both designed to be used independently and are also serviced and supported independently.

For the latest offerings from the IBM XL C/C++ compiler family on z/OS, see the z/OS downloads page at z/OS downloads.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.12 : Upgrade actions for IBM Integrated Accelerator for z Enterprise Data Compression (zEDC)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In the z15, the compression functions are moved into the processor chip, which is referred to as IBM Integrated Accelerator for z Enterprise Data Compression (zEDC). IBM Integrated Accelerator for zEDC replaces zEDC Express (FC #0420). IBM Integrated Accelerator for zEDC uses industry standard compression formats for file compression that can enable reduction in the size of data, which can save storage space and increase data transfer rates. The z/OS APIs, both authorized and zlib, transparently enable all existing software exploitation on z15, which was already enabled on z14 and earlier with zEDC Express. Support is available on z/OS V2R3, z/OS V2R4, and z/OS V2R5 when running on z15. No toleration support is required.

Data that is compressed with zEDC Express can be decompressed with IBM Integrated Accelerator for zEDC. The software inflate routine is updated to be RFC-compliant. This change allows for fallback so that IBM Integrated Accelerator for zEDC compressed data can be decompressed on z14 and earlier servers.

As with zEDC Express, IBM Integrated Accelerator for zEDC compression supports two types of processing:

  • Synchronous processing in problem state, which is requested through the zlib data compression library services
  • Asynchronous processing in authorized state, which is requested through the IBM Z authorized compression services.

As was done previously for zEDC, parmlib member IFAPRDxx is used to enable compression. However, with IBM Integrated Accelerator for zEDC compression on the z15, you use IFAPRDxx only for enabling asynchronous processing. It is not required for zlib-based (problem state) uses.

The following example shows a typical IFAPRDxx entry for IBM Integrated Accelerator for zEDC compression, which uses the same format as the zEDC Express. If your IFAPRDxx member already contains this entry, you can retain it on the z15.

PRODUCT OWNER('IBM CORP')				NAME('Z/OS')				FEATURENAME('ZEDC')				ID(5650-ZOS)				VERSION(*)				RELEASE(*)				MOD(*)				STATE(ENABLED)

Before upgrading to the z15, you must install the z/OS zlib PTFs for this support, which are identified by the following SMP/E fix categories:

  • For the IBM z15 Model T01, use fix category IBM.Device.Server.z15-8561.RequiredService
  • For the IBM z15 Model T02, use fix category IBM.Device.Server.z15T02-8562.RequiredService

Also, you must apply the PTF for APAR OA56143.

Then, relink your applications with the updated zlib data compression library. If the PTFs are not installed, z/OS attempts to find a zEDC device, which is not supported on the z15. If so, no compression or decompression can occur.

The IBM Z Batch Network Analyzer (zBNA) tool is updated to provide usage estimation for IBM Integrated Accelerator for zEDC compression.

For more information about the zBNA tool, see IBM Techdoc PRS5132 at IBM Z Batch Network Analyzer (zBNA) Tool.

In the future, after you have upgraded all servers to the z15™ level (including servers that are used for disaster recovery), and you have installed the related PTFs on all of your z/OS systems, you might have the following clean-up actions to perform:

  • In parmlib member IQPPRMxx, the MAXSEGMENTS option is obsolete and therefore ignored. Also, the defaults for DEFMINREQSIZE and INFMINREQSIZE are changed and those values can no longer be updated through parmlib. You can remove these settings from your IQPPRMxx parmlib member.
  • Applications that use zlib no longer require READ access to SAF resource FPZ.ACCELERATOR.COMPRESSION in the FACILITY CLASS. You can remove these application authorizations from your external security manager, such as RACF

Reference information

For more information, see Integrated Accelerator for zEnterprise Data Compression (zEDC) content solution.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.3.13 : Upgrade the I/O Configuration Program (IOCP) for z15


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

It is possible carry forward an IOCDS from a z13 or z14, if no new functions are required from the z15. However, to use the new I/O hardware that is available only on the z15, you must apply the required PTFs, which are identified by the following SMP/E fix categories:

  • For the IBM z15 Model T01, use fix category IBM.Device.Server.z15-8561.RequiredService
  • For the IBM z15 Model T02, use fix category IBM.Device.Server.z15T02-8562.RequiredService

Also, you must apply the PTF for APAR OA56761.

Note that the z15™ I/O hardware includes:

  • Increased coupling CHPIDs per CEC from 256 to 384
  • Support for increased ICA-SR to 96 and ICP to 64.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.4 : Actions you can take after installing an IBM z15 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

These are migration actions that you perform only after you have installed the z15™ server. You need a running z15™ server to perform these actions.

For information about PTFs, see the notes for Table 1 in the step "Migrate to an IBM z15 server."


Step 3.2.2.4.1 : FICON Express16SA


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

FICON Express16SA supports a link data rate of 16 gigabits per second (Gbps) and auto-negotiation to 8 Gbps for synergy with current generation switches, directors, and storage devices. With support for native FICON, High Performance FICON for z Systems (zHPF), and Fibre Channel Protocol (FCP), the IBM z15™ server is designed to help you to prepare for an end-to-end 16 Gbps infrastructure to meet the lower latency and increased bandwidth demands of your applications.

The FICON Express16SA adapter will work with your existing fiber optic cabling environment, both single mode and multimode optical cables.

Note:FICON Express16SA is not supported on the z15 Model T02 server.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.4.2 : Upgrade to Virtual Flash Memory (VFM)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Beginning with the IBM z14 server, IBM Virtual Flash Memory (VFM) is the replacement for the Flash Express features (#0402, #0403), which were available on the IBM zEC12 and IBM z13. No application changes are required to change from IBM Flash Express to VFM.

Ensure that you replace your Flash memory with adequate VFM.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.4.3 : Upgrade actions for Hardware Instrumentation Services (HIS)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

New extended and crypto counters and diagnostic samples are added for the z15. If you want to enable them, you must have Hardware Instrumentation Services (HIS) set up on z/OS.

To start or stop collecting extended or crypto counters or diagnostic sampling, enter the command MODIFY HIS.

No toleration support is needed.

If you want to ignore the HIS enhancements, you might need to update your HIS profilers. For more information, see the topic about starting, configuring, and stopping hardware event data collection. in z/OS MVS System Commands.

Note: If you use the CPU Measurement Facility, IBM recommends that your installation collect SMF 113 subtype 1 and 2 records. IBM also recommends that products process SMF 113 subtype 1 records when available because that is where future enhancements are made. If subtype 1 records are not available, products can process subtype 2 records.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.4.4 : Learn about System Recovery Boost


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

New for the z15, this enhancement can provide faster operating system IPL, middleware and workload restart and recovery, and planned shutdown. During a boost period that applies during operating system shutdown and following a reIPL or restart, the IBM z15™ can make additional processing capacity available to the system in a variety of ways to help accelerate processing, and apply that same boosted capacity to improve workload throughput and response time and elapsed time during the boost. Enhancements in Geographically Dispersed Parallel Sysplex (GDPS) automation are also designed to provide faster, more efficient, and more highly-parallel orchestration of GDPS automated reconfiguration activities, such as activating or deactivating images, IPLing images, and so on.

System Recovery Boost works by providing additional processor capacity and parallelism during a boost period, using your installation's already-entitled CPUs and zIIPs. System Recovery Boost does this without increasing the four-hour rolling average (4HRA) IBM software billing cost or MSU consumption associated with your workload during this time.

Note: The IBM z15 Model T02 does not provide the System Recovery Boost Upgrade capability to add additional "temporary capacity" zIIP processors. Thus, the z15 Model T02 does not offer System Recovery Boost Upgrade Feature Codes 9930 and 6802.

For more information about System Recovery Boost, see the following books:

  • IBM z15 Technical Introduction, SG24-8850
  • IBM Z Capacity on Demand User's Guide, SC28-6985-03

These books are included in the IBM z15 Library, which is available online in Resource Link™.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.4.5 : Grant cross-partition authority to the support element


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In the support element (SE) on the z15, the setting for the “Cross Partition Authority” option is replaced by new security settings on the System Details panel and the Customize Image Profiles panel. You must grant the SE the authority to accept the BCPii APIs that flow from the user application through the HWIBCPii address space. With this enablement, a logical partition can issue a subset of control program instructions to other logical partitions that are activated on the same CPC.

For more information, see the workflow step named "Enable BCPii communications on the support element."

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.4.6 : Learn about IBM Integrated Accelerator for z Enterprise Data Compression (zEDC)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Beginning with the z15, IBM Integrated Accelerator for z Enterprise Data Compression (zEDC) replaces the zEDC Express (FC #0420). As an integrated part of the z15™ processor chip, the Integrated Accelerator for zEDC does not require the purchase of a hardware feature or usage of I/O slots.

No change is required when z/OS is upgraded from a z14 to a z15.

Observe the following differences in processing:

  • RMF changes:
    • On earlier IBM Z servers, you used the RMF PCIE report to monitor the usage of zEDC devices. Starting with the z15, you can now monitor compression activity by referring to the I/O Queuing Activity report and the Extended Asynchronous Data Mover (EADM) device summary instead. RMF EADM reporting (SMF 74.10), which was previously known as Storage Class Memory (SCM) Statistics, is enhanced with asynchronous execution information.
    • On the z15, the RMF PCIE report no longer contains any information about compression.
  • Synchronous mode compression is not recorded; it is treated as an instruction invocation.
  • Asynchronous mode compression is recorded, as follows:
    • SMF30 information is captured
    • In RMF, the EADM device summary provides information about compression.
    • SAP utilization is updated to include time for compression and decompression.

Reference information

For more information, see Integrated Accelerator for zEnterprise Data Compression (zEDC) content solution.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.5 : Accommodate functions for the z15 to be discontinued on future servers


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

Note:

IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

The steps in this section involve changes in hardware support that could affect your environment. Make the appropriate changes, as needed.


Step 3.2.2.5.1 : Prepaid On/Off Capacity on Demand tokens will not carry forward


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Beginning with IBM z15™, new prepaid On/Off Capacity on Demand (On/Off CoD) temporary CP resource tokens do not carry forward to future systems. On/Off CoD from IBM allows you to enable and disable hardware engines to meet temporary peak business needs. On the IBM Z platform, this hardware offering is available exclusively on supported IBM Z servers. Charges that are related to both hardware and software depend on the duration of the temporary enablement and the capacity enabled.

Beginning with IBM z15 Model T02, prepaid tokens for On/Off Capacity on Demand (On/Off CoD) will expire 5 years after the LICCC expiration date.

Note: IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.2.5.2 : Prepare for the removal of support for TLS 1.0 and TLS 1.1 for SE, HMC, and OSC


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM z15™ is planned to be the last IBM Z server to to support the use of the Transport Layer Security protocol versions 1.0 (TLS 1.0) and version 1.1 (TLS 1.1) for establishing secure connections to the Support Element (SE), Hardware Management Console (HMC), and Open Systems Adapter (OSA) Integrated Console Controller (channel path type OSC).

Note: IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 3.2.3 : Upgrade to an IBM z14 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

Description

The IBM z14™ (z14™) provides a scalable, highly available platform that delivers differentiated value to enable business growth, reduce cost, and protect existing investments. z/OS V2R3 enhances the role of the z14 by supporting solutions for a trusted digital economy. Capabilities that are designed to optimize high availability, performance, security, and operational flexibility can help organizations grow and secure their most critical transaction environments.

The IBM z14 family of mainframes includes the following models, which are dual frame configurations: M01, M02, M03, M04, M05. The newest addition to the IBM z14 family, the IBM z14™ Model ZR1 (z14 ZR1), is a single frame configuration. The z14 ZR1 is designed for clients who do not need the capacity of the larger M01-M05 models.

In this document, references to "z14" pertain to all models of the IBM z14, including the z14 Model ZR1, unless otherwise noted.

z/OS base support for specific z14 functions depends on the z/OS release. The following table lists the z14 functions and indicates whether each function is included in a specific z/OS release (Yes or No), or whether the function requires a PTF (PTF) or a web deliverable (Web). For information about finding the appropriate PTFs, see the workflow step called "Actions you can take before you order an IBM z14 server." For more information about V1R13 support, see the Table Notes.

The following table shows a summary view of which z14 server functions are included in the base support for z/OS V2R3, z/OS V2R4, and z/OS V2R5.

z14 function included in base z/OS support (Y/N)

V2R3 4

V2R4 4

V2R5 4

Base support ¹

PTF

Yes, and in PTFs

Yes, and in PTFs

CHPID type CS5 for coupling

Yes

Yes

Yes

CHPID type OSE supporting 4 or 2 ports per feature

Yes

Yes

Yes

CHPID type OSM for intranode management network (INMN)

Yes

Yes

Yes

CPU measurement facility

Yes

Yes

Yes

Crypto Express6S Toleration 2

PTF

Yes

Yes

FICON® Express8S (CHPID type FC)

Yes

Yes

Yes

FICON Express16S (CHPID type FC)

Yes

Yes

Yes

FICON Express16S+ (CHPID type FC) when using FICON or channel-to-channel (CTC) 3

  • FICON Express16S+ LX
  • FICON Express16S+ SX

PTF

Yes

Yes

IBM z BladeCenter Extension (zBX) Model 004

Yes

Yes

Yes

IBM z Unified Resource Manager

Yes

Yes

Yes

New z14 machine instruction (assembler support) 3

PTF

Yes

Yes

OSA-Express6S (CHPID type OSD) 3

  • OSA-Express6S GbE LX
  • OSA-Express6S GbE SX
  • OSA-Express6S 10 GbE LR
  • OSA-Express6S 10 GbE SR
  • OSA-Express6S 1000BASE-T

Yes

Yes

Yes

Parallel Sysplex Infiniband (PSIFB) Coupling Link 5

Yes

Yes

Yes

z/OS global resource serialization (GRS) support for FICON CTCs

Yes

Yes

Yes

Table Notes:
  1. z/OS V1R13 (compatibility only). Extended support contract for IBM Software Support Services for z/OS is required with PTFs.
  2. z/OS V1R13 with PTFs, the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 (HCR77B0) Web deliverable installed, and an extended support contract for IBM Software Support Services. The web deliverable is available at z/OS downloads.
  3. z/OS V1R13 with an extended support contract for IBM Software Support Services and PTFs.
  4. PTFs for base support have the following fix categories:
    • For IBM z14 models M01 through M05, use FIXCAT value IBM.Device.Server.z14-3906.RequiredService and the FIXCATs for earlier processors.
    • For IBM z14 Model ZR1, use FIXCAT value IBM.Device.Server.z14ZR1-3907.RequiredService and the FIXCATs for earlier processors.
  5. InfiniBand coupling links are not supported on the z14 Model ZR1.

The exploitation of specific z14 server functions depends on the z/OS release. The following table lists the z14 functions and indicates whether each function is exploited by a specific z/OS release (Yes or No), or whether the function requires a PTF (PTF) or a web deliverable (Web). For information about finding the appropriate PTFs, see the workflow step called "Actions you can take before you order an IBM z14 server." For more information about V1R13 support, see the Table Notes.

The following table shows a summary view of which z14 server functions can be exploited in z/OS V2R3, z/OS V2R4, and z/OS V2R5.

z14 function included in base z/OS support (Y/N)

V2R3²

V2R4²

V2R5²

Processors: The maximum number of processors that can be configured per server.

For IBM z14 models M01 through M05:

  • Up to 170 processors configurable as CPs, zIIPs, IFLs, ICFs, or optional SAPs.
  • The sum of CPs and zIIPs configured in a single z/OS LPAR cannot exceed:
    • 170 on z/OS V2R1 or later in non-SMT mode
    • 128 on z/OS V2R1 or later in SMT mode.

For IBM z14 Model ZR1:

  • Up to 30 processors configurable as CPs, zIIPs, IFLs, ICFs, or optional SAPs.
  • The sum of CPs and zIIPs configured in a single z/OS LPAR cannot exceed 30 on z/OS V2R1 or later (in either SMT or non-SMT mode).

Yes

Yes

Yes

Two-way simultaneous multithreading (SMT)

Yes

Yes

Yes

Channel subsystems.

The maximum number of channel subsystems (CSS) that can be configured per server:

  • For IBM z14 models M01 through M05:
    • Up to six channel subsystems
    • Up to four subchannel sets per CSS.
  • For IBM z14 Model ZR1:
    • Up to three channel subsystems
    • Up to three subchannel sets per CSS.

Yes

Yes

Yes

Up to 4 TB of Redundant Array of Independent Memory (RAIM) per z/OS LPAR with z/OS V2.1 or later.

Yes

Yes

Yes

Transactional memory

Yes

Yes

Yes

2 GB Large Pages

Yes

Yes

Yes

Logical partitions.

The maximum number of logical partitions (LPARs) that can be configured per server:

  • For IBM z14 models M01 through M05, up to 85 LPARs can be configured.
  • For IBM z14 Model ZR1, up to 40 LPARs can be configured.

Yes

Yes

Yes

Coupling Facility Control Code Level 22 (CFLEVEL 22)

Yes 3

Yes

Yes

Coupling Express LR (CHPID type CL5)

Yes

Yes

Yes

Support for 256 Coupling CHPIDs

Yes

Yes

Yes

Support of High Performance FICON (zHPF) single-track or multitrack operations (CHPID type FC)

Yes

Yes

Yes

IBM Integrated Coupling Adapter Fanout (ICA SR) (CHPID type CS5)

Yes

Yes

Yes

CHPID type OSX for access control to the intra-ensemble data network (IEDN) from IBM z14 to Unified Resource Manager functions

Yes

Yes

Yes

CHPID type OSC supporting TN3270E and non-SNA DFT

Yes

Yes

Yes

OSA-Express6S (CHPID type OSD) without maximum port exploitation

Yes

Yes

Yes

OSA-Express6S IWQ IPSec

PTF

Yes

Yes

OSA-Express6S IWQ zCX

No

PTF

PTF

CHPID type OSD with exploitation of two ports per CHPID

Yes

Yes

Yes

Inbound workload queuing for Enterprise Extender (CHPID type OSD)

Yes

Yes

Yes

Checksum offload for IPv6 packets (CHPID type OSD)

Yes

Yes

Yes

Checksum offload for LPAR-to-LPAR traffic for IPv4 and IPv6 packets (CHPID type OSD)

Yes

Yes

Yes

Large Send for IPv6 packets (CHPID type OSD)

Yes

Yes

Yes

Crypto Express6S support of VISA Format Preserving Encryption (VFPE)

Yes

Yes

Yes

Crypto Express6S support of greater than 16 Domains

Yes

Yes

Yes

Crypto Express6S Exploitation

Web: Cryptographic Support for z/OS V2R1 - z/OS V2R3 (HCR77C1)

Web: Cryptographic Support for z/OS V2R1 - z/OS V2R3 (HCR77C1)

Web: Cryptographic Support for z/OS V2R1 - z/OS V2R3 (HCR77C1)

Crypto Express6S support of PCI-HSM compliance

Web: Cryptographic Support for z/OS V2R1 - z/OS V2R3 (HCR77C1)

Web: Cryptographic Support for z/OS V2R1 - z/OS V2R3 (HCR77C1)

Web: Cryptographic Support for z/OS V2R1 - z/OS V2R3 (HCR77C1)

10 GbE RoCE Express2 for Shared Memory Communications-Remote Direct Memory Access (SMC-R)

Yes

Yes

Yes

Single Instruction Multiple Data (SIMD) instruction set

Yes

Yes

Yes

IBM Virtual Flash Memory 1

Yes

Yes

Yes

zHyperLink Express

PTF

Yes

Yes

HiperDispatch enhancements

Yes

Yes

Yes

Data set encryption

Yes

Yes

Yes

Guarded Storage Facility (GSF)

Yes

Yes

Yes

IBM z/OS XL C/C++ compiler support of the ARCH(12) and TUNE(12) parameters.

Yes

Yes

Yes

IBM z/OS XL C/C++ runtime support of ARCH(12) and TUNE(12) parameters.

Yes

Yes

Yes

Instruction Execution Protection (IEP)

Yes

Yes

Yes

zEDC capability using zEDC Express®

Y (requires the z/OS zEDC software feature to be enabled)

Y (requires the z/OS zEDC software feature to be enabled)

Table Notes:
  1. z/OS V1R13 with PTFs, the z/OS V1.13 RSM Enablement Offering web deliverable installed, and an extended support contract for IBM Software Support Services. The web deliverable is available at z/OS downloads.
  2. PTFs for exploitation have the following fix categories:
    • For IBM z14 models M01 through M05, use FIXCAT value IBM.Device.Server.z14-3906.Exploitation and the FIXCATs for earlier processors.
    • For IBM z14 Model ZR1, use FIXCAT value IBM.Device.Server.z14ZR1-3907.Exploitation and the FIXCATs for earlier processors.
  3. Full support (duplexing with primary/secondary for CFLEVEL 22 on a z14) requires a V2R3 PTF.

Web deliverables are available from the z/OS downloads page at z/OS downloads.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

  • IBM z14 models M01 through M05, which became available September, 2017.
  • IBM z14 Model ZR1, which became available May, 2018.

Applies to migration from:

z/OS V2R4 and V2R3.

Timing:

Anytime before you introduce a z14 server into your environment.

Is the upgrade action required?

Yes, if you want to run z/OS V2R5, z/OS V2R4, or z/OS V2R3 on a z14 server, or if you want to run a coupling facility on a z14 server. If you plan to run only a coupling facility on a z14 system, only the sysplex-related actions are relevant. However, you must install the appropriate z/OS service for systems that are running on other servers that use the z14 coupling facilities.

Target system hardware requirements:

  • z/OS V2R4 with IBM z14 (z14) requires a minimum of 8 GB of memory to IPL. When running as a z/VM guest or on an IBM Z® Personal Development Tool (zPDT), a minimum of 2 GB is required for z/OS V2R4. If the minimum is not met, a warning WTOR is issued at IPL.
  • A z14 with Hardware Management Console (HMC) Version 2.14.0 plus microcode change levels (MCLs) and the Support Element Version 2.14.0.
  • Additional hardware required for specific functions.
    • IBM devices that are attached to z13, z13s, zEC12, and zBC12 servers are supported for attachment to z14 channels, unless otherwise noted. The subject I/O devices must meet FICON architecture requirements.
    • IBM Virtual Flash Memory requires FC #0604
    • zEDC Express requirements:
      • IBM z14 models M01 through M05 require FC #0420.
      • IBM z14 Model ZR1 requires FC #0420 and PCIe I/O drawer (FC #4001).
    • 10 GbE RoCE Express2 requires FC #0412
    • New OSA-Express6S cards require the following feature codes:
      • OSA-Express6S GbE LX requires FC #0422
      • OSA-Express6S GbE SX requires FC #0423
      • OSA-Express6S 10 GbE LR requires FC #0424
      • OSA-Express6S 10 GbE SR requires FC #0425
      • OSA-Express6S 1000BASE-T requires FC #0426
    • New FICON Express16S cards require the following feature codes:
      • FICON Express16S+ LX requires FC #0427
      • FICON Express16S+ SX requires FC #0428
    • zHyperLink Express requires FC #0431
    • Coupling Express LR requires FC #0433
    • Crypto Express6S requires FC #0893
    • Use of hardware acceleration for cryptographic operations, including the use of Visa, Inc. Data Secure Platform (DSP) functions requires a CPACF (FC #3863) or a CEX5S (FC #0890) feature, or both.

      See Table Note 1.

    • Use of a new Trusted Key Entry (TKE) workstation requires TKE Rack Mount w/4768 (FC #0085) or TKE w/4768 (FC #0086). The TKE workstation is a combination of hardware and software, with other features required, depending on which functions you plan to use. Different feature codes are required if you are upgrading an existing TKE workstation from an earlier server.

      TKE 9.0 (FC #0879) is also required if you plan to use the TKE workstation to manage any of the following:

      • A Crypto Express6S
      • The new CCA mode PCI-HSM settings that are available on the Crypto Express6S
      • Any Crypto Express feature that is running in IBM Enterprise PKCS #11 (EP11) mode.

Target system software requirements:

For more information, see the step "Support is delivered by service, z/OS features, and web deliverables" under "General recommendations and considerations for a z14 server." You install the required service updates on your system when you perform the step "Install the necessary z/OS service" under "Actions you can take before you order an IBM z14 server."

Other system (coexistence or fallback) requirements:

  • The suggested practice is to install and run the required service on your existing server. This action enables you to fall back from a hardware perspective, yet maintain your software level.
  • If you have not installed the preconditioning and exploitation PTFs for CFLEVEL 17-21, note that those PTFs are required to be installed throughout your sysplex before implementing CFLEVEL 22. Use the appropriate fix category, as follows:
    • For IBM z14 models M01 through M05, use FIXCAT value IBM.Device.Server.z14-3906.RequiredService
    • For IBM z14 Model ZR1, use FIXCAT value IBM.Device.Server.z14ZR1-3907.RequiredService
  • If you plan to implement zEDC, you should install the z/OS toleration PTFs on systems that access data that is compressed using zEDC Express on a z14 server.
  • If you are using ICSF and plan to share keys with other z/OS systems that have an earlier level of ICSF, you should install the ICSF coexistence PTFs on those earlier levels of ICSF. For ICSF coexistence PTFs, see the workflow step called "Actions you can take before you order an IBM z14 server" for the appropriate SMP/E FIXCAT values to use.

Restrictions:

See the substeps in the workflow step "Restrictions for a z14 server."

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Table Note:
  1. IBM Z® cryptography features include VISA Format Preserving Encryption (VFPE) technology, which forms part of the Visa, Inc. Data Secure Platform (DSP). The use of VFPE technology requires a service agreement with Visa, Inc. For details, contact your Visa account manager or Visa at P2PE@visa.com. Clients who use IBM Z® cryptography features, but do not make use of the FPE functionality, are not required to enter into any such agreement with Visa.

Steps to take

Continue your upgrade to the z14 by performing the following steps in this workflow. Each step contains a number of sub-steps.

  • "General recommendations and considerations for a z14 server"
  • "Restrictions for a z14 server"
  • "Actions you can take before you order an IBM z14 server"
  • "Actions you can take after installing an IBM z14 server"
  • "Accommodate functions for the z14 to be discontinued on future servers"

Reference information

For more information about new functions to exploit, see the IBM z14 Library, which is available online in Resource Link™.


Step 3.2.3.1 : General recommendations and considerations for a z14 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

As you plan your migration to an IBM z14™ server, consider the following items.

  1. Upgrade actions for IBM servers are cumulative. If you migrate to a z14 server from a z13™ or z13s server, and have performed the upgrade actions that are associated with the z13 or z13s, you have fewer upgrade actions than if you migrate from an earlier generation server. Thus, if you migrate from an earlier generation server, you might need to perform more upgrade actions. For example, if you migrate from a zEC12 server, you should read about and perform the z13 and z13s server upgrade actions in the workflow step "Upgrade to an IBM z13 or IBM z13s server" and its substeps.
  2. Support is delivered by service, z/OS features, and web deliverables. The base support for the z14 is delivered through service (PTFs). To determine which PTFs are required, get the current enhanced HOLDDATA file, either by using the SMP/E RECEIVE ORDER command or by downloading the 2-year file and using the SMP/E RECEIVE command to process it. Then, use the SMP/E REPORT MISSINGFIX report to identify the missing PTFs, if any. For example:
    SET BDY(GLOBAL). REPORT MISSINGFIX ZONES(target zone) FIXCAT(IBM.Device.Server.*.RequiredService).

    If you want more granular reports for REPORT MISSINGFIX, you can use the individual FIXCATs for each server, plus the FIXCATs for any intermediate services. The FIXCATs for the z14 servers are:

    • For IBM z14 models M01 through M05, the FIXCAT for z14 required service is: IBM.Device.Server.z14-3906.RequiredService.
    • For IBM z14 Model ZR1, the FIXCAT for z14 required service is: IBM.Device.Server.z14ZR1-3907.RequiredService.

    Exploitation of some functions requires a web deliverable. Specifically:

    • Exploitation of the Crypto Express6S requires the Cryptographic Support for z/OS V2R1 - z/OS V2R3 (FMID HCR77C1) web deliverable.

      If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs identified by the following fix category: IBM.Coexistence.ICSF.z/OS_V2R1-V2R3-HCR77C1

    • If you are running z/OS V2R1 and require Crypto Express4S functionality for CCA 4.4 and other EP11 cryptographic enhancement support, which includes: RKX Key Export Wrap, UDX Reduction/simplification, additional EP11 algorithms, expanded EMV support, AP Configuration simplification, CTRACE Enhancements, and KDS Key Utilization Stats, then you must download and install the Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77A1) or the Cryptographic Support for z/OS V1R13 - z/OS V2R2 web deliverable (HCR77B1).

      If you are using either of these web deliverables (HCR77A1 or HCR77B1) and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs identified by the appropriate Fix Category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77A1 or IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B1.

    • If you are running z/OS V2R1 and require Crypto Express5S exploitation support for the next Generation Coprocessor support or VISA Format Preserving Encryption (FPE), you must download and install the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77B0) or the Cryptographic Support for z/OS V1R13 - z/OS V2R2 web deliverable (HCR77B1).

      If you are using either of these web deliverables (HCR77B0 or HCR77B1) and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs identified by the appropriate fix category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B0 or IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B1.

    • If you are running z/OS V1R13, you might need to install a Cryptographic Support web deliverable, depending on which ICSF functions you require.

      To run z/OS V1R13 on a z14 server, you require IBM Software Support Services for extended z/OS V1R13 support.

  3. Larger coupling facility structure sizes might be necessary. When you change the coupling facility control code level (CFLEVEL), your coupling facility structure sizes might change. If, as part of your migration to a z14 server, you change the CFLEVEL, you might have larger structure sizes than you did previously. If your CFLEVEL is identical, structure sizes are not expected to change when you migrate from a previous server to a newer generation server. In addition, similar to CFLEVEL 17 and later, ensure that the CF LPAR has at least 512MB of storage. CFLEVEL 22, introduced on the z14, supports the Coupling Facility use of Large Memory to improve availability for larger CF cache structures and data sharing performance with larger DB2 Group Buffer Pools (GBP). This support removes inhibitors to using large CF cache structures, enabling use of Large Memory to scale to larger DB2 Local Buffer Pools (LBP) and Group Buffer Pools (GBP) in data sharing environments.
  4. Use the same software level throughout a sysplex. Having members of a sysplex at the same software level (other than during brief migration periods) is good software management policy.
  5. Migrate hardware and software at different times. To minimize the amount of change that you experience at one time, do not migrate your software release level at the same time that you migrate your hardware.
  6. Use the latest version of SCRT. In z/OS V2R3, you do not need to update SCRT because it is included in the z/OS base. If you are running an earlier release of z/OS, and you use SCRT, make sure that SCRT is at the latest level. This is a requirement for sub-capacity pricing. The latest level of SCRT for releases prior to z/OS V2R3 can be downloaded from the SCRT web site at IBM Z software pricing - Licensing - Sub-capacity licensing.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.3.2 : Restrictions for a z14 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Restrictions that are associated with the IBM z14™ server are described as follows:

  1. Functional limitations. Not all z14 functions are available in every z/OS release. See the tables in the workflow step "Upgrade to an IBM z14 server" for:
    • Summary of which z14 server functions are included in the base support for z/OS V2R2, z/OS V2R3, and z/OS V2R4.
    • Summary of which z14 server functions can be exploited in z/OS V2R2, z/OS V2R3, and z/OS V2R4.

    Some functions have migration or exploitation considerations; see the workflow steps "Actions you can take before you order an IBM z14 server" and "Actions you can take after installing an IBM z14 server." Many functions are enabled or disabled, based on the presence or absence of the required hardware and software.

    If you plan to exploit new z14 functions, you can install the software and hardware in either order; that is, there is no requirement to install either software or hardware first to exploit a specific function. However, because of outage windows and testing considerations, you might want to consider installing all the software and PTFs required for the machine and the functions you plan to exploit first, then upgrade the hardware and, finally, update your customization to exploit the new functions.

  2. z14 servers in a sysplex.
    • A Parallel Sysplex® that contains a z14 server either for a z/OS image or a coupling facility (CF) image can only contain other z14 servers, or z13, z13s, zEC12, or zBC12 servers.

      Note that no coupling link connectivity is possible between IBM zEC12 and IBM zBC12 systems and the IBM z14 Model ZR1. Other systems, such as the z13, z13s, and z14, can connect to the z14 Model ZR1 by using the Integrated Coupling Adapter Short Reach (ICA SR) and the Coupling Express Long Reach (CE LR) coupling links. The zEC12 and zBC12 systems do not support ICA SR or CE LR, and therefore cannot have coupling link connectivity to the z14 Model ZR1. Also, the InfiniBand coupling links are not supported on the z14 Model ZR1.

      GRS supports the use of FICON CTCs for Ring configurations. However, if you are currently using ESCON CTCs for GRS ring configurations within a sysplex, consider converting to GRS Star if possible, or using XCF signaling in a GRS ring configuration. XCF sysplex signaling is preferred instead of GRS CTC connections.

    • Starting with z13, servers that require time synchronization (for example, to support a base or Parallel Sysplex) must be configured in Server Time Protocol (STP) mode. STP is designed to allow multiple servers and coupling facilities to maintain time synchronization with each other, in a coordinated timing network (CTN). STP is a hardware feature of the z14, z13, z13s, zEC12, and zBC12. The most recent servers (z14, z13, and z13s) can participate only in an STP-only CTN.

      Starting with the z14 and the IBM Hardware Management Console (HMC) Version 2.14.0, you can use the Manage System Time task to configure an STP-only CTN. This task provides a simplified workflow for system time management, and features a visual topology display that surfaces configuration errors, if any, in the CTN.

  3. HCD and HCM support for the z14. As with previous servers, hardware can be defined on any supported OS version and server. However, dynamic activation of new server and new adapter types can be done only IBM z14 and later servers.
  4. Environmental Record Editing and Printing (EREP) support for the z14. Starting with the PTF for APAR IO24874, EREP supports any specification for the CPU parameter. That is, EREP does not fail an unrecognized value on the CPU parameter. If no matching records are found, EREP issues warning message IFC120I, as done in previous releases.
  5. Removal of support for running an operating system in ESA/390 architecture mode. Starting with the z14, the IBM Z® servers no longer support running in ESA/390 mode. The z14 and future systems support operating systems running in z/Architecture® mode. However, all 24-bit and 31-bit problem-state application programs that were originally written to run on the ESA/390 architecture are not affected by this change.
  6. Plan for discontinued functions. For a list of functions on the z14 that are planned to be discontinued on future servers, see the workflow step "Accommodate functions for the z14 to be discontinued on future servers."
  7. Unsupported hardware features. The following hardware features are not supported on the z14. They cannot be ordered on the z14 and cannot be carried forward from an upgrade on an earlier server to the z14.
    • Host Channel Adapter fanout:
      • The HCA2-O and HCA2-O LR features are not supported on any of the z14 models.
      • The HCA3-O and HCA3-O LR coupling fanouts are not supported on the z14 Model ZR1. This model requires ICA-SR and CE-LR fanouts.
    • IFB-MP Daughter Card #0326
    • STI-A8 Mother Card #0327
    • InterSystem Channel-3 (ISC-3) coupling links feature
    • CHPID type OSN (OSA-Express for NCP) is not supported on the OSA-Express5S GbE LX feature
    • OSA-Express4S features
    • Crypto Express4S feature
    • FICON Express8 features
    • Flash Express, which is replaced by Virtual Flash Memory on the z14
    • IBM zAware Firmware Appliance. IBM zAware analytics functions are now available through software, starting with IBM Operations Analytics for z Systems® Version 3.1. For more information, go to IBM Operations Analytics for z Systems.
    • STP Mixed CTN. The zEC12 and zBC12 were the last IBM Z® servers to support connections to an STP Mixed CTN. This also includes the Sysplex Timer (9037). Starting with the z13, servers that require Time synchronization, such as to support a base or Parallel Sysplex, require Server Time Protocol (STP) and all servers in that network must be configured in STP-only mode.
    • IBM zEnterprise® Application Assist Processor (zAAP). IBM continues to support running zAAP workloads on IBM z Integrated Information Processors (zIIPs). IBM has removed the restriction preventing zAAP-eligible workloads from running on zIIPs when a zAAP is installed on the CEC. This change was intended to help facilitate migration and testing of zAAP workloads on zIIPs. With a z14, one CP must be installed with the installation of any zIIPs or prior to the installation of any zIIPs. The total number of zIIPs purchased cannot exceed twice the number of CPs purchased. However, for upgrades from zEC12s with zAAPs, conversions from zAAPs can increase this ratio to 4:1.
  8. Carry forward hardware features. The following hardware features are not orderable on z14 servers. If they are installed on your existing server at the time of an upgrade to a z14 server, they can be retained or carried forward.
    • HMC #0092, #0094, #0095, and #0096
    • TKE with/4767 #0096 or #0097
    • OSA-Express4S 1000BASE-T #0408
    • OSA-Express5S GbE LX #0413
    • OSA-Express5S GbE SX #0414
    • OSA-Express5S 10 GbE LR #0415
    • OSA-Express5S 10 GbE SR #0416
    • OSA-Express5S 1000BASE-T #0417
    • FICON Express8S 10KM LX #0409
    • FICON Express8S SX #0410
    • FICON Express16S LX #0418
    • FICON Express16S SX #0419
    • 10GbE RoCE Express #0411
    • TKE workstation #0842
    • TKE workstation w/4767 #0847
    • Addl smart cards #0884
    • TKE Smart Card Reader #0885 or #0891
    • Crypto Express5S #0890
    • Fill and Drain Kit #3378
    • Universal Lift Tool/Ladder #3759.

    For information about supported storage controllers, see the step called "Ensure that you are using supported servers, storage controllers, and machine facilities."

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.3.3 : Actions you can take before you order an IBM z14 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

These are upgrade actions that you perform on your current system, either because they require the current system or because they are possible on the current system. You do not need the z14™ server to make these changes, and the changes do not require the z14 server once they are made. For example, discontinuing use of hardware that is no longer supported.

You can perform the following upgrade actions before you order or install a z14 server:

  1. Review the Large Systems Performance Reference (LSPR). LSPR is designed to provide comprehensive z/Architecture processor capacity ratios for different configurations of central processors (CPs) across a wide variety of system control programs and workload environments.
  2. Review the sysplex configuration in which the z14 server will participate. See the workflow step "Restrictions for a z14 server" for a description of the limitations when using z14 server with certain earlier servers in a Parallel Sysplex.
  3. Implement an STP timing network. This action is needed because Sysplex Timers (9037-002) are not supported on z14 servers.
  4. Upgrade from ISC-3 links to the Integrated Coupling Adapter (ICA) links. This action is needed because ISC-3 links are not supported on z14 servers. If desired, you can take this action after you order a z14 server, as you upgrade to the new server.
  5. Upgrade from InfiniBand coupling links, if you are ordering a z14 Model ZR1. For connectivity to other systems, the z14 ZR1 requires Integrated Coupling Adapter Short Reach (ICA SR) and the Coupling Express Long Reach (CE LR) coupling links. The z14 ZR1 does not support InfiniBand coupling links.
  6. Upgrade from unsupported hardware features to newer technology. This action is needed because specific features are not available on the z14 server. For example, Crypto Express4S and OSA-Express4 are not supported. For more information, see the following steps:
    • "Restrictions for a z14 server"
    • "Replace unsupported devices"
    • "Provide for new device installations"
  7. Determine the level of cryptographic support you require on a z14 server. The level of function that is provided for cryptographic support differs by z/OS release and the installed ICSF web deliverable. Also, toleration PTFs are available for some cryptographic web deliverables.

    For z/OS V2R3, consider the following:

    • If you are using the level of ICSF that is shipped as part of z/OS V2R3 (FMID HCR77C0), you can use most functions of the Crypto Express6S feature on a z14 server.
    • ICSF Web Deliverable HCR77C1 - Cryptographic Support for z/OS V2R1 - z/OS V2R3 provides some additional function and also incorporates enhancements that are available in PTFs for the base level of ICSF included in z/OS V2R3. The web deliverable includes support for a PCI HSM (“Payment Card Industry Hardware Security Module”) configured CCA coprocessor. Crypto Express6S also introduces the use of X.509 certificates in CCA.
    • If you are using this web deliverable and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs identified by the following Fix Category: IBM.Coexistence.ICSF.z/OS_V2R1-V2R3-HCR77C1

    For z/OS V2R2, consider the following:

    • If you are using the level of ICSF that is shipped as part of z/OS V2R2 (FMID HCR77B0), you can use most functions of the Crypto Express6S feature on a z14 server.
    • ICSF Web Deliverable HCR77C1 - Cryptographic Support for z/OS V2R1 – z/OS V2R3 provides some additional function and also incorporates enhancements that are available in PTFs for the base level of ICSF included in z/OS V2R2. The web deliverable includes support for a PCI HSM (“Payment Card Industry Hardware Security Module”) configured CCA coprocessor. Crypto Express6S also introduces the use of X.509 certificates in CCA.

    For z/OS V2R1, consider the following:

    • If you are using the level of ICSF that is shipped as part of z/OS V2R1 (FMID HCR77A0), Crypto Express5S is tolerated on a z14 server, which treats Crypto Express5S cryptographic coprocessors and accelerators as Crypto Express4S coprocessors and accelerators. However, you must install the required PTFs identified by the SMP/E fix category:
      • For IBM z14 models M01 through M05, use FIXCAT value IBM.Device.Server.z14-3906.RequiredService
      • For IBM z14 Model ZR1, use FIXCAT value IBM.Device.Server.z14ZR1-3907.RequiredService
    • If you require support for more than 16 domains on Crypto Express5S, you must install the PTFs that are identified by the appropriate fix category for your z14 server (either IBM.Device.Server.z14-3906.Exploitation or IBM.Device.Server.z14ZR1-3907.Exploitation), or install the ICSF Web Deliverable HCR77C1 - Cryptographic Support for z/OS V2R1 – z/OS V2R3, or a later ICSF web deliverable.
    • If you require Crypto Express4S functionality for CCA 4.4 and other EP11 cryptographic enhancement support that includes: RKX Key Export Wrap, UDX simplification, more EP11 algorithms, expanded EMV support, AP Configuration simplification, CTRACE Enhancements, and KDS Key Utilization stats, you must download and install the Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77A1) or the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77B0) or a later ICSF web deliverable. Note:

      If you are using the Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77A1) or a later ICSF web deliverable, and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs listed here, which are identified by fix category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77A1, or the FIXCAT for the ICSF level that you are using.

    • If you require Crypto Express6S exploitation support for the next Generation Coprocessor support or VISA Format Preserving Encryption (FPE), you must download and install the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77B0) or a later ICSF web deliverable. Note:

      If you are using ICSF Web Deliverable HCR77C1 - Cryptographic Support for z/OS V2R1 – z/OS V2R3, or a later ICSF web deliverable, and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs listed here, which are identified by fix category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B0, or a later ICSF web deliverable.

  8. Install the necessary z/OS service. IBM recommends that you use the SMP/E REPORT MISSINGFIX command to identify PTFs for the z14 server that you do not already have installed. The simplest way to do that is to specify IBM.Device.Server.* and IBM.Function.* as the fix categories for the REPORT MISSINGFIX command. Doing so will identify not only z14 support PTFs, but those for prior generations of IBM servers that you might need, and those required to enable various functions. Also, REPORT MISSINGFIX creates a batch job for the SMP/E RECEIVE ORDER command that you can use to get any PTFs you do not already have. SMP/E also provides an Explorer function that you can use to find new fix categories that might be of interest. For a description of all the fix categories, see the Values and Descriptions page at IBM Fix Category Values and Descriptions. For more information about the REPORT MISSINGFIX command, see z/OS SMP/E Commands.

    Here is an example of the SMP/E control statements you can use for REPORT MISSINGFIX:

    SET BDY(GLOBAL) . REPORT MISSINGFIX ZONES(target zone) FIXCAT(IBM.Device.Server.* IBM.Function.*) .

    If you want to use specific fix categories, you can specify the following fix categories either individually or together for the z/OS PTFs that are required to use a z14 server, exploit its functions and features, and those that IBM recommends you install if you are using a z14 server. Also needed are the FIXCATs for intermediate processors.

    • For IBM z14 models M01 through M05:
      • IBM.Device.Server.z14-3906.RequiredService
      • IBM.Device.Server.z14-3906.Exploitation
      • IBM.Device.Server.z14-3906.RecommendedService
    • For IBM z14 Model ZR1:
      • IBM.Device.Server.z14ZR1-3907.RequiredService
      • IBM.Device.Server.z14ZR1-3907.Exploitation
      • IBM.Device.Server.z14ZR1-3907.RecommendedService

    In addition, if you choose to use specific fix categories, your environment might require that you specify one or more of these fix categories:

    • IBM.Function.DataSetEncryption
    • IBM.Function.ParallelSysplexInfiniBandCoupling
    • IBM.Function.PricingInfrastructure
    • IBM.Function.ServerTimeProtocol
    • IBM.Function.UnifiedResourceManager
    • IBM.Function.zEDC
    • IBM.Function.zHighPerformanceFICON
    • IBM.Function.zHyperLink

    If you are exploiting z14 capabilities by installing a web deliverable, additional PTFs might be required. Follow the instructions in the Program Directory that is associated with each web deliverable to identify the required PTFs.

    Another way to find required PTFs is by using Preventive Service Planning (PSP) "buckets." In addition to the applicable hardware PSP buckets, you must also obtain the software PSP buckets. The hardware PSP bucket lists the recommended, required, and exploitation PTFs, and also includes information about the appropriate fix categories that are needed to identify those PTFs. However, using PSP buckets and checking on the status of the PTFs listed in them is more time-consuming and potentially error-prone than using REPORT MISSINGFIX with the appropriate fix categories. 1

  9. Run the CFSIZER tool. If you are moving your coupling facilities and the coupling facility structures are on a higher CFLEVEL than they were previously, run the Coupling Facility Structure Sizer (CFSIZER) tool to find out if you have to increase coupling facility structure sizes. Prepare to make the necessary changes to the CFLEVEL as indicated by the tool.

    You can download the CFSIZER tool at Coupling Facility sizer. Also, see the workflow step "Update your CFRM policy with coupling facility structure size changes."

    Note: After you make a coupling facility available on the new hardware, you can run the Sizer utility, an authorized z/OS program to evaluate structure size changes. The Sizer utility is distinct from CFSizer, and should be run after the new hardware (CFLEVEL) is installed, but before any CF LPAR on the new hardware is populated with structures. You can download the Sizer utility at CFSizer Alternate Sizing Techniques.

  10. Prepare for the new machine instruction mnemonics. The instruction set has been expanded on the z14 server, as is usual for new servers. Each machine instruction is represented by a mnemonic in Assembler language. The new mnemonics can be identical to the names you chose for Assembler macro instructions. In the event of such naming collisions, the Assembler's default opcode table (UNI) processes new mnemonics as instructions, not as macros, after z14 required service has been installed. If this occurs, it is likely to cause Assembler error messages and can cause incorrect object code to be generated. If you write programs in Assembler Language, compare the names of Assembler macro instructions that are used to the new machine instructions (documented in the latest z/Architecture Principles of Operation, SA22-7832) to identify any such conflicts or collisions that would occur. Identical names cause Assembler errors or the generation of incorrect object code when you assemble your programs. For information about a tool to help in identifying mnemonic conflicts, see IBM Techdocs. Search for the Techdoc PRS5289.

    If a conflict is identified, take one of these actions:

    • Change the name of your macro instruction.
    • Specify PARM='...OPTABLE(YOP)...' (or some other earlier opcode table).
    • Specify a separate ASMAOPT file containing assembler options such as in the previous method (this method requires no changes to source code or JCL).
    • Add as the first statement of your source program: *PROCESS OPTABLE(YOP) (or some other earlier opcode table).
    • Specify the PROFILE option either in JCL or the ASMAOPT file, and the specified or default member of the SYSLIB data set is copied into the front of the source program.
    • If you must use both a new instruction and a macro with the same name in an assembly, you can use a coding technique that permits both use of a new instruction and a macro with the same name in an assembly such as HLASM mnemonic tags ( :MAC:ASM).
  11. Accommodate the changes to default ARCH and TUNE level. Starting with z/OS V2R3, the default ARCH level is changed from ARCH(8) to ARCH(10), and the default TUNE level is changed from TUNE(8) to TUNE(10). The new default levels align with the zEC12; thus, code can run on any server that is supported by z/OS V2R3 without requiring changes to compiler options. However, if you compile programs to be run on processors at lower architecture levels, you must specify the appropriate ARCH and TUNE levels when you compile those programs.

    The z14 supports the new levels ARCH(12) and TUNE(12), which are needed to take advantage of the new z14 instructions, and are intended to provide performance improvements for applications. ARCH(12) produces code that uses instructions that are available on the z14 in z/Architecture mode. The z14 adds instructions for vector programming, including allowing packed decimal operations to be performed in registers rather than memory. TUNE(12) generates code that is executable on all models, but is optimized for the z14.

  12. Update I/O Configuration Program (IOCP) for earlier FICON cards. To continue using FICON Express8S cards, you must specify the new IOCP keyword MIXTYPE.
  13. Use the LOADxx MACHMIG statement to help with upgrade. In the LOADxx member, you can include the new MACHMIG statement to specify particular z14 hardware facilities that you want to disable during your upgrade to another processor, z/OS release, or both. You can exclude the following z14 facilities:
    • Hardware-based enhanced-DAT facility (EDAT2)
    • Hardware-based transactional-execution facility (TX)
    • Hardware-based vector registers (VR) in support of SIMD (VEF)
    • Guarded Storage Facility (GSF).

    If you omit the MACHMIG statement, z/OS does not limit its use of the machine facilities.

  14. Decide on the steps to take for your upgrade to a z14 server. Besides the steps that are listed here, see the following workflow step for guidance: "Actions you can take after installing an IBM z14 server."

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.3.4 : Actions you can take after installing an IBM z14 server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

These are upgrade actions that you perform only after you have installed the z14 server. You need a running z14 server to perform these actions.

For more information about PTFs, see the notes for Table 1 in the workflow step "Migrate to an IBM z14 server."

  1. FICON Express16S. FICON Express16S supports a link data rate of 16 gigabits per second (Gbps) and auto-negotiation to 4 or 8 Gbps for synergy with existing switches, directors, and storage devices. With support for native FICON, High Performance FICON for z IBM z Systems (zHPF), and Fibre Channel Protocol (FCP), the new FICON Express16S channel is designed to work with your existing fiber optic cabling environment. The FICON Express16S feature running at end-to-end 16 Gbps link speeds can provide reduced latency for large read/write operations, and increased bandwidth compared to the FICON Express8S feature.
  2. Upgrade to Virtual Flash Memory (VFM). IBM Virtual Flash Memory (VFM) is the replacement for the Flash Express features (#0402, #0403) which were available on the IBM zEC12 and IBM z13. No application changes are required to change from IBM Flash Express to VFM. Ensure that you replace your Flash memory with adequate VFM.
  3. Upgrade actions for Hardware Instrumentation Services (HIS). New diagnostic samples are added for the z14. If you want to ignore them, you might need to update your HIS profilers. Also, to tolerate the new counters (cycle and instruction) in the Problem Counter Set, you might need to update your HISSERV profilers, SMF 113 records, or z/OS UNIX System Services counter file consumers. For more information, see the topic "Starting, configuring, and stopping hardware event data collection" in z/OS MVS System Commands. Note:

    As of z/OS V2R1, if you use the CPU Measurement Facility, IBM recommends that your installation collect SMF 113 subtype 1 and 2 records. IBM also recommends that products process SMF 113 subtype 1 records when available because that is where future enhancements are made. If subtype 1 records are not available, products can process subtype 2 records.

  4. Enable BCPii communications on the support element. For Support Elements that run on the z14, the setting for the “Cross Partition Authority” option is replaced by new security settings on the System Details panel and the Customize Image Profiles panel.

    For more information, see the workflow step named "Enable BCPii communications on the support element."

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.3.5 : Accommodate functions for the z14 to be discontinued on future servers


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Note:

IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

Description

The following changes in hardware support could affect your environment. Make the appropriate changes, as needed.

  1. Removal of support for Host Channel Adapter fanout optical features. The z14™ is the last IBM Z® high-end server to support HCA3-O fanout (#0171) and HCA3-O LR fanout for 1x IFB (#0170). Note:

    The z14 Model ZR1 does not support the HCA3-O or the HCA3-O LR coupling fanouts. This model requires ICA-SR and CE-LR fanouts.

    Enterprises should begin migrating from HCA3-O and HCA3-O LR channels to one of the following coupling links on the z14, z13, and z13s.

    • For high-speed short-range coupling connectivity, the IBM Integrated Coupling Adapter (ICA SR). The ICA SR is a two-port, short-distance coupling fanout that uses a new coupling channel type: CS5. The ICA SR can only be used for coupling connectivity between z14, z13, and z13s servers. The ICA SR fanout requires new cabling, and can only connect to another ICA SR.
    • For long-range coupling connectivity, the Coupling Express Long Reach (CE LR). The CE LR is a two-port, long-distance coupling adapter that uses a new coupling channel type: CL5. The CE LR can only be used for coupling connectivity between z14, z13, and z13s servers.

    The suggested practice is to order ICA SR (#0172) or CE LR (#0433) on the z14 processors that are used in a Parallel Sysplex to help ensure coupling compatibility with future processor generations.

  2. Removal of FICON Express8S support. The z14 is the last IBM Z® high-end server to support FICON Express8S (#0409 and #0410) channels. Your installation should begin migrating from FICON Express8S channels to FICON Express16S+ channels(#0427 and #0428). FICON Express8S will not be supported on future high-end IBM Z® servers as carry forward on an upgrade.
  3. Removal of support for the zEDC Express. The z14 is the last IBM Z® high-end server to support the zEDC Express (#0420). In the future, IBM Z® high-end server compression acceleration functionality moves from the zEDC adapter to processors.
  4. Removal of support for OSA-Express6S 1000BASE-T adapters. The OSA-Express6S 1000BASE-T adapter (#0426) is the last generation of OSA 1000BASE-T adapters to support connections operating at 100 Mb/second link speed. Future OSA-Express 1000BASE-T adapter generations will support operation only at 1000 Mb/second (1 Gb/s) link speed.
  5. Removal of support for sysplex coexistence between zEC12 and zBC12 servers and future servers.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.4 : Upgrade to an IBM z13 or IBM z13s server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

Description

z/OS running on the z13 or z13s sets the groundwork for digital business by providing the foundation you need to support demanding workloads, such as operational analytics and clouds, and your traditional mission-critical applications.

In a Parallel Sysplex that includes a z13 or z13s with either a z/OS system running in at least one LPAR or at least one LPAR being used as a coupling facility (CF), you can include the following servers:

  • z13 and z13s servers
  • zEC12 and zBC12 servers
  • zEnterprise servers (z196 or z114)

The specific z13 and z13s functions, including base support, that are used by z/OS depend on the z/OS release. PTFs might be required for many of these functions. See the workflow step called "Actions you can take before you order a z13 or z13s server" for information about finding the appropriate PTFs.

The following table shows a summary view of which z13 and z13s server functions are included in the base support for z/OS V2R3, z/OS V2R4, and z/OS V2R5.

z13 and z13s function included in base z/OS support (Y/N)

V2R3¹

V2R4¹

V2R5¹

Base support

Y

Yes, and in PTFs

Yes, and in PTFs

CHPID type CS5 for coupling

Y

Y

Y

CHPID type OSE supporting 4 or 2 ports per feature

Y

Y

Y

CHPID type OSM for intranode management network (INMN)

Y

Y

Y

CHPID type OSN for OSA-Express for NCP (LPAR-to-LPAR)

Y

Y

Y

CPU measurement facility

Y

Y

Y

Crypto Express5S Toleration

Y

Y

Y

FICON Express 8S (CHPID FC)

Y

Y

Y

FICON Express16S (CHPID FC)

Y

Y

Y

IBM z BladeCenter Extension (zBX) Model 004

Y

Y

Y

IBM z Unified Resource Manager

Y

Y

Y

New z13 machine instruction (assembler support)

Y

Y

Y

OSA-Express4S (GbE LX and SX, 1000BASE-T, 10 GbE LR and SR)

Y

Y

Y

OSA-Express5S (GbE LX and SX, 1000BASE-T, 10 GbE LR and SR)

Y

Y

Y

Parallel Sysplex InfiniBand (PSIFB) Coupling Link

Y

Y

Y

z/OS global resource serialization (GRS) support for FICON CTCs

Y

Y

Y

Note:
  1. PTFs for base support have the following fix categories:
    • For z13: IBM.Device.Server.z13-2964.RequiredService
    • For z13s: IBM.Device.Server.z13S-2965.RequiredService

The following table shows a summary view of which z13 and z13s server functions can be exploited in z/OS V2R3, z/OS V2R4, and z/OS V2R5.

z13 and z13s function included in base z/OS support (Y/N)

V2R3²

V2R4²

V2R5²

Coupling Facility Control Code Level 20 (CFLEVEL 20)

Y

Y

Y

CFCC Dump Reasons support for CFLEVEL 21

Y

Y

Y

Crypto Express5S support for up to 85 Domains

Y

Y

Y

High Performance FICON (zHPF)

Y

Y

Y

IBM Integrated Coupling Adapter (ICA SR)

Y

Y

Y

Support for 256 coupling CHPIDs

Y

Y

Y

2 GB Large Pages

Y

Y

Y

Checksum offload for IPv6 packets (CHPID OSD)

Y

Y

Y

Checksum offload for LPAR-to-LPAR traffic for IPv4 and IPv6 packets (CHPID OSD)

Y

Y

Y

Crypto Express5S support of VISA Format Preserving Encryption (FPE), Next Generation Coprocessor support

Y

Y

Y

Flash Express (Storage Class Memory or SCM)

Y

Y

Y

IBM System Advanced Workload Analysis Reporter (IBM zAware)

Y

Y

Y

Inbound workload queuing for Enterprise Extender (CHPID OSD)

Y

Y

Y

Large Send for IPv6 packets (CHPID OSD)

Y

Y

Y

Manage FICON Dynamic Routing Support

Y

Y

Y

Transactional memory

Y

Y

Y

Up to 4 Subchannels Sets per CSS (z13)

Y

Y

Y

Up to 3 Subchannels Sets per CSS (z13s)

Y

Y

Y

Up to 85 LPARs (z13)

Y

Y

Y

Up to 40 LPARs (z13s)

Y

Y

Y

Greater than 100 CPs per z/OS system image

Y (z13 only). The z13 can have a maximum of 128 CPs in non-SMT mode, or up to 213 threads in SMT mode.

The z13s can have a maximum of 40 CPs in non-SMT mode, or up to 66 threads in SMT mode.

Y (z13 only). The z13 can have a maximum of 128 CPs in non-SMT mode, or up to 213 threads in SMT mode.

The z13s can have a maximum of 40 CPs in non-SMT mode, or up to 66 threads in SMT mode.

Y (z13 only). The z13 can have a maximum of 128 CPs in non-SMT mode, or up to 213 threads in SMT mode.

The z13s can have a maximum of 40 CPs in non-SMT mode, or up to 66 threads in SMT mode.

Miscellaneous PCIe enhancements

Y

Y

Y

RoCE Express for Shared Memory Communications-Remote (SMC-R) Direct Memory Access including shared RoCE Express support

Y

Y

Y

Shared Memory Communications-Direct Memory Access (SMC-D)

Y

Y

Y

Simultaneous multithreading (SMT)

Y

Y

Y

Single Instruction Multiple Data (SIMD) instruction set

Y

Y

Y

XL C/C++ support of ARCH(11) and TUNE(11) parameters

Y

Y

Y

zEDC capability using zEDC Express

Y

Y

Y

Notes:
  1. PTFs for base support have the following fix categories:
    • For z13: IBM.Device.Server.z13-2964.RequiredService
    • For z13s: IBM.Device.Server.z13S-2965.RequiredService
  2. PTFs for exploitation have the following fix categories:
    • For z13: IBM.Device.Server.z13-2964.Exploitation
    • For z13s: IBM.Device.Server.z13S-2965.Exploitation

Web deliverables are available from the z/OS downloads page at z/OS downloads.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

  • IBM z13®, which first shipped March 2015.
  • z13s, which first shipped March 2016.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3¹.

Timing:

Anytime before you introduce a z13 or z13s server into your environment.

Is the upgrade action required?

Yes, if you want to run z/OS V2R4 or z/OS V2R3 on a z13 or z13s server, or if you want to run a coupling facility on a z13 or z13s server. If you plan to run only a coupling facility on a z13 or z13s system, only the sysplex-related actions are relevant. However, you must install the appropriate z/OS service for systems that are running on other servers that use the z13 or z13s coupling facilities.

Target system hardware requirements:

  • A z13 or z13s
  • Additional hardware required for specific functions.
    • IBM devices previously attached to zEC12, zBC12, and zEnterprise servers are supported for attachment to z13 or z13s channels, unless otherwise noted. The subject I/O devices must meet FICON architecture requirements
    • IBM zAware requires the following server firmware:
      • IBM zAware 10 pack FC #1010
      • IBM zAware 10 pack on a Disaster Recovery Server FC #1011
    • Flash Express requires FC #0403
    • zEDC Express requires FC #0420
    • 10 GbE RoCE Express FC #0411
    • Use of IBMWebSphere DataPower® Integration Appliance XI50 for zEnterprise (DataPower XI50z) or select IBM BladeCenter PS701 Express blades or IBM BladeCenter HX5 blades requires a z BladeCenter Extension (zBX) Model 004
    • z BladeCenter Extension (zBX) Model 004 requires:
      • AIX® 5.3, AIX 6.1, AIX 7.1 and up, and PowerVM® Enterprise Edition (on POWER7® blade)
      • Red Hat RHEL 5.5, 6.0, 7.0 and up, SLES 10 (SP4), 11 (SP1), 12 and up, 64-bit only (on HX5 blade)
      • Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2008 R2, and Microsoft Windows Server 2008 (SP2) (Datacenter Edition recommended), 64-bit only (on HX5 blade)
    • Use of hardware acceleration for cryptographic operations, including the use of the Visa, Inc. Data Secure Platform (DSP) functions requires a CPACF (FC #3863) or a CEX5S (FC #0890) feature, or both.

      See Table Note 1.

  • Use of a Trusted Key Entry (TKE) workstation requires FC #0847.

Target system software requirements:

For more information, see the step "Support is delivered by service, z/OS features, and web deliverables" under "General recommendations and considerations for a z13 server." You install the required service updates on your system when you perform the step "Install the necessary z/OS service" under "Actions you can take before you order an IBM z13 server."

Other system (coexistence or fallback) requirements:

  • It is recommended that you install and run the required service on your existing server. This will enable you to fall back from a hardware perspective, yet maintain your software level.
  • If you have not installed the preconditioning and exploitation PTFs for CFLEVEL 17-19, note that those PTFs are required to be installed throughout your sysplex before implementing CFLEVEL 20 or CFLEVEL 21.
  • If you plan to implement zEDC, you should install the z/OS toleration PTFs on systems that access data that is compressed using zEDC Express on a z13 or z13s server.
  • If you are using ICSF and plan to share keys with other z/OS systems that have an earlier level of ICSF, you should install the ICSF coexistence PTFs on those earlier levels of ICSF.

Restrictions:

See the substeps in the workflow step "Restrictions for a z13 server."

System impacts:

None.

Related IBM Health Checker for z/OS check:

A health check for FICON dynamic routing, CHECK(IBMIOS,IOS_FABRIC_MONITOR), is available with the PTF for APAR OA40548 for z/OS V2R1, and is included in z/OS V2R3. This health check is designed to check all components of a dynamic routing fabric, the channel subsystem, and disk control units to make sure that dynamic routing requirements are met if dynamic routing is enabled for one or more FICON switches. This support is intended to help you identify misconfiguration errors that can result in data integrity exposures.

Table Note:
  1. IBM Z® cryptography features include VISA Format Preserving Encryption (VFPE) technology, which forms part of the Visa, Inc. Data Secure Platform (DSP). The use of VFPE technology requires a service agreement with Visa, Inc. For details, contact your Visa account manager or Visa at P2PE@visa.com. Clients who use IBM Z® cryptography features, but do not make use of the FPE functionality, are not required to enter into any such agreement with Visa.

Steps to take

Continue your upgrade to the z13 by performing the following steps in this workflow. Each step contains a number of sub-steps.

  • "General recommendations and considerations for a z13 server"
  • "Restrictions for a z13 server"
  • "Actions you can take before you order an IBM z13 server"
  • "Actions you can take after installing an IBM z13 server"
  • "Accommodate functions for the z13 to be discontinued on future servers"

Reference information

For more information about new functions to exploit, see the IBM z13 Library, which is available online in Resource Link™.


Step 3.2.4.1 : General recommendations and considerations for a z13 or z13s server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

As you plan your migration to a z13 or z13sTM server, consider the following:

  1. Relatively few upgrade actions are new when coming from an IBM zEnterprise EC12 or zEnterprise BC12 server. Migration to an IBM z13 or IBM z13s® server has, as its base, a migration to the IBM zEnterprise EC12 or zEnterprise BC12 servers. This means that if you are migrating to a z13 or z13s server from a zEC12 or zBC12 server, and have performed the upgrade actions that are associated with the zEC12 or zBC12, you have fewer upgrade actions than if you were migrating from an earlier generation server and have not yet performed the upgrade actions that are associated with these servers. It is important to note that you can migrate directly to a z13 or z13s server without installing the intermediate servers, but you still need to ensure that any migration considerations are satisfied for the servers that you skipped. To review the zEC12 and zBC12 server upgrade actions, see the workflow step "Upgrade to an IBM zEnterprise EC12 or IBM zEnterprise BC12 server" and its substeps.
  2. Support is delivered by service, z/OS features, and web deliverables. The base support for the z13 and z13s is delivered by service (PTFs).
    • The PSP bucket that contains the required list of PTFs for the z13 server is: Upgrade 2964DEVICE, Subset 2964/ZOS and is identified by the following SMP/E Fix Category IBM.Device.Server.z13-2964.RequiredService
    • The PSP bucket that contains the required list of PTFs for the z13s server is: Upgrade 2965DEVICE, Subset 2965/ZOS and is identified by the following SMP/E Fix Category IBM.Device.Server.z13S-2965.RequiredService.

    Exploitation of some functions requires a web deliverable. Specifically:

    • If you are running z/OS V2R1 and require Crypto Express4S functionality for CCA 4.4 and other EP11 cryptographic enhancement support that includes: RKX Key Export Wrap, UDX Reduction/simplification, additional EP11 algorithms, expanded EMV support, AP Configuration simplification, CTRACE Enhancements, and KDS Key Utilization Stats, then you must download and install the Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77A1) or the Cryptographic Support for z/OS V1R13 - z/OS V2R2 web deliverable (HCR77B1).

      If you are using either of these web deliverables (HCR77A1 or HCR77B1) and sharing keys with other z/OS systems that have a lower-level of ICSF, you require the coexistence PTFs identified by the appropriate Fix Category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77A1 or IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B1.

    • If you are running z/OS V2R1 and require Crypto Express5S exploitation support for the next Generation Coprocessor support or VISA Format Preserving Encryption (FPE), you must download and install the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77B0) or the Cryptographic Support for z/OS V1R13 - z/OS V2R2 web deliverable (HCR77B1).

      If you are using either of these web deliverables (HCR77B0 or HCR77B1) and sharing keys with other z/OS systems that have a lower-level of ICSF, you require the coexistence PTFs identified by the appropriate Fix Category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B0 or IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B1.

    • If you are running z/OS V2R1 and require exploitation of new hardware instructions using XL C/C++ ARCH(11) and TUNE(11) including SIMD, vector programming, MASS and ATLAS libraries, you must download and install the XL C/C++ V2R1M1 web deliverable with z13 support for z/OS 2.1.
    • If you are running z/OS V1R13 and want to exploit Flash Express (including pageable 1 MB Large Page Support, optional paging of PLPA and Common (CSA, ECSA) pages to Flash Express, and Dynamic reconfiguration support for Flash Express); or 2 GB Large Page support, you must download and install the z/OS V1.13 RSM Enablement Offering Web deliverable and install the required PTFs identified by the Fix Category.
    • If you are running z/OS V1R13, you might need to install a Cryptographic Support web deliverable, depending on which ICSF functions you require.
  3. Larger coupling facility structure sizes might be necessary. When you change the coupling facility control code level (CFLEVEL), your coupling facility structure sizes might change. If, as part of your migration to a z13 server, you change the CFLEVEL, you might have larger structure sizes than you did previously. If your CFLEVEL is identical, structure sizes are not expected to change when you migrate from a previous server to a newer generation server. In addition, similar to CFLEVEL 17 and later, ensure that the CF LPAR has at least 512MB of storage. CFLEVEL Levels 20 and 21, introduced on the z13 and 13s, support the Coupling Facility use of Large Memory to improve availability for larger CF cache structures and data sharing performance with larger DB2 Group Buffer Pools (GBP). This support removes inhibitors to using large CF cache structures, enabling use of Large Memory to appropriately scale to larger DB2 Local Buffer Pools (LBP) and Group Buffer Pools (GBP) in data sharing environments.
  4. Use the same software level throughout a sysplex. Having members of a sysplex at the same software level (other than during brief migration periods) is good software management policy.
  5. Migrate hardware and software at different times. To minimize the amount of change (and therefore risk) that you experience at one time, do not migrate your software release level at the same time that you migrate your hardware.
  6. Use the latest version of SCRT. In z/OS V2R3, you do not need to update SCRT because it is included in the z/OS base. If you are running an earlier release of z/OS, and you use SCRT, make sure that SCRT is at the latest level. This is a requirement for sub-capacity pricing. The latest level of SCRT for releases prior to z/OS V2R3 can be downloaded from the SCRT web site at IBM Z software pricing - Licensing - Sub-capacity licensing.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMIOS,IOS_FABRIC_MONITOR.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".

NOTE: The successful running of this IBM Health Checker for z/OS check only partially covers this upgrade action. Refer to the upgrade action text for the complete list of steps to take.


Step 3.2.4.2 : Restrictions for a z13 or z13s server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Restrictions associated with the z13™ and z13s™ servers are described as follows:

  1. Functional limitations. Not all z13 or z13s functions are available in every z/OS release. See the tables in the workflow step "Upgrade to an IBM z13 or z13s server" for:
    • Summary of which server functions are included in the base support for z/OS V2R2, z/OS V2R3, and z/OS V2R4.
    • Summary of which server functions can be exploited in z/OS V2R2, z/OS V2R3, and z/OS V2R4.

    Some functions have migration or exploitation considerations. For information, see the workflow steps "Actions you can take before you order a z13 or z13s server" and "Migration and exploitation considerations for z13 and z13s server functions." Many functions are enabled or disabled, based on the presence or absence of the required hardware and software.

    If you plan to exploit new z13 or z13s functions, you can install the software and hardware in either order; that is, there is no requirement to install either software or hardware first to exploit a specific function. However, because of outage windows and testing considerations, you might want to consider installing all the software and PTFs required for the machine and the functions you plan to exploit first, then upgrade the hardware and, finally, update your customization to exploit the new functions.

  2. z13 and z13s servers in a sysplex.
    • A Parallel Sysplex that contains a z13 or z13s server either for a z/OS image or a CF image can only contain other z13 or z13s servers, or z196, z114, zEC12, or zBC12 servers.

      If you are running z/OS on any servers earlier than a z196 or z114 server, you cannot add a z13 or z13s server to that sysplex; that is, you will not be able to perform rolling IPLs to introduce a z13 or z13s server if you have any of the earlier servers as z/OS images or coupling facility images in the sysplex.

      The earlier servers in the sysplex must be upgraded to z196, z114, or later to have z13 or z13s servers supported in the sysplex. If you have any z/OS images or coupling facility images on an earlier server, and you intend to introduce a z13 or z13s server into that sysplex, you must migrate those images to a z196, z114, or later server before introducing the z13 or z13s server.

      GRS supports the use of FICON CTCs for Ring configurations. However, if you are currently using ESCON CTCs for GRS ring configurations within a sysplex, consider converting to GRS Star if possible, or using XCF signalling in a GRS ring configuration. XCF sysplex signalling is preferred instead of GRS CTC connections.

    • InterSystem Channel 3 (ISC-3) and Integrated Cluster Bus 4 (ICB-4) Coupling Links are not supported on z13 or z13s CPC. Instead, the IBM Integrated Coupling Adapter (ICA SR), introduced on the z13 and z13s, is a two-port, short distance coupling fanout that utilizes a new coupling channel type: CS5. The ICA SR can only be used for coupling connectivity between z13 or z13s servers, and the ICA SR can only connect to another ICA SR. IBM recommends that you order ICA SR (#0172) on the z13 processors used in a Parallel Sysplex to help ensure coupling compatibility with future processor generations. You can also use 12x InfiniBand coupling links, which are designed to replace Integrated Cluster Bus 4 (ICB-4), and to complement 1x InfiniBand and ISC-3 on a z13 or z13s server. InfiniBand coupling can provide significantly improved service times compared to ISC-3s for distances up to 150 meters. You can read about coupling links in IBM System z® Connectivity Handbook (SG24-5444).
    • The z13 or z13s server cannot be connected to a Sysplex Timer (9037-002). The Server Time Protocol (STP) feature is the follow-on to the Sysplex Timer. STP is designed to allow multiple servers and coupling facilities to maintain time synchronization with each other without requiring a Sysplex Timer. STP is a hardware feature of the z13, z13s, zEC12, zBC12, z196, and z114. For more information about how to implement STP, see the Server Time Protocol (STP) website.

      The STP design introduced a concept called Coordinated Timing Network (CTN). A CTN is a collection of servers and coupling facilities that are time-synchronized to a time value called Coordinated Server Time. A CTN can be configured in two ways:

      • STP-only CTN, which does not require a Sysplex Timer. A z13 or z13s must participate in an STP-only CTN.
      • Mixed-CTN (External Time Reference and STP), which does require a Sysplex Timer. zEC12 and zBC12 were the last servers to support mixed-CTN. The z13 and z13s do not support connections to a Mixed-CTN. All servers in the network must be configured in STP-only mode. Consider migrating servers that require time synchronization, such as to support a base or Parallel Sysplex, to the Server Time Protocol (STP).

    For more information, see the following references:

  3. Plan for discontinued functions. For a list of functions on the z13 server that are planned to be discontinued on future servers, see the workflow step "Accommodate functions for the z13 server or z13s to be discontinued on future servers."
  4. Unsupported hardware features. The following hardware features cannot be ordered and cannot be carried forward from an upgrade on an earlier server to the z13 server.
    • HCA2-O
    • HCA2-O LR
    • ISC-3 links
    • CHPID type OSN (OSA-Express for NCP) is not supported on the OSA-Express5S GbE LX feature
    • Crypto Express3 (#0864)
    • Crypto Express4S (#0865)
    • STP Mixed CTN. The zEC12 and zBC12 were the last IBM Z® servers to support connections to an STP Mixed CTN. This also includes the Sysplex Timer (9037). Starting with z13, servers that require Time synchronization, such as to support a base or Parallel Sysplex, will require Server Time Protocol (STP) and all servers in that network must be configured in STP-only mode.
    • IBM zEnterprise Application Assist Processor (zAAP). IBM continues to support running zAAP workloads on IBM z Integrated Information Processors (zIIPs). IBM has removed the restriction preventing zAAP-eligible workloads from running on zIIPs when a zAAP is installed on the CEC. This change was intended to help facilitate migration and testing of zAAP workloads on zIIPs. With a z13, one CP must be installed with the installation of any zIIPs or prior to the installation of any zIIPs. The total number of zIIPs purchased cannot exceed twice the number of CPs purchased. However, for upgrades from zEC12s with zAAPs, conversions from zAAPs may increase this ratio to 4:1.
  5. Carry forward hardware features. The following hardware features are not orderable on z13 servers. If they are installed on your existing server at the time of an upgrade to a z13 server, they can be retained or carried forward.
    • HMC #0091
    • HCA2-C Fanout #0162
    • IFB-MP Daughter Card #0326
    • STI-A8 Mother Card #0327
    • Flash Express #0402 and #0403
    • OSA-Express4S 1 GbE LX #0404
    • OSA-Express4S 1 GbE SX #0405
    • OSA-Express4S 10 GbE LR #0406
    • OSA-Express4S 10 GbE SR #0407
    • OSA-Express4S 1000BASE-T #0408
    • OSA-Express5S GbE LX #0413
    • OSA-Express5S GbE SX #0414
    • OSA-Express5S 10 GbE LR #0415
    • OSA-Express5S 10 GbE SR #0416
    • OSA-Express5S 1000BASE-T #0417
    • TKE workstation #0842
    • Addl smart cards #0884
    • TKE Smart Card Reader #0885
    • FICON Express8 10KM LX #3325
    • FICON Express8 SX #3326
    • FICON Express8S 10Km LX #0409
    • FICON Express8S SX #0410
    • 10GbE RoCE Express #0411
    • zEDC Express #0420
    • Fill and Drain Kit #3378
    • Universal Lift Tool/Ladder #3759

    Also, FICON Express8 will not be supported on future high-end IBM Z® servers as carry forward on an upgrade. The z13 and z13s servers will be the last IBM Z® servers to offer ordering of FICON Express8S channel features. Enterprises that have 2GB device connectivity requirements must carry forward these channels.

    For information about supported storage controllers, see the workflow step "Ensure that you are using supported servers, storage controllers, and machine facilities."

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.4.3 : Actions you can take before you order a z13 or z13s server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

You can perform the following upgrade actions before you order or install a z13 or z13s TM server:

  1. Review the sysplex configuration in which the z13 or z13s server will participate. See the workflow step "Restrictions for a z13 or z13s server" for a description of the limitations of using z13 or z13s servers with certain earlier servers in a Parallel Sysplex.
  2. Implement an STP timing network. This action is needed because Sysplex Timers (9037-002) are not supported on z13 or z13s servers.
  3. Migrate from ISC-3 links to Infinband or Integrated Coupling Adapter (ICA) links. This action is needed because ISC-3 links are not supported on z13 or z13s servers. If desired, you can take this action after you order a z13 or z13s server, as you upgrade to the new server.
  4. Migrate from unsupported hardware features to newer technology. This action is needed because ESCON, FICON Express4, Crypto Express3, and OSA-Express3 are not supported on z13 or z13s servers. For more information, see the following workflow steps:
    • "Restrictions for a z13 or z13s server"
    • "Replace unsupported devices"
    • "Provide for new device installations"
  5. Determine the level of cryptographic support you require on a z13 or z13s server. The level of function provided for cryptographic support differs by z/OS release and the installed ICSF web deliverable. Also, toleration PTFs are available for some cryptographic web deliverables.

    For z/OS V2R3, if you are using the level of ICSF that is shipped as part of z/OS V2R3, you can use all functions of the Crypto Express5 feature on a z13 or z13s server.

    For z/OS V2R2, consider the following:

    • If you are using the level of ICSF that is shipped as part of z/OS V2R2, you can use the most functions of the Crypto Express5 feature on a z13 or z13s server.
    • The Cryptographic Support for z/OS V1R13 - z/OS V2R2 web deliverable (FMID HCR77B1) provides some additional function and also incorporates enhancements that are available in PTFs for the base level of ICSF included in z/OS V2R1. The web deliverable includes new operator commands with Parallel Sysplex wide scope that can be used to perform certain cryptographic administrative functions. These functions include activating, deactivating, and restarting cryptographic coprocessors. This support can also be used to display status for available cryptographic devices and information about active key data sets (KDSs).

    For z/OS V2R1, consider the following:

    • If you are using the level of ICSF that is shipped as part of z/OS V2R1, you can tolerate Crypto Express5 on a z13 or z13s server, which treats Crypto Express5S cryptographic coprocessors and accelerators as Crypto Express4S coprocessors and accelerators. However, you must install the required PTFs identified by the SMP/E fix category:
      • For the z13: IBM.Device.Server.z13-2964.RequiredService
      • For the z13s: IBM.Device.Server.z13S-2965.RequiredService
    • If you require support for greater than 16 domains (up to 85) on Crypto Express5S, you must install the PTFs that are identified by the appropriate fix category IBM.Device.Server.z13-2964.Exploitation or IBM.Device.Server.z13S-2965.Exploitation, or install the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77B0) or a later ICSF web deliverable.
    • If you require Crypto Express4S functionality for CCA 4.4 and other EP11 cryptographic enhancement support that includes: RKX Key Export Wrap, UDX simplification, additional EP11 algorithms, expanded EMV support, AP Configuration simplification, CTRACE Enhancements, and KDS Key Utilization stats, you must download and install the Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77A1) or the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77B0) or a later ICSF web deliverable. Note:

      If you are using the Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77A1) or a later ICSF web deliverable, and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs listed here, which are identified by fix category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77A1, or the FIXCAT for the ICSF level that you are using.

    • If you require Crypto Express5S exploitation support for the next Generation Coprocessor support or VISA Format Preserving Encryption (FPE), you must download and install the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 web deliverable (FMID HCR77B0) or a later ICSF web deliverable. Note:

      If you are using the Enhanced Cryptographic Support for z/OS V1R13-z/OS V2R1 Web Deliverable (FMID HCR77B0) or a later ICSF web deliverable, and sharing keys with other z/OS systems that have a lower level of ICSF, you require the coexistence PTFs listed here, which are identified by fix category: IBM.Coexistence.ICSF.z/OS_V1R13-z/OS_V2R1-HCR77B0, or a later ICSF web deliverable.

  6. Install the necessary z/OS service, as indicated in PSP buckets. You must obtain all of the appropriate Preventive Service Planning (PSP) buckets. In addition to the hardware PSP buckets, you must also obtain the software PSP buckets. Use the Fix Categories that are specified in the associated FIXCAT HOLDDATA to identify PTFs required for the z13 server, PTFs needed to exploit z13 capabilities, and PTFs recommended to fix known problems. Specifically, fixes in the following categories:
    • For the z13:
      • IBM.Device.Server.z13-2964.RequiredService
      • IBM.Device.Server.z13-2964.Exploitation
      • IBM.Device.Server.z13-2964.RecommendedService
    • For the z13s:
      • IBM.Device.Server.z13S-2965.RequiredService
      • IBM.Device.Server.z13S-2965.Exploitation
      • IBM.Device.Server.z13S-2965.RecommendedService

    Fixes required for several zEnterprise functions (such as Parallel Sysplex InfiniBand Coupling Links, Server Time Protocol (STP), the Unified Resource Manager, High Performance FICON for IBM z Systems (zHPF), and zEnterprise Data Compression (zEDC) are not listed in the hardware PSP bucket, but can be found by using the following Fix Categories:

    • For the z13:
      • IBM.Device.Server.z13-2964.ParallelSysplexInfiniBandCoupling
      • IBM.Device.Server.z13-2964.ServerTimeProtocol
      • IBM.Device.Server.z13-2964.UnifiedResourceManager
      • IBM.Device.Server.z13-2964.zHighPerformanceFICON
      • IBM.Function.zEDC
    • For the z13s:
      • IBM.Device.Server.z13S-2965.ParallelSysplexInfiniBandCoupling
      • IBM.Device.Server.z13S-2965.ServerTimeProtocol
      • IBM.Device.Server.z13S-2965.UnifiedResourceManager
      • IBM.Device.Server.z13S-2965.zHighPerformanceFICON
      • IBM.Function.zEDC

    Because the PTFs associated with these Fix Categories are not specific to a z13 server, you should consider specifying a generic wildcard for the server to ensure that you have all the appropriate service installed. For example:

    • IBM.Device.Server.*.ParallelSysplexInfiniBandCoupling
    • IBM.Device.Server.*.ServerTimeProtocol
    • IBM.Device.Server.*.UnifiedResourceManager
    • IBM.Device.Server.*.zHighPerformanceFICON

    Similarly, fixes needed for zBX or to support the IBM DB2 Analytics Accelerator (IDAA) are not listed in the hardware PSP bucket, but can be found by using the following Fix Categories:

    • IBM.Device.Server.zBX-2458
    • IBM.DB2.AnalyticsAccelerator.*

    If you are exploiting z13 capabilities by installing a web deliverable, you must install the PTFs listed in the software PSP buckets for each of the web deliverables that you are installing. See the program directory for the web deliverable to identify the required software PSP buckets.

    The REPORT MISSINGFIX command checks your GLOBAL zone for FIXCAT HOLDDATA matching the FIXCAT values specified on the command. The command then compares the APARs identified in that FIXCAT HOLDDATA with the PTFs installed in the specified zones, and produces a report to identify any APARs not resolved. In other words, it reports which PTFs (fixes) are missing for the specified fix categories. Furthermore, the command produces a customized job that is used to obtain any PTFs not already received through the RECEIVE ORDER command, and install any missing service via the APPLY CHECK command.

    The FIXCAT operand on the REPORT MISSINGFIX command can list multiple fix categories, as well as using the same wildcarding techniques described in this topic for the SOURCEID operand. Because both of these techniques are simple and integrated into basic SMP/E commands, use them periodically to ensure the latest PTFs specified in the hardware and software PSP buckets are installed (because PSP buckets can be updated daily). SMP/E also provides an Explorer function which helps in identifying new fix categories which might be of interest. For a description of all the fix categories, see the Values and Descriptions page at IBM Fix Category Values and Descriptions. For more information about the REPORT MISSINGFIX command, see z/OS SMP/E Commands.

  7. Run the CFSIZER tool. If you are moving your coupling facilities and the coupling facility structures are on a higher CFLEVEL than they were previously, run the Coupling Facility Structure Sizer (CFSIZER) tool to find out if you have to increase coupling facility structure sizes. Prepare to make the necessary changes to the CFLEVEL as indicated by the tool.

    You can download the CFSIZER tool at Coupling Facility sizer. Also, see the workflow step "Update your CFRM policy with coupling facility structure size changes."

    Note: After you make a coupling facility available on the new hardware, you can run the Sizer utility, an authorized z/OS program, to evaluate structure size changes. The Sizer utility is distinct from CFSizer, and should be run after the new hardware (CFLEVEL) is installed, but before any CF LPAR on the new hardware is populated with structures. You can download the Sizer utility at CFSizer Alternate Sizing Techniques.

  8. Prepare for the new machine instruction mnemonics. In support of the z13 server, there are new machine instructions. The new machine instructions (mnemonics) can collide with (be identical to) the names of Assembler macro instructions you use. In the event of such collisions, the Assembler default opcode table (UNI) treats specification of these names as instructions when the z13 required service is installed, probably causing Assembler error messages and possibly causing generation of incorrect object code. If you write programs in Assembler Language, compare the names of Assembler macro instructions that are used to the new machine instructions (documented in the latest z/Architecture Principles of Operation, SA22-7832) to identify any such conflicts or collisions that would occur. Identical names cause Assembler errors or the generation of incorrect object code when you assemble your programs. For information about a tool to help in identifying mnemonic conflicts, see IBM Techdocs. Search for the Techdoc PRS5289.

    If a conflict is identified, take one of these actions:

    • Change the name of your macro instruction.
    • Specify PARM='...OPTABLE(YOP)...' (or some other earlier opcode table).
    • Specify a separate ASMAOPT file containing assembler options such as in the previous method (this method requires no changes to source code or JCL).
    • Add as the first statement of your source program: *PROCESS OPTABLE(YOP) (or some other earlier opcode table).
    • Specify the PROFILE option either in JCL or the ASMAOPT file, and the specified or default member of the SYSLIB data set is copied into the front of the source program.
    • If you must use both a new instruction and a macro with the same name in an assembly, you can use a coding technique that permits both use of a new instruction and a macro with the same name in an assembly such as HLASM mnemonic tags (:MAC :ASM).
  9. Decide on the steps to take for your migration to a z13 server. Besides the steps listed here, see the following workflow step for guidance: "Migration and exploitation considerations for z13 and z13s server functions."

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.4.4 : Migration and exploitation considerations for z13 and z13s server functions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

The following z13 and z13sTM functions have considerations when you are planning for migration and exploitation. For PTF information, see the notes for the table of base supported functions in the workflow step "Upgrade to an IBM z13 or z13s server."

  1. Large Systems Performance Reference (LSPR) method. LSPR is designed to provide comprehensive z/Architecture processor capacity ratios for different configurations of central processors (CPs) across a wide variety of system control programs and workload environments.
  2. Simultaneous multithreading (SMT). Incremental throughput is achieved partly because the new processor chip offers intelligently implemented 2-way simultaneous multithreading. Simultaneous multithreading allows two active instruction streams per core, each dynamically sharing the core's execution resources. SMT is available on the z13 for workloads that are running on the Integrated Facility for Linux (IFL) and the IBM z Integrated Information Processor (zIIP).
  3. CFLEVEL 20 and CFLEVEL 21 support. CFLEVEL 20 and 21 support the Coupling Facility use of Large Memory to improve availability for larger CF cache structures and data sharing performance with larger DB2 Group Buffer Pools. This support removes inhibitors to using large CF cache structures, enabling use of Large Memory to scale to larger DB2 Local Buffer Pools and Group Buffer Pools in data sharing environments.
  4. Coupling links. IBM z13 introduced new PCIe (Integrated Coupling Adapter ICA SR) based Short Reach coupling links using a new CHPID type, CS5. ICA-SR links can only connect z13 and z13s CPCs to other z13 and z13s CPCs.

    IBM z13 and z13s CPC now support up to 256 links. A single z/OS or a CF Image supports a maximum of 128 links. When displaying STP (DISPLAY ETR) from a z/OS image, information is provided for the entire CPC. If more than 128 links are defined, the z/OS support must be installed on all z/OS releases running on that CPC, so that information about more than 128 links, including STP timing information, can be displayed.

  5. SIMD. z/OS V2R1 (and later) is designed to support the new vector extension facility (Single Instruction Multiple Data, SIMD) instructions available on IBM z13 servers. SIMD provides a powerful framework for development of new Business Analytics workloads, porting math-intensive workloads from other platforms, and accelerating Business Analytics workloads on IBM z13 and z13s servers. High Data Intensity, High Computational Intensity, Predictive IT Analytics, Advanced Security/Crypto, BI Reporting, Perspective Analytics, and Next-Generation Data Warehousing are some of the workloads that may benefit from Data Parallelism (SIMD). z/OS support includes enablement of Vector Registers (VR) on IBM z13 and z13s servers, Mathematical Acceleration Subsystem (MASS), and Automatically Tuned Linear Algebra Software (ATLAS) support, as well as Language Environment enablement for C runtime functions.
  6. Cryptographic Enhancements. Cryptographic enhancements for z/OS V2R1 (and later) on z13 servers include:
    • VISA Format Preserving Encryption (VFPE). Support for VFPE algorithms in CCA-based callable services helps legacy databases to contain encrypted data of sensitive fields without having to restructure the database or applications. This support relies on the Crypto Express5S coprocessor.
    • Greater than 16 Domain support. This support allows a cryptographic coprocessor to be shared across more than 16 domains, up to the maximum number of LPARs on the system. This support relies on enhanced firmware available with a minimum microcode level for the Crypto Express5S coprocessor.
    • Trusted Key Entry (TKE) 8.0 Licensed Internal Code (LIC). This support includes Crypto Express5S Coprocessor support, FIPS Certified Smart Card, Crypto Coprocessors with more than 16 domains, a full-function migration wizard for EP11 coprocessors, new master key management functions, a Smart Card Readers Available indicator, a Configure Displayed Hash Size utility, ECC Authority Signature Keys, print capability, new features in the Crypto Node Management (CNM) utility, ENC-Zero verification pattern for 24-byte DES operational keys, and usability enhancements.

    See Decide on the steps you will take for your migration to a z13 server in the workflow step "Actions you can take before you order a z13 or z13s server."

  7. IBM zAware system. The IBM zAware feature is designed to offer a near real-time, continuous learning, and diagnostics capability intended to help you pinpoint and resolve potential problems quickly enough to minimize impacts to your business. The new version of IBM zAware introduces a new generation of technology with improved analytics to provide better results. After you order a z13 or z13s server, you can prepare to set up an IBM zAware environment by defining the IBM zAware logical partition (LPAR), defining and using OPERLOG log streams, and network definitions to connect the z/OS LPAR to the IBM zAware LPAR. For more information, see IBM z Advanced Workload Analysis Reporter (IBM zAware) Guide, (SC27-2623), and z/OS MVS Setting Up a Sysplex.
  8. Java exploitation. This support is added by:
    • IBM 31-bit SDK for z/OS, Java Technology Edition, Version 8 (5655-DGG)
    • IBM 64-bit SDK for z/OS, Java Technology Edition, Version 8 (5655-DGH)
  9. Flash Express. With this support, z/OS is designed to help improve system availability and responsiveness by using Flash Express across transitional workload events such as market openings, and diagnostic data collection. z/OS is also designed to help improve processor performance by supporting middleware exploitation of pageable large (1 MB) pages. This support requires the Flash Express hardware feature.
  10. 2GB Large Page support. This support includes support for 2 GB large fixed pages.
  11. New z/Architecture instructions: XL C/C++ ARCH(11) and TUNE(11) parameters. This function provides new hardware instruction support, including support for the vector facility, the decimal floating point packed conversion facility, and numerous performance improvements (machine model scheduling and code generation updates). Single Instruction Multiple Data (SIMD) instruction set and execution support is provided through the new vector support in the compiler, including Business Analytics vector processing through the MASS and ATLAS libraries. Unlike prior generations of servers, to use any of these functions on z/OS V2R1, you must download and install the XL C/C++ V2R1M1 web deliverable with z13 support for z/OS 2.1.
  12. FICON Express16S. FICON Express16S supports a link data rate of 16 gigabits per second (GBPS) and auto-negotiation to 4 or 8 GBPS for synergy with existing switches, directors, and storage devices. With support for native FICON, High Performance FICON for System z (zHPF), and Fibre Channel Protocol (FCP), the new FICON Express16S channel is designed to work with your existing fiber optic cabling environment. The FICON Express16S feature running at end-to-end 16 GBPS link speeds provides reduced latency for large read/write operations, and increased bandwidth compared to the FICON Express8S feature.
  13. FICON Dynamic Routing. With z13, FICON channels are no longer restricted to the use of static Storage Area Network (SAN) routing policies for Inter-Switch Links (ISLs) for cascaded FICON directors. You need to ensure that all devices in your FICON SAN support FICON Dynamic Routing before implementing this feature.
  14. Improved High Performance FICON for System z (zHPF) I/O Execution at Distance. High Performance FICON for System z (zHPF) has been enhanced to allow all large write operations (> 64 KB) at distances up to 100 km to be executed in a single return trip to the control unit, thereby not elongating the I/O service time for these write operations at extended distances.
  15. Improved Channel Subsystem (CSS) Scalability. The IBM Z® servers have improved the channel subsystem (CSS) scalability, as follows:
    • The z13 server improves CSS scalability with support for six logical channel subsystems (LCSSs), which are required to support the 85 LPARs for z13, four subchannel sets (to support more devices per logical channel subsystem), and 32K devices per FICON channel, up from 24K channels in the previous generation. Additionally, a fourth subchannel set for each LCSS is provided to facilitate elimination of single points of failure for storage after a disk failure.
    • The z13s server improves CSS scalability with support for three logical channel subsystems (LCSSs) which are required to support the 40 LPARs for IBM z13s, three subchannel sets (to support more devices per logical channel subsystem), and 32K devices per FICON channel up from 24K channels in the previous generation. Additionally, a third subchannel set for each logical channel subsystem (LCSS) is provided to facilitate elimination of single points of failure for disk storage devices.
  16. PCIe and HCD Definitions. z/OS V2R1, and z/OS V2R1 HCD (FMID HCS7790) support full exploitation for z13 and z13s processors (types 2964 and 2965) with support for up to 6 channel subsystems and 4 subchannel sets. To support PCIe functions for systems that are running on zEC12, zBC12, z13, or z13s servers, HCD introduced a new dialog for defining PCIe functions and assigning the functions to LPARs.

    IBM recommends that you define and activate all the new hardware definitions on a z/OS V2R2 system, or on a V2R1 system with the appropriate HCD PTF (APAR OA44294) installed and perform software activations (with hardware validation) only on lower-level systems.

  17. Consider the changes in the CPU Measurement Facility counters. The number of CPU measurement facility counters for z13 and z13s servers remains at 128. Though the structure of the SMF 113 record does not change, the values, interpretations, and frequency of certain sections do change; therefore, current tools that use the data must be updated for the z13 and z13s servers.

    For example, consider the following SMF record field:

    • SMF113_2_CtrVN2 identifies how to interpret the MT-Diagnostic, Crypto, and Extended Counter Sets. As described in The IBM CPU Measurement Facility Extended Counters Definition for z10 and z196, SA23-2260, this field is set to 1 (for z10), 2 (for z196 or z114), 3 (for zEC12 and zBC12), or 4 (for z13 and z13s).
    Note:

    As of z/OS V2R1, if you use the CPU Measurement Facility, IBM recommends that your installation collect SMF 113 subtype 1 and 2 records. IBM also recommends that products process SMF 113 subtype 1 records when available because that is where future enhancements are made. If subtype 1 records are not available, products can process subtype 2 records.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.4.5 : Accommodate functions for the z13 server or z13s to be discontinued on future servers


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Note:

IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

Description

The following changes in hardware support could affect your environment. Make the appropriate changes, as needed.

  • Removal of support for running an operating system in ESA/390 architecture mode. The z13 and z13s™ are the last IBM Z® servers to support running in ESA/390 mode. All future systems will support only operating systems running in z/Architecture mode. However, all 24-bit and 31-bit problem-state application programs originally written to run on the ESA/390 architecture will be unaffected by this change.
  • Removal of support for Classic Style User Interface on the Hardware Management Console and Support Element. The z13 and z13s are the last IBM Z® servers to support Classic Style User Interface. In the future, user interface enhancements will be focused on the Tree Style User Interface.
  • Removal of support for the Hardware Management Console Common Infrastructure Model (CIM) Management Interface. The z13 and z13s are the last IBM Z® servers to support the Hardware Console Common Infrastructure module (CIM) Management Interface. The Hardware Management Console Simple Network Management Protocol (SNMP), and Web Services Application Programming Interfaces (APIs) will continue to be supported.
  • Removal of FICON Express8 support. The z13 and z13s are the last IBM Z® servers to support FICON Express8. You should begin migrating from FICON Express8 channel features (#3325, #3326) to FICON Express16S channel features (#0418, #0419). FICON Express8 will not be supported on future high-end IBM Z® servers as carry forward on an upgrade.
  • Removal of support for ordering FICON Express8S channel features. Enterprises that have 2GB device connectivity requirements must carry forward these channels.
  • Removal of an option for the way shared logical processors are managed under PR/SM LPAR. The z13 and z13s are the last IBM Z® servers to support selection of the option Do not end the timeslice if a partition enters a wait state when the option to set a processor run-time value has been previously selected in the CPC RESET profile. The CPC RESET profile applies to all shared logical partitions on the machine, and is not selectable by logical partition.
  • Removal of support for configuring OSN CHPID types. OSN CHPIDs are used to communicate between an operating system instance running in one logical partition and the Communications Controller for Linux (CCL) product in another logical partition on the same CPC. See announcement letter #914-227 dated 12/02/2014 for details regarding withdrawal from marketing for the CCL product.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.5 : Enable BCPii communications on the support element


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

It is necessary to grant authority on the support element (SE) to allow the support element to accept the BCPii APIs flowing from the user application through the HWIBCPii address space. With this enablement, a logical partition can issue a subset of control program instructions to other logical partitions that are activated on the same CPC.

For Support Elements that run on z14 and later processors, the method for enabling cross-partition authority is changed from previous IBM Z® servers. The setting of the cross-partition authority checkbox is replaced by new security settings in the Hardware Management Console (HMC) and the Support Element (SE), as follows:

  • CPC permission is now specified by using the System Details task.
  • Image (LPAR) permission is now specified by using the Image Activation Profile or the Change LPAR Security task.

These new security controls allow for more granular control for specifying BCPii send and receive capabilities. For example, you can enable all partitions or a subset of partitions to receive BCPii requests.

For previous IBM Z® servers, you enabled cross-partition authority by selecting the cross-partition checkbox. You selected this option on the local SE for the CPC of the image that the z/OS BCPii application is running on, plus any other systems for which BCPii communication was required.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple

When change was introduced:

IBM z14, which became available September 2017.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you are migrating from an earlier IBM Z® server to the z14, and you want to maintain the same BCPii permissions on the z14.

Target system hardware requirements:

IBM z14 server.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

To maintain the same permissions:

If you are migrating from an earlier IBM Z® server to the z14, and you want to maintain the same BCPii permissions on the z14, you can port (export/import) your definitions to the new server. Then, perform the following steps on the HMC:

  1. Select Systems Management
  2. Select the CPC that is required.
  3. Click the System Details task.
  4. Click the Security tab to display the default settings.
    • To grant authority to all partitions on all CPCs to issue BCPii calls against this CPC, ensure that the following options are selected:
      1. Enable the system to receive commands from partitions
      2. All partitions
  5. Select CPC Operational Customization > Change LPAR Security. For each LPAR that was identified to support BCPii on the pre-z14 machine, click the current BCPii enablement level in the BCPii Permissions column and perform the following:
    • Ensure that the option Enable the partition to send commands is selected to grant authority for this LPAR to send BCPii requests to other CPCs and LPARs.
    • Ensure that the option Enable the partition to receive commands from other partitions is selected to allow other LPARs to target this LPAR with BCPii requests.
    • Ensure that the option All partitions is selected, which grants all partitions on all CPCs permission to issue BCPii calls against this LPAR.

To use more granular permissions: If you are migrating from an earlier IBM Z® server, and you want to use more granular BCPii permissions on the z14, you can select individual partitions by using the Selected partitions option for both CPC and LPAR authority.

To disable permissions:

If you do not want to enable BCPii permissions on the z14, perform the following steps on the HMC:

  1. Select Systems Management
  2. Select the CPC that is required.
  3. Click the System Details task.
  4. Click the Security tab to display the default settings.
  5. To deny authority to LPARs to issue BCPii calls against this CPC, ensure that the option Enable the system to receive commands from partitions is not selected.

If your installation has just a few LPARs for which to disable permissions, consider the following steps:

  • Select CPC Operational Customization > Change LPAR Security. For each LPAR that is not disabled, select the BCPii enablement level in the BCPii Permissions column and do the following:
    1. Deselect the option Enable the partition to send commands. This action denies authority for this LPAR to send BCPii requests to other CPCs and LPARs.
    2. Deselect the option Enable the partitions to receive commands from other partitions. This action prevents other LPARs from sending BCPii requests to this LPAR.

If your installation has multiple LPARs for which to disable BCPii permissions, consider changing multiple Image Activation Profiles at one time. To do so, follow these steps:

  1. Select CPC Operational Customization > Customize/Delete Activation Profiles
  2. Select multiple images for which you want to change the BCPii permissions.
  3. Select the option Customize profile.
  4. Select Next until the Security page is shown.
  5. For BCPii permissions, select Apply to all profiles and deselect the options Send and Receive.
  6. Select Next until Summary is shown. Review your changes.
  7. If the settings are correct, select Finish to save your changes. Otherwise, if the settings are not correct, select Back to return to the tasks and make corrections. Or, select Cancel to end your session.

Reference information

For more information, see the following references:

  • Support Element Operations Guide
  • zEnterprise System Processor Resource/Systems Manager Planning Guide.

These books are included in the IBM z15 Library, which is available online in Resource Link™.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.6 : Provide for new device installations


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The hardware configuration of your processors and I/O devices determines how many devices you can attach to your system. z/OS supports attachment of up to 65280 devices in Subchannel Set 0, each with eight access paths, and the attachment of up to 65536 secondary devices in each additional subchannel set.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

V2R4 and V2R3.

Timing:

Anytime.

Is the upgrade action required?

Yes, if you are going to use new devices with z/OS V2R5.

Target system hardware requirements:

Dependent upon the new devices used.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

The following are general considerations related to I/O device support.

  • Attaching devices through HCD. You can define, or attach, new devices to your system through the interactive panels of the Hardware Configuration Definition (HCD) base element. HCD has dynamic I/O capabilities, changing hardware definitions without the need for an IPL or hard power-on reset.

    Any time you make changes to your I/O configuration, you need to use HCD to modify your system's I/O definition file (IODF). You should also update the input/output configuration data set (IOCDS) when you run HCD to ensure that the configuration information is consistent across the software and microcode.

  • Operating modes. Most devices attached to z/OS operate in full function mode, that is, all features on the device are compatible with, and usable on, the operating system. Some of these features include:
    • For DASD devices: dynamic path reconnection, extended count-key-data operation, and caching and cache-related facilities
    • For tape devices: cartridge stack loading and data compaction.

    Some devices also operate in compatibility mode, which allows you to simulate the function of another device or model. Compatibility mode causes the device to function like a different device of the same type, ignoring some or all of the additional features the device might have. This allows you to migrate between devices with minimal impact on programs that have device dependencies.

  • UCB virtual storage constraint relief. Each device attached to the system has one or more UCBs associated with it. The size of the I/O configuration and placement of UCBs affects the amount of available virtual memory, both below 16MB and below 2GB. For more information, see the description of the LOCANY parameter in z/OS HCD Planning and the topic "Module placement effect on virtual storage" in z/OS MVS Initialization and Tuning Guide. The z/OS Systems Programmer should review the contents of the link pack area (LPA) list to determine whether to remove or move libraries to gain virtual storage constraint relief.
  • Hardware maintenance. Some devices require a specific level of hardware maintenance to operate properly on a z/OS system. DFSMS software support for new hardware devices might also require the installation of PTFs.

Reference information

For more information, see the following references:

  • For a summary of the most commonly-used I/O devices supported by z/OS that are also directly supported by DFSMS functions, see the topic about identifying I/O devices in z/OS Planning for Installation. If you have a question about support for a device that is not listed, contact your IBM representative.
  • For more information about HCD, see z/OS HCD Planning.
  • For information about working with IODFs, see z/OS HCD User's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 3.2.7 : BCP: Ensure that enough real memory is installed


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

A minimum of 8 GB of real memory is required to IPL your z/OS system. When running as a z/VM guest or on an IBM Z® Personal Development Tool (zPDT), z/OS requires a minimum of 2 GB of real memory.

If you attempt to IPL z/OS with less than the minimum amount of real memory, z/OS issues the following warning message (a WTOR) during IPL:

IAR057D LESS THAN 8 GB OF REAL STORAGE IMPACTS SYSTEM AVAILABILITY - ADD STORAGE OR REPLY C TO CONTINUE

Continuing with less than the minimum amount of real memory might impact the availability of your system. If you attempt to IPL z/OS on an earlier IBM server, no warning message is issued.

To help you with upgrading, IBM provides a new health check, IBMRSM,RSM_MINIMUM_REAL, which issues a warning for a system that is configured with less than 8 GB of real memory.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

IBM z14 server or later.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

If the system detects that it is running on a z14 server, and less than 8 GB of real memory is configured, the system issues warning message IAR057D (a WTOR) during IPL.

Related IBM Health Checker for z/OS check:

IBMRSM,RSM_MINIMUM_REAL

You can use this health check to determine whether the system meets the minimum memory requirements.

Steps to take

Follow these steps:

  • For a system that is running as a z/VM guest, ensure that the server has a minimum of 2 GB of real memory.
  • For a system that is running on IBM Z® Personal Development Tool (zPDT), ensure that the server has a minimum of 2 GB of real memory.
  • Otherwise, ensure that the LPAR has a minimum of 8 GB of real memory.

Reference information

For more information about the minimum real memory requirement, see z/OS Planning for Installation.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMRSM,RSM_MINIMUM_REAL.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".

This check is available on the following releases: z/OS V2R2 and z/OS V2R3.

NOTE: The successful running of this IBM Health Checker for z/OS check only partially covers this upgrade action. Refer to the upgrade action text for the complete list of steps to take.


Step 3.2.8 : Update your CFRM policy with coupling facility structure size changes


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you are upgrading to a new coupling facility control code level (CFLEVEL), you must make the appropriate coupling facility structure size updates in the z/OS coupling facility resource management (CFRM) policy.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Multiple.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

V2R4 and V2R3.

Timing:

Anytime.

Is the upgrade action required?

Yes, if you are upgrading to a new CFLEVEL.

Target system hardware requirements:

For information about coupling facility code levels and the processors that support those levels, see Coupling Facility Level (CFLEVEL) Considerations.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you are upgrading to a new CFLEVEL, do the following:

  1. Run the Coupling Facility Structure Sizer (CFSizer) tool. This tool sizes structures based on the amount of space needed for the current CFLEVEL. The tool sizes for the most currently available level; you might find that the results are oversized if you use an earlier CFLEVEL. You can find the tool at Coupling Facility sizer.

    Alternatively, you can run an as-is batch utility program that is called SIZER after you bring a new CFLEVEL coupling facility into use in your configuration. SIZER examines your currently allocated coupling facility structures and recalculates the size that should be used for them with the new later-CFLEVEL coupling facility. The as-is SIZER utility is available as a compressed package that you can download from CFSizer Alternate Sizing Techniques.

  2. Update the CFRM policy with the size modifications that are needed.
  3. Activate the updated CFRM policy so that it becomes the active policy that governs structure allocation in the sysplex.

Reference information

Coupling facility code levels have hardware and software requirements. For more information, see Coupling Facility Level (CFLEVEL) Considerations.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4 : Upgrading from z/OS V2R3 to z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This z/OS Upgrade Workflow contains the steps for upgrading from a z/OS V2R3 system to a z/OS V2R5 system.


Step 4.1 : BCP upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element BCP (Base Control Program).


Step 4.1.1 : BCP actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes BCP upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.1.1.1 : BCP: Define exits USER4 and USER5 for IFASMFDP and IFASMFDL


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R3, new exit points USER4 and USER5 were added to the IFASMFDP and IFASMFDL dump utility programs to support SMF records that contain an extended header. As with the other SMF exits (USER1, USER2, and USER3), the USER4 and USER5 exits are called during processing by the SMF dump programs IFASMFDL and IFASMFDP. These exits are referred to as the USERx exits.

With the addition of USER4 and USER5, you must provide valid exit routines for these exit points if you specify them in the SYSIN parameters for the IFASMFDL or IFASMFDP programs.

You must also define these exit routines for USER4 and USER5 in your active SMFPRMxx parmlib member, as follows:

  • For exits that are used with IFASMFDL, define the exits in SMFPRMxx by using the SMFDLEXIT keyword.

  • For exits that are used with IFASMFDP, if IFASMFDP is run in an authorized state, define the exits in SMFPRMxx by using the SMFDPEXIT keyword.

Note: IFASMFDP runs authorized when invoked from JCL, such as via EXEC PGM=IFASMFDP.

If you do not update your active SMFPRMxx parmlib member to satisfy these requirements, you will receive a following error message and IFASMFDL or IFASMFDP stops processing with return code x'08'. IFA840I USER EXIT xxxxxxxx NOT REGISTERED WITH SYSTEM.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

z/OS V2R4 and z/OS V2R3, both with APAR OA60236 installed.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3, without APAR OA60236 installed.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you specify the USER4 or USER5 exits in the SYSIN parameters for the IFASMFDL or IFASMFDP programs.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check for invocations of IFASMFDP and IFASMFDL that specify the USER4 or USER5 exits in the SYSIN parameters for those utilities. If the USER4 or USER5 exits are being referenced, verify that the exits are defined in the SMFPRMxx parmlib member on the SMFDLEXIT and SMFDPEXIT keywords, if appropriate.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.1.2 : BCP: The ASCB and WEB are backed in 64-bit real storage by default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS 2.5, the address space control block (which is mapped by IHAASCB) and the work element block (which is mapped by IHAWEB) are backed in 64-bit real storage by default. Previously, these data structures were backed in 31-bit storage, unless your DIAGxx parmlib member specified CBLOC REAL31(IHAASCB,IHAWEB).

In z/OS 2.4, the keywords REAL31 and REAL64 were added to the CBLOC statement of parmlib member DIAGxx. With these keywords, you can specify which data structures are backed in 31-bit real storage or 64-bit real storage.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you have an application that relies on the ASCB or WEB to be backed in 31-bit real storage.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check for programs that issue the load real address (LRA) instruction in 31-bit addressing mode for the ASCB or WEB data structures. The LRA instruction cannot be used to obtain the real address of locations backed by real frames above 2 gigabytes in 24-bit or 31-bit addressing mode. For those situations, use the LRAG instruction instead of LRA.

The TPROT instruction can be used to replace the LRA instruction when a program is using it to verify that the virtual address is translatable and the page backing it is in real storage.

If you have programs that do not tolerate 64-bit real storage backing for the ASCB or WEB data structures, update the DIAGxx parmlib member to specify CBLOC REAL31(IHAASCB,IHAWEB).

Reference information

For information about the LRAG and TPROT instructions, see z/Architecture Principles of Operation, SA22-7832, which is available from the IBM Resource Link website.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.1.3 : BCP: Accommodate the removal of the binder transport utility IEWTPORT


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting with z/OS V2R5, z/OS no longer includes the transport utility, IEWTPORT. This program management binder utility converts a program object in a PDSE into a "transportable program file" in a sequential (nonexecutable) format and conversely can also reconstruct the program object from a transportable program file and store it back into a PDSE. The use of this utility has been discouraged for a number of years, as described in z/OS MVS Program Management: User's Guide and Reference.

The appropriate utility for copying load modules and program objects is IEBCOPY.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 220-226, dated June 16, 2020

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use the IEWTPORT transport utility.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If your installation currently uses the IEWTPORT transport utility, update your procedures to use the IEBCOPY utility instead. In z/OS V2R5, z/OS does not include the IEWTPORT transport utility.

Reference information

For more information, see z/OS MVS Program Management: User's Guide and Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.1.4 : BCP: Stop using z/OS Batch Runtime


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

z/OS Batch Runtime is not supported in z/OS V2R5. This component provided a framework for interoperability between PL/I, COBOL, and Java applications that run on z/OS. It was designed to provide a managed environment that enables shared access to a DB2 connection by PL/I, COBOL, and Java programs.

It is recommended that you use IBM WebSphere® Application Server JSR 352 instead. Doing so might require you to modify and test your programs in a JSR 352 compliant batch container.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use z/OS Batch Runtime.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Determine whether your programs use z/OS Batch Runtime. Check for references to:
    • JCL PROC BCDPROC
    • BCDBATCH
    • Java classes in com.ibm.zos.batch.container.BCDBatchContainer.
  2. If your programs use z/OS Batch Runtime, you must modify them to use the WebSphere JSR 352 compliant container. Running the programs requires that WebSphere Application Server is installed.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.1.5 : BCP: Use the recommended values for WLM service coefficients


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R5, z/OS no longer supports specifying service coefficients in the WLM service definition. If the values of the service coefficients in your WLM service definition differ from the recommended values, you must change them to the recommended values.

The amount of system resources an address space or enclave consumes is measured in service units. Service units are calculated based on the CPU, SRB, I/O, and storage (MSO) service the address space or enclave consumes.

Service units are the basis for period switching within a service class that has multiple periods. The duration of a service class period is specified in terms of service units. When an address space or enclave running in the service class period has consumed the amount of service that is specified by the duration, workload management moves it to the next period. The work is then managed to the goal and importance of the new period.

Because not all kinds of services are equal in every installation, more weight can be assigned to one kind of service over another. These weights are called service coefficients.

Assigning different weights made sense in the past, when resources like storage and I/O were scarce. However, in today's environments, it does not make sense to allow storage and I/O to influence period switch, or weight CPU and SRB service differently. Therefore, to streamline and simplify user experience, and to facilitate more consistent management, the service coefficients are removed from the WLM service definition, and set to hardcoded defaults.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 219-344 "IBM z/OS Version 2 Release 4" dated July 23, 2019.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes. WLM service coefficients specified in the service definition are not supported in z/OS V2R5.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

If the upgrade action is not done, address spaces or enclaves that are running in a service class period might move faster or slower than expected to the next period.

Related IBM Health Checker for z/OS check:

The following health check is added by APAR OA59066:

  • IBMWLM,ZOSMIGV2R3_NEXT2_WLM_ServCoeff

Use this health check to determine whether WLM service coefficients other than the IBM recommended values are specified in the currently installed WLM service definition. If one or more of the WLM service coefficients use a non-recommended value, exception message IWMH102E is issued.



IWMH102E The recommended WLM service coefficients are not being used

If exception message IWMH102E is issued, consider changing the service coefficients in the WLM service definition to the recommended values and review the durations for any multi-period service classes and adjust them accordingly. To convert the old duration into the new duration, refer to the APAR OA59066.

Steps to take

Check the values of the service coefficients in your WLM service definitions. You can do so in z/OSMF on the Service Definition Details tab of the Workload Management task, or in the WLM ISPF application on the Service Coefficients/Options panel.

The recommended values are:

  • CPU: 1.0
  • IOC: 0.0
  • MSO: 0.0000
  • SRB: 1.0

If the values of the service coefficients in your WLM service definition differ from the recommended values, change them to the recommended values. If you do so, you must recalculate the duration of your service class periods, and your accounting procedures.

The capacity limits of resource groups and tenant resource groups are not affected by this change because they are specified in unweighted service units.

Reference information

For more information, see the topic Defining service coefficients and options in z/OS MVS Planning: Workload Management.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMWLM,ZOSMIGV2R3_NEXT2_WLM_ServCoeff.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".

This check applies to z/OS V2R3.


Step 4.1.1.6 : BCP: Recompile programs with the new IRARMCTZ macro in APAR OA55218


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R3, several fields in the IRARMCTZ control block were moved to incorrect offsets. APAR OA55218 corrects the offsets of these fields.

After you apply the PTF for APAR OA55218, you must recompile any programs that use the affected fields in the IRARMCTZ control block.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP

When change was introduced:

z/OS V2R3 with APAR OA55218 applied.

Applies to upgrade from:

z/OS V2R3 (without APAR OA55218 applied).

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you have programs that use the affected fields in the IRARMCTZ control block.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check your programs for any use of the following fields in the IRARMCTZ control block:

  • RMCTZ_WLMIRDSTRUC
  • RMCTZ_FLAGS
  • RMCTZ_WLMIRDSTRUC_SET
  • RMCTZ_RTCapLeadTime
  • RMCTZ_Time_To_Cap
  • RMCTZ_Time_To_Cap_Group

After you apply the PTF for APAR OA55218, recompile any affected programs with the new version of the IRARMCTZ macro. The macro version ( RMCTZ_Version) is updated to Version 6 by this APAR.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.1.7 : BCP: Evaluate your stand-alone dump data set allocations and your IPCS processing of them


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As your applications grow in size and use greater amounts of storage, you should evaluate whether the DASD allocated for your stand-alone dump data continues to be adequate.

In z/OS V1R6, support was introduced for extended-format sequential data sets, a form of data set that is SMS-managed and can occupy more than 64 K tracks per volume. In z/OS V1R7, this support was supplemented with support for large format sequential data sets (DSNTYPE=LARGE), a form of data set that is essentially the same as conventional sequential data sets except that more than 64 K tracks may be spanned per volume. If your stand-alone dump data sets are spread over more volumes than you want, both types of support can help you gain better control over the number of volumes used for each stand-alone dump data set.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended because of changes that have been made to stand-alone dump processing (that reorder dump records with the intent of recording more important data early), and especially recommended if you deploy any LPARs with significantly more main storage than previously used.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  • Use multivolume stand-alone dump data sets. Adjust the number of volumes and their separation to achieve tolerable stand-alone dump capture times.
  • Use extended-format sequential data sets or large format sequential data sets. Copy their contents to an extended-format, compressed, striped data set using the IPCS COPYDUMP subcommand before analysis. Use the same or a larger striping factor than you used for your stand-alone dump data sets. Dump data sets to which stand-alone dump can write may be neither compressed nor striped, but both attributes are advantageous for the target of the copy operation. Starting with z/OS V1R12, stand-alone dump data sets can be placed in track-managed space as well as cylinder-managed space on Extended Address Volumes (EAV).
  • Use a large CISIZE and striping for IPCS dump directories, and use blocking, striping, and compression for the stand-alone dump data set. Very large stand-alone dumps might require that you define your directory with the extended addressing attribute, allowing it to hold more than 4 GB. Tip:

    Control interval sizes less than 24K have been shown to be more vulnerable to fragmentation when used as IPCS dump directories, and IPCS performance can be degraded when such fragmentation occurs. In this background, warning message BLS21110I will be issued and you might recreate the DDIR by using the CLIST BLSCDDIR.

    BLS21110I CISIZE(cisize) is less than 24K. It may degrade IPCS performance

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.2 : BCP actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes BCP upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.1.2.1 : BCP: Accommodate the new CHECKREGIONLOSS default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In the DIAGxx parmlib member, the VSM CHECKREGIONLOSS option specifies the amount of region size loss that can be tolerated in an initiator address space. The initiator remembers the initial maximum available region size (below and above 16 MB) before it selects its first job. Whenever a job ends in the initiator, if the maximum available region size (below or above 16MB) is decreased from the initial value by more than the CHECKREGIONLOSS specification, the initiator ends with message IEF0931 or IEF094A, depending on whether the subsystem automatically restarts the initiator.

When CHECKREGIONLOSS is enabled, your installation can avoid encountering 822 abends or 878 abends in subsequent jobs that are selected by the initiator. These abends occur when the available region size decreases because of storage fragmentation or problems that prevent storage from being freed.

In z/OS V2R5, the CHECKREGIONLOSS option is enabled by default with a value of (256K,30M). Thus, if the 24-bit region size decreases by 256K or more, or the 31-bit region size decreases by 30M or more, the initiator is ended and restarted with message IEF0931 or IEF094A.

IBM strongly recommends that you enable the CHECKREGIONLOSS option with appropriate settings for your system. Consider using the IBM default CHECKREGIONLOSS(256K,30M).

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended. Enabling the CHECKREGIONLOSS option causes initiator address spaces to be recycled when the maximum obtainable region size is reduced below a threshold. This change is expected to have a positive impact on the system without requiring any intervention.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Possible termination and restart of initiators, with additional occurences of message IEF0931 or message IEF094A.

Related IBM Health Checker for z/OS check:

Use the following IBM Health Checker for z/OS check to audit the setting of the VSM CHECKREGIONLOSS option in the DIAGxx parmlib member:

  • IBMVSM,ZOSMIGV2R4_NEXT_VSM_CHECKREGION*

This health check is available for z/OS V2R4 and z/OS V2R3 with the PTF for APAR OA59143.

Steps to take

Determine whether the CHECKREGIONLOSS option is enabled on your system. To do so, enter the command DISPLAY DIAG and check the command output.

  • If the CHECKREGIONLOSS option is specified in your active DIAGxx parmlib member, run the IBM health check IBMVSM,ZOSMIGV2R4_NEXT_VSM_CHECKREGION* to check the current settings. If necessary, adjust the health check parameters to match the values that are displayed.

    Otherwise, if you want to continue using the current CHECKREGIONLOSS settings, you have no further action to take.

  • If the CHECKREGIONLOSS option is not specified in your active DIAGxx parmlib member, and you want to enable the option (as recommended), update the DIAGxx member with the following statement: VSM CheckRegionLoss(256K,30M).

    Then, enable this change by entering the command SET DIAG=xx.

    If you do not want to enable the CHECKREGIONLOSS option on your system, you can set it to a very high value, such as (16M,2046M). Doing so effectively disables this option.

Reference information

For more information, see the following references:

Instructions:

This portion of the Workflow will guide you in submitting a job to run the IBM Health Check for z/OS that is associated with this upgrade action, IBMVSM,ZOSMIGV2R4_NEXT_VSM_CHECKREGION*.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.1.2.2 : BCP: Accommodate the new DSLIMITNUM default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In the SMFLIMxx parmlib member, the parameter DSLIMITNUM is used to override the maximum number of data spaces and hiperspaces that can be created by a user-key program. In z/OS V2R5, the default for DSLIMITNUM is changed to 4096. In previous releases, the default was 4294967295.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if the default is not acceptable to your environment.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Applications that invoke DSPSERV CREATE, especially those applications that loop erroneously, might fail with the more restrictive DSLIMITNUM default in effect.

Related IBM Health Checker for z/OS check:

None.

Steps to take

SMF 30 record field SMF30NumberOfDataSpacesHWM indicates the high-water mark of the number of data spaces that are owned by the unauthorized (problem state and user key) tasks that are associated with a job. This field is added when you apply APAR OA59137 and APAR OA59126.

If your installation runs jobs that rely on the default for SMFLIMxx DSLIMITNUM or IEFUSI word 7 subword 3, inspect the SMF 30 record field SMF30NumberOfDataSpacesHWM fields for values that exceed 4096. For jobs that exceed 4096, update SMFLIMxx or IEFUSI to allow the maximum number of data spaces that are required.

Reference information

For more information, see the description of the DSLIMITNUM parameter in z/OS MVS Initialization and Tuning Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.2.3 : BCP: XCF/XES FUNCTIONS XTCSIZE is enabled by default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R4, the FUNCTIONS statement was added to the COUPLExx parmlib member. FUNCTIONS specifies the initial enablement state of XCF/XES optional functions on the current system.

Included on the FUNCTIONS statement is the option XTCSIZE. When enabled, XTCSIZE causes XCF to automatically manage message size segregation when sending messages to a z/OS system. By enabling XTCSIZE, you no longer need to manually configure for message size segregation.

The XTCSIZE keyword is ENABLED by default. You can disable it, if necessary. You can set the state of the FUNCTIONS statement dynamically by using the SETXCF FUNCTIONS system command.

The status of the XTCSIZE option does not impact XCF message traffic that includes systems earlier than z/OS V2R4. Existing XCF transport class definitions do not need to be changed.

Removing transport class definitions for message size segregation should not be done until all systems in the sysplex are z/OS V2R4 or later and you have no plans to fall back to an earlier release.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended. Disabling XTCSIZE is possible, but not recommended.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

Health check IBMXCF,XCF_TCLASS_CLASSLEN is enhanced to check the status of the XTCSIZE option, in addition to definitions for message size segregation. If you do not want XTCSIZE to be enabled, you can change the health check parameter from XCFMGD to USERMGD.

Steps to take

The XTCSIZE keyword is ENABLED by default. You can disable it, if necessary. You can set the state of the FUNCTIONS statement dynamically by using the SETXCF FUNCTIONS system command.

Reference information

For more information, see the description of the XCF/XES FUNCTIONS options in z/OS MVS Setting Up a Sysplex.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMXCF,XCF_TCLASS_CLASSLEN.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.1.2.4 : BCP: Create IPL text


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IPL text is bootstrap information that is required for IPL, such as the location of the nucleus library. You must create IPL text by running ICKDSF against the system residence volume.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  • Update and run the IPLTEXT job to write a new copy of the IPL text. If you install z/OS with a ServerPac, an installation dialog job is provided to perform this action. If you install z/OS with a CBPDO, refer to the instructions in z/OS Program Directory in the z/OS Internet library.

Tip: With ICKDSF R17 APAR PM42057 applied, you can use the REFORMAT command with the new parameter REMOVEIPLTXT to remove IPL text from the volume.

Note: When the IPLTXTEXIST parameter (which was introduced by ICKDSF R17 APAR PK16403) is specified with the REFORMAT command with the IPLDD parameter, WTOR message ICK21836D is suppressed if IPL text exists.

Reference information

For a sample IPLTEXT job, see z/OS Program Directory in the z/OS Internet library. ServerPac provides a similar job for accomplishing this task; see ServerPac: Installing Your Order.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.2.5 : BCP: Review the list of WTORs in parmlib member AUTOR00


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The IBM-supplied parmlib includes the AUTOR00 member. When the member is found in your parmlib concatenation during IPL, it causes auto-reply processing to be started. If the WTORs listed in AUTOR00 are automated by your existing automation product, ensure that the replies in AUTOR00 are appropriate.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use the auto reply facility of z/OS, which is enabled by default when the AUTOR00 member is found in the parmlib concatenation.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  • Examine the WTOR replies in the AUTOR00 parmlib member. If the replies or delay duration are not desirable, you can create a new AUTORxx parmlib member and make corresponding changes. Also compare the replies to what your automation product would reply to these WTORs. Make sure that the AUTOR00 replies are in accordance with the replies from your automation product. IBM does not recommend making updates to AUTOR00, because updates to AUTOR00 might be made by the service stream or in new z/OS releases.

Note: The IBM-shipped data set SYS1.IBM.PARMLIB contains the AUTOR00 member. So, if you specify it within the PARMLIB concatenation and will not intend to activate the auto reply functionality, you need to specify AUTOR=OFF in the IEASYSxx parmlib member.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.2.6 : BCP: Reassemble the stand-alone dump program


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The stand-alone dump program produces a dump of storage that is occupied by a system that failed or a stand-alone dump program that failed. You must reassemble the stand-alone dump program each release. When the stand-alone dump program is properly created on a DASD residence volume, it resides in the SYS1.PAGEDUMP.Vvolser data set.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  • Reassemble the stand-alone dump program. If you install z/OS with a ServerPac, an installation dialog job is provided to perform this action. If you install z/OS with a CBPDO, instructions to perform this action are provided in z/OS MVS Diagnosis: Tools and Service Aids.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.2.7 : BCP: Removal of support for user key common areas


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM strongly recommends that you eliminate all use of user key common storage. Allowing programs to obtain user key (8-15) common storage creates a security risk because the storage can be modified or referenced, even if fetch protected, by any unauthorized program from any address space. Therefore, without the restricted use common service area (RUCSA) optional priced feature, the obtaining of user key (8-15) storage is not supported in z/OSV2R4.

RUCSA is more secure because it can be managed as a SAF resource. However, it does not prevent two or more different SAF-authorized applications from altering or referencing another application's RUCSA storage. RUCSA became available as a part of the BCP base element with APAR OA56180 on earlier z/OS releases, but it is only available as a priced feature in z/OS V2R4.

Related to this change:

  • Support to change the key of common ESQA storage to a user key (via CHANGKEY) is removed regardless of RUCSA exploitation.

  • Support of user-key (8 - 15) SCOPE=COMMON data spaces is removed regardless of RUCSA exploitation.

  • The following DIAGxx parmlib statements are not supported after z/OS V2R3. They should be removed from z/OS V2R4 and later systems:

    VSM ALLOWUSERKEYCSA(YES)
    This setting is not recommended. Specify NO or accept the default of NO.

    ALLOWUSERKEYCADS(YES)
    The default in z/OS V2R3 is YES. After z/OS V2R3, NO is the only valid specification.

    NUCLABEL DISABLE(IARXLUK2)
    The default in z/OS V2R3 is DISABLE. In z/OS V2R4 and later, the default is ENABLE.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

  • If running CICS Transaction Server for z/OS, you require V5.2 or later.
  • If running Tivoli OMEGAMON XE for DB2 PE/PM, you require APAR PI97225 ("Removed User Key CADS Creation").

Other PTFs on other IBM products might also be required. As a reminder, use the TargetSystem-RequiredService.z/OS.V2R4 FIXCAT to identify those necessary PTFs.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

See "Steps to take."

Related IBM Health Checker for z/OS check:

Use the following IBM Health Checker for z/OS checks:

  • IBMVSM,VSM_ALLOWUSERKEYCSA to examine the setting of the ALLOWUSERKEYCSA option in the DIAGxx parmlib member.
  • IBMVSM,ZOSMIGV2R3_NEXT_VSM_USERKEYCOMM to detect usage of user key common storage.

Steps to take

  1. On the production system that you are upgrading to z/OS V2R4, determine whether you are using user key common storage by checking the response to the following operator commands:
    • D IPLINFO,RUCSA . If RUCSA was specified with nonzero values, you are already using RUCSA and must do either of the following:
      • Upgrade to the z/OS V2R4 priced optional feature. For instructions, see z/OS Planning for Installation. No other steps are required. However, you might want to see whether you can reduce or possibly eliminate user key common storage usage by following the additional steps below.
      • Start with Step 2 below to remove all usage of user key common storage from your current system and then remove the use of RUCSA before IPLing z/OS V2R4.
    • D DIAG . If VSM ALLOWUSERKEYCSA and ALLOWUSERKEYCADS are set to NO and you are not using RUCSA, no further action is required. You already prevent the use of user key common storage.

  2. Query all software vendor products to determine whether any service is required to eliminate the use of user key common storage.
    • If you are running CICS Transaction Server for z/OS, ensure that you are running V5.2 or a later version.
    • If you are running Tivoli OMEGAMON XE for DB2 PE/PM, apply APAR PI97225 ("Removed User Key CADS Creation").

  3. Check for usage of user key common areas, such as the following:
    • Using the STORAGE, GETMAIN or CPOOL service to obtain common ECSA/CSA storage (subpool 227, 228, 231, 241) that specifies a key of 8-15.
    • Using the DSPSERV service to allocate a SCOPE=COMMON data space in a key of 8-15.
    • Using the CHANGKEY service to change the storage key of common storage to a key of 8-15.

    To aid in finding all instances of user key common usage, apply the PTFs for APARs OA53355, OA56180, OA61368, and OA62489 on your production system. Doing so allows you to take one or more of the following actions:

    • Enable the following example SLIP trap to produce GTF trace records to help in identifying software that uses user key common storage:
      SLIP SET,IF,A=TRACE,ID=UKEY,NUCEP=(IARXLUK4,0,1),TRDATA=(STD,REGS),END
      In the GTF trace record, register 1 contains the address of the program that used user key common storage.

    • Activate the ZOSMIGV2R3_NEXT_VSM_USERKEYCOMM health check. This health check issues an exception message when it detects usage of user key common storage.
    • Specify VSM ALLOWEARLYRUCSA(YES) in your DIAGxx parmlib. For more information, see ++DOC holds for OA61368 and OA62489. Note that you must define a RUCSA before using VSM ALLOWEARLYRUCSA(YES).
    • Ensure that SMF Type 30 recording is active. The Storage and Paging section contains flags that indicate whether user key common storage is used. For information about the SMF30_RUCSAEarlyUsage, SMF30_UserKeyCsaUsage, SMF30_UserKeyCadsUsage, and SMF30_UserKeyChangKeyUsage flags, see z/OS MVS System Management Facilities (SMF).

  4. If the PTF for APAR OA53355 is not applied, you can take one or more of the following actions to help find instances of user key common usage:
    • Set the DIAGxx parmlib statement VSM ALLOWUSERKEYCSA to NO, which is the default. Then, IPL a test system with the updated setting. Any software on your test system that attempts to obtain user key CSA/ECSA storage by using the GETMAIN, STORAGE, or CPOOL service will fail. The service receives one of the following abends: B04-5C, B0A-5C, or B78-5C.
    • Specify ALLOWUSERKEYCADS(NO) in your DIAGxx parmlib. Then, IPL a test system with the updated setting. Any software on your test system that attempts to obtain a user key (8-15) SCOPE=COMMON data space fails with a 01D-xx0015xx abend.
    • On z/OS V2R3 systems and later, specify NUCLABEL ENABLE(IARXLUK2) in your DIAGxx parmlib member. Then, IPL a test system with the updated setting. Any software on your test system that attempts to use CHANGKEY to change subpool 247 or 248 common storage to a user key (8-15) will fail with a 08F-1C abend.
    • Enable the following example SLIP trap to produce GTF trace records to help in identifying software that obtains user key CSA/ECSA storage:
      SLIP SET,IF,A=TRACE,ID=UCSA,NUCEP=(IGVVSMG2,0,1),END
    • Enable the following example SLIP trap to produce GTF trace records to help in identifying software that allocates user key SCOPE=COMMON data spaces:
      SLIP SET,IF,A=TRACE,ID=UCAD,NUCEP=(IAXDKUKY,0,1),END
    • Check for usage of the CHANGKEY service to change the storage key of common storage to a key of 8-15.

  5. Change the affected software to use a system key rather than a user key. Or, change the affected software to use storage that is not common to all address spaces. Some alternatives for sharing storage (instead of having storage common to all address spaces) include the following options:
    • Use a SCOPE=ALL data space to share data space storage with specific units of work in specific address spaces.
    • Use IARVSERV SHARE to share below-the-bar storage with specific address spaces.
    • Use IARV64 GETSHARED to share above-the-bar storage with specific address spaces.
    • Use z/OS UNIX shared memory to share below-the-bar or above-the-bar storage with specific address spaces.

  6. For those who cannot immediately eliminate all affected software programs or need more assistance in identifying the programs that reference user key CSA storage, the more secure restricted use common service area (RUCSA), an optional priced feature in z/OS V2R4 (and provided in the BCP base element by APAR OA56180 for earlier z/OS releases) can be used. However, IBM still recommends the elimination of all user key common storage. For more information about RUCSA and upgrading to it, see z/OS MVS Initialization and Tuning Guide.

Reference information

For more information, see the following references:

Instructions:

This portion of the Workflow will guide you to submit jobs to run two health checks that are associated with this upgrade action, IBMVSM,VSM_ALLOWUSERKEYCSA and IBMVSM,ZOSMIGV2R3_NEXT_VSM_USERKEYCOMM.

These checks will be activated if they are not already active. If the checks are activated, they will be deactivated at the end of the job, so that they remain in the same state as they were found.

If the health checks run with no exceptions, this step will be marked "Complete" indicating that this upgrade action requires no further activity.

If either of the health checks find an exception, this step will be marked as "Failed". If so, further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (using any method you use to view health check output, such as SDSF) and correct any situations as appropriate. You can then re-run this workflow step to submit the health check job again, until the health checks no longer receive exceptions and the step is marked "Complete".

NOTE: The successful running of these health checks only partially covers this upgrade action. Refer to the upgrade action text for the complete list of steps to take.


Step 4.1.2.8 : BCP: Stop referencing the ETR parameters in CLOCKxx


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R4, the default values of the CLOCKxx parmlib member ETRMODE and ETRZONE parameters changed from YES to NO.

The IBM z10 was the last IBM mainframe to support the ETRMODE and ETRZONE parameters in CLOCKxx. Because z/OS V2R5 requires a z13 or later processor to run, the ETRMODE and ETRZONE parameters are obsolete. They are deactivated (set to NO) by default.

It is recommended that you set these parameters to NO, or remove them from CLOCKxx. Specifying YES can cause unexpected behavior if you also specify STPZONE NO. For details, see APAR OA54440.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review the CLOCKxx member that you use to IPL your system, and take one of the following actions:

  • If CLOCKxx does not specify ETRMODE or ETRZONE, you have no action to take.
  • If CLOCKxx specifies ETRMODE YES or ETRZONE YES, set these parameters to NO, or remove them so that they default to NO.
  • If CLOCKxx specifies ETRMODE NO and ETRZONE NO, you have no action to take.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.1.2.9 : BCP: Evaluate the changed default for system logger use of IBM zHyperwrite


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R5 and previous releases with APAR OA62658 installed, the default for the system logger use of zHyperwrite is changed from 'enabled' to ‘disabled' for systems that do not specify the IXGCNFxx parmlib member.

If system logger use of zHyperwrite is needed at your installation, you must ensure that HYPERWRITE ALLOWUSE(YES) is specified in the IXGCNFxx parmlib member.

Note: System Logger use of zHyperwrite function was disabled by default in an earlier service update (APAR OA57408) for the case in which the IXGCNFxx parmlib member is specified without the HYPERWRITE ALLOWUSE statement.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP.

When change was introduced:

z/OS V2R3 and z/OS V2R4, with APAR OA62658 installed.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4, without APAR OA62658 installed.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you want system logger to use IBM zHyperwrite data replication, and you do not have an IXGCNFxx parmlib member that explicitly states HYPERWRITE ALLOWUSE(YES).

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you do not want system logger to use IBM zHyperwrite data replication, and HYPERWRITE ALLOWUSE(YES) is not in effect, you have no action to take.

To check the current setting, enter the following command: DISPLAY LOGGER,IXGCNF,MANAGE

If you currently use IBM zHyperwrite data replication, and want to continue doing so, when you install APAR OA62658, you must ensure that the use of IBM zHyperWrite data replication by system logger is enabled in parmlib member IXGCNFxx parmlib member: HYPERWRITE ALLOWUSE(YES).

Reference information

For more information, see description of the IXGCNFxx parmlib member in z/OS MVS Initialization and Tuning Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.2 : BookManager READ upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element BookManager READ.


Step 4.2.1 : BookManager READ actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes BookManager READ upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.2.1.1 : BookManager Read: Remove any dependencies on BookManager READ from your system


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

z/OS V2R4 removes support for the BookManager READ element. IBM recommends that you use IBM Knowledge Center for z/OS, which was introduced in z/OS V2R2, to access product documentation on the web or from your own local repository.

IBM Knowledge Center for z/OS is the IBM platform for delivering product documentation. It is the replacement for both BookManager READ and Library Server.

In z/OS V2R2, IBM Knowledge Center for z/OS (KC4z) became a base element of z/OS. With KC4z, and Version 5 of the Softcopy Librarian tool, your installation can manage collections of Knowledge Center content (plug-ins) in your own repositories, and serve the content to users from those repositories.

KC4z provides function that is equivalent to BookManager READ and Library Server, as follows:

  • Similar to BookManager READ, you can use KC4z to manage your content collections. One difference is that KC4z provides a web interface to the documentation, rather than the“green screen” TSO/E interface as found in BookManager READ.
  • Similar to Library Server, you can use KC4z to host and serve documentation from your own server, within your intranet. By using links on the KC4z content Landing Page for each "z/OS elements+features" product, KC4z can serve PDFs from the IBM Publications Center website. Or, if the PDFs are loaded into a KC4z repository on your system (using the collection of Adobe Indexed PDFs for "z/OS elements+features"), the PDFs can be served from a local KC4z repository.

In z/OS V2R1, IBM ended its production of BookManager Book format publications. At this time, the need to continue reading documentation by using the BookManager READ “green screen” interface on TSO/E is much reduced or eliminated.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

BookManager READ

When change was introduced:

z/OS V2R4

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Remove any dependencies on BookManager READ from your system.

Check for the following uses:

  • Review any invocation of BookManager READ on any customized ISPF panels that you have provided.
  • Reading BookManager Book format documentation by using the BookManager READ “green screen” interface on TSO/E. Plan to replace your BookManager Book repository with a KC4z repository of Knowledge Center plugins.
  • Using the BookManager READ command line interface to access information in BookManager Book format documentation, such as the older “ green screen” version of the LookAT message tool.

Replace any use of the BookManager READ command line interface that accesses information in BookManager Book documentation with a Knowledge Center based solution. IBM Knowledge Center includes a replacement for the legacy LookAT facility that was used for message look-ups. You can find it here: IBM Z: Look@ Knowledge Center

In KC4z, the LookAT function can be configured to perform its message lookup against either the Knowledge Center hosted on ibm.com, or against a KC4z repository of Knowledge Center documentation hosted locally on your system.

If you still need the ability read legacy BookManager books, you can do so by moving the book files to a Windows system and using Softcopy Reader for Windows to read the files. This tool is available for download without charge from IBM Support Portal on ibm.com.

Reference information

For more information, see IBM Knowledge Center for z/OS Configuration and User Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.3 : Bulk Data Transfer upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element Bulk Data Transfer (BDT) and the optional BDT features BDT File-to-File and BDT SNA NJE.


Step 4.3.1 : BDT actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes BDT upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.3.1.1 : BDT: Plan for the removal of the Bulk Data Transfer (BDT) File-to-File feature


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As previously announced, z/OS V2R5 is the last release that will include base element Bulk Data Transfer (BDT) and its priced features BDT File-to-File and BDT SNA NJE. Clients should plan to migrate to an alternative.

Aligned with the announcement of the end of life for IBM JES3 in Software Announcement 219-013, dated February 26, 2019, support for BDT will be removed in the next release after z/OS V2R5. This changes applies to both priced features, BDT SNA NJE and BDT File-to-File (F2F). BDT SNA NJE offers JES3 clients the ability to send information over SNA networks to other end points.

Note that BDT SNA NJE does not apply to JES2 clients because this function has always been included as part of JES2. The BDT F2F feature offers both JES3 and JES2 clients the capability of managed file copying from one system to another system.

Functional replacements for BDT F2F are IBM MQ Advanced for z/OS ( 5655-AV9), which includes IBM MQ Managed File Transfer and MQ Advanced Message Security, and IBM Sterling™ Connect:Direct® for z/OS (5655-X11).

Support is planned to be provided for BDT, BDT SNA NJE, and BDT F2F until the end of support for z/OS V2R5.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Bulk Data Transfer Feature (BDT), including SNA NJE and F2F.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 220-498, dated December 8, 2020.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended if you use BDT.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If your installation currently uses the BDT File-to-File feature, plan to use an alternative in a future release.

Reference information

For information about the BDT File-to-File feature, see BDT File-to-File Transaction Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.3.1.2 : BDT: Plan for the removal of the Bulk Data Transfer (BDT) SNA NJE feature


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As previously announced, z/OS V2R5 is the last release that will include base element Bulk Data Transfer (BDT) and its priced features BDT File-to-File and BDT SNA NJE. Clients should plan to migrate to an alternative.

Aligned with the announcement of the end of life for IBM JES3 in Software Announcement 219-013, dated February 26, 2019, support for BDT will be removed in the release after z/OS V2R5. This changes applies to both priced features, BDT SNA NJE and BDT File-to-File (F2F). BDT SNA NJE offers JES3 clients the ability to send information over SNA networks to other end points.

Note that BDT SNA NJE does not apply to JES2 clients because this function has always been included as part of JES2.

Support is planned to be provided for BDT, BDT SNA NJE, and BDT F2F until the end of support for z/OS V2R5.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Bulk Data Transfer Feature (BDT), including SNA NJE and F2F.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 220-498, dated December 8, 2020.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended if you use BDT.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If your installation currently uses the BDT SNA NJE feature, plan to use an alternative in a future release.

Reference information

For information about BDT, see BDT File-to-File Transaction Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.4 : CIM upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element Common Information Model (CIM).


Step 4.4.1 : CIM actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes CIM upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.4.1.1 : CIM: Accommodate the default change from HTTP to HTTPS


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting in z/OS V2R4, the common information model (CIM) server uses HTTPS connections by default. On start-up, the CIM server listens on the HTTPS port, rather than the HTTP port, as was done in previous releases.

The change from HTTP to HTTPS is intended to allow for more secure communication with the CIM server.

The following CIM server configuration defaults are affected:

  • enableHttpConnection=true
  • enableHttpsConnection=false

In z/OS V2R4, these defaults were changed to:

  • enableHttpConnection=false
  • enableHttpsConnection=true

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

BCP

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you have applications that connect to the CIM server through the HTTP protocol.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Based on this change, the CIM server opens a listener on port 5989 by default. If a client connection on this port is not secured by AT-TLS, the connection is closed and an appropriate error message is issued on the operations console.

Related IBM Health Checker for z/OS check:

The following migration health check indicates whether the CIM server is listening on the HTTP port of the system:
IBMCIM,ZOSMIGV2R4_CIM_HTTPS_ENABLED

This check is available for z/OS V2R3 with APAR OA57687 applied.

Steps to take

It is recommended that you use HTTPS instead of HTTP, which allows the CIM server to use Application Transparent Layer Security (AT-TLS) functions. Here, the communication between the CIM client and the CIM server is encrypted.

You must also configure the CIM client applications to use HTTPS. Ensure that the applications run as CIM clients connected to the CIM server on HTTPS port 5989.

Fall back to HTTP is possible, though it is not secure and therefore not recommended.

If you need the CIM server to use the HTTP protocol on start-up, follow these steps:

  • Start the CIM server with the following settings specified in the configuration properties file:
    • enableHttpConnection=true
    • enableHttpsConnection=false
  • Alternatively, you can dynamically change the enableHttpConnection value and restart the CIM server by entering either of these commands on the operations console:
    • cimconfig -s enableHttpConnection= true -p
    • F CFZCIM,APPL=CONFIG,enableHttpConnection=true,PLANNED

Reference information

For information about how to set up HTTPS connections for the CIM server, see the topic “Configuring the CIM server HTTPS connection using AT-TLS” in CIM User’s Guide.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMCIM,ZOSMIGV2R4_CIM_HTTPS_ENABLED.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.5 : Communications Server upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element z/OS Communications Server.


Step 4.5.1 : Communications Server actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Communications Server upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.5.1.1 : IP Services: Ensure that FTP users have access to JES mode


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

With APAR PH42618, support is added to the z/OS FTP server for a new SAF resource to control the use of FTP server JES operational mode: EZB.FTP.sysname.ftpdaemonname.ACCESS.JES

Whenever an FTP client user attempts to enter JES mode, the FTP server verifies that the client user ID is permitted to this SAF resource. As with any SAF check, the profiles defined to protect this resource and their associated access lists determine which users are permitted access.

With the introduction of this resource, it is possible that existing SAF generic profiles for FTP-related resources or an External Security Manager (ESM) that denies access when no applicable profiles are found could block JES mode from FTP users who previously had access.

For example:

  • If your ESM is configured with a generic profile that encompasses the new resource name, such as EZB.FTP.ZOS1.FTPD.** or EZB.FTP.ZOS1.FTPD.ACCESS.*, access to the FTP JES mode is controlled by the access lists for that generic profile. Therefore, users who previously were able to enter JES mode might no longer be permitted to do so without the creation of a more specific SAF profile to protect JES mode.

  • If you use an ESM that denies access in cases where no profile is defined for a resource or where the SERVAUTH class is not activated, users who previously were able to enter JES mode are no longer permitted to do without explicit permission to a SERVAUTH class profile that protects the EZB.FTP.sysname.ftpdaemonname.ACCESS.JES resource.

Note: The FTP server permits access to JES mode if the ESM returns a "no decision" indication (return code 4) on the SAF access control check. Some ESMs, such as RACF, return this code when no profile is defined for the resource or when the SERVAUTH class is not active. In these cases, there is no change in FTP behavior.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

IP Services

When change was introduced:

z/OS V2R5 or an earlier release with the PTF for APAR PH42618 applied.

Applies to upgrade from:

z/OS V2R5, z/OS V2R4 and z/OS V2R3, each without APAR PH42618 applied.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if your z/OS system is running one or more FTP daemons and both of the following conditions are true:

  • Your ESM defines any SAF SERVAUTH class generic profiles that encompass the EZB.FTP.sysname.ftpdaemonname.ACCESS.JES resource
  • Your ESM does not support the "not decision" SAF return code (return code 4), but instead denies access in cases where no applicable profile is found or if the SERVAUTH class is not active.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

Running one or more z/OS FTP daemons.

Restrictions:

None.

System impacts:

If the specified conditions are met and the upgrade action is not performed, FTP users might lose access to JES mode.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review the list of z/OS user IDs that have a valid need to enter FTP JES mode and permit those users to a profile that protects the EZB.FTP.sysname.ftpdaemonname.ACCESS.JES resource.

Any other z/OS user IDs should be denied access to this resource.

Reference information

For more information, see the topic Transferring files using FTP in IP Configuration Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.5.1.2 : SNA services: Stop using the VTAM Common Management Information Protocol


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

In z/OS V2R5, support is removed for the VTAM® Common Management Information Protocol (CMIP). CMIP services is an API that enables a management application program to gather various types of SNA topology data from a CMIP application, which is called the topology agent. IBM recommends that you use the SNA network monitoring network management interface (NMI) to monitor SNA Enterprise Extender and High Performance Routing data.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 219-013, dated 26 February 2019.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you are currently using VTAM CMIP services.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether VTAM OSIMGMT functions are in use on this system, use the health check IBMCS,ZOSMIGV2R4_NEXT_CS_OSIMGMT

The health check is available on the following releases:

  • V2R3 with APAR OA57227
  • z/OS V2R4

Steps to take

Determine whether you have any programs that use VTAM Common Management Information Protocol (CMIP) to monitor SNA Enterprise Extender and High Performance Routing data. An indication of current usage would be if OSIMGMT=YES is specified in your VTAM start list. If so, update the programs to use the SNA network monitoring network management interface (NMI).

Note: With the removal of CMIP from VTAM, the OSIMGMT start option is removed. This option specifies whether the VTAM topology agent code and the CMIP services code is to be loaded and activated for use. You can remove this option from your VTAM start lists for z/OS V2R5 systems.

Reference information

For more information about VTAM start otions, see the topic VTAM start options in SNA Resource Definition Reference.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMCS,ZOSMIGV2R4_NEXT_CS_OSIMGMT.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.5.1.3 : IP Services: Accommodate the removal of native TLS/SSL support from DCAS


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

As of z/OS V2R5, Digital Certificate Access Server (DCAS) support for using IBM System SSL for TLS/SSL is removed. You must upgrade the DCAS server to use Application Transparent Transport Layer Security (AT-TLS) policies.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement "IBM z/OS Version 2 Release 4" dated July 23, 2019.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you are using native TLS/SSL support for DCAS (TLSMECHANISM DCAS).

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

DCAS configuration error messages are issued if any IBM system SSL configuration keywords or parameters are configured.

Related IBM Health Checker for z/OS check:

The following migration health check can help you determine whether you are using native TLS/SSL for FTP servers:
IBMCS,ZOSMIGV2R4_NEXT_CS_DCAS_NTVSSL

This check is available for z/OS V2R3 and V2R4 with both APAR PH16144 (TCP/IP) and APAR OA58255 (SNA) applied.

Steps to take

You must migrate the DCAS server to use AT-TLS policies.

Complete the following steps to migrate the DCAS server to use AT-TLS policies:

  1. Customize the DCAS server for TLS/SSL. For more information, see the topic about customizing DCAS for TLS/SSL in IP Configuration Guide.
  2. Migrate the DCAS configuration file. For more information about DCAS configuration keywords and equivalent AT-TLS policies, see the table that follows.

Table 2. Migrating existing DCAS server to use AT-TLS policies
DCAS configurationAT-TLS equivalent statementAT-TLS policy statement
ClientAuth

Local1

HandshakeRole ServerWithClientAuthTTLSEnvironmentAction
ClientAuthType Required

TTLSEnvironmentAction

TTLSEnvironmentAdvancedParms

ClientAuth

Local2

HandshakeRole ServerWithClientAuthTTLSEnvironmentAction
ClientAuthType SAFCHECKTTLSEnvironmentAction ->

TTLSEnvironmentAdvancedParms

IPADDRLocalAddrTTLSRule
KEYRINGKeyringTTLSEnvironmentAction ->

TTLSKeyringParms

LDAPPORTGSK_LDAP_SERVER_PORTTTLSEnvironmentAction ->

TTLSGskAdvancedParms ->

TTLSGskLdapParms

LDAPSERVERGSK_LDAP_SERVERTTLSEnvironmentAction ->

TTLSGskAdvancedParms ->

TTLSGskLdapParms

PortLocalPortRangeTTLSRule
SAFKEYRINGKeyringTTLSEnvironmentAction ->

TTLSKeyringParms

STASHFILEKeyringStashFileTTLSEnvironmentAction ->

TTLSKeyringParms

V3CIPHERV3CipherSuitesTTLSEnvironmentAction ->

TTLSCipherParms

Reference information

For the steps to migrate the DCAS server, see the topic on converting DCAS configuration keywords to equivalent AT-TLS policy statements in IP Configuration Guide.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMCS,ZOSMIGV2R4_NEXT_CS_DCAS_NTVSSL.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.5.1.4 : IP Services: Accommodate the removal of native TLS/SSL support from TN3270E


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

As of z/OS V2R5, TN3270E support for using IBM System SSL for TLS/SSL is removed. You must configure the TN3270E server to use AT-TLS policies.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you are using native TLS/SSL support for TN3270E (SECUREPORT).

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

TN3270E configuration error messages are issued if any IBM system SSL configuration keywords or parameters are configured.

Related IBM Health Checker for z/OS check:

The following migration health check can help you determine whether you are using native TLS/SSL for TN3270E servers:
IBMCS,ZOSMIGV2R4_NEXT_CS_TN3270_NTVSSL

This check is available for z/OS V2R3 and V2R4 with APAR OA58255 applied.

Steps to take

You must migrate the TN3270E server to use AT-TLS policies.

Complete the following steps to migrate the TN3270E server to use AT-TLS policies:

  1. Customize the TN3270E server for TLS/SSL. For more information, see the topic "TN3270E Telnet server security" in IP Configuration Guide.
  2. Migrate the TN3270E configuration file. For more information about TN3270E configuration keywords and equivalent AT-TLS policies, see Table 2.
    Table 2. Migrating existing TN3270E server to use AT-TLS policies
    Telnet statementAT-TLS equivalent statementAT-TLS equivalent statement
    CLIENTAUTH

    NONE

    HandshakeRole

    Server

    TTLSConnectionAction or

    TTLSEnvironmentAction

    CLIENTAUTH

    SSLCERT

    HandshakeRole

    ServerWithClientAuth and

    ClientAuthType Required

    TTLSConnectionAction or

    TTLSEnvironmentAction /

    TTLSEnvironmentAdvancedParms within TTLSEnvironmentAction

    CLIENTAUTH

    SAFCERT

    HandshakeRole

    ServerWithClientAuth and

    ClientAuthType SAFCHECK

    TTLSConnectionAction or

    TTLSEnvironmentAction /

    TTLSEnvironmentAdvancedParms within TTLSEnvironmentAction

    CRLLDAPSERVERGSK_LDAP_SERVER and

    GSK_LDAP_SERVER_PORT

    TTLSGskLdapParms within TTLSEnvironmentAction
    ENCRYPTIONTTLSCipherParmsTTLSConnectionAction or TTLSEnvironmentAction
    KEYRINGKeyringTTLSKeyRingParms within TTLSEnvironmentAction
    SSLV2SSLv2TTLSEnvironmentAdvancedParms within TTLSEnvironmentAction or

    TTLSConnectionAdvancedParms within TTLSConnectionAction

    SSLTIMEOUTHandshakeTimeoutTTLSEnvironmentAdvancedParms within TTLSEnvironmentAction or

    TTLSConnectionAdvancedParms within TTLSConnectionAction

Reference information

For the steps to migrate the TN3270E server, see the topic "Converting Telnet profile statements to equivalent AT-TLS policy statements" under the TN3270E Telnet server topic "Transport Layer Security" in IP Configuration Guide.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMCS,ZOSMIGV2R4_NEXT_CS_TN3270_NTVSSL.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.5.1.5 : IP Services: Upgrade TLS/SSL support for the FTP server to AT-TLS


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

As of z/OS V2R5, FTP server support for using IBM System SSL for TLS/SSL is removed. You must configure the FTP server to use AT-TLS policies.

Note: TLS/SSL support for the FTP client is unchanged.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement "IBM z/OS Version 2 Release 4", dated July 23, 2019.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you are using native TLS/SSL support for the FTP server (TLSMECHANISM FTP).

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

FTP configuration error messages are issued if any of the removed configuration keywords or parameters are configured for FTP servers.

Related IBM Health Checker for z/OS check:

The following migration health check can help you determine whether you are using native TLS/SSL for FTP servers:
IBMCS,ZOSMIGV2R4_NEXT_CS_FTPSRV_NTVSSL

This check is available for z/OS V2R3 and V2R4 with both APAR PH21573 (TCP/IP) and APAR OA59022 (SNA) applied.

Steps to take

You must migrate any FTP server using native TLS/SSL to use AT-TLS policies.

Perform the following steps to migrate from an existing FTP server configuration using native TLS/SSL support to a configuration using AT-TLS:

  1. Configure AT-TLS and Policy Agent. For details about Policy Agent setup and AT-TLS policy statements, see IP Configuration Reference.

    Requirements:

    • The FTP server is an AT-TLS controlling application. Code a TTLSEnvironmentAdvancedParms statement with the ApplicationControlled and SecondaryMap parameters; both parameters should specify the value On. The ApplicatonControlled parameter allows FTP to start and stop TLS security on a connection. The SecondaryMap parameter enables active or passive data connections to use the AT-TLS policy that is used for the control connection. You do not need to code any additional TTLSRule statements for the data connections.
    • The FTP server requires the HandshakeRole parameter with the value Server or ServerWithClientAuth to be coded on the TTLSEnvironmentAction statement. If the SECURE_LOGIN statement is coded in FTP.DATA with the parameters REQUIRED or VERIFY_USER, the HandshakeRole parameter value must be ServerWithClientAuth.
    • The TTLSRule statement for the FTP server requires the Direction parameter with the value Inbound.

  2. Configure the FTP server to use AT-TLS by coding TLSMECHANISM ATTLS in FTP.DATA.

  3. If TLSRFCLEVEL CCCNONOTIFY is configured in FTP.DATA, update TLSRFCLEVEL to have a valid value for AT-TLS. If your FTP server uses TLSRFCLEVEL CCCNONOTIFY, change it to TLSRFCLEVEL RFC4217. CCCNONOTIFY is no longer allowed when TLSMECHAMISM ATTLS is configured. If you leave CCCNONOTIFY unchanged when TLSMECHAMISM ATTLS is configured, the FTP server issues a warning message and defaults to TLSRFCLEVEL DRAFT.

    The CCCNONOTIFY and DRAFT options provide interoperability with FTP clients that were implemented based on early drafts of the RFC. In the time since RFC 4217 was adopted as a standard in 2005, it is unlikely that any of the FTP clients that interact with your z/OS FTP server are still limited to early draft behavior.

    You might need to change the configuration of any FTP clients that currently use the CCCNONOTIFY behavior. If you encounter an FTP client that is limited to the DRAFT or CCCNONOTIFY behavior, work with the owner of the client to upgrade it to a modern implementation that complies with the RFC 4217 standard.


  4. Use Table 2 to migrate the existing FTP server configuration to AT-TLS. Remove the statements form FTP.DATA and code the AT-TLS equivalent statement.
    Table 2. Migrating existing FTP server configuration
    FTP.DATA statementAT-TLS equivalent statementAT-TLS policy statement
    KEYRINGKeyring

    TTLSEnvironmentAction ->

    TTLSKeyRingParms

    CIPHERSUITEV3CipherSuites

    TTLSEnvironmentAction or TTLSConnectionAction ->

    TTLSCipherParms

    TLSTIMEOUTGSK_V3_SESSION_TIMEOUT

    TTLSEnvironmentAction ->

    TTLSGskAdvancedParms

    SSLV3SSLv3

    TTLSEnvironmentAction -> TTLSEnvironmentAdvancedParms

    Or

    TTLSConnectionAction -> TTLSConnectionAdvancedParms


  5. Use Table 3 to migrate existing ciphers coded on CIPHERSUITE statements in FTP.DATA to AT-TLS TTLSCipherParms statements.
    Table 3. Migrating existing ciphers
    CIPHERSUITE cipherV3CipherSuites cipherHexadecimal value
    SSL_DES_SHA TLS_RSA_WITH_DES_CBC_SHA09
    SSL_3DES_SHA TLS_RSA_WITH_3DES_EDE_CBC_SHA0A
    SSL_NULL_MD5TLS_RSA_WITH_NULL_MD5 01
    SSL_NULL_SHA TLS_RSA_WITH_NULL_SHA 02
    SSL_RC2_MD5_EX TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 06
    SSL_RC4_MD5 TLS_RSA_WITH_RC4_128_MD504
    SSL_RC4_MD5_EX TLS_RSA_EXPORT_WITH_RC4_40_MD503
    SSL_AES_128_SHATLS_RSA_WITH_AES_128_CBC_SHA2F
    SSL_AES_256_SHA TLS_RSA_WITH_AES_256_CBC_SHA35

  6. AT-TLS supports more secure TLS versions and ciphers. Consider enabling TLSv1.2 or TLSv1.3 on the TTLSEnvironmentAdvancedParms or TTLSConnectionAdvancedParms statement. Consider enabling support for stronger ciphers on the TTLSCipherParms statement.

Reference information

For the steps to migrate the FTP server, see the topic "Steps for migrating the FTP server and client to use AT-TLS" in IP Configuration Guide.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMCS,ZOSMIGV2R4_NEXT_CS_FTPSRV_NTVSSL.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.5.1.6 : IP services: Ensure storage availability for IWQ IPSec traffic


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

As of z/OS V2R3 with TCP/IP APAR PI77649, the processing of IPAQENET and IPAQENET6 INTERFACE statements is enhanced when you use OSA-Express6S. If you enabled QDIO inbound workload queuing (WORKLOADQ) and you have IPSec traffic, an additional ancillary input queue (AIQ) is established for IPSec inbound traffic. Additional storage is allocated for this input queue.

Each AIQ increases storage utilization in the following two areas:

  • Approximately 36 KB of fixed ECSA
  • 64-bit CSM HVCOMMON for READSTORAGE

    If you are using IPSec, when the first IPSec tunnel is activated (protocols ESP or AH), the new AIQ is backed with 64-bit CSM HVCOMMON fixed storage. The amount of HVCOMMON storage that is used is based on the specification of the INTERFACE READSTORAGE parameter.

If you configured QDIO inbound workload queuing (WORKLOADQ), ensure that sufficient fixed ECSA and fixed (real) 4 KB CSM HVCOMMON storage is available for the AIQ for IPSec traffic.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R3 (with APAR PI77649).

Applies to upgrade from:

z/OS V2R3 (without APAR PI77649).

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but it is recommended if you have the WORKLOADQ parameter that is specified on the OSA IPAQENET and IPAQENET6 INTERFACE statements, you have IPSec traffic and you have concerns about using additional ECSA or real (fixed) storage.

Target system hardware requirements:

OSA-Express6S Ethernet features or later in QDIO mode running on IBM z14 and ZR1.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether sufficient fixed storage is available for IWQ IPSec enabling, use the following IBM health checks:

  • IBMCS,ZOSMIGV2R4PREV_CS_IWQSC_tcpipstackname issues a message if the TCP/IP stack has inbound workload queuing (IWQ) and IPSec enabled, but the OSA does not support IWQ for IPSec. Only OSA-Express6S and later support IWQ for IPSec. This health check is shipped INACTIVE and set to run once.
  • IBMCS,CSTCP_IWQ_IPSEC_tcpipstackname issues a message if the TCP/IP stack has IWQ and IPSec enabled, and the OSA does support IWQ for IPSec. This health check is shipped ACTIVE and is set to run once.

These health checks are available with PH11837 and OA57525 for V2R3, and PH12005 and OA57560 for V2R4.

Steps to take

  1. If you are using or plan to use OSA-Express6S or later, verify that the following conditions are true:
    • WORKLOADQ is specified on the IPAQENET and IPAQENET6 INTERFACE statements.
    • Have IPSec traffic; protocols ESP or AH.
  2. If step 1 is applicable, IWQ IPSec uses additional storage. Continue with step 3 - 6. Otherwise, there is no increase in storage usage, and no further action is required.
  3. To calculate the total storage increase, count the total number of IPAQENET and IPAQENET6 INTERFACE statements that are coded with the WORKLOADQ parameter that are associated with OSA-Express6S or later. Make a note of the number.
  4. Verify that sufficient ECSA is available. To calculate this, multiply the total INTERFACE statements that are counted in step 3 by 36 KB. The resulting number indicates how much additional ECSA is required.

    To determine whether sufficient ECSA is available to enable this function, verify the following ECSA definitions:

    • D CSM usage (PARMLIB member IVTPRM00, ECSA MAX value)
    • VTAM (Start Options CSALIMIT and CSA24)
    • TCPIP (GLOBALCONFIG ECSALIMIT statement in the TCPIP PROFILE)
  5. Verify that sufficient real (fixed) storage is available. 64-bit fixed (CSM HVCOMMON) storage is used for the IPSec AIQ read buffers. To calculate this value, multiply the total number of INTERFACE statements that are counted in step 3 by your configured READSTORAGE value (for example, 4 MB). You can verify how much storage is being used for READSTORAGE by using the D NET, TRLE command. The resulting number indicates how much additional fixed (64-bit) storage is required. To verify that the additional fixed storage is not a constraint for your system, take the following actions:
    • Use the DISPLAY CSM command to verify that sufficient fixed storage is available (CSM FIXED MAXIMUM defined in IVTPRM00).
    • Verify the actual amount of real storage available to this z/OS system by using D M=STOR or D M=HIGH.
  6. If sufficient ECSA or real storage is not available, increase the available real storage or consider defining some of the OSA-Express6S (or later) INTERFACE statements with the NOWORKLOADQ parameter. If your CSM FIXED MAXIMUM is too low, increase this value in IVTPRM00.

Reference information

For information about ECSA usage, see the IBM technote Communications Server ECSA and CSM Storage Usage.

For documentation updates to existing publications, check the following URL for the appropriate FMID:

Instructions:

This portion of the Workflow will guide you to submit jobs to run two IBM Health Check for z/OS health checks associated with this upgrade action, IBMCS,*IWQ*.

These checks will be activated if they are not already active. If the checks are activated, they will be deactivated at the end of the job, so that they remain in the same state as they were found.

If the health checks run with no exceptions, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health checks find an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation as you find appropriate. You can then re-run this workflow step to submit the health check jobs again, until the health checks no longer receive exceptions and the step is marked "Complete".

These health checks are available with PH11837 and OA57525 for V2R3, and PH12005 and OA57560 for V2R4.


Step 4.5.1.7 : TCP/IP: Removal of Sysplex Distributor support for Cisco Multi-Node Load Balancer (MNLB)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

z/OS V2R5 removes support for sysplex distributor optimized connection load balancing with the Cisco Multi-Node Load Balancer (MNLB) router function. In previous releases, you could use a combination of the sysplex distributor and the Cisco MNLB to provide workload balancing.

This removal affects configurations that have the SERVICEMGR keyword specified on the VIPADEFINE statement in the TCP/IP configuration file (PROFILE.TCPIP). This removal does not affect any other Sysplex Distributor functions.

IBM recommends that you implement another solution for workload balancing, such as an external load balancer.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 220-378 "IBM z/OS V2.4 3Q 2020 new functions and enhancements", dated September 22, 2020.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if your installation has configured sysplex distribution to use optimized connection load balancing with the Cisco MNLB router function.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

To determine whether your system is affected, check for the SERVICEMGR keyword specification on the VIPADEFINE statement in the TCP/IP configuration file (PROFILE.TCPIP).

Typically, the PROFILE.TCPIP data set is specified on the PROFILE DD statement in the TCP/IP stack started procedure. However, other options exist for specifying it. The search order for accessing PROFILE.TCPIP information is as follows. The first file found in the search order is used.

  1. //PROFILE DD statement
  2. jobname.nodename.TCPIP
  3. TCPIP.nodename.TCPIP
  4. jobname.PROFILE.TCPIP
  5. TCPIP.PROFILE.TCPIP

For more information, see the topic PROFILE.TCPIP search order in IP Configuration Guide.

In the PROFILE.TCPIP data set, search for instances of the SERVICEMGR keyword. Remove the keyword from the PROFILE.TCPIP data set.

Reference information

For statement syntax and descriptions of the configuration statements, see the topic TCP/IP profile (PROFILE.TCPIP) and configuration statements in IP Configuration Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.5.1.8 : SNA and IP services: Prepare for the removal of support for LSA and LCS devices


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

z/OS V2R5 is planned to be the last z/OS release to support VTAM Link Station Architecture (LSA) and TCP/IP LAN Channel Station (LCS) devices. z/OS systems that have workloads that rely on the SNA protocol and use OSE networking channels as the transport should be updated to make use of some form of SNA over IP technology, where possible, such as Enterprise Extender.

As stated in IBM United States Hardware Announcement 121-029, dated May 4, 2021, many IBM Z clients rely on Systems Network Architecture (SNA) applications for mission-critical workloads, and IBM has no plans to discontinue support of the SNA protocol, including the SNA APIs. However, IBM Z support for the SNA protocol being transported natively from the server using OSA Express 1000BASE-T adapters configured as channel type “OSE” will be eliminated in a future hardware system family.

With the support for OSE planned to be discontinued, support for the related VTAM and TCP/IP device drivers is also planned to be discontinued.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R5. Also, see the following IBM Announcement Letters:

  • IBM United States Software Announcement 221-260 "IBM z/OS V2.5: Enabling innovative development to support hybrid cloud and AI business applications", dated July 27, 2021.
  • IBM United States Hardware Announcement 121-029, "IBM z15 Model T01 and IBM z15 Model T02 provide increased security, resiliency, performance, and flexibility for mission-critical workloads in a hybrid cloud", dated May 4, 2021.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended if your installation is currently using OSA-Express in OSE mode (for SNA or TCP/IP).

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

Health checks are planned.

Steps to take

To determine whether your system is affected for LCS (TCP/IP), check your TCP/IP profile for DEVICE, LINK, and HOME statements that include the device type LCS. Make plans to migrate your legacy LCS definitions to use IPAQENET INTERFACE statements to access your LAN. See the topic INTERFACE - IPAQENET OSA-Express QDIO interfaces statement in IP Configuration Guide.

To determine whether your system is affected for LSA (VTAM), check the XCA major nodes in your VTAMLST members to see if any of them have MEDIUM=CSMACD coded on the PORT statement. Depending on your connectivity requirements, consider making plans to switch your connectivity to use FICON CTC connectivity or SNA over IP technologies, such as Enterprise Extender or TN3270.

Reference information

For statement syntax and descriptions of the configuration statements, see the following topics:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.5.1.9 : IP Services: Prepare for the removal of support for OSA DEVICE/LINK/HOME configuration


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

z/OS V2R5 is planned to be the last z/OS release to support the definition of Open Systems Adapter Express (OSA Express) connectivity through the following TCP/IP profile statements:

  • DEVICE
  • LINK
  • HOME

These statements are defined in the TCP/IP configuration file (PROFILE.TCPIP).

If you use these statements with a device type of MPCIPA and a link type of IPAQENET to define network connections for OSA devices, IBM recommends that you convert the statements to equivalent INTERFACE statements. The INTERFACE statement improves stack configuration for IPAQENET interfaces, and some functions like multiple VLAN support require that the QDIO interface is defined with the INTERFACE statement.

If you use these statements with a device type of LCS, there is not an INTERFACE equivalent for this and, as support for LCS is also planned to be withdrawn, you must make plans to use different connectivity to access the LAN.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 221-260 "IBM z/OS V2.5: Enabling innovative development to support hybrid cloud and AI business applications", dated July 27, 2021.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended if your installation defines OSA network connectivity through the TCP/IP profile statements DEVICE, LINK, and HOME.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

Health checks are planned.

Steps to take

To determine whether your system is affected for QDIO, check your TCP/IP profile for DEVICE, LINK, and HOME statements that include the device type MPCIPA and the link type IPAQENET. Convert the statements to equivalent IPAQENET INTERFACE statements. See the topic Steps for converting from IPv4 IPAQENET DEVICE, LINK, and HOME definitions to the IPv4 IPAQENET INTERFACE statement in IP Configuration Guide.

To determine whether your system is affected for LCS, check your TCP/IP profile for DEVICE, LINK, and HOME statements that include the device type LCS. Make plans to migrate your legacy LCS definitions to use IPAQENET INTERFACE statements to access your LAN. See the topic INTERFACE - IPAQENET OSA-Express QDIO interfaces statement in IP Configuration Guide.

Reference information

For statement syntax and descriptions of the configuration statements, see the topic TCP/IP profile (PROFILE.TCPIP) and configuration statements in IP Configuration Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.5.1.10 : TCP/IP: Removal of Sysplex Distributor support for IBM DataPower Gateway products


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

z/OS V2R5 removes support for sysplex distributor target-controlled distribution to DataPower® Gateway products. As a result, the following keywords are no longer supported on the VIPADISTRIBUTE statement in the TCP/IP configuration file (PROFILE.TCPIP):

  • GRE
  • ENCAP
  • TARGCONTROLLED
  • CONTROLPORT

IBM recommends that you implement another solution for workload balancing, such as an external load balancer.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement "IBM z/OS Version 2 Release 4", dated July 23, 2019.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if your installation has configured sysplex distribution to non-z/OS targets.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Typically, the PROFILE.TCPIP data set is specified on the PROFILE DD statement in the TCP/IP stack started procedure. However, other options exist for specifying it. The search order for accessing PROFILE.TCPIP information is as follows.The first file found in the search order is used.

  1. //PROFILE DD statement
  2. jobname.nodename.TCPIP
  3. TCPIP.nodename.TCPIP
  4. jobname.PROFILE.TCPIP
  5. TCPIP.PROFILE.TCPIP

For more information, see the topic PROFILE.TCPIP search order in IP Configuration Guide.

In the PROFILE.TCPIP data set, search for instances of the following keywords, which are related to Tier1 workload distribution:

  • GRE
  • ENCAP
  • TARGCONTROLLED
  • CONTROLPORT

Remove the keywords from the PROFILE.TCPIP data set.

Reference information

For the syntax and descriptions of the configuration statements, see the topic TCP/IP profile (PROFILE.TCPIP) and configuration statements in IP Configuration Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.5.2 : Communications Server actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Communications Server upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.5.2.1 : IP Services: Implement the AT-TLS server-allowed KEX curves list


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

With APAR OA61783 on z/OS V2R5 and z/OS V2R4, z/OS Communications Server added the GSK_SERVER_ALLOWED_KEX_ECURVES environment variable. This variable is used to specify the list of key exchange elliptic curves that are supported by the server during a TLS V1.0, TLS V1.1, or TLS V1.2 handshake.

When this variable was introduced, no corresponding AT-TLS support existed. Thus, if an AT-TLS user wanted to specify a server-allowed key exchange curve list, they had to code the System SSL environment variable in an AT-TLS environment file that is referenced by the Envfile parameter of the TTLSGroupAdvancedParms statement associated with the relevant AT-TLS rules.

Now, with the introduction of APAR PH45902 for zz/OS V2R5 and z/OS V2R4, AT-TLS adds support for the System SSL server-allowed key exchange curve list. With this change, any specification of the GSK_SERVER_ALLOWED_KEX_ECURVES variable in an AT-TLS environment file is now overridden by the new ServerKexECurves parameter of the TTLSSignatureParms statement. If no ServerKexECurves parameter is specified, AT-TLS uses its own default list.

Because of this change, configurations that specify the GSK_SERVER_ALLOWED_KEX_ECURVES variable in an AT-TLS environment file must be updated to use the new AT-TLS policy parameter.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

IP Services

When change was introduced:

z/OS V2R5 or z/OS V2R4, with the PTF for APAR PH45902 applied.

Applies to upgrade from:

z/OS V2R5 or z/OS V2R4, each without APAR PH45902 applied.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if AT-TLS policy is being used on the system and that policy specifies the use of an AT-TLS environment file that contains the System SSL GSK_SERVER_ALLOWED_KEX_ECURVES variable, which was introduced with APAR OA61783.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

If the action is not taken and the specified conditions exist, the server allowed KEX curves specified in the AT-TLS environment files are ignored and the AT-TLS default is used.

Related IBM Health Checker for z/OS check:

None.

Steps to take

To determine whether you currently use the GSK_SERVER_ALLOWED_KEX_ECURVES variable, do the following:

  1. On your z/OS V2R5 and z/OS V2R4 systems, for each affected z/OS TCP/IP stack, enter the pasearch -t command to list all the AT-TLS rules currently in use and redirect the command output to a z/OS UNIX file, for example: pasearch -t > /tmp/attlsrules.txt. The pasearch command generates a consolidated report of each installed AT-TLS rule, including each of the conditions and actions that make up the rule.

  2. Search the generated file (/tmp/attlsrules.txt in the example above) for each occurrence of the label "Envfile:" to locate all the references to AT-TLS environment files or data sets.

  3. For each unique AT-TLS environment file, examine its contents. If it contains a GSK_SERVER_ALLOWED_KEX_ECURVES variable, do the following:
    1. Write down the name of the environment file
    2. Write down value specified on the GSK_SERVER_ALLOWED_KEX_ECURVES variable
    3. Note whether the file contains other environment variables in addition to the GSK_SERVER_ALLOWED_KEX_ECURVES variable.
    4. Search for and write down the name of each AT-TLS rule that references the environment file. The rule name appears before the environment file specification and can be found by searching for the preceding “policyRule:” label.
  4. If the environment file does not contain a GSK_SERVER_ALLOWED_KEX_ECURVES variable, you can ignore it.

    If you use the z/OSMF Network Configuration Assistant to maintain your AT-TLS policy:

    1. Using the notes you took during the previous steps, log into the z/OSMF Network Configuration Assistant AT-TLS perspective. For each affected TCP/IP stack, go to the main Connectivity Rules dialog. Notice that the policyRule names you noted earlier contain the names of the Connectivity Rules for which they were generated. Note that one Connectivity Rule can result in the generation of multiple policyRules.

    2. For each affected Connectivity Rule, do the following:

      1. Add the curves specified on the GSK_SERVER_ALLOWED_KEX_ECURVES variable to the server key exchange curve list under the signature parameters for each Security Level associated with the Connectivity Rule

      2. Remove the GSK_SERVER_ALLOWED_KEX_ECURVES from the environment file. If this action renders the file empty, you can delete the file.

      3. If the environment file is empty or was deleted, deselect the use of the environment file for the Connectivity Rule.

      If you hand-code your AT-TLS policy files, using the notes you took during the previous steps, edit each affected AT-TLS policy file. For each environment file that contains a GSK_SERVER_ALLOWED_KEX_ECURVES variable, do the following:

      1. Find each TTLSGroupAction statement that references the environment file

      2. For each of those TTLSGroupAction statements, find each TTLSRule statement that references the TTLSGroupAction.

      3. For each of those TTLSRule statements, find the TTLSEnvironmentAction statement it references. Note: You can also reference TTLSSignatureParms statements from the TTLSConnectionAction if you have a need to do so.

        Do the following:

        • If the TTLSEnvironmentAction statement references a TTLSSignatureParms statement, add a ServerKexECurves parameter with the specified GSK_SERVER_ALLOWED_KEX_ECURVES value to that TTLSSignatureParms statement.

        • Otherwise, create a new TTLSSignatureParms statement that specifies the ServerKexECurves parameter with the specified GSK_SERVER_ALLOWED_KEX_ECURVES value. Note that if you have already created such a new TTLSSignatureParms statement for another TTLSEnvionmentAction statement, you can point this TTLSEnvironmentAction statement to that new TTLSSignatureParms statement. You do not have to create a new TTLSSignatureParms statement for each TTLSEnvironmentAction statement (multiple TTLSEnvironmentAction statements can reference the same TTLSSignatureParms statement).

        • After the above steps are complete for each of the affected TTLSEnvironmentAction statements, you can delete the GSK_SERVER_ALLOWED_KEX_ECURVES variable from the environment file. If this renders the file empty, you can delete it and remove the Envfile parameter from the TTLSGroupAction statement.

      Reference information

      For more information, see the topic TTLSSignatureParms statement in IP Configuration Reference.

      Instructions:

      This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.5.2.2 : IP Services: Update /etc configuration files


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

Some utilities provided by Communications Server require the use of certain configuration files. You are responsible for providing these files if you expect to use the utilities. IBM provides default configuration files as samples in the /usr/lpp/tcpip/samples directory. Before the first use of any of these utilities, you should copy the IBM-provided samples to the /etc directory (in most cases). You can further customize these files to include installation-dependent information. An example is setting up the /etc/osnmpd.data file by copying the sample file from /usr/lpp/tcpip/samples/osnmpd.data to /etc/osnmpd.data and then customizing it for the installation.

If you customized any of the configuration files that have changed, you must incorporate the customization into the new versions of the configuration files.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Communications Server.

When change was introduced:

Various releases. See the table in "Steps to take."

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you have customized a configuration file that IBM has changed. See the table in "Steps to take."

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you added installation-dependent customization to the IBM-provided configuration files listed in the following table, make the same changes in the new versions of the files by copying the IBM-provided samples to the files. Then, customize the files.

Utility

IBM-provided sample file

Target location

What changed and when

SNMP agent

/usr/lpp/tcpip/samples/etc/osnmpd.data

/etc/osnmpd.data

Every release, the value of the sysName MIB object is updated to the current release.

Reference information

For more information about Communications Server configuration files, see z/OS Communications Server: IP Configuration Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.5.2.3 : IP Services: Make changes for Netstat enhancements


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

The Netstat command displays the status of a local host. In each release of z/OS, the Netstat reports can change in ways that can affect automation or front-end programs.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if the changed or removed settings affect either automation that uses the Netstat report output or front-end programs that run the Netstat command.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Accommodate the Netstat changes in your automation and front-end programs. You can begin by reviewing the ways in which the displays are updated in each release. For details about the changes for each Netstat report, see Communications Server interface changes for z/OS V2R5 in z/OS Communications Server: New Function Summary. However, you must run the commands to know with certainty what changes to make after you IPL the system.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.5.2.4 : IP Services: Decide whether to accept the new FIXED CSM default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

In z/OS V2R4, the default amount for communications storage manager (CSM) fixed storage for buffers is increased from 200 MB to 512 MB. Your installation can specify a value for the CSM fixed storage amount on the FIXED statement in the IVTPRM00 parmlib member.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Communications Server.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use the default CSM FIXED MAX value of 200M and you do not want to use the new default of 512M.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether the maximum amount of storage dedicated to CSM is sufficient for your system, use the health check IBMCS,CSVTAM_CSM_STG_LIMIT. This check is available for z/OS V2R4 and z/OS V2R3 systems.

The health check issues message ISTH017E if the value specified for the maximum CSM storage for the FIXED, ECSA, or HVCOMM storage types as defined in parmlib member IVTPRM00 is less than the minimum value specified for the check.

Message ISTH002I is displayed prior to this message for each CSM storage type that failed the check.

Steps to take

Review your HVCOMMON setting in IVTPRM00 and determine whether you need to increase this value to account for the fact that the system reserves a larger portion of this storage by default for CSM buffers.

If you did not previously code a value for FIXED in IVTPRM00 and you do not want the new default, specify FIXED MAX(200M) in your IVTPRM00 parmlib member to retain the value as formerly defaulted.

Tip: You can use the D NET,CSM command to display the "FIXED MAXIMUM" storage specification in message IVT5538I.

Reference information

For information about the IVTPRM00 parmlib member, see the IVTPRM00 parmlib member in z/OS MVS Initialization and Tuning Reference.

See the topic about fixed maximum storage for CSM buffers in z/OS Communications Server: IP Configuration Guide.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMCS,CSVTAM_CSM_STG_LIMIT.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.5.2.5 : IP Services: Determine the storage impact of QDIOSTG=126


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network AdministratorNo

Description:

Description

If you specify QDIOSTG=126 in your VTAM start options, each OSA-Express QDIO interface that uses the default READSTORAGE setting of GLOBAL on the INTERFACE or LINK statement gets 8 MB of fixed CSM for read storage. For any OSA-Express QDIO interfaces that have a bandwidth of at least 10 GbE and use 8 MB of read storage, z/OS V2R4 allocates additional fixed CSM 4K HVCOMMON storage for work element processing.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Communications Server.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

The system allocates additional fixed CSM HVCOMMON storage for work element processing for each OSA-Express QDIO interface that is using 8 MB of read storage.

Related IBM Health Checker for z/OS check:

None.

Steps to take

See Additional fixed storage for OSA interfaces using 8 MB of read storage in z/OS Communications Server: IP Configuration Guide to understand how much additional storage z/OS V2R4 allocates for work element processing.

If you do not want the system to allocate this extra storage for a specific interface, update your INTERFACE or LINK statement to specify a READSTORAGE value other than GLOBAL.

Reference information

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.6 : Cryptographic Services upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element Cryptographic Services. Included are the components Integrated Cryptographic Service Facility (ICSF), PKI Services, and System Secure Sockets Layer (SSL).


Step 4.6.1 : Cryptographic Services actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Cryptographic Services upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.6.1.1 : ICSF: Update references to the old ICSF library


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R5, ICSF no longer provides:

  • CSFDLL module in CSF.SCSFMOD0
  • C header file CSFBEXTH in CSF.SCSFHDRS
  • Side deck CSFDLLSD in CSF.SCSFOBJ

Also, the data sets CSF.SCSFHDRS and CSF.SCSFOBJ are no longer created at installation time.

These parts were functionally replaced in z/OS V1R9 by the C header file CSFBEXT in SYS1.SIEAHDR.H, the library CSFDLL31 in SYS1.SIEALNKE, and the side deck CSFDLL31 in SYS1.SIEASID.

Existing executable load modules that are already link-edited with CSFDLL will continue to run unchanged.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

Cryptographic Services.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if an application that uses the old library, header, or side deck, must be recompiled or relinked. Or, if an application dynamically loads CSFDLL.

Existing applications that were built with CSFDLL do not require any updates.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check your applications on your system for the use of any of the following:

  • #include <.csfbexth.h>. or #include "csfbexth.h"
  • Use of side deck CSFDLLSD
  • Link-edit of CSFDLL into a load module
  • References to data sets CSF.SCSFHDRS or CSF.SCSFOBJ

To use the supported interfaces, make the following changes:

  • #include <.csfbexth.h>. or #include "csfbexth.h"

    Replace with csfbext.h (note the removed 'h' in the include name) and ensure that the standard header location SYS1.SIEAHDR.H or ICSF-specific location /usr/lpp/pkcs11/include is in the include path

  • Use of side deck CSFDLLSD

    Replace with CSFDLL31 from the standard side deck location SYS1.SIEASID

  • Link-edit of CSFDLL into a load module

    Replace with CSFDLL31 from the standard library location SYS1.SIEALNKE

  • References to data sets CSF.SCSFHDRS or CSF.SCSFOBJ

    Replace with SYS1.SIEAHDR.H or SYS1.SIEASID, if not already present in the relevant data set concatenations

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.6.1.2 : ICSF: Negotiation of the extended master secret extension enabled by default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

With the installation of APAR OA60105, System SSL supports TLS session hash and extended master secret extension as defined in RFC 7627. This extension binds the master secret to the full handshake that generated it.

The extended master secret support can be configured through either an environment variable or an invocation to the gsk_attribute_set_enum() routine.

The environment variable settings are:

GSK_CLIENT_EXTENDED_MASTER_SECRET
  • OFF – Does not support extended master secret extension
  • ON – Sends the extended master secret extension. This is the default.
  • REQUIRED – Requires the extended master secret extension to be supported by the server

GSK_SERVER_EXTENDED_MASTER_SECRET
  • OFF – Does not support extended master secret extension
  • ON – Supports extended master secret extension if the client sends it. This is the default.
  • REQUIRED – Requires the extended master secret extension to be sent by client.

gsk_attribute_set_enum()

452 - GSK_CLIENT_EXTENDED_MASTER_SECRET
  • GSK_SERVER_EXTENDED_MASTER_SECRET_OFF – Does not support extended master secret extension
  • GSK_SERVER_EXTENDED_MASTER_SECRET_ON – Sends the extended master secret extension. This is the default.
  • GSK_SERVER_EXTENDED_MASTER_SECRET_REQUIRED – Requires the extended master secret extension to be supported by the server

453 - GSK_SERVER_EXTENDED_MASTER_SECRET
  • GSK_SERVER_EXTENDED_MASTER_SECRET_OFF – Does not support extended master secret extension
  • GSK_SERVER_EXTENDED_MASTER_SECRET_ON – Supports extended master secret extension if the client sends it. This is the default.
  • GSK_SERVER_EXTENDED_MASTER_SECRET_REQUIRED – Requires the extended master secret extension to be sent by client

By default, System SSL enables the support for both TLS client and server applications. The System SSL TLS client always sends the extension. The System SSL TLS server, if presented with the extension, uses it during the negotiation of the connection.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

Cryptographic Services.

When change was introduced:

z/OS V2R3 and z/OS V2R4 with APAR OA60105.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4 (without APAR OA60691 applied).

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you are using System SSL or AT-TLS for secure TLS 1.0, 1.1 and 1.2 connections. The Extended Master Secret is not supported or needed with TLS 1.3.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

When upgrading to V2R5, ensure that preconditioning (coexistence) APAR OA60691 is installed on the other systems in the sysplex.

If there is a need to disable the extended master secret support in the System SSL application due to compatibility issues, the GSK_SERVER_EXTENDED_MASTER_SECRET and GSK_CLIENT_EXTENDED_MASTER_SECRET environment variables or attributes can be set to OFF to disable the support. This can be done by using the gsk_attribute_set_enum() routine, setenv() or environment variables, if supported by the System SSL application.

Restrictions:

None.

System impacts:

If the coexistence PTFs for APAR OA60691 are not applied to all LPARs in the sysplex, it may result in additional full TLS handshakes which might impact performance, resulting in higher CPU utilization.

Related IBM Health Checker for z/OS check:

None.

Steps to take

With the direction to enable the extended master secret support by default, System SSL applications and those that rely on AT-TLS may need to disable the negotiation of this extension for compatibility issues.

The disablement by the System SSL application can be done by utilizing the gsk_attribute_set_enum() routine, setenv() or, if their application supports the setting of UNIX environment variables, providing product information for disablement through the environment variables.

If looking to exploit the new capability to require the extension to be used during the negotiation of the connection (ie. GSK_CLIENT_EXTENDED_MASTER_SECRET_REQUIRED or GSK_SERVER_EXTENDED_MASTER_SECRET_REQUIRED ), care needs to be taken to ensure that the connection partner supports the extension. If the System SSL server application supports sysplex session id caching (GSK_SYSPLEX_SIDCACHE) and like servers reside on different LPARs, each LPAR must be utilizing z/OS V2R3 or higher with the APAR applied prior to requiring the extension.

AT-TLS considerations

You can use the System SSL environment variables listed above to control extended master secret behavior for AT-TLS rules. To do so, specify the variables in a file or data set that is referenced through the Envfile parameter on the TTLSGroupAdvancedParms statement in the AT-TLS policy. For information about the Envfile parameter, see the topic TTLSGroupAdvancedParms statement in z/OS Communications Server: IP Configuration Reference.

If you build and maintain your AT-TLS policy through the z/OSMF Network Configuration Assistant, you can specify an environment file through the following dialog:
AT-TLS->TCP/IP Stack->Connectivity Rule->Advanced tab->Advanced button->Environment tab.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.6.1.3 : ICSF: Remove sequential data sets from the CSFPARM DD statement


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R4, it is no longer possible to specify a sequential data set on the CSFPARM DD statement in the ICSF procedure.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

Cryptographic Services.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you specify a sequential data set on the CSFPARM DD statement.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check for the specification of any sequential data sets specified on the CSFPARM DD statement.

Consider using a partitioned data set in place of a sequential data set on the CSFPARM DD statement. For example:

//ICSF PROC PRM=XX //ICSF EXEC PGM=CSFINIT,TIME=NOLIMIT,MEMLIMIT=NOLIMIT //CSFPARM DD DSN=SYS1.ICSFLIB(CSFPRM&PRM),DISP=SHR

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 4.6.1.4 : Accommodate the removal of support for EIM, OCSF, OCEP, and PKITP


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R5, z/OS no longer supports Enterprise Identity Mapping (EIM) and Open Cryptographic Services Facility (OCSF), including its plug-ins, such as Open Cryptographic Enhanced Plug-ins (OCEP) and PKI Services Trust Policy (PKITP). These components were not widely used or enhanced for several releases of z/OS.

IBM recommends that you use other applications for comparable functions, such as Integrated Cryptographic Services Facility (ICSF) and System SSL.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

Cryptographic Services.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 219-344 "IBM z/OS Version 2 Release 4" dated July 23, 2019.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use EIM, OCSF, OCEP, or PKITP.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check for the use of any of the following applications on your system:

  • Enterprise Identity Mapping (EIM)
  • Open Cryptographic Services Facility (OCSF) and its plug-ins, including:
    • Open Cryptographic Enhanced Plug-ins (OCEP)
    • PKI Services Trust Policy (PKITP)

Use other applications for comparable functions, such as Integrated Cryptographic Services Facility (ICSF) and System SSL.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.6.2 : Cryptographic Services actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Cryptographic Services upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.6.2.1 : ICSF: Update references to deprecated ICSF SMF and PKDS header fields


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R5, ICSF removes support for out-of-service cryptographic coprocessors. Also, ICSF is reusing a previously defined but no longer used field in the PKDS header record, which is mapped by the CSFMPKDS macro.

As of z/OS V2R5, the following processors are no longer service-supported:

  • z990, processor type 2084, models A08, B16, C24, and D32
  • z890, processor type 2086, model A04
  • z9 EC, processor type 2094, models S08, S18, S28, S38 and S54
  • z9 BC, processor type 2096, models R07 and S07
  • z10 EC, processor type 2097, models E12, E26, E40, E56, and E64
  • z10 BC, processor type 2098, model E10

Along with this change, the corresponding IBM cryptographic coprocessors PCIXCC, CEX2C, CEX3C, and CEX4S are no longer supported.

ICSF continues to support these processor models and corresponding cryptographic coprocessors in z/OS release V2R4 and z/OS V2R3. Clients with these out-of-service processor models must remain at Cryptographic Support for z/OS V2R2 - z/OS V2R4 (HCR77D1) (or prior release of ICSF) on z/OS V2R4 or prior release.

With the removal of support, SMF type 82 records fields that indicate the presence or use of the out-of-service coprocessors are deprecated. Note that a new field for each subtype was introduced in "Enhanced Cryptographic Support for z/OS V1R13 - z/OS V2R1 (HCR77B0)" which made the old fields unnecessary.

The updated SMF record fields are described in the macro CSFSMF82 and in the z/OS ICSF System Programmer's Guide, Appendix B. The deprecated fields are marked as "Reserved" with an explanation of which field to use instead.

In addition, the format of the Public Key Data Set (PKDS) header record is changed. Eight bytes of a previously-defined but no-longer-used field (PKHKMKHP) is reclaimed for the new field PKHECCDT and the remaining bytes are marked as reserved. New bits are defined in the new flag byte (PKHMKDTF), which will indicate the reason the new field (PKHECCDT) is non-zero. Field PKHKMKHP was used only on the z900 and earlier models, and is now reserved because those models are no longer in service.

Field PKHSMKHP is renamed to PKHRSAVP for consistency across CKDS, PKDS, and TKDS terminology. The old name is still valid for compatibility, but it is recommended that you use the new name, instead.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

Cryptographic Services.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R3 and z/OS V2R4.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended so that your applications can take advantage of new information in the SMF and PKDS records.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

If references to the deprecated fields are not updated, applications that process SMF records or PKDS header records might report incorrect or incomplete information.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If your application processes ICSF SMF records (type 82), the following actions are recommended, but not required:

SMF type 82, Record Subtype 7 (Operational Key Entry)
References to EQUs SMF82KCX, SMF82KC3, or SMF82KC4 should be changed to field SMF82KAP.
SMF type 82, Record Subtype 14 (Master Key Entry)
References to EQUs SMF82ANC, SMF82ACX, SMF82AC3, or SMF82AC4 should be changed to field SMF82AAP.
SMF type 82, Record Subtype 15 (Retained Key Create/Delete)
References to EQUs SMF82RKI, SMF82RCX, SMF82RC3, or SMF82RC4 should be changed to field SMF82RAP.
SMF type 82, Record Subtype 16 (Cryptographic Processor Interface)
References to EQUs SMF82PNP, SMF82PCX, SMF82PC3, or SMF82P4 should be changed to field SMF82PAP.
SMF type 82, Record Subtype 18 (Cryptographic Processor Configuration)
References to EQUs SMF82CGP, SMF82CGC, SMF82CGA, SMF82CX3, SMF82C3A, or SMF82C4 should be changed to field SMF82CAP.
SMF type 82, Record Subtype 20 (Cryptographic Processor Timing)
References to EQUs SMF82TCX, SMF82TCA, SMF82T3C, SMF82T3A, or SMF82T4 should be changed to field SMF82TPT.

If your application processes the Public Key Data Set (PKDS) header record, the following actions are required:

  • Remove references to PKHKMKHP. This field has not had meaning since z900/z800 hardware was present.
  • Change PKHSMKHP references to PKHRSAVP. The new field accurately reflects the field's use.

Reference information

For descriptions of the affected fields, see the following topics in Cryptographic Services ICSF: System Programmer's Guide:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.6.2.2 : PKI Services: Ensure that users have CA root certificate for PKI and web pages use HTTPS


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R4, the PKI Services component of z/OS uses the HTTPS protocol for its web page interfaces. In previous releases, PKI Services presented the first web page by using the HTTP protocol. Doing so allowed the user to use the link on this page to download the certificate authority (CA) root certificate of the web server certificate into the web browser. Thereafter, all the subsequent web pages used HTTPS.

To help ensure strong security, web pages should use HTTPS rather than HTTP. To use HTTPS, the CA root certificate of the web server must be preinstalled in the user’s web browser.

Starting with z/OS V2R4, the PKI page that previously used HTTP is now updated to use HTTPS. The link that is used to deliver the CA root certificate on the first page is removed. Therefore, you must use an alternative method to distribute the CA root certificate to the appropriate users at your installation. Also, you must remove the CA root certificate link from the template files and update the vhost files to use HTTPS.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

PKI Services.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, for first-time users of PKI Services web page interfaces. A web browser must have the root CA of the web server, otherwise, the user cannot access the PKI page.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

In Microsoft Internet Explorer, the following message is displayed:

This site is not secure

In Mozilla Firefox, the following message is displayed:

Your connection is not secure.

Related IBM Health Checker for z/OS check:

None.

Steps to take

For any web browser that is planned to be used to access the PKI web page interface for the first time, your PKI administrator must distribute the CA root certificate of the web server (HTTP server, WebSphere, or WebSphere Liberty) to users who require access to the PKI web page interfaces. A possible method is to distribute the CA root certificate is by using the same communication channel that you use to provide users with the URI of the PKI web page.

If you send email, you can do the following:

  1. Add the CA root certificate as an attachment or include it as Base64 encoded text in the first email.
  2. Send a separate email with the root certificate fingerprint to help users ensure that the correct CA certificate was received in the previous email.

If you use the HTTP server, you can do the following:

  1. Remove the following CA root certificate link from pkiserv.tmpl:
    	<div role="region" aria-label="Install CA Certificate">	<A HREF="/PKIServ/cacerts/cacert.der">	Install the CA certificate to enable SSL sessions for PKI Services</A>	
  2. Change public-cgi to ssl-cgi-bin for the camain.rexx location from pkiserv.tmpl.

    Change the following statement:
    	<param name="" value="">	<FORM METHOD=GET ACTION="/[application]/public-cgi/camain.rexx">	
    to the following:
    	<FORM METHOD=GET ACTION="/[application]/ssl-cgi-bin/camain.rexx">	
  3. Remove the RewriteRule lines for public-cgi in your vhost files for SSL server authentication and SSL client authentication.

    For example:
    	RewriteRule   ^/(PKIServ|Customers)/public-cgi/(.*)  http://<server-domain-name>/$1/public-cgi/$2 [R,NE,L]	

If you use the WebSphere Application Server or WebSphere Liberty server, you can do the following:

  • Remove the following CA root certificate link from pkitmpl.xml:
    	<tns:CA_cert_URL>http://hostname:port/PKIServ/cacerts/cacert.der</tns:CA_cert_URL>	

For options for distributing the CA root certificate, see "Steps for accessing the user web pages" in Cryptographic Services PKI Services Guide and Reference.

Reference information

For more information, see Cryptographic Services PKI Services Guide and Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7 : DFSMS upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element DFSMSdfp and optional features DFSMSdss, DFSMShsm, DFSMSrmm, and DFSMStvs.


Step 4.7.1 : DFSMS actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes DFSMS upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.7.1.1 : DFSMS: Change DFSMSrmm Web Services to use the HTTPS protocol


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

DFSMSrmm web services provides support for remote java applications to connect to the DFSMSrmm application programming interface over the internet. DFSMSrmm web services can be deployed either under z/OS WebSphere Application Server or Apache Tomcat (or another web service middleware). These packages are provided in the /usr/lpp/dfsms/rmm/ directory.

Starting in z/OS V2R4, DFSMSrmm web services uses HTTPS connections by default. If your installation uses DFSMSrmm web services, you must ensure that the web server and client software are both configured to use HTTPS. The server software must be configured to choose the protocol and the TCP/IP port that are to be used by one of the web services packages.

The change from HTTP to HTTPS is intended to allow for more secure communication with the DFSMSrmm application programming interface.

By default, only connections that use an encrypted HTTPS protocol are honored. Note that using an HTTPS protocol requires a signed certificate to be stored in a keystore file.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSrmm

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you have applications that connect to the DFSMSrmm API over the internet through the HTTP protocol.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Unless the web server uses an encrypted HTTPS connection, and if the rmmApiSecureConnection variable is not set to “false”, any unencrypted connections to the DFSMSrmm API using the Web Services package provided by RMM will be rejected.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine whether your installation uses DFSMSrmm web services. This function requires one of the following server products to be running on your system:

  • IBM z/OS WebSphere Application Server
  • Apache Tomcat

Also, one of the following packages must be deployed:

  • /usr/lpp/dfsms/rmm/rmmapi.ear for IBM WebSphere
  • /usr/lpp/dfsms/rmm/rmmapitc.war for Apache Tomcat.

If the connector that is defined for DFSMSrmm web services is secure and is using the SSL protocol, no change is needed. However, if it is unencrypted, for example, the client is connecting to an “http://” address instead of “https://”, the connection will be rejected when used with the packages included with DFSMSrmm in z/OS V2R4 or later.

If you discover an unencrypted connection, do the following:

  1. Obtain a CA-signed certificate and place it in the keystore file for both the server (Apache Tomcat or IBM z/OS WebSphere Application Server) and the client.
  2. Change the server's connector to use SSL.
  3. Change the client software to connect to an HTTPS address rather than HTTP, and ensure that it has access to the certificate that is used.

Though not recommended, it is possible to bypass this restriction and use the HTTP protocol in the current release. To do so, you must define the environment variable rmmApiSecureConnection to the server software, and set it “false”.

Reference information

For more information, see the topic “Using the DFSMSrmm application programming interface with web services” in DFSMSrmm Application Programming Interface.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.1.2 : DFSMSdfp: Review XRC parmlib members for use of default values


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R4, some XRC default settings were changed to match IBM recommendations. If you depend on the old default, you must explicitly specify the old values in the appropriate parmlib members.

The following defaults are changed:

Value

Old Default

New Default

SCDumpType

STATESAV

NDSS

ReadDelay

1000

250

SuspendOnLongBusy

NO

YES

TracksPerRead

3

12

TracksPerWrite

3

12

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Examine parmlib members that are related to XRC for settings with changed defaults:

  • If the setting is not specified in any of the XRC-related parmlib members, determine whether the old default value needs to be retained according to the following table. If the value needs to be the old default, it must be specified in the member. Otherwise, the new default takes effect when XRC is started on the new z/OS release.
  • If the setting is specified in an XRC-related parmlib member (with any value, but especially with the old default value), consider whether the new default value is appropriate to use.

Setting

Effect of change in default

Reason to keep the old value

SCDumpType

Uses less disruptive mechanism to take storage control statesaves for diagnosis.

Use the old value STATESAV if your storage controls do not support non-disruptive statesaves. Or, when recommended by IBM Support.

ReadDelay

XRC record sets are read from primary storage control more frequently.

Use the old value 1000 for environments with >200 ms network latency to primary disk.

SuspendOnLongBusy

XRC is suspended immediately if the cache fills up on primary disk, resulting in less application impact.

Use the old value NO only for environments in which it is preferable to incur high application response time impact to maintain wanted recovery point objective (RPO).

TracksPerRead and TracksPerWrite.

These settings should be set to the same value.

Volume initialization and resync operations are faster and more reliable.

Note:

Higher values than the default are supported and can improve initialization and resync performance if sufficient bandwidth is available.

Use the old value 3 only if the new value 12 impacts performance.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.1.3 : DFSMSdfp: Back up SMS control data sets


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In a multisystem Storage Management Subsystem (SMS) complex, operating systems share a common set of SMS classes, groups, ACS routines, and a configuration base, which make up the storage management policy for the complex. This storage management policy is maintained in a source control data set (SCDS). When this policy is activated for SMS, the bound policy is maintained in processor storage and on DASD in an active control data set (ACDS). Systems in the complex communicate SMS information through a common communications data set (COMMDS).

It is recommended that to successfully share SMS control data sets in a multisystem environment where there are mixed levels of DFSMS, you update, translate, validate, and activate SMS policies on the system with the latest level of DFSMS. When an earlier control data set is to be updated or activated, the control data set is formatted by the later-level system. The shared SMS control blocks reflect the new, rather than the previous, lengths and control information.

For fallback, IBM recommends restoring SMS control data sets from backups taken on the fallback release.

Editing a policy on an earlier system could invalidate unused control information and prevent the control data set from being accessed by a later system. A warning message is provided before a policy can be changed on an earlier system. ACS routines may need to be updated and translated so to not reference policy items not known to the earlier system.

Remember, you risk policy activation failures if SCDS changes are not validated using the latest-level system in a sysplex.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended to ensure data integrity.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

Install the PTFs as described in the step called "Install coexistence and fallback PTFs," if they are not already installed.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Do the following on your earlier systems:

  1. Back up SMS control data sets according to established procedures in the event that fallback is required. The control data set format is VSAM linear.
  2. Install all coexistence PTFs, as described in the step called "Install coexistence and fallback PTFs."

In addition, if you modified and activated a higher-level policy on a pre-z/OS V2R5 system, do the following to ensure that the ACDS can be accessed on z/OS V2R5 and that the SMS control block reflect the new lengths and control information:

  1. On the earlier system, save the active ACDS as an SCDS with the SETSMS SAVESCDS command.
  2. On z/OS V2R5, update, translate, validate, and activate the saved SMS policy.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.1.4 : DFSMSdfp: Plan for the removal of z/OS Global Mirror Extended Remote Copy (XRC)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

z/OS V2R5 is the last release of z/OS to support IBM z/OS Global Mirror, also known as extended remote copy or XRC.

For years, IBM has offered two asynchronous replication strategies:

  • IBM z/OS Global Mirror, also known as extended remote copy (XRC)
  • DS8000 Global Mirror

After z/OS V2R5, IBM plans to support and maintain DS8000 Global Mirror only.

The withdrawal of support for XRC aligns with the direction that was announced in Hardware Announcement 920-001, dated January 7 2020, which indicated that the DS8900F family is the last platform to support z/OS Global Mirror.

New functions to support asynchronous replication technology are planned only for DS8000 Global Mirror. No new z/OS Global Mirror functions are planned to be provided with DS8900F and z/OS.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 221-057, dated March 2 2021.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended if you use XRC.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If your installation currently uses DFSMS extended remote copy (XRC), plan to use an alternative in a future release.

Reference information

For information about BDT, see DFSMSdfp Advanced Copy Services.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.1.5 : DFSMShsm: Accommodate the default change for SETSYS MIGRATIONAUTOCLOUD


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R4, the default target for DFSMShsm automatic migration is changed from both classic and cloud object storage to just classic migration. To have DFSMShsm data sets automatically migrated to cloud object storage, you must enable this processing.

Automatic migration to the cloud object storage was introduced in DFSMS SPE APAR OA52901, which was provided for z/OS V2R2 and z/OS V2R3. Initially, this function was enabled by default.

In addition, as of z/OS V2R4, the DFSMShsm command SETSYS MIGRATIONAUTOCLOUD(ALLCLOUDONLYNOCLOUD) is updated to allow you to specify that only a subset of DFSMShsm hosts are to process cloud migrations. Initially, the command defaulted to ALL, which indicates that both cloud and classic migrations are to be processed. In z/OS V2R4, the command default is changed to NOCLOUD, to prevent cloud migrations from impacting classic migration windows.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMShsm

When change was introduced:

z/OS V2R3 with APAR OA52901 applied.

Applies to upgrade from:

z/OS V2R3 without APAR OA52901 applied.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if your DFSMShsm data set migrations are currently targeted to cloud object storage.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If your installation does not migrate DFSMShsm data sets to cloud object storage, you have no action to take.

To determine whether your DFSMShsm data set migrations are automatically targeted to cloud object storage, check your SMS management classes for cloud object storage automatic migrations. These migrations are enabled by specifying that cloud object storage should be targeted, and by specifying a cloud object storage name. If both are not specified, classic migration is performed instead.

To maintain the current processing, specify either SETSYSMIGRATIONAUTOCLOUD(ALL) or MIGRATIONAUTOCLOUD(CLOUDONLY) in the DFSMShsm ARCCMDxx parmlib member.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.1.6 : DFSMSdfp: Increase storage for SMS ACDS data sets


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

With APAR OA52913, the length of the management class definition (MCD) in the SMS active control data set (ACDS) was increased from 328 to 760 bytes. This change was made in support of automatic migration support for transparent cloud tiering (TCT). With this change, the values that are used to estimate the size of storage that is needed for an active control data set are out of date.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp.

When change was introduced:

z/OS V2R3 with the PTF for APAR OA52913 applied.

Applies to upgrade from:

z/OS V2R3 without APAR OA52913.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use the ACDS and it is reaching full capacity.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

The ACDS data set can fill sooner than you might expect.

The following errors can occur:

  • IEC070I 203: Extend was attempted but no secondary space was specified
  • IGD058I 6068 (X'17B4’): Problem could be caused by insufficient space to extend the data set

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check your utilization of the ACDS. To prevent the ACDS from reaching full, consider reallocating the ACDS to allow for more space.

When you allocate the SCDS and ACDS, specify secondary space allocations. This action helps to ensure that extends can be performed when:

  • New classes, groups, and other structures are added
  • Sizes of these structures increase in size.

Reference information

For more information, see:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.2 : DFSMS actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes DFSMS upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.7.2.1 : DFSMSdss: SHARE keyword is ignored for COPY and RESTORE of PDSE


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting in z/OS V2R4, your programs must close PDSE data sets before these data sets are overwritten by a DFSMSdss COPY or RESTORE operation. Otherwise, the DFSMSdss COPY or RESTORE operation encounters serialization errors, such as an ADR412E.

If your system does not have OA56300 applied, in z/OS V2R4 your programs must close PDSE data sets before these data sets are overwritten by a DFSMSdss COPY or RESTORE operation. Otherwise, the operation encounters serialization errors, such as an ADR412E error. This behavior occurs regardless of whether the SHARE keyword is specified prior to the application of OA56300.

If your system already has OA56300 applied, DFSMSdss no longer honors the use of the SHARE keyword during COPY or RESTORE operations on PDSE data sets.

For programs that cannot close the PDSE data sets while a COPY or RESTORE operation is in progress, these programs can specify the TOLERATE(ENQFAILURE) keyword. If so, the program is responsible for ensuring data consistency. Using the TOLERATE(ENQFAILURE) keyword does not guarantee absolute data consistency; use it at your own risk.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdss

When change was introduced:

In z/OS V2R3, with APAR OA56300 applied.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if your programs open PDSE data sets when DFSMSdss is writing to them.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Applications must now close PDSEs before a copy or restore is to overwrite it. If you do not close down the application, serialization errors such as an ADR412E occurs on the DFSMSdss copy or restore.

Changing DFSMSdss to ignore the SHARE keyword for output data sets ensure integrity and prevent DFSMSdss from restoring a PDSE that an application has open. It also prevents an application from opening a PDSE that DFSMSdss is restoring.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.2.2 : DFSMSdfp: Ensure the Language Environment runtime library is available for DLLs


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Language Environment provides common services and language-specific routines in a single runtime environment. You can use Language Environment to build and use dynamic link libraries (DLLs) for applications.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if your installation builds or references DLLs.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If your installation builds or references DLLs, either you must set up the system link list to refer to the Language Environment runtime libraries (SCEERUN and SCEERUN2), or each job that creates or uses a DLL must include a STEPLIB DD statement referencing these libraries.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.2.3 : DFSMSdfp: Update SYS1.IMAGELIB


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you use page mode printers such as the IBM 3800 or the IBM 3900 running in line mode (not page mode), you must install library character sets, graphic character modification modules, and character arrangement tables in SYS1.IMAGELIB. This upgrade action does not apply if you are using IBM 3900 printers that are driven by PSF.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you are not using your old SYS1.IMAGELIB, you are installing with ServerPac or SystemPac, and you are using line mode printers, such as the 3800 or 3900.

Target system hardware requirements:

IBM 3800 or 3900 printers.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Run the LCSBLD1 job from the samplib data set to create character sets, graphic character modification modules, and character arrangement tables in SYS1.IMAGELIB.
  2. Copy customized or locally-written FCBs and UCS images from your old system's SYS1.IMAGELIB data set to the new system's SYS1.IMAGELIB data set.

Reference information

For information about maintaining SYS1.IMAGELIB, see z/OS DFSMSdfp Advanced Services.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.2.4 : DFSMSdss: Build the IPLable stand-alone DFSMSdss image


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting with z/OS V1R12, DFSMSdss uses BSAM instead of EXCP to read from and write to DFSMSdss dump data sets during DUMP, COPYDUMP, and RESTORE operations. As a result, if you plan to use DFSMSdss Stand-Alone Services, you must rebuild the IPL-capable core image for the Stand-Alone Services program.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdss.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you want to use DFSMSdss Stand-Alone Services.

Target system hardware requirements:

Stand-Alone Services supports the IBM 3494 TotalStorage™ Enterprise Automated Tape Library, the IBM 3495 TotalStorage Enterprise Automated Tape Library, and the IBM 3590 TotalStorage Enterprise Tape Subsystem.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

Stand-Alone Services does not support the creation of the core image on an SMS-managed volume.

System impacts:

If this upgrade action is not performed, users of DFSMSdss standalone restore cannot restore to tape any backups that were created with greater than 65520-byte blocks. The operation fails with the message ADRY3530I SEQUENCE ERROR ON RESTORE TAPE.

Backups that are created with 65520-byte blocks can be restored as before.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Use the DFSMSdss command BUILDSA to create a Stand-Alone Services IP-capable core image. On the command, you can specify:
    • Device from which Stand-Alone Services are to be IPLed (such as a card reader, tape drive, or DASD volume)
    • Operator console to be used for Stand-Alone Services

    The BUILDSA command builds the IPLable core image on the current operating system and determines a record size, based on whether the IPL is performed from a card, tape, or DASD.

  2. Use your security management product, such as RACF, to protect the SYS1.ADR.SAIPLD.Vvolser data set and the Stand-Alone Services modules.
  3. If you have not already done so, create a backup copy of your system that can be restored by this function. For information about backing up volumes, see z/OS DFSMSdfp Storage Administration.
Notes:
  1. To ensure that Stand-Alone Services is available when you run from DASD, do not delete the SYS1.ADR.SAIPLD.Vvolser data set or move it to another volume.
  2. If you IPL from DASD and later change the volume serial number, you must rerun the BUILDSA function to create a new core image data set with the new volume serial number in the name.
  3. If you attempt to use the DFSMSdss stand-alone restore program from z/OS V1R11 to restore a backup that was created with a block size greater than 65520 bytes, the operation fails with the message ADRY3530I SEQUENCE ERROR ON RESTORE TAPE.

Reference information

For more information, see z/OS DFSMSdfp Storage Administration.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.2.5 : DFSMSdfp: Accommodate change to SAF checking during open of VSAM volume data sets


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R5 and previous releases with APAR OA62372 installed, the user’s authority is checked when they run a program that attempts to open a VSAM volume data set (VVDS). If the user does not have proper authority to open the VVDS, the open request ends with an IEC161I 40 - 002 message.

Note that open requests for VSAM data sets are not affected by this change.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp.

When change was introduced:

z/OS V2R3 and V2R4, with APAR OA62372.

Applies to upgrade from:

z/OS V2R3 and V2R4, without APAR OA62372.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

Vendor code might need authorization to VVDS data sets.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Failure to create the necessary RACF profile, might result in IEC161I 40 - 002 messages and open failures.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Ensure that users who run programs that read VVDS data sets directly have at least read authority to the data sets. Note that only generic profiles work for protecting VVDSs; discrete profiles are not honored.

The following command grants read authority to all users of VVDS data sets through a RACF generic profile: ADDSD 'SYS1.VVDS.V*' UACC(READ)

Otherwise, if you might receive SAF authorization failure messages for the VVDS. If appropriate to do so, grant those users read access through a generic profile.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.3 : DFSMS actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes DFSMS upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.7.3.1 : DFSMSdfp: Update the OAM FSDELETE table


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The file system delete table (FSDELETE) is used to identify objects to be deleted by the Object Access Method (OAM) from the z/OS UNIX file system hierarchy. The objects to be deleted can be a result of normal deletion activity or cleanup cases for objects written to the file system that have not been committed (application rollback).

With APAR OA55700 for z/OS V2R3 and V2R4, OAM added a cloud tier to its existing storage hierarchy. OAM objects can be stored as objects to public or private clouds. As part of this support, APAR OA55700 added the CLOUD ID column to the FSDELETE table, which contains a 4-byte CHAR value.

The APAR OA55700 update is included in the V2R5 base release. As a result, OAM object users must update the FSDELETE table, as described in this workflow step.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp.

When change was introduced:

APAR OA55700 for z/OS V2R3 and V2R4.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use OAM object support.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Modify and run the CBRSMR1D sample job if the FSDELETE table for this sample job does not exist.
  2. Modify and run the CBRSMCID sample job if the new columns for this sample job do not exist.

Reference information

For more information, see the topic on migrating, installing, and customizing OAM in z/OS DFSMS OAM Planning, Installation, and Storage Administration Guide for Object Support.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.7.3.2 : DFSMSdfp: Run OAM DB2 BIND jobs


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Whenever you upgrade to a new release of z/OS, you must run OAM DB2 BIND jobs if you are using OAM for object support. The BIND jobs update DB2 with new OAM DB2 code.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

DFSMSdfp.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use OAM object support.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

Coexistence PTFs are applicable to DFSMSdfp OAM. For information about installing coexistence PTFs, see the step called "Install coexistence and fallback PTFs."

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Run the BIND jobs appropriate to your installation:

  1. Update and execute the samplib job CBRPBIND (OAM DB2 Bind Package Job).
  2. Do one of the following:
    • If your installation starts OAM, uses the file system sublevel or optical or tape devices, or uses the OAM storage management component (OSMC), do the following:
      • Update and execute samplib job CBRABIND (OAM DB2 Application Plan Bind for LCS and OSR).
      • Update and execute samplib job CBRHBIND (OAM DB2 Application Plan Bind for OSMC).
    • If your installation does not start OAM, use the file system sublevel or optical or tape devices, or use OSMC, update and execute samplib job CBRIBIND (OAM DB2 Application Plan Bind for OSR only).
  3. For more information, see the topic on migrating, installing, and customizing OAM in z/OS DFSMS OAM Planning, Installation, and Storage Administration Guide for Object Support.

Note: If you choose to edit a previous version of an OAM BIND job, you must incorporate any new changes as described in the header of each samplib OAM BIND job.

Reference information

For more information about OAM, see z/OS DFSMS OAM Planning, Installation, and Storage Administration Guide for Object Support.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.8 : Distributed File Service upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element Distributed File Service.


Step 4.8.1 : Distributed File Service actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Distributed File Service upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.8.1.1 : DFS/SMB: Use Network File System (NFS) instead of DFS/SMB


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R4, the z/OS operating system no longer supports Distributed File System / Server Message Block (DFS/SMB). Originally, the z/OS Distributed File Service base element consisted of two components: SMB and z/OS File System (zFS). In z/OS V2R4, the name of the base element is changed to z/OS File System.

If you need to share files between z/OS and Microsoft Windows, IBM recommends that you use the Network File System (NFS) protocol instead of DFS/SMB. NFS also allows for the sharing of z/OS data with UNIX and Linux systems.

NFS is the strategic file sharing protocol for the z/OS platform. To help your installation upgrade to NFS, IBM plans to deliver new NFS function on existing levels of the operating system, including installation, security, availability, and operational enhancements. These planned enhancements are intended to help you more easily migrate to NFS before you upgrade to the next release of z/OS.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Server Message Block (SMB) support of the IBM z/OS Distributed File Service base element.

When change was introduced:

z/OS V2R4. Also, see IBM United States Software Announcement 218-236, dated May 15, 2018.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use DFS/SMB.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether your system uses DFS/SMB, use health check IBMUSS,ZOSMIGV2R3_NEXT_USS_SMB_DETECTED. This check, which is added by APAR OA56251, is available for z/OS V2R3 systems.

Steps to take

Do the following:

  1. Determine whether your system uses DFS/SMB. To do so, use health check IBMUSS,ZOSMIGV2R3_NEXT_USS_SMB_DETECTED.
  2. If so, stop using DFS/SMB.
  3. Verify that NFS is configured and running.

    NFS provides two z/OSMF workflows to aid the system administrator, as follows:

    Workflow for Installing and Configuring the z/OS NFS Server
    Guides the system administrator through the process of setting up the z/OS NFS Server. This workflow provides information on the initial installation of the NFS server. You might find it to be helpful, if you have not set-up NFS before.
    Workflow for Migration from z/OS DFS/SMB to z/OS NFS
    Describes the steps that the system administrator must perform to have z/OS NFS provide function that is similar to an existing z/OS DFS/SMB configuration.

    For more information about these workflows, see APAR OA56186.

  4. Use the equivalent functions in NFS.

Reference information

For more information about NFS, see z/OS Network File System Guide and Reference.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMUSS,ZOSMIGV2R3_NEXT_USS_SMB_DETECTED.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.9 : HCD upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element Hardware Configuration Definition (HCD).


Step 4.9.1 : HCD actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes HCD upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.9.1.1 : HCD: Remove configurations for unsupported processor types


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R5, HCD removes support for processor types that are out of service. Specifically, HCD no longer supports the following processors types:

  • IBM z10 EC, processor type 2097, models E12, E26, E40, E56, and E64
  • IBM z10 BC, processor type 2098, model E10
  • IBM z9 EC, processor type 2094, models S08, S18, S28, S38 and S54
  • IBM z9 BC, processor type 2096, models R07 and S07
  • IBM z990, processor type 2084, models A08, B16, C24, and D32
  • IBM z890, processor type 2086, model A04

z/OS V2R5 does not run on these servers.

Previously, in z/OS V2R4, support was withdrawn for the IBM z900 (processor type 2064) and IBM z800 (processor type 2066).

If your I/O definition file (IODF) contains definitions for these servers, and you use HCD to maintain your configuration, you must delete the old definitions before moving to z/OS V2R5.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

HCD.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if unsupported processors are still defined in your I/O definition file (IODF).

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

HCD cannot validate the I/O configuration for unsupported processor types.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check your currently active IODFs to determine whether you have any saved processor configurations for these out-of-service processors.

Follow these steps:

  1. Start HCD.
  2. Select option 1 “Define, modify, or view configuration data”
  3. Select option 3 “Processors” to see the list of defined processor configurations.
  4. Check the Type column for any of the out-of-service processor types.
  5. If you still have any processor configuration for one or more of the out-of-service processor types, determine whether the processor is still in use. If not, delete the configuration.

    Otherwise, if the processor it is still in use, the system that maintains the IODF cannot be upgraded to z/OS V2R5.

Reference information

For more information, see HCD User's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.9.2 : HCD actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes HCD upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.9.2.1 : HCD: Accommodate the removal of switch functions from Tivoli System Automation


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

With the I/O operations component (I/O Ops) of Tivoli System Automation (TSA) reaching its end of service date in September 2019, HCD has withdrawn support for I/O Ops, as of z/OS V2R4. The I/O Ops component is removed from TSA in Release 4.1, as stated in IBM United States Software Announcement 217-086, dated February 28, 2018. With this change, HCD and HCM no longer support the I/O Ops component, as of z/OS V2R4.

The changes for HCM are described in the workflow step called "HCM: Accommodate the removal of I/O Operations from Tivoli System Automation."

In previous releases, HCD used the I/O Ops component for importing, exporting, definition, and activation of switch configurations, and for gathering input for the HCD I/O Path report. Withdrawing the I/O Ops support in HCD means that HCD no longer supports importing, exporting, or activating switch configurations. The corresponding HCD actions — 2.8, 2.9, and 5.2 — are removed from HCD.

Though it is still possible to define switches and switch configurations in HCD, the switch information in the IODF can become out of sync with information in the switch itself. Therefore, it is recommended that you stop using the switch configuration information in HCD.

Note:

More recent FICON switches are configured within the switches themselves.

With the removal of the support for I/O Ops, HCD no longer uses I/O Ops for gathering information for the I/O Path report, which remains available in HCD. HCD can provide similar function by using IBM Z Discovery and Auto-Configuration (zDAC), if zDAC is enabled on your system. Otherwise, if zDAC is not enabled, the HCD I/O Path report includes information from the IODF only. Be aware that zDAC dynamically defines temporary devices to be able to perform discovery.

A limitation of zDAC is that status information is available only for paths that are accessible from the local sysplex. If you currently run HCD and TSA I/O Ops for the I/O Path report, in z/OS V2R4, you must run the report on all z/OS sysplexes and then combine this information manually. Or, you can run the report on a system that has access to all of the paths that are of interest.

This change also means that the message CBDG129I is no longer displayed if an I/O Path report is requested and I/O Ops is not available.

HCM continues to show the I/O Path report as generated by HCD.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

HCD

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use the system status information in the I/O Path report.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine whether you still have switch configurations in your IODF by using HCD option 1.2 to find your switches. To determine whether you have switch configurations in your IODF, use action 's' "Work with switch configurations" and action 'p' "Work with ports."

If you are using the I/O Path report, enable zDAC on the system where you run the report. To do so, you must authorize the LPAR that is running HCD to make dynamic I/O configuration changes. In addition, the user running the report needs to be authorized to make dynamic I/O configuration changes. This activity requires UPDATE authority to the MVS.ACTIVATE profile in the OPERCMDS class. For more details on zDAC and how to enable it, see HCD User's Guide.

Determine whether you are running the HCD I/O Path report. If so, do the following:

  • Define, export, and activate switch configurations by using a previous version of HCD. It is recommended that you remove switch configuration information from your IODF.
  • Replace your I/O Path report that used TSA I/O OPS with I/O Path reports that use zDAC.
  • Be aware that message CBDG129I is no longer issued by HCD.

Reference information

For more information, see z/OS HCD User's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.10 : HCM upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element Hardware Configuration Manager (HCM).


Step 4.10.1 : HCM actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes HCM upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.10.1.1 : HCM: Accommodate the removal of I/O Operations from Tivoli System Automation


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The I/O operations component (I/O Ops) is removed from Tivoli System Automation (TSA) in Release 4.1. With this change, HCD and HCM no longer support the I/O Ops component, as of z/OS V2R4.

The changes for HCD are described in the workflow step called "HCD: Accommodate the removal of switch functions from Tivoli System Automation."

In previous releases, HCM used the I/O Ops component for the following functions:

  • Displaying the active sysplex and the status of its objects graphically
  • Retrieving, manipulating, and activating switch matrices
  • Issuing I/O Operation commands.

With this change, the corresponding functions are removed from HCM. Specifically, the functions are removed from the HCM Operations menu and the actions that are listed for View > Colors dialog > I/O Operations.

HCM continues to show the I/O Path report as generated by HCD.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

HCM

When change was introduced:

z/OS V2R4. Also, see IBM United States Software Announcement 217-086, "IBM Service Management Suite for z/OS, V1.4.2 integrates System Automation solutions to offer modernized operations automation for increased availability on IBM z Systems,"" dated February 28, 2017.

Applies to upgrade from:

z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use HCM to display information about the active sysplex, work with switch matrices, or issue I/O Operations commands.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you use HCM, be aware that you can no longer use HCM to display information about the active sysplex, work with switch matrices, or issue I/O Operations commands. Also, because HCM depends on HCD, it is recommended that you stop using the switch configuration information in HCM.

Note: More recent FICON switches are configured within the switches themselves.

Reference information

For more information, see z/OS and z/VM HCM User's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.11 : HLASM upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element High Level Assembler (HLASM).


Step 4.11.1 : HLASM actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes HLASM upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.11.1.1 : HLASM: Verify that the changed default of ILMA is acceptable


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Before HLASM APAR PI74470, if the active instruction set was switched during an assembly by using the ACONTROL OPTABLE, any previously defined macros were no longer visible, as they were only added to the current OPTABLE set. For SYSLIB macros, this behavior is harmless (though inefficient) because a new copy of the macro is fetched. However, for inline macros, this behavior causes errors because the macro becomes undefined.

To help avoid this problem, APAR PI97142 adds the option ILMA, which prevents this problem by causing inline macros to be defined in all OPTABLEs. The ILMA option was required to be explicitly specified to override the default NOILMA.

With APAR PI98655, the keyword value ILMA=YES is now included in the default options module ASMADOPT and the macro ASMAOPT, which is used to generate ASMADOPT.

This default change is unlikely to affect any but a few assembly language programs.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

HLASM.

When change was introduced:

z/OS V2R3 with APAR PI98655 installed.

Applies to upgrade from:

z/OS V2R3 without APAR PI98655 installed.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended if you have assembly language programs that meeting the conditions described in "Steps to take."

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check your high-level assembly language programs for code that satisfies all of the following conditions:

  • Uses ACONTROL OPTABLE to switch the instruction set
  • Uses inline macros, where the assembly options do not include ILMA or an explicit NOILMA option
  • Expects to define different inline macros for different OPTABLE instruction sets.

For programs that meet all of these conditions, you must ensure that the option NOILMA is active at the point that each affected macro is defined. It can, for example, be specified for the whole assembly on a *PROCESS statement or in the PARM field, or on an ACONTROL statement before the affected macro.

Note:

If you assemble your own ASMADOPT default options module, the new default of ILMA does not take effect until you reassemble your default options module, or switch to using the supplied default options module.

Reference information

For more information, see HLASM Programmer's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.11.2 : HLASM actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes HLASM upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.11.2.1 : HLASM: Discontinue the usermod for the IEV90 alias


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting with z/OS V2R3, and earlier releases with APAR PI71827 applied, you no longer need to define IEV90 as an alias of ASMA90. HLASM now includes the ALIAS IEV90 statement in the JCLIN for HMQ4160J, which means that an alias for ASMA90 is automatically created.

Programs that invoke ASMA90 through the name IEV90 will continue to work.

In previous releases, to ease the migration of assembler procedures from Assembler H (IEV90) to High Level Assembler (ASMA90), your installation might have defined IEV90 as an alias of ASMA90. Your installation could use the ASMAIEV sample usermod in the ASM.SASMSAM1 library to enable the alias, until you finished updating the references. IBM supplies module ASMAIEV in data set ASM.SASMSAM1. In the sample, ASMAIEV has a usermod name of ML00009.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

HLASM.

When change was introduced:

z/OS V2R3 with APAR PI90075.

Applies to upgrade from:

z/OS V2R3 (without APAR PI90075).

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use a usermod to define the IEV90 alias.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review your installation procedures for instructions for applying the ASMAIEV sample usermod. You no longer have to apply the usermod.

Reference information

For more information, see HLASM Installation and Customization Guide. .

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12 : IBM z/OS Management Facility upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element IBM z/OS Management Facility (z/OSMF).


Step 4.12.1 : z/OSMF actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes z/OSMF upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.12.1.1 : z/OSMF: Use the z/OSMF desktop interface


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The z/OSMF desktop is the primary user interface for interacting with z/OSMF. In z/OS V2R5, the older classic or tree-style interface is removed from z/OSMF.

The z/OSMF desktop provides all of the functions of the classic interface in a more modern and personalized UI. The z/OSMF desktop includes task icons, a taskbar, and other desktop elements that can be customized by the user. With the z/OSMF desktop, users can interact with z/OS through a familiar interface that is similar to other operating environments.

The z/OSMF desktop offers additional capabilities, such as:

  • Search for z/OS data sets and files
  • Ability to group tasks in a folder.

The z/OSMF desktop is displayed to users when they access the z/OSMF welcome page. If the classic interface was saved as a user preference in a previous release, the z/OSMF desktop is displayed instead.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF

When change was introduced:

z/OS V2R5. Announced as a "Statement of Direction" in IBM Software Announcement 219-210, dated December 10, 2019.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Begin using the z/OSMF desktop to access z/OSMF functions. The classic interface is no longer available as a user-selectable option.

Reference information

For more information, see the z/OSMF online help.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.1.2 : z/OSMF: Upgrading the IBM zERT Network Analyzer


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Network Administrator and Db2 Systems ProgrammerNo

Description:

Description

When you upgrade to z/OS V2R5, you need to upgrade your existing IBM zERT Network Analyzer settings to the new release. You also need to upgrade your user-built queries and possibly the imported SMF data from your existing IBM zERT Network Analyzer database to the new release schema version.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Some information needs to be collected from the existing IBM zERT Network Analyzer settings panels and data in your existing IBM zERT Network Analyzer database may need to be unloaded before installing the new release. Once the install is complete, additional upgrade actions are performed after the first IPL.

Is the upgrade action required?

Yes, if you use the IBM zERT Network Analyzer and you want to preserve your existing application settings, user-built queries, or imported SMF data.

Target system hardware requirements:

None.

Target system software requirements:

Access to a Db2 for z/OS subsystem (Db2 11 or higher).

Other system (coexistence or fallback) requirements:

If not running Db2 for z/OS on the target system, a remote Db2 subsystem can be used. A co-located Db2 for z/OS subsystem is recommended for the best performance.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine whether your installation uses the IBM zERT Network Analyzer z/OSMF plugin. To do so, check the IZUPRMxx member’s PLUGINS statement for the ZERT_ANALYZER parameter. If specified, the IBM zERT Network Analyzer is at least enabled for the z/OSMF instance. Otherwise, the IBM zERT Network Analyzer is not used. You have no action to perform.

If the IBM zERT Network Analyzer is enabled for use on your system, continue with the information in this section.

Before installing the new version of z/OS:

  • To upgrade the database settings, work with your database administrator (DBA) to determine the database settings for the database that has been set up for the new release (see below for database upgrade steps).
  • To upgrade the application settings, take the following steps:
    1. Log into the existing IBM zERT Network Analyzer
    2. Navigate to Settings > Application Settings
    3. Record the current application settings found within the LOG SETTINGS, REPORT SETTINGS, and EXPORT SETTINGS sections

After installing the new version of z/OS and the IBM zERT Network Analyzer and upgrading the new database:

  1. Log into the new IBM zERT Network Analyzer
  2. Navigate to Settings > Application Settings
  3. Apply the recorded settings

Before installing the new version of z/OS:

Ensure that your existing IBM zERT Network Analyzer database’s schema version is at least 1.3.x. If not, you must apply service (including execution of any associated HOLD actions) to bring the network analyzer and its database up to that schema version.  Schema version 1.3.x was introduced with APAR PH16222 (for z/OS V2R3) and APAR PH16223 (for z/OS V2R4), but it is recommended that you apply the most recent IBM zERT Network Analyzer PTF to get up to the latest level of service.

Do not perform the database upgrade steps described below until your IBM zERT Network Analyzer database is at the proper schema version. You can check the database schema version and release values in the Database Information area of the IBM zERT Network Analyzer’s Settings > Database Settings dialog.

UNLOAD data from your existing IBM zERT Network Analyzer database:

Use the Db2 for z/OS UNLOAD utility to unload the tablespaces listed under Table 1 and, if appropriate, Table 2 below.  See Using the Db2 for z/OS UNLOAD and LOAD utilities below for detailed instructions on using the utilities.

Table 1 and Table 2 list the specific IBM zERT Network Analyzer database tables that need to be upgraded to preserve your queries and your imported SMF data, respectively. Note that only the listed tables should be upgraded. Do not upgrade the APPL table (<schema>.<appTable>) or any of the query result tables (the partitioned tables).  The APPL table is properly prepared when you create the new database and the query result tables only contain transient data.

Table 1: Tablespaces to be upgraded to preserve your queries

Fixed schema and table names

Aliased schema and table names

SYSIBM_EZB_ZNADB.OPENJPA_SEQUENCE_TABLE

<schema>.<openjpaTable>

SYSIBM_EZB_ZNADB.QUERY

<schema>.<queryTable>

SYSIBM_EZB_ZNADB.SCOPE_FLTR

<schema>.<scopeFltrTable>

SYSIBM_EZB_ZNADB.SCOPE_FLTR_ENDPT

<schema>.<scopeFltrEndptTable>

SYSIBM_EZB_ZNADB.SCOPE_FLTR_SYSSPEC

<schema>.<scopeFltrSysspecTable>

SYSIBM_EZB_ZNADB.SEC_FLTR

<schema>.<secFltrTable>

SYSIBM_EZB_ZNADB.SEC_IPSEC_FLTR

<schema>.<secIpsecFltrTable>

SYSIBM_EZB_ZNADB.SEC_SSH_FLTR

<schema>.<secSshFltrTable>

SYSIBM_EZB_ZNADB.SEC_TLS_FLTR

<schema>.<secTlsFltrTable>


Table 2: Tablespaces to be upgraded to preserve your imported SMF data

Fixed schema and table names

Aliased schema and table names

SYSIBM_EZB_ZNADB.DATAMGMTHISTORY

<schema>.<dmhistTable>

SYSIBM_EZB_ZNADB.DATASET

<schema>.<dsTable>

SYSIBM_EZB_ZNADB.SECURITY_SESSION

<schema>.<secsessTable>

SYSIBM_EZB_ZNADB.SESSION_STATISTICS

<schema>.<sessstatsTable>

SYSIBM_EZB_ZNADB.IPSEC_INFO

<schema>.<ipsecTable>

SYSIBM_EZB_ZNADB.SSH_INFO

<schema>.<sshTable>

SYSIBM_EZB_ZNADB.TLS_INFO

<schema>.<tlsTable>

SYSIBM_EZB_ZNADB.TOPOLOGY

<schema>.<topoTable>

SYSIBM_EZB_ZNADB.OPENJPA_SEQUENCE_TABLE

<schema>.<openjpaTable>

After installing the new version of z/OS: It is important to perform the LOAD process into the new IBM zERT Network Analyzer database before any SMF data is imported or any queries are saved. Otherwise, the existing SMF data or queries will be overwritten upon performing the LOAD operation.

Your existing IBM zERT Network Analyzer database setup, the desired setup for the new database and, in some cases, your DBA’s preferences determine the exact procedure for loading the contents of your existing IBM zERT Network Analyzer database instance into the new database.

Three common scenarios are described here, but you can adapt these scenarios as needed for your specific situation.

 

Scenario 1: If your IBM zERT Network Analyzer database uses an aliased database schema (based on IZUZNADA template) where the database for the new release will be created in the same Db2 for z/OS subsystem than the existing database:

  1. Drop all aliases defined in the network analyzer database
  2. Specify your local values in a copy of the IZUZNADI variable substitution data set for the new release, taking care to specify a different value for <schema> than the one used in the existing network analyzer database.
  3. Use the IZUZNADA template for the latest IBM zERT Network Analyzer version to create a new set of IBM zERT Network Analyzer database objects under the new <schema> name. When the generated DDL executes, a new set of aliases will be created, pointing to the new database objects.
  4. Use the Db2 for z/OS LOAD utility to load the data unloaded from the existing database into the new database.
  5. Start the z/OSMF instance with the new IBM zERT Network Analyzer.
  6. Update the database settings panel and application settings panel as described under “Upgrading your IBM zERT Network Analyzer settings” above.
  7. At this point, all the user-built queries (if upgraded) and imported SMF data (if upgraded) from the old database should now be available in the new version of the network analyzer.

If, at any point after this, you need to switch back to the previous release of the IBM zERT Network Analyzer and its associated database:

  1. Drop all aliases
  2. Recreate all those aliases, pointing to the old database objects under the old schema name.

Scenario 2: If the database for the new release will be created in a different Db2 for z/OS subsystem than the existing database (works for both fixed and aliased database schemas):

  1. Specify your local values in a copy of the IZUZNADI variable substitution data set for the new release.
  2. Use the IZUZNADT or IZUZNADA template (as appropriate) for the latest IBM zERT Network Analyzer version to create a new set of IBM zERT Network Analyzer database objects in a different Db2 for z/OS subsystem.
  3. Use the Db2 for z/OS LOAD utility to load the data unloaded from the existing database into the new database.
  4. Start the z/OSMF instance with the new IBM zERT Network Analyzer.
  5. Update the database settings panel and application settings panel as described under “Upgrading your IBM zERT Network Analyzer settings” above.
  6. At this point, all the user-built queries (if upgraded) and imported SMF data (if upgraded) from the old database should now be available in the new version of the network analyzer.

If, at any point after this, you need to switch back to the previous release of the IBM zERT Network Analyzer and its associated database, simply point the old version of the IBM zERT Network Analyzer to the old database.  All of the data should still be there unchanged from the last time you used the database.

Scenario 3: If your IBM zERT Network Analyzer uses a fixed database schema (based on IZUZNADT template) where the database for the new release is defined in the same Db2 for z/OS subsystem than the existing database:

  1. Drop the existing IBM zERT Network Analyzer database
  2. Specify your local values in a copy of the IZUZNADI variable substitution data set for the new release.
  3. Use the IZUZNADT template for the latest IBM zERT Network Analyzer version to create a new set of IBM zERT Network Analyzer database objects in the same Db2 for z/OS subsystem where the old database used to reside.
  4. Use the Db2 for z/OS LOAD utility to load the data unloaded from the existing database into the new database.
  5. Start the z/OSMF instance with the new IBM zERT Network Analyzer.
  6. Update the database settings panel and application settings panels as described under “Upgrading your IBM zERT Network Analyzer settings” above .
  7. At this point, all the user-built queries (if upgraded) and imported SMF data (if upgraded) from the old database should now be available in the new version of the network analyzer.

If, at any point after this, you need to switch back to the previous release of the IBM zERT Network Analyzer and its associated database:

  1. Drop the database created in step 4 above
  2. Use the DDL you generated for the prior release to create a network analyzer database at the prior release (and PTF) level. If need be, you can re-generate the DDL for the old release/PTF level using your old customized IZUZNADI data set and the database schema tooling provided with the exact release/PTF level of the old IBM zERT Network Analyzer.

Using the Db2 for z/OS UNLOAD and LOAD utilities

These steps provide an example of using the Db2 for z/OS UNLOAD/LOAD utilities to upgrade an existing IBM zERT Network Analyzer database schema release to a newer schema release and different schema version.  In this example, we illustrate a case that uses a fixed name schema (based on the IZUZNADT template) and a different Db2 for z/OS subsystem for the existing and the new databases. If you are using one of the other approaches described above, then you will need to adjust these steps to accommodate your scenario.

Although there are different ways to execute the utilities, this example will use the Db2 Interactive Panels in ISPF to invoke the Db2 Utilities.

Requirements for upgrading via UNLOAD/LOAD:

  • Before UNLOADing your existing IBM zERT Network Analyzer database, verify that its database schema release and version is at the latest PTF level. To do this, check the database schema version and release values in the Database Information area of the IBM zERT Network Analyzer’s Settings > Database Settings dialog.
  • Perform the LOAD process into the new IBM zERT Network Analyzer database before any SMF data is imported or any queries are saved. Otherwise, the existing SMF data or queries will be overwritten upon performing the LOAD operation.

Explanation of UNLOAD/LOAD Db2 Utilities:

UNLOAD extracts rows from an existing database table and writes them out to a sequential data set according to the specifications described in a separate input file. For the purpose of upgrading, UNLOAD the TABLESPACE using the following command syntax:
UNLOAD TABLESPACE database.tablespacename
FROM TABLE schemaname.tablename

It is important to note that you will need to allocate enough space to hold the resulting output sequential data set which contains the tables and data from your existing database. Otherwise your UNLOAD job will fail.

LOAD reads the data sets created by UNLOAD and writes the data into a database table. Similar to the UNLOAD, we LOAD a TABLE using the following command syntax:
LOAD INDDN(inputddname) INTO TABLE schemaname.tablename

As an alternative, you may specify the SYSPUNCH parameter in your UNLOAD utility job, which will allow for a LOAD DDL to be generated at the time of your UNLOAD. The generated LOAD DDL will contain the commands necessary to LOAD your unloaded data into the new database.

Steps for using UNLOAD/LOAD Utilities

Below, you will find the steps for using the Db2 Interactive Panels to perform an UNLOAD/LOAD, as well as some important considerations.

UNLOAD Steps: Consider the following as you use UNLOAD with the IBM zERT Network Analyzer database:

  • During the UNLOAD, you can choose to have the Db2 UNLOAD Utility generate a LOAD DDL on your behalf by specifying the PUNCHDSN parameter, (i.e. the SYSPUNCH parameter).
  • As you are performing your UNLOAD/LOAD, you will find it useful to confirm your output via the SDSF Held Output display.

LOAD Steps: Consider the following as you use LOAD with the IBM zERT Network Analyzer database:

  • As previously stated, this example uses a different Db2 for z/OS subsystem to hold our new database release. Before starting the LOAD, prepare this by changing the Db2 Default Location to point to the subsystem containing the new database by navigating to the SPUFI Db2 Database Panels and selecting Db2 Defaults.
  • When confirming your output in SDSF following a LOAD step, you may have noticed that your tablespace has been placed in a COPY-pending state. If so, this is normal. To resolve this issue, follow the few short steps as described below under Resolving Common Issues in UNLOAD/LOAD.
  • After you have completed all your LOADs and resolved any issues you may have faced, your IBM zERT Network Analyzer database upgrade is complete. At this point, you should be able to start the z/OSMF instance with the new IBM zERT Network Analyzer plug-in, configure the database settings to point to the new database, and use any upgraded queries to analyze any upgraded SMF data.

Resolving Common Issues in UNLOAD/LOAD

COPY-pending: If your tablespace is in COPY-pending state, you cannot update the table, but you can run queries against it.

There are a couple ways to resolve this issue:

  • Depending on your needs, you can perform an image copy following the steps outlined in this link: Running the COPY utility from a JCL job
  • If you prefer not make a copy, you can use the REPAIR utility to SET the TABLESPACE to NOCOPYPEND:
    REPAIR SET TABLESPACE tablespace NOCOPYPEND

Repairing after a Failed UNLOAD/LOAD operation

If you encounter a scenario where your UNLOAD or LOAD job failed, it is good practice to verify that the job is terminated before processing another utility. This can be done using two simple Db2 commands from inside the Db2 Command Panel or anywhere else a Db2 command can be issued.

  • First, you will need to find the utility-id associated with the failed job. This can be done using the display db2 utilities command: -DISPLAY UTILITY (*)
  • Once you have the utility-id for the utility in progress, you can terminate the utility(s) using the terminate db2 utilities command: -TERM UTILITY (*) or -TERM UTILITY (utility-id).
  • .

By specifying an asterisk (*), all utility jobs are terminated for which you are authorized.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.1.3 : z/OSMF: Move the user directory from /var to /global


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

IBM recommends that you move the z/OSMF user directory (sometimes also called the z/OSMF data directory) from under /var/zosmf to /global/zosmf.

IBM previously recommended placing the z/OSMF user directory under /var/zosmf. IBM has changed the recommendation to /global/zosmf for the following reasons:

  • Make it easier for z/OSMF-based applications with sysplex scope to remain synchronized with sysplex-scoped data repositories, such as the RACF database and TCP/IP profile
  • Make it easier to move the z/OSMF server to different z/OS systems in a sysplex
  • Help simplify automatic recovery from LPAR or z/OSMF server failures.

With APAR PI92211, IBM changed the default z/OSMF user directory to reside under /global rather than /var.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF

When change was introduced:

z/OS V2R3 with APAR PI92211.

Applies to upgrade from:

z/OS V2R3 without APAR PI92211.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

IBM recommends that you move the z/OSMF user directory (sometimes also called the z/OSMF data directory) from under /var/zosmf to /global/zosmf.

Follow these steps:

  1. Find the current mount point for the z/OSMF user directory (sometimes called the data directory). The mount point is specified in the following locations:
    • MOUNT command for the z/OSMF user directory in the BPXPRMxx parmlib member
    • On the USER_DIR statement of the IZUPRMxx parmlib member
    • On the USERDIR parameter of the EXEC statement in the IZUSVR1 started procedure
  2. If the mount point is not already set to /global/zosmf, do the following:
    1. Create the directory /global/zosmf. You can find the command that is needed to do that in the IZUMKFS job in the SYS1.SAMPLIB data set.
    2. In the following places, change the mount point for the z/OSMF user directory to /global/zosmf:
      • MOUNT command for the z/OSMF user directory in the BPXPRMxx parmlib member
      • USER_DIR statement of the IZUPRMxx parmlib member
      • USERDIR parameter of the EXEC statement in the IZUSVR1.
    3. Stop the z/OSMF server address space, IZUSVR1.
    4. Unmount the z/OSMF user directory from /var/zosmf
    5. Mount the z/OSMF user directory on /global/zosmf
    6. Change the home directory for the user ID used to start the server address space to /global/zosmf/data/home/izusvr. For RACF, use the ALTUSER command: ALTUSER userID OMVS(HOME(/global/zosmf/data/home/izusvr))

      If you used the IBM sample to define the user ID, change userID to IZUSVR.

    7. Restart the z/OSMF server address space.
Note:

If you use more than one z/OSMF server in a sysplex at the same time, ensure that each server uses a different user directory. For example, you might have two autostart groups that are named ZOSMFG1 and ZOSMFG2. In this case, create two different directories under /global named /global/zosmfg1/zosmf and /global/zosmfg2/zosmf, and use one for each active server.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.1.4 : z/OSMF: Stop using the policy data import function of NCA


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R5, the Network Configuration Assistant (NCA) plug-in of z/OSMF no longer supports the policy data import function. This function allowed the user to import existing Policy Agent configuration files into the Network Configuration Assistant.

Starting in z/OS V2R5, it is not possible to import policy configuration files for AT-TLS, IPSec, PBR, and IDS technologies.

Import of TCP/IP profiles into Network Configuration Assistant is not affected.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 219-344 "IBM z/OS Version 2 Release 4" dated July 23, 2019.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you need to import Policy Agent configuration files into Network Configuration Assistant.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you plan to import Policy Agent configuration files into the Network Configuration Assistant, perform this work in the current release of z/OS. This function is not supported in z/OS V2R5.

Otherwise, you have no action to take.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.2 : z/OSMF actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes z/OSMF upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.12.2.1 : z/OSMF: Accommodate the use of IBM z/OS Liberty Embedded


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting in z/OS V2R3, z/OSMF is changed to use IBM WebSphere Liberty Embedded, which is a new base element of z/OS V2R3. In previous releases, z/OSMF used a version of WebSphere Liberty Profile that was supplied with z/OSMF.

Related to this change are the following changes to z/OSMF:

  • With the installation of APAR PI88651, you can use an alternative name for the z/OSMF angel process (a named angel) by coding the name on the ANGEL_PROC parameter in the IZUPRMxx member.
  • WebSphere Liberty Profile is removed from the z/OSMF file system.

During initialization, the z/OSMF server attempts to connect to an angel process, which provides authorized services to the z/OSMF server. By default, the z/OSMF angel process is IZUANG1, which is recommended for most z/OS installations. However, you might choose to use a specific named angel with the z/OSMF server. If so, you must ensure that name of the angel is defined to your system, as described in "Steps to take."

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF

When change was introduced:

z/OS V2R3 with APAR PI88651.

Applies to upgrade from:

z/OS V2R3 without APAR PI88651.

Timing:

Before IPLing z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Ensure that you are using the z/OS V2R3 level of the z/OSMF started procedures from your installed PROCLIB data set, as they are different from prior releases. The started procedures are IZUANG1, IZUSVR1, and IZUINSTP. If you customized these procedures in a previous release, you must apply your customizations to the new procedures.
  2. If your installation uses an autostarted z/OSMF server, the angel is started internally during system initialization. If you plan to use a named angel (not IZUANG1), you must ensure that name of the angel matches the name of its started procedure. To do so, specify the angel name on the ANGEL_PROC parameter in the IZUPRMxx member. This parameter indicates both the name of the angel and its started procedure.
  3. If your installation starts the z/OSMF server through another means, such by operator command or through automation, you must ensure that the specified angel name matches the name of the angel started procedure. You can specify the angel name on the NAME parameter of the START command: START IZUANG1,NAME=proc-name. Or, you can specify the angel name on the NAME parameter of the PROC statement of the IZUANG1 started procedure before you enter the command START IZUANG1.
  4. For a named angel, ensure that the following authorizations are done:
    • z/OSMF user and z/OSMF administrator security groups are authorized to the started procedure name.
    • z/OSMF server started task user ID is authorized to the angel name.

Reference information

For more information, see IBM z/OS Management Facility Configuration Guide and the following topics in IBM Knowledge Center:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.3 : z/OSMF actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes z/OSMF upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.12.3.1 : z/OSMF: Be aware that error message details are no longer displayed by default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

The Home Page tab of the z/OSMF General Settings task includes the option Display error details if the login attempt fails. When selected, this option causes a detailed error message to be displayed to users who encounter errors when attempting to log in to z/OSMF. The message indicates the cause of the error, such as an expired password or revoked user ID.

Previously, this option was selected by default. However, with the installation of APAR PH30367, this option is deselected by default and only the following error message is displayed for log-in errors:

  • "To log into z/OSMF, enter a valid z/OS user ID and password. Your account might be locked after too many incorrect log-in attempts."

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF.

When change was introduced:

z/OS V2R4 and z/OS V2R3, with APAR PH30367 installed.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3, without APAR PH30367 installed.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you want error details to be displayed if the user's login attempt fails.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Verify that APAR PH30367 is installed on your system. To see the service level of z/OSMF, check the z/OSMF server "About page."

If you prefer to show the detailed message to users, and you did not save this setting previously, select the option Display error details if the login attempt fails in the z/OSMF General Settings task. Then, click Save to save it.

To access the z/OSMF General Settings task, you must be a z/OSMF administrator. Specifically, your z/OS user ID must have READ access to the resource profile SAF-prefix.ZOSMF.GENERAL.SETTINGS in the ZMFAPLA class. Typically, the IZUADMIN group has access to this resource profile.

Reference information

For information about the General Settings task, see the z/OSMF online help.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.3.2 : z/OSMF: Remove STGADMIN SAF authorization requirements for Software Management


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

The z/OSMF Software Management plug-in can be used to manage the z/OS software inventory, deploy SMP/E packaged and installed software, and generate reports about your software.

In z/OS V2R5, it is recommended that you remove several SAF authorizations for the z/OSMF Software Management plug-in because they are no longer needed.

z/OSMF Software Management uses the services of DFSMSdss program ADRDSSU to copy, dump, and restore data sets during Software Management Deploy (Install) and Export actions. Currently Software Mangement uses the following COPY/DUMP/RESTORE options which require authorization to STGADMIN SAF FACILITY class resources:

  • BYPASSACS
  • IMPORT
  • TOLERATE(ENQFAILURE)

Because of the above options authorization is required to the following SAF FACILITY class resources to execute JCL generated by z/OSMF Software Management for Deploy (Install) and Export actions:

  • STGADMIN.ADR.COPY.BYPASSACS
  • STGADMIN.ADR.COPY.TOLERATE.ENQF
  • STGADMIN.ADR.DUMP.TOLERATE.ENQF
  • STGADMIN.ADR.RESTORE.BYPASSACS
  • STGADMIN.ADR.RESTORE.IMPORT
  • STGADMIN.ADR.RESTORE.TOLERATE.ENQF

Authorization to the above STGADMIN SAF resources are an uneccessary burden to the average user installing software using z/OSMF Software Management.  Therefore, z/OSMF Software Management is being updated to no longer use the BYPASSACS, IMPORT, and TOLERATE(ENQFAILURE) operands on the COPY, DUMP, and RESTORE commands for DFSMSdss program ADRDSSU. Hence, authorization to the above SAF FACILITY class resources will no longer be required by z/OSMF Software Management.

A consequence of removing the IMPORT operand on RESTORE operations is that users who install software using z/OSMF Software Management will require READ access to the originating data set names in the portable software instance being installed (the names of the data sets that are dumped when producing the portable software instance).

For IBM software, users require READ access to the data set names that are used by IBM during the creation of the ServerPac portable software instance. Specifically, your user ID requires READ access to data set names that begin with CB.OS* and CB.ST*.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF.

When change was introduced:

z/OS V2R4 and z/OS V2R3, with APAR PH26509 installed.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3, without APAR PH26509 installed.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended to remove the unnecessary SAF authorizations. However, one new SAF resource is required, as described in "Steps to take."

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Verify that APAR PH26509 is installed on your system. If so, the identified STGADMIN SAF resources are no longer required for running the JCL that is generated by z/OSMF Software Management. To see the service level of the Software Management plug-in, check the z/OSMF server "About page." Verify that APAR PH26509 is installed.

In your RACF database, check for authorization for z/OSMF Software Management users to any of the following SAF FACILITY class resources:

  • STGADMIN.ADR.COPY.BYPASSACS
  • STGADMIN.ADR.COPY.TOLERATE.ENQF
  • STGADMIN.ADR.DUMP.TOLERATE.ENQF
  • STGADMIN.ADR.RESTORE.BYPASSACS
  • STGADMIN.ADR.RESTORE.IMPORT
  • STGADMIN.ADR.RESTORE.TOLERATE.ENQF

If a user is authorized to any of the these SAF FACILITY class resources solely for the purposes of installing software using z/OSMF Software Management, then authorization to these resources may be removed.

In addition, to install software provided by IBM or another vendor using z/OSMF Software Management, users will require READ access to the originating data set names used by the vendor when producing the software order. That is, READ access is required to access the data sets in the Software Instance that is exported to create a Portable Software Instance.

IBM uses a single and consistent data set name prefix when producing Portable Software Instances to be installed by z/OSMF Software Management. This practice reduces the data set name variations a z/OSMF Software Management user must be authorized to READ in order to install software provided by IBM. Specifically, your user ID requires READ access to data set names that begin with CB.OS* and CB.ST*.

As an example, consider the order number CB.OSnnnnnn, where "nnnnnn" is a unique order number assigned to the customer's requested software content, such as CB.OT246095.SYS1.LINKLIB. Therefore, users will require READ access to SAF resources for data set names of the form CB.OS*.**.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.3.3 : z/OSMF: Ensure that workflow users are authorized to read workflow files


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

With the installation of APAR PH14511, the workflow user requires at least READ access to the workflow definition file and any related files that are needed to create a z/OSMF workflow. Previously, the workflow user could use files that could be read by the z/OSMF server identity.

To enhance the access control of files, the workflow user cannot create workflows from files that can be read only by the z/OSMF server identity.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF.

When change was introduced:

z/OS V2R4 and z/OS V2R3, with APAR PH14511 applied.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3, without APAR PH14511 applied..

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if users create workflows without specific user ID authorization to workflow files.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Users cannot create z/OSMF workflows if they lack READ access to the workflow files.

Related IBM Health Checker for z/OS check:

None.

Steps to take

For users who create z/OSMF workflows, ensure that the related z/OS user IDs have READ access to the workflow definition file, the optional workflow input variable file, and other required workflow files.

Reference information

For information about creating z/OSMF workflow files, see IBM z/OS Management Facility Programming Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.3.4 : z/OSMF: Remove references to z/OSMF mobile notification service


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

z/OS V2R5 removes support for z/OSMF mobile notification service. The other z/OSMF notification services, including the Notifications task and the email notification services remain available, and can be used in place of the mobile notification service.

Specifically, the following functions are removed from z/OSMF:

  • In the z/OSMF graphical user interface (GUI), the following pages are removed from the Notification Settings task:
    • Mobile Configuration page
    • z/OSMF mobile application entry in the User page

  • REST API that was used for z/OSMF mobile notifications:
    POST /zosmf/notifications/new

  • The following request body properties are removed from the z/OSMF notifications REST API:
    • "product”
    • “eventGroup”
    • “data”
    • “alert”

The change is related to the removal of the IBM zEvent mobile application and the Bluemix based push services.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use the z/OSMF mobile notification service.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

The following message is issued if a user or program attempts to use the z/OSMF mobile notification service on a z/OS V2R5 system:
IZUG608E: Notification property \"assignees\" is missing, or its value \"null\" is incorrect.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine whether any of your users or programs use the z/OSMF mobile notification service. If so, use the z/OSMF Notifications task or the z/OSMF email notification service as a replacement.

Reference information

For information about the z/OSMF notifications REST API, see IBM z/OS Management Facility Programming Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.12.3.5 : z/OSMF: Use the Diagnostic Assistant to collect diagnostic data about z/OSMF


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

APAR PH18776 removes the diagnostics page from the z/OSMF General Settings task. The diagnostic page is made obsolete with the addition of the new z/OSMF Diagnostic Assistant, which is added by APAR PH11606. The new plug-in provides additional functions for collecting diagnostic data that were not availabe in the older diagnostics page.

Using the z/OSMF Diagnostic Assistant might require you to create user authorizations in your external security manager (ESM). This workflow step includes a sample RACF definition that you can use as a model for creating the user authorizations.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OSMF.

When change was introduced:

z/OS V2R4 and z/OS V2R3, with APAR PH18776 installed.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3, without APAR PH18776 installed.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if users want to use collect diagnostic information about z/OSMF.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Verify that APARs PH18776 (for z/OS V2R3 and V2R4) and PH11606 (for z/OS V2R3) are installed on your system. z/OS V2R4 included PH11606. If so, the z/OSMF Diagnostic Assistant is available and the older diagnostic page is removed from General Settings. To see the service level of the z/OSMF plug-ins, check the z/OSMF server "About page." Verify that APARs PH18776 and PH11606 are installed.

In your external security manager, create the authorizations for users of the z/OSMF Diagnostic Assistant task. The following example shows sample RACF statements for defining the resource profile and granting authorization to the z/OSMF administrators group (IZUADMIN):

	RDEFINE ZMFAPLA IZUDFLT.ZOSMF.ADMINTASKS.DIAGNOSTIC_ASSISTANT UACC(NONE)	PERMIT IZUDFLT.ZOSMF.ADMINTASKS.DIAGNOSTIC_ASSISTANT CLASS(ZMFAPLA) ID(IZUADMIN) ACCESS(READ)	SETROPTS RACLIST(ZMFAPLA) REFRESH

Reference information

For information about the z/OSMF Diagnostic Assistant, see the online help that is included with z/OSMF.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.13 : Infoprint Server upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for optional feature Infoprint Server.


Step 4.13.1 : Infoprint Server actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Infoprint Server upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.13.1.1 : Infoprint Server: Upgrade web browser support for Infoprint Central


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R4, the Infoprint Central component of Infoprint Server requires one of these web browsers:

  • Microsoft Internet Explorer 11.0
  • Microsoft Edge 40.15063 or later
  • Mozilla Firefox 52.0 Extended Support Release (ESR) or later

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Infoprint Server.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use Infoprint Central.

Target system hardware requirements:

None.

Target system software requirements:

If you use Infoprint Central to work with IP PrintWay extended mode print jobs and printers, you need:

  • IBM HTTP Server - Powered by Apache base element of z/OS
  • The XML Toolkit for z/OS V1.10 (5655-J51)
  • One of these Java products:
    • IBM 31-bit SDK for z/OS, Java Technology Edition, V7.1 (5655-W43) or V8 (5655-DGG)
    • IBM 64-bit SDK for z/OS, Java Technology Edition, V7.1 (5655-W44) or V8 (5655-DGH)
  • One of the following web browsers on workstations with these tested operating systems:
    Windows 7 Professional, Windows 8.1, and Windows Server 2012
    • Microsoft Internet Explorer 11.0
    • Mozilla Firefox 52.0 Extended Support Release (ESR) or later
    Windows 10
    • Microsoft Internet Explorer 11.0
    • Microsoft Edge 40.15063 or later
    • Mozilla Firefox 52.0 Extended Support Release (ESR) or later

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Other browsers might work with Infoprint Central V2R4, but are not tested. Using untested browsers might result in some Infoprint Central functions that are unavailable.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Install one of these web browsers on a tested operating system:

  • Microsoft Internet Explorer 11.0
  • Microsoft Edge 40.15063 or later
  • Mozilla Firefox 52.0 Extended Support Release (ESR) or later

Reference information

For more information, see z/OS Infoprint Server Operation and Administration, which describes how to start and stop Infoprint Server and how to use Infoprint Central.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.13.1.2 : Infoprint Server: Dynamic configuration is enabled by default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In Infoprint Server for z/OS V2R4, dynamic configuration is always enabled.

Advantages of dynamic configuration include the following:

  • Authorized administrators can use the Infoprint Server ISPF panels or the Printer Inventory Definition Utility (PIDU) to view and change the dynamic attributes rather than editing the file /etc./Printsrv/aopd.conf
  • If you change an attribute in the system configuration definition, with a few exceptions, you do not need to stop and restart Infoprint Server for the change to take effect.
  • You can configure Infoprint Server to start and stop individual daemons.
  • You can benefit from new functions in Infoprint Server that require dynamic configuration. For example, you can use the MVS™ system logger function.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Infoprint Server.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether dynamic configuration is enabled on your system, use the following health check: IBMINFOPRINT,ZOSMIGV2R3_NEXT_INFOPRINT_DYNCFG

Steps to take

Follow the instructions in the workflow step called "Using IBM Health Checker for z/OS for migration checking" to install and activate ZOSMIGV2R3_NEXT_INFOPRINT_DYNCFG.

Reference information

None.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMINFOPRINT,ZOSMIGV2R3_NEXT_INFOPRINT_DYNCFG.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".

This check applies to z/OS V2R3.


Step 4.13.2 : Infoprint Server actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Infoprint Server upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.13.2.1 : Infoprint Server: Remount the Printer Inventory and copy the customized files


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

When you upgrade to the latest z/OS system, you must bring forward the customized data from your previous system.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Infoprint Server.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Do the following:

aopstart EXEC
If you modified the aopstart EXEC, copy it to the z/OS V2R5 system.
Configuration file
If you are using the ServerPac Full System Replace option and you modified the Infoprint Server configuration file, copy the file to the z/OS V2R5 system. Its default location is /etc/Printsrv/aopd.conf. However, you might have specified a different location in environment variable AOPCONF.
  • If your previous installation used dynamic configuration, all attributes except these are ignored before and after this upgrade:
    • base-directory
    • inventory
    • jes-name
    • resolve-printway-printers
    • start-daemons
    • xcf-group-qualifier
  • If your previous installation did not use dynamic configuration, all attributes except the ones listed are converted to attributes in the system configuration definition when Infoprint Server V2R5 starts for the first time and ignored afterward.
IP PrintWay
If you currently use the IP PrintWay component of Infoprint Server, copy to the z/OS V2R5 system any IP PrintWay exit routines and data stream filters that you wrote. It is a good practice to recompile the exits and filters on z/OS V2R5.
NetSpool
If you currently use the NetSpool component of Infoprint Server, copy to the z/OS V2R5 system any NetSpool exit routines that you wrote. It is a good practice to recompile the exits and filters on z/OS V2R5.
Printer Inventory
  • Remount the /var/Printsrv directory from the earlier system on the z/OS V2R5 system. The /var/Printsrv directory contains the Printer Inventory and other Infoprint Server files. The default directory is /var/Printsrv. However, you might have changed the directory name in the base-directory attribute in the aopd.conf configuration file. Notes:
    1. After you start Infoprint Server on the z/OS system, you need to use the Infoprint Server pidu command to export the Printer Inventory on the z/OS V2R5 system so that you have a backup of the Printer Inventory.
    2. If /var/Printsrv is not mounted at a separate mount point, use the Infoprint Server pidu command to export the Printer Inventory on the original system; restore it on the z/OS V2R5 system after the first IPL. Do not use other copy commands to copy the Printer Inventory. (Mounting /var/Printsrv at a separate mount point can result in better management of disk space and easier migration.)
  • Configure the Infoprint Server environment variables (for example, AOPCONF, PATH, LIBPATH, NLSPATH, MANPATH) in /etc/profile.
Print Interface
If you currently use the Print Interface component of Infoprint Server, do these:
  • If you wrote any data stream filters, copy them to the z/OS V2R5 system. It is a good practice to recompile the exits and filters on z/OS V2R5.
  • If you run the SAP R/3 application server on the z/OS system, copy the SAP callback daemon configuration file to the z/OS V2R5 system. Its default location is /etc/Printsrv/aopsapd.conf. However, you might have specified a different location in environment variable AOPSAPD_CONF.

Reference information

For more information, see z/OS Infoprint Server Customization.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.13.2.2 : Infoprint Server: Infoprint Central requires SSL connections by default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting with z/OS V2R4, SSL connection is required by default for the Infoprint Central web browser GUI. In previous releases, the GUI worked with or without SSL.

This change requires your installation to specify enabled SSL for your IBM HTTP Server (IHS) powered by Apache 31-bit configuration. Doing so causes the httpd.conf.updates file to be updated with a rewrite directive that converts the HTTP links to HTTPS links. This action saves users from having to update their Infoprint Central bookmarks.

For users who do not want to change their IHS configurations to use SSL, an Infoprint Server configuration attribute and new ISPF field are provided. The new option has an attribute name of use-unencrypted-connection and an ISPF panel field name of “Use unencrypted connection.” Note that this connection type is less secure than HTTPS.

Information about this upgrade action.

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Infoprint Server

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you are running Infoprint Central.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

The following health checks are provided by IBM:

  • IBMINFOPRINT,ZOSMIGV2R3_NEXT_INFOPRINT_IPCSSL.

    This check is intended for V2R3 systems. It indicates whether Infoprint Central uses SSL by default. You are prompted to set up SSL before upgrading to z/OS V2R4. If SSL is being used already, this check issues a message to confirm that this action is completed.

    This check issues the following exception messages:

    • AOPH1905I
    • AOPH1906E
  • IBMINFOPRINT,INFOPRINT_CENTRAL_SECURE_MODE.

    This best practice health check is intended for z/OS V2R4 and later. It is issued during the initialization of Infoprint Central and warns you to use an SSL connection for Infoprint Central to prevent security exposures. If SSL is already in use, this check issues a message to confirm that this upgrade action is completed.

    This check issues the following exception messages:

    • AOPH1907I
    • AOPH1908E

Steps to take

If SSL is not enabled in IHS and you are using Infoprint Central, follow these instructions.

To use an SSL connection for Infoprint Central, do the following:

  1. Follow the instructions to enable SSL in IBM HTTP Server on z/OS Migrating from Domino-powered to Apache-powered, which is available online: http://www.redbooks.ibm.com/redpapers/pdfs/redp4987.pdf.
  2. Uncomment the Rewrite directive in the httpd.conf.updates file provided by Infoprint Server before copying the Infoprint Central directives to the httpd.conf file.
  3. Test an Infoprint Central link or bookmark to ensure that Infoprint Central loads in the browser.

If you need to use an unencrypted connection, do the following:

  1. Use the Infoprint Server System Configuration ISPF panel or PIDU to set the use-unencrypted-connection attribute to yes in the printer inventory.
  2. Test an Infoprint Central link or bookmark to ensure that Infoprint Central loads in the browser.

Reference information

For more information, see the security chapter in IBM HTTP Server on z/OS Migrating from Domino-powered to Apache-powered, which is available online: http://www.redbooks.ibm.com/redpapers/pdfs/redp4987.pdf

Instructions:

This portion of the Workflow will guide you in submitting jobs to run two IBM Health Checks that are associated with this upgrade action, IBMINFOPRINT,ZOSMIGV2R3_NEXT_INFOPRINT_IPCSSL and IBMINFOPRINT,INFOPRINT_CENTRAL_SECURE_MODE.

These checks will be activated if they are not already active. If the checks are activated, they will be deactivated at the end of the jobs. The checks will remain in the same state as they were found.

If the health checks run with no exceptions, this step will be marked "Complete" indicating that this upgrade action requires no further activity.

If either of the health checks find an exception, this step will be marked as "Failed". If so, further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output using any method that you use to view health check output, such as SDSF. Correct any situation, as appropriate. Then repeat this Workflow step to submit the health check jobs again, until the health checks no longer receive exceptions and the step is marked "Complete".


Step 4.13.3 : Infoprint Server actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Infoprint Server upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.13.3.1 : Infoprint Server: Run aopsetup


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

When upgrading to z/OS V2R5, you must run the aopsetup shell script to establish the correct file permissions for Infoprint Server directories and files.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Infoprint Server.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Run the aopsetup shell script from an rlogin shell, from an OMVS session, or with the BPXBATCH command. Specify the names of the RACF groups that you defined for Infoprint Server operators and administrators as arguments to aopsetup. For example, if you defined group AOPOPER for operators and group AOPADMIN for administrators, enter:

/usr/lpp/Printsrv/bin/aopsetup AOPOPER AOPADMIN
Rule:

You must run aopsetup from a user ID with a UID of 0. You can use the su command to switch to an effective UID of 0 if you have READ access to the BPX.SUPERUSER profile in the RACF FACILITY class.

Tip:

You can run aopsetup from the driving system (instead of the target system) if all of these are true:

  • You have the target system /var/Printsrv directory accessible.
  • You reference the target system /usr/lpp/Printsrv directory mounted under a /service directory as described in the comments at the beginning of the aopsetup shell script.
  • The RACF database groups for operators and administrators are the same on the driving and target system.

Reference information

For information about running aopsetup, see z/OS Infoprint Server Customization.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.13.3.2 : Infoprint Server: Edit the aopd.conf file


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting in z/OS V2R4, the attributes in the Infoprint Server configuration file are ignored, with the exception of the following attributes:

  • base-directory
  • inventory
  • jes-name
  • resolve-printway-printers
  • start-daemons
  • xcf-group-qualifier

Equivalent attributes in the system configuration definition are used instead. To avoid confusion, edit the Infoprint Server configuration file to remove the ignored attributes. The default location of this file is /etc/Printsrv/aopd.conf. However, you might have specified a different location in environment variable AOPCONF.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS Infoprint Server.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

No.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Use a text editor to remove all ignored attributes from aopd.conf.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.14 : Integrated Security Services upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element Integrated Security Services, which includes the Network Authentication Service component.


Step 4.14.1 : Integrated Security Services actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Integrated Security Services upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.14.1.1 : Network Authentication Service: Use the stronger NDBM database encryption types


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R5, z/OS Network Authentication Service (Kerberos) is changed as follows:

  • The default master key encryption type for an NDBM database or stash file is changed to a stronger encryption type.
  • The default encryption types that are used when none are explicitly defined in the Kerberos configuration files are updated to include stronger encryption types.
  • When the -k option is omitted from the kdb5_ndbm load command, the default encryption type is no longer assumed to be the master key encryption type.
  • The -k option, when used with the -mkey_convert option on the kdb5_ndbm load command, allows a master key encryption type change.

More information about these changes

When the NDBM database maintenance utility kdb5_ndbm is used to create an NDBM database or stash file, the default master key encryption type is now aes256-cts-hmac-sha384-192, which is a stronger form of encryption than the previous default aes256-cts-hmac-sha1-96. This change affects only the master principal encryption key, which is used to encrypt the keys of the database principal records. This change does not affect existing NDBM databases.

Overriding the use of the default encryption type for the master principal key is still possible if you include the -k option when you create a database or stash file.

The list of default encryption types that are available when none are explicitly set in the Kerberos configuration files now includes stronger encryption types. The default encryption types are as follows:

  • aes256-cts-hmac-sha384-192
  • aes128-cts-hmac-sha256-128
  • aes256-cts-hmac-sha1-96
  • aes128-cts-hmac-sha1-96
  • des3-cbc-sha1

In releases prior to z/OS V2R5, if the -k keytype option was not specified on the kdb5_ndbm load command, the master key encryption type is assumed to be the default encryption type. Load processing might fail if the master key encryption type in the dump file is not the default master encryption type.

To avoid this type of failure, in z/OS V2R5, it is no longer assumed that the default encryption type is the master key type when the -k option is omitted from the kdb5_ndbm load command. Instead, load processing determines the master key encryption type from the dump file.

In z/OS V2R5, a new command option -K desired-master-key-encryption-type is added to allow you to specify the new database master key encryption type with the -mkey_convert option. If the -K option is not specified, the new database master key type is assumed to be the same encryption type that is determined for the -k option.

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Integrated Security Services - Network Authentication Service.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use the kdb5_ndbm create command to create an NDBM database or kdb5_ndbm stash command to create a stash file and you do not specify the -k keytype option.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

To determine whether your installation is affected by this change, check for the following conditions:

  • If you create new or replicate NDBM databases that will be shared by multiple Key Distribution Center (KDC) instances, determine whether any KDC instances do not support the stronger encryption type aes256-cts-hmac-sha384-192.
  • Determine whether the default encryption types are used by checking the following:
    • SKDC_TKT_ENCTYPES environment variable is not set in the KDC envar file (/etc/skrb/home/kdc/envar by default)
    • default_tgs_enctypes or default_tkt_enctypes keywords are not set in the Kerberos configuration file (/etc/skrb/krb5.conf by default).

If your installation is affected, do the following:

  • If you create an NDBM database that will be shared with secondary Key Distribution Center (KDC) instances that do not support the aes256-cts-hmac-sha384-192 encryption type:
    • Include the -k keytype option on the kdb5_ndbm create command
    • Specify the strongest encryption type that is supported by all of the KDC instances.

    For example, if all of the KDC instances support aes256-cts-hmac-sha1-96, but some do not support aes256-cts-hmac-sha384-192, specify the following kdb5_ndbm create command:
    kdb5_ndbm create -k aes256-cts-hmac-sha1-96

  • If you create a secondary KDC on a z/OS 2.5 system and the primary KDC database is not using the aes256-cts-hmac-sha384-192 encryption type, use the -k keytype option when you create the master key stash file. For example, to create a stash file with an aes256-cts-hmac-sha1-96 master key encryption type, enter the following kdb5_ndbm stash command:
    kdb5_ndbm stash -k aes256-cts-hmac-sha1-96

  • If you must continue to use the earlier (weaker) default encryption types, you must explicitly specify them in the z/OS KDC environment variable file (/etc/skrb/home/kdc/envar by default), as follows:
    SKDC_TKT_ENCTYPES=aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1
    and in the Kerberos configuration files (/etc/skrb/krb5.conf by default), as follows:
    default_tgs_enctypes=aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1 default_tkt_enctypes =aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1

Reference information

For more information, see z/OS Integrated Security Services Network Authentication Service Administration.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies.


Step 4.15 : ISPF upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element ISPF.


Step 4.15.1 : ISPF actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes ISPF upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.15.1.1 : ISPF: Accommodate the ISPF Gateway access change from HTTP to HTTPS


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting in z/OS V2R4, the ISPF Gateway uses HTTPS connections by default. The change from HTTP to HTTPS is intended to allow for more secure communication with the ISPF Gateway. One example of a program that accesses the ISPF Gateway is the installation verification program (IVP) that is included with ISPF.

If you use the ISPF Gateway through the HTTP protocol, you must update your configuration to enable SSL for your ISPF gateway traffic.

Although not recommended, a configuration option is provided to allow you to override the default, for fall back to non-secure HTTP if needed.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

ISPF

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use the ISPF Gateway through the HTTP protocol.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether the ISPF Gateway is being accessed on your system through non-secure HTTP, run health check IBMISPF,ZOSMIGV2R3_Next_ISPF_GW_HTTPS.

When this exception condition is detected, message ISTM040E is issued and is followed by message ISTM900I, which indicates the date and time that the ISPF Gateway was last accessed using non-secured HTTP. You can use message ISTM900I to determine whether a new non-secured HTTP access of the ISPF Gateway has been detected or the exception condition is related to an earlier access.

This health check is available for z/OS V2R3 with the PTFs for APARs OA58151 and OA58450 applied.

Steps to take

Determine whether the ISPF Gateway is being accessed on your system through non-secure HTTP. To do so, use IBM health check IBMISPF,ZOSMIGV2R3_Next_ISPF_GW_HTTPS. This health check is available for z/OS V2R3 with the PTFs for APARs OA58151 and OA58450 applied.

Update your configuration to enable SSL for your ISPF gateway traffic, as described in the topic “Customizing IBM HTTP server powered by Apache” in ISPF Planning and Customizing.

Although not recommended, you can override the default by adding environment variable CGI_SECURECONN to your HTTP configuration and setting it to FALSE.

Reference information

For more information about how to update the ISPF configuration, see the topic “Configuring the CIM server HTTPS connection using AT-TLS” in ISPF Planning and Customizing.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMISPF,ZOSMIGV2R3_Next_ISPF_GW_HTTPS.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.15.1.2 : ISPF: Remove any dependencies on Workstation Agent from your system


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

z/OS V2R5 removes support for the ISPF Workstation Agent (WSA), also known as the ISPF client/server component. WSA is an application that runs on your local workstation and maintains a connection between the workstation and the ISPF host. It is primarily used to transfer files between the workstation and the host.

IBM recommends that you use a more current file transfer solution, such as those provided by z/OS FTP, the sftp utility of OpenSSH, or another file transfer mechanism. These solutions have more capabilities, including the ability to provide secure communications.

Note: The communication between ISPF and the ISPF Workstation Agent is not secure. Therefore, avoid using the ISPF Workstation Agent.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

ISPF

When change was introduced:

z/OS V2R5. Also, see the "Statement of General Direction" in Preview: IBM z/OS Version 2 Release 4, IBM United States Software Announcement 219-013, dated February 26, 2019.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you are using the ISPF Workstation Agent.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether the ISPF Workstation Agent is being used on your system, use health check IBMISPF,ISPF_WSA.

This health check is added by ISPF APAR OA56980.

Steps to take

Determine whether any of your users or programs use the ISPF Workstation Agent (WSA), also known as the ISPF client/server component. If so, remove any dependencies on WSA from your system. Instead, use a more current file transfer solution, such as those provided by z/OS FTP, the sftp utility of OpenSSH, or another file transfer mechanism. These solutions have more capabilities, including the ability to provide secure communications.

Reference information

For more information, see the following references:

  • Statement of General Direction in IBM United States Software Announcement 219-013, dated February 26, 2019
  • The topic Prohibiting connections to the ISPF Workstation Agent in z/OS ISPF Planning and Customizing.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMISPF,ISPF_WSA.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.16 : JES2 upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element JES2.


Step 4.16.1 : JES2 actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes JES2 upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.16.1.1 : JES2: Activate z22 mode


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting with z/OS V2R5, JES2 no longer supports the z11 level for checkpoint data sets. z22 mode was introduced in z/OS V2R2.

You must activate JES2 in z22 mode, if you are not already doing so. When you switch to z22 mode, the system upgrades the JES2 checkpoint.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

JES2.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use the z11 level for checkpoint data sets.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

After z/OS V2R5 is active, you cannot fall back to z11 mode.

If you enter the command $ACTIVATE,LEVEL=Z11 in z/OS V2R5, the following error message is issued:

$ACTIVATE,LEVEL=Z11
$HASP003 RC=(06),ACT IVATE LEVEL - VALUE CONTAINS INVALID DATA

System impacts:

None.

Related IBM Health Checker for z/OS check:

To determine whether the z11 level is used for checkpoint data sets, use IBM Health Checker for z/OS check IBM_JES2, JES2_UPGRADE_CKPT_LEVEL_JES2.

Steps to take

Before installing z/OS V2R5, perform these steps:

  • On the systems in your MAS, determine your z22 checkpoint activation readiness, as follows:

    1. Enter the $D ACTIVATE command to verify that activation to z22 mode can succeed.

      If you plan to change the checkpoint mode dynamically through the command $ACTIVATE,LEVEL=z22, SPOOLDEF CYL_MANAGED=ALLOWED must be specified in JES2PARM before activation.

      You might see that z22 mode requires an extra nnn 4K records for CKPT1.

  • Enter the JES2 $ACTIVATE command to verify non-configuration changes that must be accommodated before you go to z22, and to activate z22 mode. See the considerations for this command in z/OS JES2 Commands.

JES2 restarts in the same mode as the other members of the MAS (if any are active) or the mode of the last active JES2 member when it was shut down.

Prior to z/OS V2R5, on a cold start JES2 always started in z22 mode, unless overridden by the OPTSDEF COLD_START_MODE or UNACT parameters. In z/OS V2R5, on a cold start, JES2 always starts in z22 mode regardless of the OPTSDEF COLD_START_MODE or UNACT parameters.

If you IPL a z/OS V2R5 system in z11 mode and activate JES2 in a warm start, JES2 ends with the following error:

$HASP446 CURRENT CHECKPOINT DATA SETS ARE IN z/OS 1.11
FORMAT. THIS IS NOT SUPPORTED BY THE z/OS 2.5 LEVEL OF JES2.

If so, you must correct the problem. Either convert to z22 mode and restart JES2, or restart JES2 with a cold start.

Reference information

For more information, see z/OS JES2 Commands.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMJES2,JES2_UPGRADE_CKPT_LEVEL_JES2.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.16.2 : JES2 actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes JES2 upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed but do not require it to be active.


Step 4.16.2.1 : JES2: Accommodate the changed default for the EXECUTABLE keyword on $GETMAIN


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

z/OS V2R3 added the EXECUTABLE= keyword on the $GETMAIN macro to indicate whether the obtained storage is marked as executable for systems that run on an IBM z14 server or later. For more information about non-executable memory, see the description of the EXECUTABLE= keyword on the STORAGE macro.

When the EXECUTABLE= keyword was added to the $GETMAIN macro in z/OS V2R3, the default was YES. Starting with z/OS V2R4, the default on $GETMAIN is changed to NO. This change implies that, by default, any storage that is obtained in a supported subpool does not support executable code on a z14 server. Any attempt to run code in the storage results in an 0C4 abend.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS JES2.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you have any affected JES2 exit routines or user modifications.

Target system hardware requirements:

IBM z14 server or later.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

If EXECUTABLE=NO is used and YES is needed, any attempt to run code in the storage results in an 0C4 ABEND occurs.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review your exits for instances of the $GETMAIN macro that obtains storage for executable code. In particular, check for DCB exit stubs that might be obtained and pointed to by the EXLST area. When appropriate to do so, convert the $GETMAIN and its associated $FREMAIN to specify EXECUTABLE=YES. On a z/OS V2R3 system, you can perform this change before you upgrade to z/OS V2R5.

If in doubt, you can change all $GETMAIN and $FREMAIN macros to specify EXECUTABLE=YES.

Reference information

For more information, see z/OS JES2 Installation Exits.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.16.2.2 : JES2: Ensure that programs access checkpoint data in 64-bit storage


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

JES2 checkpoint versions are used to provide a stable copy of the job and output queues when processing data requests from applications. Programs can obtain JES2 checkpoint versions by using subsystem interface (SSI) function code 71, subfunction subfunction 4 (SSJIFOBT - obtain a version) and passing in the IAZDSERV data area. IAZDSERV contains the pointers to the data areas in the checkpoint version. The previous versions 1 through 9 of the IAZDSERV macro (DSERV DSECT) are defined using 31-bit addresses and ALETs to access the checkpoint data.

To help you prepare for the use of 64-bit checkpoint data, z/OS V2R4 introduced a new version 10 IAZDSERV (DSERVX DSECT), which contains 64-bit addresses and uses ALETs to access the checkpoint data. In z/OS V2R4, programs could use a pre-version 10 IAZDSERV to access a checkpoint version and continue using 31-bit pointers. However, it was also possible to migrate your applications to the new 64-bit checkpoint version by passing in a version 10 IAZDSERV and accessing the checkpoint version data using the 64-bit pointers, even though the data areas were in 31-bit storage. JES2 SSI code that accesses a checkpoint version was updated to use the new version 10 (64-bit) DSERVX DSECT.

Now, with the introduction of APAR OA61750 for z/OS V2R5, the JES2 checkpoint version data is moved to 64-bit private storage. Access is still done by using a pointer and ALET supplied by the IAZDSERV passed to SSI function code 71. However, applications that directly access a checkpoint version must change to use the Version 10 format of IAZDSERV, which has 64-bit data pointers.

With APAR OA61750 installed on z/OS V2R5, version 10 is the only supported version of IAZDSERV. If a pre-version 10 IAZDSERV is passed to SSI function code 71, the corresponding pointer to the area returns a value of x'7FFFBAD' with an ALET value of 0. The return code (SSOBRETN) is set to 4 with reason code (SSJIRETN) of 40.

You must ensure that any programs that refer directly to IAZDSERV fields are updated to use the version 10 format of IAZDSERV.

Notes:

  1. Besides the normal checkpoint version, it is possible to access a live checkpoint version by setting the DSRVF1LI bit in the input IAZSERV. A live checkpoint version is not a stable copy; it is a shared copy of the actual JES2 checkpoint. Live checkpoint versions are not impacted by APAR OA61750.

  2. APAR OA61229 moved the track group map (TGM) in a live version to 64-bit storage. The track group map pointer is returned in DSRVTGPT in the older IAZDSERV format (if DSRVSVRN of 7 through 9 is passed). With APAR OA61229, if a live version is requested, the DSRVTGPT field returns zero because the data area is in 64-bit storage and the return and reason code (SSOBRETN and SSJIRETN) are both set to zero. With APAR OA61750, the DSRVTGPT field is set to x'7FFFFBAD' and SSOBRETN is set to 4 with SSJIRETN set to 40.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS JES2.

When change was introduced:

z/OS V2R5 with APAR OA61750.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you have a program that uses the IAZDSERV macro with SSI function code 71 to access a JES2 checkpoint version, and the program passes an IAZDSERV with DSRVSVRN set to 1-9 in the SSJIUSER control block.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check for applications and exits that access checkpoint version data from the IAZDSERV data area. Determine whether this code must access the checkpoint data blocks directly.

As an alternative to using the IAZDSERV data area directly, your code can use an SSI call to access checkpoint version data. IBM recommends that you evaluate the use of SSI calls, such as SSI function code 80 (extended status) or SSI function code 82 (JES property SSI). Determine whether you can use these services to obtain the data that you require. Otherwise, you must upgrade your code to accept the 64-bit data pointers that are returned in the version 10 IAZDSERV data area.

The following pointers in the older format IAZDSERV are impacted by APAR OA61750:

  • DSRVJOPT - Pointer TO JOT
  • DSRVJQPT - Pointer TO JQE
  • DSRVQSPT - Pointer TO QSE
  • DSRVHCPT - Pointer TO HCT
  • DSRVJNPT - Pointer TO JNT
  • DSRVJXPT - Pointer to JQX
  • DSRVJTPT - Pointer to JQE track group extension
  • DSRVDAPT - Pointer to DAS
  • DSRVWQST - Pointer to WQPOS
  • DSRVOXPT - Pointer to JOX
  • DSRVTGPT - Pointer to TGM
  • DSRVZJPT - Pointer to ZJC

If your program accesses any of the IAZDSERV fields listed above in a non-live version, update your program to use the new format IAZDSERV (DSERVX mapping DSECT and DSRXSVRN set to DSRXSV10). Access the data areas by using the appropriate 64-bit pointer (and ALET) in 64-bit addressing mode.

In general, unless your code must reference individual fields in the $DSERV mapping, it should not require changes. However, it your code references fields in the $DSERV, you must upgrade your code to use the 64-bit fields and run in 64-bit addressing mode.

Note: If you use the $DSERV macro in an exit, be aware that the IAZDSERV data area it returns is the version 10 level and thus contains 64-bit pointers. All JES2 services that use the $DSERV macro as input were upgraded in z/OS V2R4 to accept the version 10 of the IAZDSERV data area.

Reference information

For more information, see the following publications:

Step 4.16.2.3 : JES2: Accommodate changes in NJE input phase processing for multi-object job streams


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Before z/OS V2R4, if an NJE job stream contained more than one job or job group, the stream and all jobs within it would fail input phase processing. Starting with z/OS V2R4, JES2 now supports multiple job and job group objects in an NJE job transmission stream. This is done by keeping all the jobs in the stream busy in the INPUT phase of processing until the job trailer (end of the job stream) is received. When received, the jobs complete input phase processing and are queued to the next phase. If an error occurs on the connection and the job trailer is not received, all of the jobs are purged from the receiving system. When the NJE connection is reestablished, the entire job stream is sent again.

This change implies a number of subtle changes in how input phase processing works:

  • Multiple jobs and job groups can be marked busy on a job receiver at the same time
  • Final processing for the jobs is delayed until the job trailer is received. This includes exits 20 and 50 (end of input exits) and exit 51 (queue change). As a result, the end of input exit for the first job in the stream is not given control until all other input exits (job statement, accounting string, JCL statement) are called for all of the jobs. The environment in which the end of input exit is called is the same as in prior releases, however, the order is changed.
  • When a connection drops, because multiple jobs can exist on the NJE job receiver, all of these jobs must be purged. Prior releases would only have at most one job that needed to be purged.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS JES2.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you have exits or processes that are impacted

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review these changes to NJE input phase processing and evaluate suitable changes to your system. For example, if you have any exits or procedures that rely on only one job or job group being active on a particular NJE job receiver at a time, review and update those exits and procedures. Similarly, if you have an end of input exit or a queue change exit that relies on being called immediately after other input exits for a particular job, review those exits and change them appropriately.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.16.2.4 : JES2: Review changes applicable to exit routines and user modifications


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Changes to your JES2 exit routines and user modifications might be necessary, depending on which JES2 functions are used and which JES2 data areas are referenced.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS JES2.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you have any affected JES2 exit routines or user modifications.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

See the topic on JES2 exit migration considerations in z/OS JES2 Installation Exits. This topic describes the changed information that you might need to accommodate. Generally, assembly errors in JES2 exits indicate that you were affected by a JES2 data area change.

Note: As a recommended practice, use the $MODULE macro to include JES2 macros within your exit routines and user-supplied modules. By doing so, you allow the $MODULE macro to manage macro dependencies. For a list of the control block mappings (DSECTs) that can be specified on the $MODULE macro, see the tables in the $MODULE topic in z/OS JES2 Macros.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.16.3 : JES2 actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes JES2 upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.16.3.1 : JES2: Respond to PENCRYPT conflict notifications


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Beginning in z/OS V2R4, the value of JES2 initialization parameter NODE PENCRYPT is saved in the JES2 checkpoint and checked for consistency across all MAS members.

During the first start of JES2 on MAS members that specify NODE PENCRYPT=YES, JES2 notifies the operator that the saved PENCRYPT value (NO) conflicts with the new PENCRYPT value (YES). This situation can result in messages $HASP442 and $HASP563. If so, the operator can continue the initialization by replying 'Y' to the subsequent $HASP441 message.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

JES2.

When change was introduced:

zOS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if your system includes MAS members that are defined in the JES2 initialization (INIT) deck with NODE PENCRYPT=YES.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

During the first start of JES2 on MAS members that specify NODE PENCRYPT=YES, JES2 notifies the operator that the saved PENCRYPT value (NO) conflicts with the new PENCRYPT value (YES). The operator must verify whether JES2 initialization should continue:

$HASP442 INITIALIZATION STATEMENTS CONFLICTING WITH SAVED VALUES FOLLOW:
$HASP563 NODE(n) NAME=nodename DEFINITION HAS CHANGED
NODE(n) PENCRYPT=NO WILL BE CHANGED TO PENCRYPT=YES

$HASP441 REPLY 'Y' TO CONTINUE INITIALIZATION OR 'N' TO TERMINATE.

A $HASP563 message is issued for each applicable NODE initialization statement.

These one-time PENCRYPT conflict notifications and subsequent continuation verification requests are new, as of z/OS V2R4.

When this situation occurs, the operator can reply ‘Y’ to the $HASP441 message that is issued after one or more of the following messages are issued:

“$HASP563 NODE(n) NAME=nodename DEFINITION HAS CHANGED NODE(n) PENCRYPT=NO WILL BE CHANGED TO PENCRYPT=YES”

Note that HASP563 messages in the following situations should be investigated to determine the cause and proper course of action:

  • Issued on subsequent starts of JES2 after upgrading to z/OS V2R4 or later
  • Issued for parameters other than PENCRYPT

Reference information

For more information, see z/OS JES2 Commands.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.17 : JES3 upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element JES3.


Step 4.17.1 : JES3 actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes JES3 upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.17.1.1 : JES3: Accommodate the removal of JES3 in a future release


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As previously announced, for clients that use JES3, z/OS V2R5 is the last release for which IBM plans to include the JES3 feature. Clients should plan to migrate to an alternative.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

JES3

When change was introduced:

z/OS V2R5. Also, see the "Statement of General Direction" in IBM United States Software Announcement 219-013, dated February 26, 2019.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended if your system runs JES3.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you are one of the clients who remains on JES3, IBM encourages you to plan your migration. For questions, contact jes3q@us.ibm.com.

Reference information

For more information, see the Statement of General Direction in IBM United States Software Announcement 219-013, dated February 26, 2019.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.18 : Language Environment upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element Language Environment.


Step 4.18.1 : Language Environment actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Language Environment upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.18.1.1 : Language Environment: Update the CSD based on the newest CEECCSD


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Each release, Language Environment adds or deletes load modules in the CICS system definition (CSD) file. Therefore, the CSD file must be updated every release, based on the sample CSD program definitions in members CEECCSD and CEECCSDX in the SCEESAMP data set. The CSD samples from the latest release of z/OS can be used for earlier releases of z/OS that can co-exist with the current release.

If your installation is running CICS Transaction Server for z/OS 4.2 or earlier, you must update the CSD file with the program definitions in member CEECCSD and member CEECCSDX. For later releases of CICS TS, you can skip this step if your installation uses the automatic update function that was provided in APARs PI60389 and PI73184.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Language Environment.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use:

  • CICS TS 4.2 or earlier
  • CICS TS 5.1, 5.2, or 5.3, and you do not allow program definitions to be updated automatically.

Target system hardware requirements:

None.

Target system software requirements:

For CICS TS 5.1, 5.2, and 5.3, the optional, but recommended, approach is not to add the Language Environment required program resource definitions to the CSD. Instead, allow the program resource definitions to be automatically updated by CICS through its system autoinstall functionality, which installs the program definitions when they are required.

For CICS TS 5.4 and later, use of the automatic update function is required.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Failure to perform this upgrade action can result in several various program ABENDs, such as ABENDU4093 RC=3EC. Which ABEND you see depends on the programming language, and the level of the programming language, that you use.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If your installation is running CICS TS 4.2 or earlier, you must update the CSD file with the program definitions in member CEECCSD and member CEECCSDX. These members are contained in the data set hlq.SCEESAMP.

Note: The group that contains the Language Environment runtime routines must be in the group list that is used during CICS startup.

For CICS TS 5.1, 5.2, and 5.3, you can skip this step, if you allow CICS to install the program definitions automatically. This function was provided in APARs PI60389 and PI73184. Otherwise, you must update the CSD file manually.

For CICS TS 5.4 and later, use of the CICS automatic update function is required. This function ensures that the Language Environment definitions are installed with the same program attributes as was used previously.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.18.1.2 : Language Environment: Upgrade load modules in the LPA


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Each release you must update the Language Environment load modules that you make accessible through the link pack area (LPA). In addition, each release you should review your list of Language Environment load modules in the LPA to determine if it is still suitable.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Language Environment.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you need to make modules accessible through the link pack area (LPA).

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review Language Environment load modules in the LPA.

To move load modules into the LPA, use the following sample members in the CEE.SCEESAMP data set:

  • AFHWMLP2 : This is a sample of all Language Environment Fortran component modules eligible for the LPA.
  • CEEWLPA : This is a sample of a PROGxx member of SYS1.PARMLIB that includes all Language Environment CEE-prefixed runtime modules eligible for the LPA (that is, all Language Environment base modules) except the callable services stubs.
  • CELQWLPA : This is a sample for AMODE 64 runtime support.
  • EDCWLPA : This is a sample of a PROGxx member of SYS1.PARMLIB that includes all Language Environment EDC-prefixed and CEH-prefixed runtime modules eligible for the LPA (that is, all z/OS XL C/C++ component modules) except locales and code page converters.
  • IBMALLP2 (or IBMPLPA1 for Enterprise PL/I for z/OS) : This is a sample of all Language Environment PL/I component modules eligible for the LPA.
  • IGZWMLP4 : This is a sample of all Language Environment COBOL component modules eligible for the LPA.

To see which modules are eligible for the LPA, refer to z/OS Language Environment Customization. The modules listed there can be put in the LPA or extended LPA (ELPA) depending on their RMODE value:

  • If the RMODE is ANY, the module can reside in the LPA or in the ELPA (above or below the 16 MB line).
  • If the RMODE is 24, the module can reside only in the LPA (below the 16 MB line).

If you are considering placing the modules listed in z/OS Language Environment Customization in the LPA or the ELPA, then IBM recommends that you place the SCEELPA data set in the LPA list (LPALSTxx). SCEELPA contains Language Environment load modules that are reentrant, that reside above the 16 MB line, and that are heavily used by z/OS.

In z/OS Language Environment Customization you will also see tables of modules eligible for the LPA and the ELPA above and beyond what is found in the SCEELPA data set. You will need to use the dynamic LPA or MLPA approach to move these modules into the LPA or ELPA. You do not need to include recommended modules if they contain functions your installation does not use. Language Environment modules not listed in these tables can be moved into the LPA or ELPA at your discretion.

Reference information

For more information, see the table Language Environment sample IEALPAnn or PROGxx members in hlq.SCEESAMP for the list of sample members and their changed content in z/OS Language Environment Customization. The table contains a list of eligible load modules for:

  • Language Environment base modules
  • Language Environment z/OS XL C/C++ component modules
  • Language Environment COBOL component modules
  • Language Environment Fortran component modules
  • Language Environment PL/1 component modules

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.19 : Library Server upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element Library Server.


Step 4.19.1 : Library Server actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Library Server upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.19.1.1 : Stop using Library Server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

z/OS V2R4 removes support for the Library Server element. IBM recommends that you use IBM Knowledge Center for z/OS, which was introduced in z/OS V2R2, to create your own local repositories and manage content.

Knowledge Center is the IBM platform for delivering product documentation. IBM Knowledge Center for z/OS is the replacement for both BookManager READ and Library Server on z/OS.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Library Server.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

IBM recommends that you use IBM Knowledge Center for z/OS for maintaining local repositories of Knowledge Center documentation and serving this content.

Reference information

For more information, see IBM Knowledge Center for z/OS Configuration and User Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.20 : Network Files System (NFS) upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element z/OS Network File System (z/OS NFS).


Step 4.20.1 : z/OS Network File System actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes z/OS Network File System (z/OS NFS) upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.20.1.1 : NFS: Update references to NFS samples, macros, and utility source parts


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R5, a number of NFS parts are relocated in the system. If your programs refer to these parts, update the programs to refer to the new locations.

The following NFS macros are moved from SYS1.NFSMAC to SYS1.MACLIB:

  • GFSAUDSA
  • GFSAULOG
  • GFSAUSEC
  • GFSAUSMF

The following NFS samples are moved from SYS1.NFSSAMP to SYS1.SAMPLIB:

  • GFSALLOC
  • GFSAPATT
  • GFSAPEXP
  • GFSAPROC
  • GFSDDDEF
  • GFSMKDIR
  • GFSAMHDJ
  • GFSDELET
  • GFSAPMAP
  • GFSCPROC
  • GFSISMKD
  • GFSDLDDF
  • GFSAUXF
  • GFSAUXL
  • GFSAPSMF

The following z/OS NFS utility source parts are moved from z/OS NFS prefix.NFSTARB to the z/OS UNIX file system under /usr/lpp/NFS/utils/

Previous location

New location

prefix.NFSTARB(gfsawjcl)

/usr/lpp/NFS/utils/Makefile

prefix.NFSTARB(gfsawaxd)

/usr/lpp/NFS/utils/gfsawaxd.c

prefix.NFSTARB(gfsawlin)

/usr/lpp/NFS/utils/gfsawlin.c

prefix.NFSTARB(gfsawlou)

/usr/lpp/NFS/utils/gfsawlou.c

prefix.NFSTARB(gfsawmnt)

/usr/lpp/NFS/utils/gfsawmnt.h

prefix.NFSTARB(gfsawmou)

/usr/lpp/NFS/utils/gfsawmou.c

prefix.NFSTARB(gfsawrp6)

/usr/lpp/NFS/utils/gfsawrp6.h

prefix.NFSTARB(gfsawrs6)

/usr/lpp/NFS/utils/gfsawrs6.h

prefix.NFSTARB(gfsawsha)

/usr/lpp/NFS/utils/gfsawsha.c

prefix.NFSTARB(gfsawsho)

/usr/lpp/NFS/utils/gfsawsho.h

prefix.NFSTARB(gfsawaix)

/usr/lpp/NFS/utils/znfs-client-utils.tar

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS NFS.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you have programs that refer to the affected parts.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

  • Check for any use of SYS1.NFSMAC or SYS1.NFSSAMP, such as compile jobs that use the NFS macros. If your programs refer to these parts, update the programs to refer to the new locations.

  • The next time you compile the z/OS NFS utilities, copy the source files from /usr/lpp/NFS/utils/.

Reference information

For information about NFS, see Network File System Guide and Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.21 : Open Systems Adapter/Support Facility (OSA/SF) upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element Open Systems Adapter/Support Facility (OSA/SF).


Step 4.21.1 : OSA/SF actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes the OSA/SF upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.21.1.1 : OSA/SF: Stop using Open Systems Adapter/Support Facility (OSA/SF)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Starting in z/OS V2R4, support is removed for the OSA Support Facility (OSA/SF) element. IBM recommends that you stop using this element.

No change to the OSA cards' strategic importance to z/OS is meant by this change. z/OS continues to support the networking operational use of OSA adapters.

OSA Support Facility (OSA/SF) is used to configure devices on Open Systems Adapter (OSA) cards that are used for the SNA protocol and to support and manage all OSA features. OSA/SF in z/OS has both a graphical user interface and a REXX API. On EC12/BC12 systems, IBM introduced support to configure these devices on the latest generation OSA adapters (OSA Express5S) and to support and manage these adapters exclusively using the Hardware Management Console (HMC), with no capability to configure or manage devices on these adapters provided in the z/OS OSA/SF application. The OSA/SF on the HMC functionality can be used to configure and manage OSA-Express4S and newer generation adapters.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

OSA/SF.

When change was introduced:

z/OS V2R4. Announced as a Statement of Direction in IBM Software Announcement 218-472, dated November 13, 2018.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

IBM recommends that you stop using OSA Support Facility (OSA/SF) before installing z/OS V2R5.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.22 : RMF upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for optional feature Resource Measurement Facility (RMF).


Step 4.22.1 : RMF actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes RMF upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.22.1.1 : RMF: Remove references to deprecated ports for the RMF DDS server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R4 and later, the following Distributed Data Server (DDS) options are deprecated: DM_PORT, DM_ACCEPTHOST, MAXSESSIONS_INET, SESSION_PORT, and TIMEOUT. These options should be removed from PARMLIB member GPMSRV00

RMF is changed to no longer use ports 8801 and 8802. The ports are described, as follows:

  • In previous releases, RMF used port 8801 as the default for the Distributed Data Server (DDS) option SESSION_PORT. This port was used by the RMF PM java client in addition to the HTTP port.

  • In previous releases, RMF used port 8802 as the default for the DDS option DM_PORT. This port was used as the UDP/IP port for Tivoli® DM/390 communication. This product is no longer available.

Ports 8801 and 8802 are deprecated. It is recommended that you disable these ports in the RMF DDS. A warning message is issued if either of the options SESSION_PORT or DM_PORT are present in the RMF parmlib member GPMSRVxx.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

RMF.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended if you use RMF and the DDS server is configured to use any of the deprecated options.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

The following health check is added by APAR OA60404:

  • IBMRMF,RMF_DDS_OPTS

Use this health check to Checks for deprecated DDS options.

This check issues the following messages:

  • GPMH1004I
  • GPMH1005E

Steps to take

If you have RMF, determine whether your system is affected by this change. Check for the following conditions:

  • RMF PM version 2.4.x or an earlier release failing to connect to the DDS server.
  • Warning message for deprecated DDS server options SESSION_PORT or DM_PORT.
  • Health check messages GPMH1004I and GPMH1005E if health checks are enabled.

Do the following:

  • Verify that you are running the latest level of RMF PM.
  • If your RMF parmlib member GPMSRVxx includes the settings SESSION_PORT(8801) or DM_PORT(8802), remove the settings.
  • Ensure that RMF client applications refer to the HTTP_PORT.

Reference information

For more information, see z/OS Resource Management Facility User's Guide.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMRMF,RMF_DDS_OPTS.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".

This check applies to z/OS V2R4 and later.


Step 4.22.2 : RMF actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes RMF upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.22.2.1 : RMF: Determine updates for RMF structural changes


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R5, RMF consists of two components that work together to provide performance management capabilities, as follows:

z/OS Data Gatherer
This base element collects performance measurements from the hardware and operating system and provides access to measurements across the sysplex.
RMF
This optional priced feature uses the collected measurements to report performance statistics in tabular and graphical reports.

The term RMF refers to the RMF reporter component.

In addition, the following feature is new:

z/OS Advanced Data Gatherer (ADG)
This optional priced feature gathers performance data in raw form. RMF provides performance reports, based on metrics from the ADG feature. The RMF priced feature includes entitlement to the ADG priced feature.

The following table summarizes the RMF structural changes.

Name

Type

Description

Resource Measurement Facility (RMF) Optional feature, exclusive, priced, can be dynamically enabled. The Resource Measurement Facility (RMF) feature generates performance reports based on the data that is provided by the z/OS Advanced Data Gatherer feature. Generation of RMF reports with Parallel Sysplex scope is supported only if the RMF feature is enabled on all systems in the Parallel Sysplex.

The presence of the RMF feature causes the z/OS Advanced Data Gatherer feature to be enabled.

z/OS Data Gatherer Base element, exclusive. The z/OS Data Gatherer collects z/OS resource usage and performance data. The following base functions are provided:
  • SMF 70 subtype 1 record data is written into the SMF buffer and to SMF data sets or to a log-stream.
  • Sysplex Data Server API can be used to access Monitor II and SMF 70 subtype 1 record data.
  • z/OS Data Gatherer API GRBSMFR and Sysplex Data Server API ERB3XDRS can be used to retrieve SMF record type and Monitor III data from SMF and Monitor III VSAM data sets.
z/OS Advanced Data Gatherer Optional feature, exclusive, priced, can be dynamically enabled. The z/OS Advanced Data Gatherer feature allows:
  • System administrators to write SMF 70-78 record data into the SMF buffer and to SMF data sets or to a log-stream.
  • Application programs to access collected Monitor II, Monitor III, and SMF 70-78 record data by using Sysplex Data Server APIs and z/OS Data Gatherer APIs.

When the PTFs for APARs OA58281 and OA58759 are applied to z/OS V2R3 or V2R4, the RMF product is restructured into z/OS Data Gatherer and the RMF feature. The Data Gatherer base component is packaged and delivered as a separate FMID.

With the z/OS Data Gatherer now included in the z/OS base, the RMF installation procedure and licensing model are changed. This workflow step describes the possible actions for you to take.

If your installation does not use z/OS RMF, you have no upgrade actions to perform.

Packaging and installation

In z/OS V2R5, the Data Gatherer base z/OS component (566527401) is shipped within the same FMID as the z/OS Advanced Data Gatherer priced feature, FMID HRG77D0. The RMF reporter component (566527404) remains in the optional RMF feature and is packaged in the existing FMIDs HRM77D0 and JRM77DJ.

The new RMF feature entitles you to use RMF and z/OS Advanced Data Gatherer.

Element

FMIDs

COMP ID

RETAIN release

Level

z/OS Data Gatherer

HRG77D0

566527401

7D0

z/OS V2R5

RMF

HRM77D0
JRM77DJ

566527404

7D0
7DJ

z/OS V2R5

With z/OS Data Gatherer now included in the z/OS base, the RMF installation procedure and licensing model are changed. In previous releases, an SMP/E installation of the RMF product libraries was done for all ServerPac and CBPDO installations, regardless of whether you purchased an RMF license. In z/OS V2R5, this concept continues, but note that z/OS Data Gatherer and RMF are now installed into different target and distribution libraries.

The RMF installation procedure is described in z/OS V2R5 Program Directory.

Licensing model

Under the previous RMF licensing model, you were required to order the RMF product before you could use it. In z/OS V2R5, a new licensing model allows you to obtain base z/OS Data Gatherer functions as part of your z/OS entitlement. You can optionally enable additional priced features to run z/OS Advanced Data Gatherer and RMF.

Element or featureFMIDsLevelTypeDynamic enablement through IFAPRDxx
z/OS Data GathererHRG77D0z/OS V2R5Base elementN
z/OS Advanced Data GathererHRG77D0z/OS V2R5Priced featureY
RMFHRM77D0 (English)
JRM77DJ (Japanese)
z/OS V2R5Priced featureY

If you do not have an RMF license, you can run a standalone z/OS Data Gatherer in basic mode without RMF. If so, you can use base functions such as the following:

  • Collection of Monitor I performance data
  • Writing SMF 70 subtype 1 record data into the SMF buffer and to SMF data sets or to a logstream. SMF 70 subtype 1 records are required as input to IBM Software Pricing tools.
  • Access to Monitor II and SMF 70 subtype 1 record data through the use of Sysplex Data Server APIs ERB2XDGS and ERBDSQRY or ERBDSREC. ERB2XDGS is used by the optional priced z/OS element SDSF.
  • z/OS Data Gatherer API GRBSMFR and Sysplex Data Server API ERB3XDRS can be used to retrieve any SMF record type and Monitor III data from SMF and Monitor III VSAM data sets.

If you enable the z/OS Advanced Data Gatherer feature:

  • System administrators can configure the z/OS Data Gatherer to write SMF 70-78 record data to the SMF buffer and to SMF data sets or to a logstream. SMF 70-78 record data in the SMF buffer can be retrieved through the use of Sysplex Data Server APIs ERBDSQRY and ERBDSREC. SMF record data in general can be used as input to SMF post-processing tools and data providers.
  • Collection of Monitor III performance data
  • Application programs can access collected Monitor III, Monitor II, and SMF 70-78 record data through the use of Sysplex Data Server and z/OS Data Gatherer APIs.

To use the RMF reporter function, you must obtain the RMF feature. RMF includes the following functions:

  • RMF Postprocessor
  • Monitor II and III ISPF reports
  • Distributed Data Server
  • Monitor II background session to write SMF 79 record data.

Enabling the RMF feature also enables the z/OS Advanced Data Gatherer feature.

IBM Software Manufacturing customizes the IFAPRDxx parmlib member according to your Shopz order. This service provides enabled or disabled features to you, ready to use.

The availability of RMF functions depends on which features are enabled: RMF, z/OS Advanced Data Gatherer, or neither. If you attempt to use z/OS Advanced Data Gatherer when neither RMF or z/OS Advanced Data Gatherer is enabled, an error message is returned. Similarly, an error message is returned if you attempt to use RMF functions when the RMF feature is disabled or not installed.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

RMF.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if your system uses z/OS RMF.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

The post-installation steps depend on which components you plan to use, and which z/OS priced features you are entitled to. If you are upgrading an existing RMF configuration from z/OS V2R4 or V2R3, you must perform upgrade actions for RMF, z/OS Data Gatherer, and Advanced Data Gatherer. If you are not currently using RMF, you have fewer actions to perform.

Recommended steps are provided for the following scenarios:

  • Scenario 1: Upgrading an existing RMF configuration from z/OS V2R4 or V2R3
  • Scenario 2: Using z/OS Data Gatherer only (without RMF) in either basic or advanced mode. z/OS Data Gatherer in advanced mode requires that you are entitled to the z/OS feature Advanced Data Gatherer.

Scenario 1: Upgrading an existing RMF configuration from z/OS V2R4 or V2R3

To upgrade an existing RMF configuration from z/OS V2R4 or V2R3, perform the following steps on your z/OS V2R5 system:

  1. Verify that you ordered the RMF priced feature. Also, in parmlib member IFAPRDxx, verify that both priced features RMF (FEATURENAME RMF) and z/OS Advanced Data Gatherer (FEATURENAME ADV DG) are enabled.

  2. Update LPA, LNKLST, and the APF list for the RMF and z/OS Data Gatherer load modules, as follows:

    • Update LNKLST (PROGxx) as follows:

      • Change SYS1.SERBLINK to SYS1.SERBLNKE.

        Note: In z/OS V2R5, PDS data sets SERBLINK and AERBMOD1 are converted to PDSE data sets SERBLNKE and AERBMOD2, respectively.

      • Add SYS1.SGRBLINK

    • Update the APF list (PROGxx) as follows:

      • Change SYS1.SERBLINK to SYS1.SERBLNKE.
      • Add SYS1.SGRBLINK

    • Update LPA list (LPALSTxx) as follows:

      • Change SYS1.SERBLPA to SYS1.SGRBLPA.

    • Ensure that both SYS1.SGRBCLS and SYS1.SERBCLS are added to the DD SYSPROC statements in your logon procedures.

    • If your installation uses Program Control and the PROGRAM class, you must add the corresponding program profiles for RMF and z/OS Data Gatherer system modules. For a RACF installation, the commands are:
      RALT PROGRAM ERB* ADDMEM('SYS1.SERBLNKE'//NOPADCHK)
      RALT PROGRAM GPM* ADDMEM('SYS1.SERBLNKE'//NOPADCHK)
      RALT PROGRAM ERB* ADDMEM('SYS1.SGRBLINK'//NOPADCHK)

      Also, remove the SERBLINK data set from the profile. This data set is no longer used. For a RACF installation, the RACF commands are:
      RALT PROGRAM ERB* DELMEM('SYS1.SERBLINK’ //NOPADCHK)
      RALT PROGRAM GPM* DELMEM('SYS1.SERBLINK’ //NOPADCHK)

Scenario 2: Using z/OS Data Gatherer only (without RMF) in either basic or advanced mode.

If you do not plan to use RMF, you can use z/OS Data Gatherer in either basic or advanced mode, depending on what you have entitled. z/OS Data Gatherer in advanced mode requires that you are entitled to the z/OS feature Advanced Data Gatherer.

Perform the following steps on your z/OS V2R5 system:

  1. If you want to use z/OS Advanced Data Gatherer, ensure that priced feature (FEATURENAME ADV DG) is enabled in parmlib member IFAPRDxx. To use z/OS Data Gatherer in basic mode, no IFAPRDxx enablement statement is required.

  2. Update the z/OS Data Gatherer load module names. These modules reside in SYS1.SGRBLINK and SYS1.SGRBLPA. You must define these libraries as APF-authorized libraries, which you can do with an IPL or dynamically (without an IPL), as follows.

    To activate z/OS Data Gatherer with an IPL:

    1. Add the SGRBLINK library to the link list
    2. Add the SGRBLINK library to the APF list
    3. Add the SGRBLPA library to the LPA list
    4. IPL the system.

    To activate z/OS Data Gatherer dynamically:

    1. Add the SGRBLINK library to a dynamic link list
    2. Change the APF format to dynamic, if it is not already dynamic
    3. Add the SGRBLINK library to the APF list
    4. Add the SGRBLPA library to dynamic LPA
    5. Enter SETPROG commands to make the changes effective.

  3. Ensure that SYS1.SGRBCLS is added to the DD SYSPROC statement in your logon procedures. Do not reference SYS1.SERBCLS.

  4. If your installation uses Program Control and the PROGRAM class, you must add a program profile for the z/OS Data Gather system modules. For a RACF installation, the command is:
    RALT PROGRAM ERB* ADDMEM('SYS1.SGRBLINK'//NOPADCHK)
Consideration for a mixed sysplex

If your installation shares its logon procedures with multiple systems in a sysplex, be aware that data set SYS1.SGRBCLS is new in z/OS V2R5. If you add this data set to a logon procedure, you cannot use the procedure to log on to z/OS V2R4 or earlier systems. Attempting to do so results in a JCL error ("Dataset not found").

To avoid this error, create an empty data set named SYS1.SGRBCLS on the lower level systems. Or, create an alias for SYS1.SGRBCLS that references SYS1.SERBCLS on the lower level systems, then remove the alias when you upgrade the systems to z/OS V2R5.

Reference information

See the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.22.3 : RMF actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes RMF upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.22.3.1 : RMF: Use a Monitor III reporter version equal to or later than your RMF Monitor III gatherer version


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

To avoid problems when reporting Monitor III data, use an RMF reporter version that is equal to or later than the latest RMF gatherer version used to collect the data to be reported. For example, it is safe to use an RMF reporter version from z/OS V2R5 for data that is collected with an RMF gatherer from z/OS V2R3, but not vice versa.

Mixed (and therefore problematic) levels of collected data can occur in the following scenarios:

  • Single system : You install and test a new release, then fall back to an earlier one; your data sets might contain data that is collected with different versions of the RMF gatherer.
  • Sysplex : You migrate to a new release on one system in a sysplex but try to use an earlier reporter version from another system to report on the migrated system's data.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

RMF.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you had planned to use an earlier level RMF reporter on data that was collected with a later level RMF gatherer.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

See "Steps to take."

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Always use an RMF Monitor III reporter version that is equal to or later than the gatherer version used to collect the data from which you want to produce a report.

Note: Monitor III notifies users by issuing information message ERB948I when a reporter session is started on a system in a sysplex that is not running with the highest RMF level available in the sysplex. The message helps users to avoid reporting problems.

Reference information

For more information, see z/OS Resource Management Facility User's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.22.3.2 : RMF: Configure AT-TLS to enable secure communication with the RMF distributed data server


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R4, the following parameters were added to GPMSRVxx parmlib member to support secure incoming HTTP connections for the RMF distributed data server (DDS):

  • HTTPS
  • CLIENT_CERT

In GPMSRVxx, the HTTPS parameter defaults to the setting ATTLS. Therefore, as of z/OS V2R4, the DDS requires that incoming connections are secured by AT-TLS. Otherwise, the connection is refused.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

RMF.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if the DDS accepts unsecure incoming connections.

Target system hardware requirements:

If the DDS GPMSRVxx parmlib member option uses HTTPS(ATTLS), which is the default, DDS incoming connections must be secured through AT-TLS.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

The following health check is added by APAR OA60403:

  • IBMRMF,RMF_DDS_ATTLS

Use this health check to check the DDS server AT-TLS configuration and setup. The health check verifies that if HTTPS(ATTLS) is enabled by default or explicitly, a corresponding AT-TLS policy is active.

This health check issues the following messages:

  • GPMH1001I
  • GPMH1002I
  • GPMH1003E

Steps to take

To allow the DDS to accept insecure connections, you can specify the option HTTPS(NO) in your active GPMSRVxx parmlib member. However, this setting is not recommended because it is not secure.

Information about how to set up AT-TLS communication is provided in z/OS Communications Server: IP Configuration Guide and z/OS Security Server RACF Security Administrator's Guide. For other security management products, refer to the corresponding security product documentation.

The following example shows a rule that enables secure communication with the DDS:

# RMF Distributed Data Server Rule TTLSRule DDSServerRule { LocalPortRange 8803 Jobname GPMSERVE Direction Inbound Priority 1 TTLSGroupActionRef DDSServerGRP TTLSEnvironmentActionRef DDSServerENV } TTLSGroupAction DDSServerGRP { TTLSEnabled On Trace 1 } TTLSEnvironmentAction DDSServerENV { HandshakeRole Server TTLSKeyringParms { Keyring DDSServerKeyring } TTLSEnvironmentAdvancedParms { ServerCertificateLabel RMFDDS } }

The example rule is described, as follows:

TTLSRule: Jobname
The name value specifies the job name of the application. GPMSERVE is the job name of the DDS
TTLSRule: LocalPortRange
The local port the application is bound to for this rule's action to be performed. 8803 is the default HTTP Port of the DDS.
TTLSRule: Direction
Specifies the direction from which the connection must be initiated for this rule's action to be performed. In this example, Inbound is specified, which means that the rule applies to connection requests that arrive inbound to the local host.
TTLSRule: Priority
An integer value in the range 1 -2000000000 represents the priority that is associated with the rule. The highest priority value is 2000000000. If you use multiple rules for the DDS server, the more specific a rule is, the higher its priority should be. Generic rules without detail specifications of the incoming connections should have a low priority.
TTLSEnvironmentAction: HandshakeRole
Specifies the SSL handshake role to be taken for connections in this AT-TLS environment. In this example, Server is specified which means that the SSL hand shake is performed as a server.
TTLSKeyringParms: Keyring
Specifies the path and file name of the key database z/OS® UNIX file, the ring name of the SAF key ring, or the name of the z/OS PKCS #11 token. In this example, the RACF key ring DDSServerKeyring is specified.
TTLSEnvironmentAdvancedParms: ServerCertificateLabel
Specifies the label of the certificate for a server application to authenticate the server. In this example, the DDS Server certificate with the label RMFDDS is used.

Reference information

For more information, see the topic "DDS options" in Resource Measurement Facility User's Guide.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMRMF,RMF_DDS_ATTLS.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".

This check applies to z/OS V2R4 and later.


Step 4.23 : SDSF upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for optional feature SDSF.


Step 4.23.1 : SDSF actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes SDSF upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.23.1.1 : SDSF: Use only SAF-based security to protect SDSF functions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

Starting in z/OS V2R5, only SAF-based security is used to protect SDSF product functions. SDSF no longer supports the use of legacy internal security, which is provided by definitions in the ISFPARMS assembler source or ISFPRMxx PARMLIB statements.

The system authorization facility (SAF) is an interface defined by z/OS that enables programs to use system authorization services to control access to resources, such as data sets and MVS commands. SAF either processes security authorization requests directly or works with RACF, or other security managers, to process them.

As of z/OS V2R5, SDSF uses only SAF security profiles in classes, such as SDSF, OPERCMDS and JESSPOOL, to control the display and command authority in the product.

Non-SAF security decisions provided by the “Display Auth” and “Command Auth” exit points in ISFUSER are no longer supported.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

SDSF.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if SDSF on your system uses security definitions in the ISFPARMS assembler source or ISFPRMxx PARMLIB statements.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

You can determine whether SDSF uses SAF-based security by running health check IBMSDSF,SDSF_CLASS_SDSF_ACTIVE. If the SDSF SAF class is not active, the health check issues message ISFH1016E.

SDSF health checks are distributed in ISF.SISFLOAD for installations running SDSF in the LNKLST. The checks are also distributed in ISF.SISFLINK for installations that do not run SDSF in the LNKLST. For those installations, ISF.SISFLINK must be added to the LNKLST.

Note: To avoid a possible ABEND 290 with reason code 02014007 issued by HZSADDCK:

  • Specify the proper check routine name. The check routine module must be in an APF-authorized library. The system must be able to locate the check routine within the joblib, the steplib of the IBM Health Checker for z/OS address space, the LPA, or the LNKLST.
  • Specify the proper message table name. The message table module must be in an APF-authorized library. The system must be able to locate the message table within the joblib, the steplib of the IBM Health Checker for z/OS address space, the LPA, or the LNKLST.

Steps to take

If you are already using SAF for SDSF product security, no action is necessary.

If you are using SDSF internal security or the ISFUSER exit to enforce local security decisions, you must upgrade to SAF security for SDSF before using z/OS V2R5. Converting to SAF security for SDSF can be performed on any currently supported release of z/OS.

Reference information

For information about how to convert to the SAF interface, see z/OS SDSF Security Migration Guide.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMSDSF,SDSF_CLASS_SDSF_ACTIVE.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.23.1.2 : SDSF: Update path environment variables to refer to the 64-bit JVM


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R5, SDSF removes support for running an SDSF/Java application using the 31-bit Java virtual machine (JVM). SDSF/Java applications can run unchanged using the 64-bit JVM.

SDSF supplies Java classes (referred to as SDSF/Java) that allow access to SDSF panels and functions through applications written in Java. Such applications are typically invoked under the z/OS UNIX System Services shell by running Java and specifying a main class that references the SDSF/Java classes.

In previous releases, an SDSF/Java application could run using either the 31-bit or 64-bit version of the Java JVM. Effective with SDSF V2R5, the JVM must be running in 64-bit mode.

The SDSF sample job ISF.SISFJCL(ISFISMKD) is used to create the directories in the file system used by SDSF. The sample job invokes the ISF.SISFEXEC(ISFMKDIR) exec to perform the create. In z/OS V2R5, the exec is changed to no longer create the /usr/lpp/sdsf/java/lib directory.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

SDSF.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if your installation uses SDSF programs that rely on 31-bit Java.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Follow these steps:

  1. Check the PATH environment variable for a reference to the Java 31-bit JVM, such as the following:

    export PATH=/usr/lpp/java/J8.0/bin:$PATH

    If so, change the PATH environment variable to refer to the 64-bit JVM:

    export PATH=/usr/lpp/java/J8.0_64/bin:$PATH

  2. Check the LIBPATH environment variable for a reference to the 31-bit SDSF DLLs, such as the following:

    export LIBPATH=/usr/lib/java_runtime:$LIBPATH

    or

    export LIBPATH=/usr/lpp/sdsf/java/lib:$LIBPATH

    If so, change your LIBPATH environment variable to refer to the SDSF 64-bit DLL:

    export LIBPATH=/usr/lib/java_runtime64:$LIBPATH

    or

    export LIBPATH=/usr/lpp/sdsf/java/lib_64:$LIBPATH

Note that no changes to your application code are necessary. The only difference is the use of the 64-bit JVM to run the application.

Reference information

For more information, see z/OS SDSF Operation and Customization.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.23.2 : SDSF actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes SDSF upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.23.2.1 : SDSF: Review and reassemble user exit routines


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

If you have written user exit routines, review them to ensure they are still appropriate for the current environment, and make changes as necessary. All user exit routines must be reassembled with the z/OS V2R4 level of the SDSF macro library.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

SDSF.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if user exit routines are in use.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Review user exit routines to ensure they are appropriate for z/OS V2R4. Make changes as necessary. Regardless of whether you have made changes, reassemble the user exit routines with the z/OS V2R4 level of the SDSF macro library.

Tip: A PROPLIST statement, along with PROPERTY statements, both in the ISFPRMxx parmlib member, defines customized values for certain SDSF properties. It provides an alternative to writing user exit routines to customize those properties. A user exit routine that customizes the same property as a PROPERTY statement overrides the value on the PROPERTY statement.

Reference information

For more information, see z/OS SDSF Operation and Customization.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.23.2.2 : SDSF: Use dynamic statements for ISFPARMS to avoid reassembly


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

For many z/OS releases, a recommended update action has been to specify z/OS SDSF customization with the ISFPRMxx parmlib member. There are several major advantages to using the ISFPRMxx parmlib member format over the original format, which involves an assembler module and SDSF macros.

Beginning with the release after z/OS V2R5, IBM plans that only the ISFPRMxx parmlib member format will be supported. For this reason, if the parmlib member ISFPRMxx is not currently being used, IBM recommends that you convert to using ISFPRMxx to avoid being impacted in the future.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

SDSF.

When change was introduced:

z/OS V2R5. Announced as a "Statement of Direction" in IBM Software Announcement 222-214, dated June 21, 2022.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended because z/OS V2R5 is the last release to support the method of using the ISFPARMS assembler macro to specify SDSF options.

If you still use ISFPARMS, it is strongly recommended that you convert to ISFPRMxx and use an external security manager, such as RACF, for your security definitions. You can use the ISFACP utility to convert your ISFPARMS to ISFPRMxx statements.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

While moving to ISFPARMS on one system, you can still specify SDSF options with your customized ISFPARMS using assembler macros on another coexisting system, until such time as all systems are using the dynamic statements.

Take care to assemble the correct macros with the corresponding z/OS level on which SDSF will run. Toleration APARs are provided to allow sharing of a higher level ISFPRMxx on down level systems such that you can share the same ISFPRMxx member on all systems in your sysplex.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To verify that SDSF dynamic statements in ISFPRMxx are being used rather than the assembler macros, use check IBMSDSF,SDSF_ISFPARMS_IN_USE. If the check determines that the assembler macro ISFPARMS is in use instead, and that it has been modified, the check generates an exception. If the assembler macro ISFPARMS is in use but it has not been modified, so that all defaults are in effect, the check does not generate an exception.

SDSF registers this check with the IBM Health Checker for z/OS infrastructure when the SDSF server address space is initialized. However, one of the items this check verifies is that the SDSF server itself is in use, so you have to manually add this check (particularly if you do not use the SDSF server) so that the IBM Health Checker for z/OS infrastructure invokes the check. To add the check, put the following statement in your PROGxx parmlib member: EXIT ADD EXITNAME(HZSADDCHECK) MODNAME(ISFHCADC).

SDSF health checks are distributed in ISF.SISFLOAD for installations running SDSF in the LNKLST. The checks are also distributed in ISF.SISFLINK for installations that do not run SDSF in the LNKLST. For those installations, ISF.SISFLINK must be added to the LNKLST.

Note:

To avoid a possible ABEND 290 with reason code 02014007 issued by HZSADDCK:

  • Specify the proper check routine name. The check routine module must be in an APF-authorized library. The system must be able to locate the check routine within the joblib, the steplib of the IBM Health Checker for z/OS address space, the LPA, or the LNKLST.
  • Specify the proper message table name. The message table module must be in an APF-authorized library. The system must be able to locate the message table within the joblib, the steplib of the IBM Health Checker for z/OS address space, the LPA, or the LNKLST.

Steps to take

If you are already using ISFPRMxx parmlib member to specify dynamic statements for ISFPARMS, there is no upgrade action to perform.

If you are using assembler macros for ISFPARMS, do one of the following:

  • Convert your existing ISFPARMS to dynamic statements by using a conversion utility that you invoke with the ISFACP command.
  • Reassemble your customized ISFPARMS for use with z/OS V2R5. Reassembly must be done whenever you change your z/OS release. Before reassembling ISFPARMS, you might want to update it for new function. The assembler ISFPARMS cannot be shared with any other release of SDSF. Only use ISFPARMS for the release on which it is assembled.

    Note: If you have an SMP/E usermod that specifies modifications to assembler macro ISFPARMS, change the usermod to indicate that module ISFPARMS is now owned by the z/OS base V2R5 SDSF FMID (HQX77D0). The correct SMP/E syntax is ++VER(Z038) FMID(HQX77D0).

    Also, in the SMP/E usermod, change the distlib to reference DISTLIB(AISFSRC). The correct SMP/E syntax is ++VER(Z038) FMID(HQX77D0). Your ++SRC or ++SRCUPD statement must specify DISTLIB(AISFSRC).

Reference information

For more information about invoking the conversion utility with the ISFACP command, and the ISFPARMS and the ISFPRMxx parmlib members, see z/OS SDSF Operation and Customization.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMSDSF,SDSF_ISFPARMS_IN_USE.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.24 : SDSF actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes SDSF upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.24.1 : SDSF: Plan to stop using a non-scrollable main panel


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

SDSF V2R5 is the last release that will support the old style (non-scrollable) panel and the compatibility mode using either the custom property or the special ddname.

Element or feature:

SDSF.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended, because SDSF V2R5 is the last release to support the old-style (non-scrollable) main panel. You can prepare for this future change by removing any dependencies on the main panel now.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Verify that the old-style main panel is not being used:

  • Review your ISFPRMxx definition and ensure that Panel.Main.DisableTable is not present or is set to FALSE.
  • Check for the special ddname ISFMIGMN allocated to the session.

SDSF creates a generic tracker event when fallback to the old-style main panel is done by using the ISFMIGMN special ddname. Use the SDSF GT (generic tracker panel) to find events with the description “SDSF MENU TABLE DISABLED: ISFMIGMN ALLOCATED.” Use the event jobname to find the job that is using the old-style panel fallback.

Reference information

For more information, see z/OS SDSF Operation and Customization.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25 : Security Server upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for optional feature z/OS Security Server.


Step 4.25.1 : Security Server actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Security Server upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.25.1.1 : Security Server: Stop sharing RACF databases between z/OS and z/VM


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/VM 7.3, sharing of the RACF database between z/OS and z/VM is no longer supported.

z/VM 7.2 was the last release of z/VM to support sharing the RACF database between z/VM and z/OS systems. Sharing the RACF databases between these operating systems is no longer recommended, due to the distinct security and administration requirements of the different platforms.

With the installation of the PTF for APAR OA62875, all supported releases of z/OS are updated to detect whether a database was flagged by z/VM starting at release 7.3 and reject its use, if so marked.

Sharing of databases between z/OS systems is not affected by this change. Sharing of databases between all releases of z/OS and releases of z/VM before 7.3 is not affected by this change.

PTFs for APAR OA62875 are available for z/OS V2R3 and later.

With the installation of the PTF for APAR OA62875, a RACF for z/VM 7.3 database is rejected in the following situations:

  • IPL
  • RVARY ACTIVATE
  • IRRMIN00 PARM=UPDATE

    Note: With the following exception: IRRMIN00 PARM=UPDATE updates a z/VM 7.3 RACF database with template level RPI7300.10000000.00000000 to the current z/OS template level. This capability exists to help simplify migration to z/VM 7.3 and recovery from errors.

Other RACF utilities continue to run against RACF for z/VM 7.3 databases.

The RACF for z/OS V2R5 publications are updated to remove references to database sharing with RACF/VM.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server

When change was introduced:

z/VM 7.3 and z/OS after applying the PTF for APAR OA62875. Also, see IBM United States Software Announcement 222-293, "IBM z/OS V2.5 3Q 2022 enhancements," dated September 20, 2022.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if the RACF database is shared between z/OS and z/VM and z/VM is upgraded to Release 7.3.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

RACF for z/VM as of release 7.3.

Restrictions:

None.

System impacts:

If RACF for z/OS detects a RACF database that was configured by RACF for z/VM as of release 7.3, RACF for z/OS will reject the database. If this situation occurs during IPL, the user is prompted for an alternate database to use.

Related IBM Health Checker for z/OS check:

None.

Steps to take

As of z/VM 7.3, plan to stop sharing the RACF database between z/OS and z/VM. Carefully follow the RACF for z/VM 7.3 documentation to copy shared RACF databases, then reconfigure either z/VM or z/OS to use the copy, so that the RACF database is no longer shared.

Notes:

  1. If the PTF for RACF for z/OS APAR OA62875 is not yet installed, RACF for z/OS accepts and uses the RACF for z/VM 7.3 database. In the short term, RACF for z/OS and RACF for z/VM remain compatible and no corruption occurs. However, RACF database incompatibility will occur over time as RACF for z/OS and RACF for z/VM 7.3 deliver service and features that update the RACF database templates.

  2. RACF for z/OS service that can potentially impact the compatibility between RACF for z/OS and RACF for z/VM will require the installation of the PTF for APAR OA62875. Then, if the database is identified as a RACF for z/VM 7.3 database, RACF for z/OS rejects the database.

Reference information

See the RACF for z/VM 7.3 publications.

For RACF for z/OS considerations, see the topic As of z/VM 7.3, sharing of the RACF database between z/OS and z/VM is not allowed in z/OS Security Server RACF Security Administrator's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25.1.2 : Security Server: Determine whether IRRUT200 users require READ access to IDCAMS


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

With z/OS V2R5, RACF introduced support to allow a VSAM linear data set (LDS) to be used as a RACF data set in specific configurations. As a part of this support, the RACF database verification utility program IRRUT200 was changed to use IDCAMS REPRO instead of IEBGENER or ICEGENER, if either the source or target data set is a VSAM LDS.

With APAR OA61995, IRRUT200 uses IDCAMS REPRO for copying any RACF data set, including a non-VSAM to non-VSAM copy operation. This results in a change to the output sent to the IRRUT200 SYSUT2 DD name. Prior to OA61995, non-VSAM to non-VSAM RACF data set copy resulted in these messages:

DATA SET UTILITY - GENERATE PROCESSING ENDED AT EOD IRR62065I - IEBGENER copied SYSRACF to the work dataset SYSUT1, IEBGENER RC=0000

With OA61995, this RACF data set copy operation results in this message:

IRR62005I - IDCAMS REPRO copied SYSRACF to the work data set SYSUT1

In the unlikely event that your installation has program-protected the IDCAMS program, users of the IRRUT200 utility need to be granted READ authority to the profile that covers the IBM-supplied IDCAMS program.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server

When change was introduced:

z/OS V2R5, or an earlier release with the PTF for APAR OA61995 applied.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3, without the PTF for APAR OA61995 applied.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if your installation uses a program profile for IDCAMS.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If SETROPTS WHEN(PROGRAM) is not in effect, no action is required.

If SETROPTS WHEN(PROGRAM) is in effect and there is no profile in the PROGRAM class which matches the program name "IDCAMS" and the volume on which it resides, no action is necessary.

If SETROPTS WHEN(PROGRAM) is in effect and a profile in the PROGRAM class matches the program name "IDCAMS" and the volume on which it resides, an upgrade action is required. Ensure that user IDs that use IRRUT200 to copy a RACF data set have READ authority to the PROGRAM class profile. Be sure to enter a SETROPTS WHEN(PROGRAM) REFRESH command after updating the PROGRAM class profile.

Examine your use of IRRUT200 to see if you have any dependencies on the messages produced by IEBGENER. If you have any dependencies on the IEBGENER or its replacement messages, review the new IDCAMS utility messages.

Reference information

For information about the IRRUT200 utility and its use of IDCAMS, see the topic RACF database verification utility program (IRRUT200) in z/OS Security Server RACF System Programmer's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25.1.3 : Security Server: Accommodate the removal of RACF TSO/E HELP text


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems Programmer and z/OS Security AdministratorNo

Description:

Description

As of z/OS V2R5, the RACF TSO/E HELP command is no longer supported. Entering the command "help racf keyword" in TSO/E results in the message "IKJ56802I HELP NOT AVAILABLE."

For information about RACF command syntax, see the IBM publication z/OS Security Server RACF Command Language Reference.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 220-378, dated September 22, 2020.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use the TSO/E HELP command for information about RACF command syntax.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Entering the command "help racf keyword" in TSO/E results in the message "IKJ56802I HELP NOT AVAILABLE."

Related IBM Health Checker for z/OS check:

None.

Steps to take

Stop using the TSO/E HELP command for information about RACF command syntax.

Reference information

For information about RACF command syntax, see z/OS Security Server RACF Command Language Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25.1.4 : Security Server: Define a PTKTDATA profile to allow PassTicket-based password changes


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

Previously, an authorized program could use RACROUTE REQUEST=VERIFY or REQUEST=VERIFYX, and specify a PassTicket as the PASSWRD= keyword value, to change the user's password or phrase. With the installation of APAR OA60579, this function is disallowed by default.

To enable this function, the security administrator must allow it by defining the appropriate PTKTDATA class profile, as described in "Steps to take."

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server

When change was introduced:

z/OS V2R3 and z/OS V2R4 with APAR OA60579 installed.

Applies to upgrade from:

z/OS 2.3 and z/OS V2.4 without APAR OA60579 installed.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you have any applications that currently exploit this capability.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Any application that currently exploits this capability fails unless this upgrade action is performed.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine whether you have any applications that change a password or passphrase when authenticating with a PassTicket. This function could be used, for example, by a password reset application when the current password is unknown.

To discover which applications are using this function, you can create a generic profile that denies access and set it to warning mode:

RDEFINE PTKTDATA IRRPTAUTH.PWCHANGE.APPL.*
UACC(NONE) WARNING

SETROPTS RACLIST(PTKTDATA) REFRESH

Alternatively, you can create a generic profile that grants UPDATE access and logs successes over time. Be sure that you are auditing the USER class so that password changes can be identified in the SMF record:

RDEFINE PTKTDATA IRRPTAUTH.PWCHANGE.APPL.*
UACC(UPDATE) AUDIT(ALL(READ))

SETROPTS RACLIST(PTKTDATA) REFRESH

SETROPTS AUDIT(USER)

You can also review your existing SMF data to see if this function has been used in the past. All PassTicket evaluations are logged with an SMF 80 Event Code 1 record. Relocate Section 443 indicates when a PassTicket was successfully evaluated. When SETROPTS AUDIT(USER) is in effect, password and passphrase changes are identified by SETROPTS AUDIT(USER) appearing as a reason for logging.

To enable an application to change a password or passphrase when authenticating with a PassTicket, you must define a PTKTDATA profile for this function:

IRRPTAUTH.PWCHANGE.APPL.appl-name

This class profile name is checked for UPDATE access on behalf of the user whose password or passphrase is being changed. The value of appl-name is used in evaluating the PassTicket. If no covering profile exists, the request fails.

Consider temporarily defining IRRPTAUTH.PWCHANGE.APPL.* with UACC(UPDATE) and logging successes, or with UACC(NONE) in WARNING mode, until you know which applications to allow.

Reference information

For more information, see the topic Allowing password changes when authenticating with a PassTicket in Security Server RACF Security Administrator's Guide.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25.2 : Security Server actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Security Server upgrade actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.25.2.1 : Security Server: Ensure the ECC master key is activated in the CCA coprocessor


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

In RACF, the RACDCERT command is used to manage RACF digital certificates. When you specify RACFDCERT with the RSA(PKDS) keyword for an RSA private key, RACF stores the RSA private key in the ICSF PKA key data set (PKDS).

Starting in z/OS V2R4, the RSA private key is stored in PKDS under a more secure master key that is called the ECC master key (32 bytes). In previous releases, the RSA private key was stored in PKDS under a 24-byte master key called the RSA master key. With this change, you must ensure that the ECC master key is activated in the CCA coprocessor. Otherwise, the RACDCERT command that attempting to store an RSA key in PKDS fails with an error.

This change is intended to help maintain strong security in your enterprise. It also supports the generation of a new signature algorithm on certificates that are used for TLS1.3, which was introduced in z/OS V2R4.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server.

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if your installation uses the RACF RACDCERT command with the RSA(PKDS) keyword and you did not activate the ECC master key in the CCA coprocessor.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

The RACDCERT command fails with reason code x'00002B08' and the following message:

IRRRD117I Unexpected ICSF CSNDPKG return code x'00000008 ' and reason code x'00002B08'. The request is not processed.

Related IBM Health Checker for z/OS check:

To detect an active ECC master key and the availability of a coprocessor CCA-5.3 or above, use health check IBMICSF,ICSF_PKCS_PSS_SUPPORT.

Based on this status, the health check indicates whether PKCS-PSS algorithms can be used under current conditions.

This health check is available with APAR OA56837.

Steps to take

Look for uses of the RACDCERT command specified with the RSA(PKDS) keyword. For example:

RACDCERT GENCERT...RSA(PKDS(...)) RACDCERT REKEY...RSA(PKDS(...)) RACDCERT ADD ...PKDS(...)

If so, verify that the ECC master key is activated before these commands are used on a z/OS V2R4 system. You can use either of the following approaches:

  • Open ICSF panel option 1 and check the CCA coprocessor ECC master keys status.
  • Run the ICSF ECC master key health check.

Reference information

None.

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMICSF,ICSF_PKCS_PSS_SUPPORT.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.25.2.2 : Security Server: Be aware of new restriction on the use of certificates with long RDNs


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

In z/OS V2R5, be aware of a new restriction on the use of certificates with long relative distinguished names that exceed 64 characters, if the distinguished name (DN) is used in a mapping filter.

Certificate name filters are used by RACF® (specifically, the initACEE callable service) to analyze the subject's and issuer's distinguished names in a given certificate to determine the user ID to associate with it. You can create filters based on the full issuer's distinguished names in order to administer all certificates by a given issuer as a single user ID. You can also create filters based on portions of the subject's distinguished name, and a variety of filters based on certain combinations of partial and full distinguished names.

With the installation of APAR OA59946, the RACDCERT MAP service no longer allows a filter string to contain a relative distinguished name (RDN) value that is greater than 64 characters (referred to as a "long RDN"). It is no longer possible to allow a model certificate to be used when the certificate contains a long RDN in either the subject or issuer DN.

If such a mapping was created prior to OA59946, it is no longer used by the initACEE callable service (IRRSIA00) in its Query and Create functions. If the certificate presented to initACEE contains a long RDN in either the subject or issuer DN, the certificate does not map to a RACF user ID.

With the installation of APAR OA60717, RACDCERT MAP allows a model certificate to be used when that certificate contains a long RDN, if the RDN is contained in a DN that is not used in the filter. For example, if the issuer DN contains a long RDN, but the subject DN does not, the certificate can be used to create a subject-only filter.

Similarly, with APAR OA60717, the initACEE service can be used to map an input certificate with a long RDN, if the DN that contains the long RDN is not used to match a mapping filter.

For example, if a certificate is presented that contains a long RDN in the issuer DN, but not in the subject DN, and there is a subject-only filter, that filter is honored. However, if a subject+issuer filter exists from prior to OA59946, the mapping fails. The security administrator must delete the subject+issuer filter before the mapping process can proceed. This work effort includes looking for additional filters, such as the subject-only filter in this example, and then checking for a hostIDMapping extension in the certificate.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server.

When change was introduced:

z/OS V2R4 and z/OS V2R3, both with the PTF for APAR OA59946 applied.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3, both without APAR OA59946.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if a certificate with a long RDN value is used to map to a RACF user ID using the initACEE service, and the DN containing the long RDN is used by the certificate name filter.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Failure to perform this action can result in initACEE failures with SAF return code 8, RACF return code 8, and RACF reason code 40. Typically, these errors are presented as TLS authentication failures.

Related IBM Health Checker for z/OS check:

None.

Steps to take

If you previously used a filter that no longer works, and you want to continue using that kind of filter:

  • If a client certificate has a long RDN in its subject name, a new client certificate must be issued by the signing certificate and be redistributed.

    As a work-around while this effort is underway, you can delete the existing subject+issuer filter, or subject-only filter, and create issuer-only filters as appropriate. When the new certificate is ready, you can create the original filter type again, and delete the temporary filters.

  • If a client certificate has a long RDN in its issuer name, both the issuer and client certificates must be replaced. Create a new signing certificate and used it to sign new client certificates for those that are currently used in initACEE. Redistribute the client certificates.

    As a work-around while this effort is underway, you can delete the existing subject+issuer filter, or issuer-only filter, and create subject-only filters as appropriate. When the new certificates are ready, you can create the original filter type again, and delete the temporary filters.

Reference information

For information about the certificate name filtering function, see the topic "RACF and digital certificates" in Security Server RACF Security Administrator's Guide.

For information about the initACEE callable service, see z/OS Security Server RACF Callable Services.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25.2.3 : Security Server: Remove RACF dynamic classes named IZP and ZOWE


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

If your installation uses IBM Zowe, its documentation directed you to add the ZOWE class to RACF. In z/OS V2R5, this class can be deleted after all of the systems that share the RACF database are upgraded to z/OS V2R5.

If your installation uses IBM Unified Resource Manager, its documentation directed you to add the IZP class to RACF. In z/OS V2R5, this class can be deleted after all of the systems that share the RACF database are upgraded to z/OS V2.5.

Otherwise, after you upgrade to z/OS V2R5, RACF identifies the conflict between the dynamic class and the IBM class by issuing message ICH14079I during IPL and with every subsequent SETROPTS RACLIST(xxx) REFRESH for the class. After the classes are deleted from the RACF CDT class and the RACF CDT class is refreshed, the message is no longer issued.

There is no need to alter any profiles in the IZP or ZOWE class.

For a list of the new classes that are shipped with RACF, see the topic Supplied resource classes for z/OS systems in the IBM publication Security Server RACF Security Administrator's Guide.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended to avoid messages that indicate a conflict between the IBM classes and the dynamic classes.

Target system hardware requirements:

None.

Target system software requirements:

Zowe or IBM Unified Resource Manager.

Other system (coexistence or fallback) requirements:

All systems that share the RACF database must be on z/OS V2R5 before the dynamic class can be deleted.

Restrictions:

None.

System impacts:

After you upgrade to z/OS V2R5, RACF identifies conflicts between dynamic classes and the IBM classes by issuing message ICH14079I during IPL and with every subsequent SETROPTS RACLIST(xxx) REFRESH for the class. Despite message ICH14079I, RACF functions normally and uses the IBM-defined class.

Warning: If the RACF database is shared with any z/OS release earlier than V2R5, the deletion of the class will make the profiles in that class unusable on the downlevel system.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check for message ICH14079I or the existence of the IZP and ZOWE classes in the RACF class descriptor table (CDT). For example:

  • RLIST CDT IZP CDTINFO
  • RLIST CDT ZOWE CDTINFO

Important: Ensure that the dynamic class was defined compatibly with the IBM class, as documented by Zowe or IBM Unified Resource Manager. Specifically, verify that the POSIT value matches what is documented for the class in z/OS Security Server RACF Macros and Interfaces (607 for ZOWE, 608 for IZP). If not, change the POSIT value on your current release before upgrading to V2R5. The Security Administrator's Guide contains instructions on changing a POSIT number in the topic titled "Changing a POSIT value for a dynamic class."

When all the systems that share the RACF database are upgraded to z/OS V2R5, delete the classes as follows:

  • RDELETE CDT IZP
  • RDELETE CDT ZOWE
  • SETROPTS RACLIST(CDT) REFRESH

In the interim, the ICH14079I messages can be ignored.

Reference information

For a list of the new classes that are shipped with RACF, see the topic "Summary of Changes" in Security Server RACF Security Administrator's Guide. For the complete list of RACF-supplied classes, see the topic Supplied resource classes for z/OS systems in the same publication.

For a description of message ICH14079I, see the IBM publication z/OS Security Server RACF Messages and Codes.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25.2.4 : Security Server: Check for duplicate class names


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems Programmer and z/OS Security AdministratorNo

Description:

Description

When new classes are shipped with RACF, you should verify that any installation-defined class names in the class descriptor table (CDT) do not conflict with the new classes.

For a related upgrade action, see the step called "Security Server: Remove RACF dynamic classes named IZP and ZOWE" in this workflow.

For a list of the new classes that are shipped with RACF, see the topic "Summary of Changes" in Security Server RACF Security Administrator's Guide.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you have user-defined classes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

All systems that share the RACF database must be on z/OS V2R5 before the dynamic class can be deleted.

.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Verify that any installation-defined class names in the class descriptor table (CDT) do not conflict with the new classes.

  • If you have duplicate class names, RACF issues the following message and enters failsoft mode:
    ICH564A RACF DETECTED AN ERROR IN THE INSTALLATION CLASS DESCRIPTOR TABLE, ENTRY class_name, ERROR CODE 7
  • If a conflict in class names occurs, you can resolve it as follows:
    1. Delete the profiles in the installation-defined class with the conflicting name.
    2. Delete the CDT entry for the class.
    3. Add a CDT entry with a different name.
    4. Redefine the profiles.

Note: If the new z/OS system shares its RACF database with downlevel systems, you might not be able to delete the classes until you upgrade the downlevel systems to z/OS V2R5. Otherwise, deleting classes will make the profiles in that class unusable on the downlevel systems.

Reference information

For a list of the new classes that are shipped with RACF, see the "Summary of Changes" in Security Server RACF Security Administrator's Guide. For the complete list of RACF-supplied classes, see the topic Supplied resource classes for z/OS systems in the same publication.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25.2.5 : Security Server: Check for programs affected by the maximum length of JESJOBS class profiles


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Security AdministratorNo

Description:

Description

In z/OS V2R4, and previous releases with RACF APAR OA57721 applied, the maximum length of profiles in the RACF JESJOBS class is increased from 39 to 246. This change is intended to accommodate new resource names for the JES2 encryption of spool data sets.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server.

When change was introduced:

z/OS V2R3 with APAR OA57721 applied.

Applies to upgrade from:

z/OS V2R3 without APAR OA57721 applied.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you have programs that are affected by the increase of the maximum length of JESJOBS class profiles in RACF.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Check your programs to determine whether they are affected by the increase of the maximum length of JESJOBS class profiles in RACF. Look for programs that retrieve RACF profiles in the JESJOBS class by using the RACROUTE REQUEST=EXTRACT macro with the following keyword values specified:

  • TYPE=EXTRACTN or MATCHGN=YES
  • ENTITY=, or ENTITYX= with a buffer size of less than 246 bytes

If any such programs exist, change the programs to use the ENTITYX= keyword with a buffer length of at least 246 bytes. If possible, use the maximum size buffer of 255.

Reference information

For information about the RACROUTE REQUEST=EXTRACT ENTITY, ENTITYX, TYPE=EXTRACTN, and MATCHGN=YES keywords, see z/OS Security Server RACROUTE Macro Reference.

For information about the MAXLENX keyword of the ICHERCDE macro, see z/OS Security Server RACF Macros and Interfaces.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.25.3 : Security Server actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes Security Server upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.25.3.1 : Security Server: Update database templates


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems Programmer and z/OS Security AdministratorNo

Description:

Description

To ensure that the RACF utilities function properly, use the IRRMIN00 utility to update the test and production RACF databases with the database templates for the current release level.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

Security Server.

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

To install the database template updates, run the IRRMIN00 utility with PARM=UPDATE.

Tip: The RACF database templates are updated for z/OS V2R5. The templates initially contain a version string with the value HRF77D0 00000223.00000050.

Note: If IRRMIN00 produces a return code of 4 and message IRR8025 PARM=UPDATE specified, but template update not required, you do not necessarily have a problem. Check that your JCL refers to the new level of IRRMIN00. If so, you can ignore the return code and warning message. Possibly, a previous PTF already updated your templates to the current level for the new release. Otherwise, if your JCL refers to an old copy of IRRMIN00, correct the JCL and run IRRMIN00 again.

Reference information

For more information, see the following references:

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.26 : SMP/E upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element System Modification Program/Extended (SMP/E).


Step 4.26.1 : SMP/E actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes SMP/E migration actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.26.1.1 : SMP/E: Accommodate the removal of Planning and Migration Assistant


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R4, the Planning and Migration Assistant (PMA) function is removed from SMP/E. This change affects programs that use the ISPF tables that are generated by PMA, and users who use PMA when they order IBM products.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

SMP/E

When change was introduced:

z/OS V2R4. Announced as a Statement of Direction in IBM United States Software Announcement 218-236, dated May 15, 2018.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you use the PMA functions.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine whether you have users or programs who use the PMA functions. If not, you have no action to take.

Otherwise, for programs that use the PMA-generated ISPF tables, update the programs to use another method for retrieving information about installed products. Programs can use a combination of the SMP/E programming interface (GIMAPI) and z/OSMF Software Management REST APIs to retrieve this information.

Note:

Data from the CustomPac order inventory is no longer available.

Instead of PMA, users can use the following:

  • Functions available on Shopz to create the orders for replacement sets of products
  • SMP/E LIST commands to retrieve information about installed products and features
  • z/OSMF Software Management to display information about defined software instances.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.27 : TSO/E upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element Time Sharing Option/Extensions (TSO/E).


Step 4.27.1 : TSO/E actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes TSO/E upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run once they are made.


Step 4.27.1.1 : TSO/E: Check for programs that expect RC 0 for invalid command invocations


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Usually, when a command is not found or fails, TSO/E command processing responds with return code 12 (RC12). However, for one type of command error, in which the command name exceeds 8 characters or contains an invalid character, TSO/E command processing responds with return code zero (RC 0).

In z/OS V2R4, this behavior is corrected. TSO/E command processing is updated to return RC 12 for situations in which the command name exceeds 8 characters or contains an invalid character.

This change in behavior applies to the following types of processing:

  • CLIST processing in which the return code is checked in the &LASTCC variable
  • Batch TMP jobs that use conditional processing that is based on return code.

For example, in previous releases, the command ABCDEFGH# receives return code 0 and the message:

IKJ56621I INVALID COMMAND NAME SYNTAX

As of z/OS V2R4, the command ABCDEFGH# receives return code 12 and the same message.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

TSO/E

When change was introduced:

z/OS V2R4.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you have programs that create command names based on user input or file input.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

In some rare situations, a CLIST or multi-step background TMP job might expect return code 0 from a syntactically incorrect command name. Check for any programs that might issue a syntactically incorrect command name as a result of creating the command name based on user input or file input. If so, update the programs so that they correctly handle return code 12 for such errors.

Reference information

None.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.27.1.2 : TSO/E: Stop using the Server-Requester Programming Interface (SRPI)


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R4, the Server-Requester Programming Interface (SRPI) is no longer supported. This API was introduced in TSO/E in the 1980s to provide a programming interface that enhances the environment of IBM workstations communicating with IBM mainframes running z/OS.

Support related to SRPI will be discontinued in TSO/E by removing the MVSSERV command and associated interfaces and functions. Documentation for SRPI-related functions, such as the MVSSERV command, are planned to be removed.

If your applications use SRPI, IBM recommends that you migrate to TCP/IP for z/OS for similar function.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

TSO/E

When change was introduced:

z/OS V2R4. Also, see IBM United States Software Announcement 217-085, "IBM z/OS Version 2 Release 3 - Engine for digital transformation," dated February 21, 2017.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, if you are using the SRPI function.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Identify any applications that are using the SRPI functions, and modify them to use TCP/IP for z/OS.

Look for references to the MVSSERV command or the following macros in your programs:

  • CHSCED
  • CHSDCPRB
  • CHSTRACE
  • DEFSERV
  • INITTERM
  • SENDREC

You can use the generic tracker facility to track the usage the MVSSERV command. Specifically, the generic tracker can check for EVENTDESC: 'MVSSERV CALL'.

The following is an example of the generic tracker output:

INSTANCE: 1 COUNT: 1 EVENTDESC:'MVSSERV CALL' OWNER: IBMTSO SOURCE: MVSSERV EVENTDATA: x0000000000000000 x0000000000000000 PROGRAM: CHSTCPS PROGRAMOFFSET: x0000000000000000 HOMEJOB: IBMUSER HOMEASID: x0022 EVENTJOB: IBMUSER EVENTASID: x0022 AUTHORIZED:NO FIRST TIME: 2016-06-09 06:13:02

Reference information

For information about the generic tracker facility, see z/OS MVS Diagnosis: Tools and Service Aids.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.28 : XL C/C++ upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for optional feature XL C/C++.


Step 4.28.1 : XL C/C++ actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes XL C/C++ upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.28.1.1 : XL C/C++: Review the z/OS XL C/C++ Compiler and Runtime Migration Guide


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems Programmer and Application DeveloperNo

Description:

Description

For the z/OS XL C/C++ upgrade actions to take, see the topic New migration issues for z/OS XL C/C++ in z/OS XL C/C++ Compiler and Runtime Migration Guide for the Application Programmer. Though this book is written for application programmers, in some z/OS installations, job scope can overlap to the extent that system programmers might find the information they require in this book, such as upgrade information related to the c89 utility.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS XL C/C++

When change was introduced:

General upgrade action not tied to a specific release.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

No, but recommended if you use z/OS XL C/C++.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

For the upgrade information that is relevant to your installation, see the topic New migration issues for z/OS XL C/C++ in z/OS XL C/C++ Compiler and Runtime Migration Guide for the Application Programmer.

Reference information

For more information, see the topic New migration issues for z/OS XL C/C++ in z/OS XL C/C++ Compiler and Runtime Migration Guide for the Application Programmer.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.29 : XL C/C++ actions to perform after the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes XL C/C++ upgrade actions that you can perform only after you have IPLed z/OS V2R5. You need a running z/OS V2R5 system to perform these actions.


Step 4.29.1 : XL C/C++: Update programs to use the __NORETURN macro


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems Programmer and Application DeveloperNo

Description:

Description

The _Noreturn keyword was introduced in the C11 language standard. This keyword indicates to the compiler that the current function does not return to the caller.

z/OS XL C/C++ defines __noreturn__ as a macro in its features.h header file, which provides compatibility between programs that might or might not be compiled with C11 enabled, as follows:

  • If C11 is enabled, the __noreturn__ macro is defined as _Noreturn.

  • If C11 is not enabled, the __noreturn__ macro is defined as an empty macro.

However, in IBM Open XL C/C++ for z/OS, __noreturn__ is reserved as a keyword. To avoid a name conflict with the keyword, Open XL C/C++ for z/OS does not define a __noreturn__ macro in its features.h header file.

To resolve the __noreturn__ macro issue, APAR PH41221 and APAR PH46883 for z/OS V2R5 and z/OS V2R4 makes the _Noreturn keyword available in the form of a macro named __NORETURN. Note that no underscores ("__") exist at the end of the __NORETURN macro.

z/OS XL C/C++ users who want to migrate to IBM Open XL C/C++ for z/OS must do the following:

  • Update their programs to replace the __noreturn__ macro with the __NORETURN macro

  • Include the IBM Open XL C/C++ for z/OS features.h header file with their programs.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS XL C/C++.

When change was introduced:

z/OS V2R5 and z/OS V2R4, both with APAR PH41221 and APAR PH46883.

Applies to upgrade from:

z/OS V2R4 (without APAR PH41221 and APAR PH41221) and z/OS V2R3.

Timing:

After the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, for z/OS XL C/C++ users who:

  • Use __noreturn__ as prefix to functions
  • Plan to migrate to IBM Open XL C/C++ for z/OS

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Programs running under IBM Open XL C/C++ for z/OS will encounter the following compilation error:
"error: unknown type name '__noreturn__' ".

Related IBM Health Checker for z/OS check:

None.

Steps to take

Examine your z/OS XL C/C++ programs for uses of the __noreturn__ macro.

For any programs that use the __noreturn__ macro, update the programs to replace the __noreturn__ macro with the __NORETURN macro.

Ensure that these programs include the features.h header file, which defines the __NORETURN macro.

Reference information

For more information, see the topic Library functions in z/OS XL C/C++ Runtime Library Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.30 : z/OS OpenSSH upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for the base element z/OS OpenSSH.


Step 4.30.1 : z/OS OpenSSH actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes z/OS OpenSSH migration actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed, but do not require it to be active.


Step 4.30.1.1 : OpenSSH: Accommodate a new level of OpenSSH


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In z/OS V2R4, OpenSSH was upgraded to include open source version OpenSSH 7.6p1. This level is referred to as OpenSSH V2R4. The previous version of OpenSSH was Version 6.4p1.

In z/OS OpenSSH V2R4, significant new features include:

  • Elliptic-curve DSA keys are now supported in key rings and FIPS.
  • Support new key algorithms: ssh-ed25519 and ssh-ed25519-cert-v01@openssh.com
  • Support new key exchange algorithms: diffie-hellman-group14-sha256, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, curve25519-sha256, and curve25519-sha256@libssh.org.
  • Support new cipher algorithms: chacha20-poly1305@openssh.com
  • SMF Type 119 subtype 94 and 95 (ssh / sshd connection started) records include a section that identifies the IP addresses and ports for the connection.
  • Command ssh-proxyc is added, which can be used by the SSH client to connect through SOCKS5 proxy servers.

In z/OS OpenSSH V2R4, the following features are no longer available (they are deprecated by the Open Source community in OpenSSH 7.6p1):

  • SSH Version 1 protocol (also referred to as SSH1).
  • These options from ssh_config are removed: Cipher, CompressionLevel, RhostsAuthentication, RhostsRSAAuthentication, RSAAuthentication.
  • These options from sshd_config are removed: KeyRegenerationInteval, RhostsAuthentication, RhostsRSAAuthentication, RSAAuthentication, ServerKeyBits, UseLogin, and PAMAuthenticationViaKbdInt.
  • Support for Blowfish and RC4 ciphers and the RIPE-MD160 HMAC (Hash Message Authentication Code), specifically: blowfish-cbc, cast128-cbc, arcfour, arcfour128, arcfour256, hmac-ripemd160, hmac-ripemd160@openssh.com, and hmac-ripemd160-etm@openssh.com.

In z/OS OpenSSH V2R4, the following features are no longer enabled by default:

  • 1024-bit Diffie-Hellman key exchange, specifically diffie-hellman-group1-sha1
  • Support for DSA (ssh-dss, ssh-dss-cert-*) host and user keys
  • Support for MD5-based and truncated MD5 and SHA1 HMAC algorithms, specifically: hmac-md5, hmac-md5-96@openssh.com, hmac-sha1-96, hmac-sha1-96@openssh.com, hmac-md5-etm@openssh.com, hmac-md5-96-etm@openssh.com, hmac-sha1-96-etm@openssh.com

z/OS OpenSSH V2R4 also includes enhancements to existing keywords.

For a list of the z/OS OpenSSH V2R4 changes that might require upgrade actions, see "Steps to take" in this workflow step.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS OpenSSH.

When change was introduced:

z/OS V2R4. Also, see IBM United States Software Announcement "IBM z/OS Version 2 Release 3 enhancements and statements of direction," dated November 21, 2017.

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if any of the changes in "Steps to take" are applicable to your environment.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

IBM provides the following health checks:

  • Use health check ZOSMIGV2R4_SSH_CONFIG is to check the settings in the SSH config file. The default check path is /etc/ssh/ssh_config.
  • Use health check ZOSMIGV2R4_SSHD_CONFIG is to check the settings in SSH daemon config file. The default check path is /etc/ssh/sshd_config.
  • These checks are available for z/OS V2R3 with APAR OA57724 applied.

Steps to take

The following sections describe potential upgrade actions for the OpenSSH base element.

Changes to the ssh_config file

What Changed Customization action needed?

The BatchMode keyword

Previously, authentication without passphrase/password querying in batch mode did not includeSSH_ASKPASS. Now, match mode allows SSH_ASKPASS to be used for authentication.

No, SSH_ASKPASS is not listed as an available authentication option in the previous version.

The Ciphers keyword

Previously, chacha20-poly1305@openssh.com is not supported. Now chacha20-poly1305@openssh.com isadded to the default list. Also, preciously ‘+’ or ‘-’ character is not supported at the beginning of a specified value. Now ‘+’ or ‘-’ character is allowed to be used at the beginning of a specified cipher algorithm to append it to the default cipher list.

Yes, if you use the previous default list and do not want to allow the new cipher or the neworder of the preferred ciphers.

Action: Specify the previous default list without the deprecated ciphers blowfish-cbc, arcfour, arcfour128, arcfour256, and cast128-cbc.

The ControlPath keyword

Previously, ‘%%’ is not supported in the ControlPath argument. Now, if the argument contains‘%%’, it is interpreted as a literal percent sign (%).

No, ControlPath argument that contains ‘%%’ was not considered as a valid option in the previousversion.

The ControlPersist keyword

Previously, the argument ‘0’ is not supported. Now, if the argument is set to ‘0’, it is the same as setting the argument to ‘yes’ to allow the primary connection to remain in the backgroundindefinitely.

No, setting ControlPersist to 0 was not considered as a valid option in the previous version.

The HostKeyAlgorithms keyword

Previously, ssh-ed25519 and ssh-ed25519-cert-v01@openssh.com are not supported. Now, ssh-ed25519and ssh-ed25519-cert-v01@openssh.com are supported and these algorithms are added to the defaultlist. Also, preciously ‘+’ or ‘-’ character is not supported at the beginning of a specified value.Now ‘+’ or ‘-’ character is allowed to be used at the beginning of a specified cipher algorithm toappend it to the default list of host key algorithms.

The complete list of host key algorithms that are used by ssh can be found in ssh_config (seeHostKeyAlgorithms).

Yes, if you use the previous default list and do not want to allow the new host key algorithms orthe new order of the preferred host key algorithms.

Action: Specify the previous default list without the deprecated host key algorithms:ssh-dss-cert-v00@openssh.com and ssh-rsa-cert-v00@openssh.com.

The HostName keyword

Previously, ‘%%’ is not supported in the HostName argument. Now, if the argument contains ‘%%’,it is interpreted as a literal percent sign (%).

No, HostName argument that contains ‘%%’ was not considered as a valid option in the previousversion.

The IdentityFile keyword

Previously, the default list of SSH protocol version 2 did not contain Ed25519 authenticationidentity ~/.ssh/id_ed25519. Now ~/.ssh/id_ed25519 is added and the default list of identities is~/.ssh/id_dsa, ~/.ssh/id_ecdsa, ~/.ssh/id_ed25519, and ~/.ssh/id_rsa.

Previously ‘%%’ was not supported in the IdentityFile argument. Now, if the argument contains‘%%’, it is interpreted as a literal percent sign (%).

Yes, if you use the previous default list and do not want to allow the new identity file or thenew order of the preferred identity file.

Action: Specify the previous default list but note that SSH protocol version 1 identity is no longer supported.

The KexAlgorithms keyword

Previously, the default list does not contain curve25519-sha256, curve25519-sha256@libssh.org,diffie-hellman-group14-sha256, diffie-hellman-group16-sha512, and diffie-hellman-group18-sha512.Now, the default KEX list contains curve25519-sha256, curve25519-sha256@libssh.org,diffie-hellman-group14-sha256, diffie-hellman-group16-sha512, and diffie-hellman-group18-sha512.Also, preciously ‘+’ or ‘-’ character is not supported at the beginning of a specified value. Now‘+’ or ‘-’ character is allowed to be used at the beginning of a specified KEX algorithm to appendit to the default KEX list.

Yes, if you use the previous default list and do not want to allow the new key exchange algorithmfile or the new order of the preferred key exchange algorithm file.

Action: Specify the previous default list.

The LocalCommand keyword

Previously, ‘%%’ is not supported in the LocalCommand argument. Now, if the argument contains‘%%’, it is interpreted as a literal percent sign (%).

No, LocalCommand argument that contains ‘%%’ or set to ‘none’ was not considered as a validoption in the previous version.

The LocalForward keyword

Previously, the argument does not contain the UNIX socket format[bind_address:]port:host:hostport, local_socket:host:hostport, and local_socket:remote_socket. Nowthe argument allows you to specify UNIX socket format [bind_address:]port:host:hostport,local_socket:host:hostport, and local_socket:remote_socket for local forward connection.

No, UNIX socket is not allowed to use for local forward connection in the previous version.

The ProxyCommand keyword

Previously, ‘%%’ is not supported in the argument. Now, if the argument contains ‘%%’, it isinterpreted as a literal percent sign (%).

Also, the argument ‘none’ is not supported. Now, if the argument is set to ‘none’, the ability of ProxyCommand to use command to connect to the server is unavailable. Further, ssh-proxyc was not available in the previous version. Now, ProxyCommand can be used with ssh-proxyc.

No. ProxyCommand argument that contains ‘%%’ or set to ‘none’ was not considered as a validoption in the previous version. And ssh-proxyc was not available in the previous version.

The RemoteForward keyword

Previously, the argument does not allow the UNIX socket format [bind_address:]port:local_socket,remote_socket:host:hostport, remote_socket:local_socket nor does it allow SOCKS 4 or 5 proxy format[bind_address:]port. Now, the argument allows you to use UNIX socket format[bind_address:]port:local_socket, remote_socket:host:hostport, remote_socket:local_socket. And[bind_address:]port format is allowed to let ssh act as a SOCKS 4 or 5 proxy and forward connections.

No, the newly added arguments were not valid in the previous version.

The SendEnv keyword

Previously, the TERM environment variable is not sent if TERM is not specified in sshd_configAcceptEnv keyword whenever the client requests a pseudo-terminal. Now, the TERM environment variableis always sent whenever a pseudo-terminal is requested, as it is required by the protocol.

Yes, if previously TERM was not specified as an environment variable for sshd_configAcceptEnv.

Action: Unset TERM unless you do not need it and do not want to send it. Otherwise, sshsends the TERM environment variable by default.

The StrictHostKeyChecking keyword

Previously, the argument ‘accept-new’ or ‘off’ is not supported. Now, the argument ‘accept-new’ is used to let ssh automatically add new host keys to the user known hosts files but refuse connections to hosts with changed host keys. The argument ‘off’ is used the same as ‘no’ to automatically add new host keys to the user known hosts files and allow connections to hosts with changed host keys to proceed.

No, setting StrictHostKeyChecking to ‘accept-new’ or ‘off’ was not considered as a valid optionin the previous version.

Changes to the sshd_config file

What Changed Customization action needed?

The AllowUsers keyword

Previously, the CIDR address/masklen format was not supported for the HOST criteria.

Now, HOST criteria can contain addresses to match in CIDR address/masklen format.

No. The CIDR address/masklen format is not valid in the previous version.

The AuthenticationMethods keyword

Previously, "any" as the string was not supported.

Now, “any” to indicate the default behavior of accepting any single authentication method.

No, “any” is not valid in the previous version.

The AuthorizedKeysCommand keyword

Previously, tokens (%%, %f, %h, %k, %t, and %u) were not supported for AuthorizedKeysCommand.

Now, arguments to AuthorizedKeysCommand accept the tokens. If no arguments are specified, the username of the target user is used.

No. Tokens were not valid in the previous version.

The Ciphers keyword

Previously, chacha20-poly1305@openssh.com algorithm is not supported by Cipher. Now the cipher supportschacha20-poly1305@openssh.com algorithm and added it into the default list.

Previously, ‘+’ character and ‘-’ character were not supported. Now, if the specified valuebegins with a ‘+’ character, the specified methods are appended to the default set instead ofreplacing them. If the specified value begins with a ‘-’ character, the specified methods (includingwildcards) are removed from the default set, instead of replacing them.

Yes, if you use the previous default list and do not want to allow the new cipher or the neworder of the preferred ciphers.

‘+’ character and ‘-’ character is not valid in the previous version.

Action: Specify the previous default list without the deprecated ciphers blowfish-cbc, arcfour, arcfour128, arcfour256, and cast128-cbc.

The DenyUsers keyword

Previously, address/masklen format was not supported for the HOST criteria. Now, HOST criteriacan additionally contain addresses to match in CIDR address/masklen format.

No, CIDR address/masklen format is not valid in the previous version.

The HostKey keyword

Previously, the default host key was /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_dsa_key, and/etc/ssh/ssh_host_ecdsa_key, for protocol version 2.

Now, the default host key is /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_dsa_key,/etc/ssh/ssh_host_ecdsa_key, and /etc/ssh/ssh_host_ed25519_key.

Yes, if you want to use the previous default host key for protocol version 2 and do not want to use host key /etc/ssh/ssh_host_ ed25519_key.

Action: Specify the previous default host key.

The KexAlgorithms keyword

Previously, ‘+’ character and ‘-’ character were not supported. Now, if the specified valuebegins with a ‘+’ character, the specified methods are appended to the default set instead ofreplacing them. If the specified value begins with a ‘-’ character, the specified methods (includingwildcards) are removed from the default set, instead of replacing them.

Previously, the default KexAlgorithms List did not contain diffie-hellman-group14-sha256,diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, curve25519-sha256, and curve25519-sha256@libssh.org.Now the defaultKexAlgorithms list contains diffie-hellman-group14-sha256, diffie-hellman-group16-sha512,diffie-hellman-group18-sha512, curve25519-sha256, and curve25519-sha256@libssh.org.

Yes, if you use the previous default list and do not want to allow the new KexAlgorithms. Theprevious default list was ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256, diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1, diffie-hellman-group1-sha1.

‘+’ character and ‘-’ character is not valid in the previous version.

Action: Specify the previous default list.

The Match keyword

Previously, CIDR address/masklen format was not supported for the Address criteria. Now, addresscriteria can additionally contain addresses to match in CIDR address/masklen format.

Previously, the keywords that could be used on the lines that follow Match did not containAllowStreamLocalForwarding, AuthorizedPrincipalsCommand, AuthorizedPrincipalsCommandUser,ClientAliveCountMax, ClientAliveInterval, HostbasedAcceptedKeyTypes, IPQoS, LogLevel, PermitUserRC,PubkeyAcceptedKeyTypes, RevokedKeys, StreamLocalBindMask, StreamLocalBindUnlink, TrustedUserCAKeys.

RhostsRSAAuthentication and RSAAuthentication are contained in the keyword list that can be usedon the lines that follow Match.

Now, the keywords that can be used on the lines that follow Match includeAllowStreamLocalForwarding, AuthorizedPrincipalsCommand, AuthorizedPrincipalsCommandUser,ClientAliveCountMax, ClientAliveInterval, HostbasedAcceptedKeyTypes, IPQoS, LogLevel, PermitUserRC,PubkeyAcceptedKeyTypes, RevokedKeys, StreamLocalBindMask, StreamLocalBindUnlink, TrustedUserCAKeys,and do not contain RhostsRSAAuthentication and RSAAuthentication.

No. CIDR address/masklen format is not valid in the previous version. Similarly, the followingare not valid: AllowStreamLocalForwarding, AuthorizedPrincipalsCommand,AuthorizedPrincipalsCommandUser, ClientAliveCountMax, ClientAliveInterval,HostbasedAcceptedKeyTypes, IPQoS, LogLevel, PermitUserRC, PubkeyAcceptedKeyTypes, RevokedKeys,StreamLocalBindMask, StreamLocalBindUnlink, TrustedUserCAKeys.

The PermitOpen keyword

Previously, none and * was not supported. Now, none can be used to prohibit all forwardingrequests and the wildcard ‘*’ can be used for host or port to allow all hosts or ports.

No. None and * are not valid in the previous version.

The RevokedKeys keyword

Previously, none was not a supported value. Now, none is used to indicate not use one.

No. None is not valid in the previous version.

The TrustedUserCAKeys keyword

Previously, none is not a supported value. Now, none is used to indicate not use one.

No. None is not valid in the previous version.

The XauthLocation keyword

Previously, none is not a supported value. Now, none is used to indicate not use one.

No. None is not valid in the previous version.

Changes to the ssh command

What Changed Customization action needed?

The -c option

Previously, chacha20-poly1305@openssh.com is not supported. Now chacha20-poly1305@openssh.com isadded to the default list.

The complete list of ciphers that are used by ssh can be found in ssh_config (see Ciphers).

Yes, if you use the previous default list and do not want to allow the new cipher or the neworder of the preferred ciphers.

Action: Specify the previous default list without the deprecated ciphers blowfish-cbc,arcfour, arcfour128, arcfour256, and cast128-cbc.

The -i option

Previously, the default list of SSH protocol version 2 did not contain Ed25519 authenticationidentity ~/.ssh/id_ed25519. Now ~/.ssh/id_ed25519 is added and the default list of identities is~/.ssh/id_dsa, ~/.ssh/id_ecdsa, ~/.ssh/id_ed25519, and ~/.ssh/id_rsa.

Yes, if you use the previous default list and do not want to allow the new identity file or thenew order of the preferred identity file.

Action: Specify the previous default list but note that SSH protocol version 1 identity isno longer supported.

The -L option

Previously, the argument does not contain the UNIX socket format[bind_address:]port:host:hostport, local_socket:host:hostport, and local_socket:remote_socket. Now,the argument allows you to use UNIX socket format [bind_address:]port:host:hostport,local_socket:host:hostport, and local_socket:remote_socket for local forward connection.

No, UNIX socket is not allowed to use for local forward connection in the previous version.

The -O option

Previously, ‘forward’, ‘cancel’, ‘proxy’ and ‘stop’ arguments are not supported. Now ‘forward’ isused to request forwarding without command execution; ‘cancel’ is used to cancel forwarding; ‘proxy’is used to start multiplexing proxy mode; ‘stop’ is used to request the primary to stop acceptingfurther multiplexing requests.

No, the newly added arguments were not valid in the previous version.

The -Q option

Previously, the available arguments do not include ‘cipher-auth’, ‘key-cert’, ‘key-plain’ and‘protocol-version’. Now, ‘cipher-auth’ is used to query supported symmetric ciphers that supportauthenticated encryption, ‘key-cert’ is used to query certificate key types, ‘key-plain’ is used toquery non-certificate key types, and ‘protocol-version’ is used to query supported SSH protocolversions.

No, the newly added arguments were not valid in the previous version.

The -R option

Previously, the argument does not allow the UNIX socket format [bind_address:]port:local_socket,remote_socket:host:hostport, remote_socket:local_socket nor does it allow SOCKS 4 or 5 proxy format[bind_address:]port. Now, the argument allows you to use UNIX socket format[bind_address:]port:local_socket, remote_socket:host:hostport, remote_socket:local_socket. And[bind_address:]port format is allowed to let ssh act as a SOCKS 4 or 5 proxy and forwardconnections.

No, the newly added arguments were not valid in the previous version.

The ~C escape character

Previously, it does not allow cancellation of local forwarding. Now, -KL[bind_address:]port isallowed to cancel local forwarding in command line.

No, the added command is considered as invalid in the previous version.

Changes to the sshd command

What Changed Customization action needed?

The -h option.

Previously, the default host key was /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_dsa_key, and/etc/ssh/ssh_host_ecdsa_key, for protocol version 2.

Now the default host key is /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_dsa_key,/etc/ssh/ssh_host_ecdsa_key, and /etc/ssh/ssh_host_ed25519_key.

Yes, if you want to use the previous default host key for protocol version 2 and don't want touse host key /etc/ssh/ssh_host_ed25519_key.

Action: Specify the previous default host key for protocol version 2.

Changes to the sftp command

What Changed Customization action needed?

The -f option for put and get subcommands.

Previously, sftp didn’t support fsync() calling.

Now a new option -f was added for fsync() calling. If the -f flag is specified, then it requeststhat files be flushed to disk immediately after transfer.

Yes. The sync() calling is only supported by servers that implement the "fsync@openssh.com"extension.

Action: If you want to use -f option, ensure that the server implements the"fsync@openssh.com" extension.

Changes to the ssh-keygen command

What Changed Customization action needed?

The -t option

Previously, ssh-keygen didn’t support key type ed25519.

Now, a new supported key type ed25519 was added.

No. Use this new key type as you need.

Changes to the ssh-keyscan command

What Changed Customization action needed?

The -t option

Previously, ssh-keyscan didn’t support key type ed25519.

Now, a new supported key type ed25519 was added.

No. Use this new key type as you need.

Changes to the ssh_config file that might require an upgrade action

What Changed Upgrade action needed?

The AFSTokenPassing keyword

Previously, this keyword indicated whether to pass AFS token to remote host when using SSHprotocol version 1. Now, AFSTokenPassing keyword is removed because SSH protocol version 1 is nolonger supported.

No. Because AFSTokenPassing is not supported on z/OS UNIX.

The Cipher keyword

Previously, this keyword specified the cipher to for encryption for SSH protocol version 1. Now,Cipher keyword is removed because SSH protocol version 1 is no longer supported.

Yes, if you are using any of the SSH protocol version 1 ciphers: 3des, blowfish, or des. If youspecify SSH protocol version 1 cipher in the ssh configuration file, a debug message “Deprecatedoption "Cipher"” is returned.

Action: Update your application. Do not specify to use SSH protocol version 1 and itsciphers. Use SSH protocol version 2 and its corresponding ciphers.

The Ciphers keyword

Previously, SSH protocol version 2 ciphers blowfish-cbc, arcfour, arcfour128, arcfour256,cast128-cbc, 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc are supported and listed in thedefault list. Now blowfish-cbc, arcfour, arcfour128, arcfour256, and cast128 are no longersupported; 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc are removed from the default cipherlist.

Yes, if you are using any of the listed ciphers: blowfish-cbc, arcfour, arcfour128, arcfour256,cast128-cbc, 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc.

Action: Do not specify to use blowfish-cbc, arcfour, arcfour128, arcfour256, orcast128-cbc. When specifying 3des-cbc, aes128-cbc, aes192-cbc, or aes256-cbc, specify the samecipher in sshd.

The CompressionLevel keyword

Previously, this keyword specified the compression level if compression is enabled when using SSHprotocol version 1. Now, CompressionLevel is removed because the compression level applies tocompression option in SSH protocol version 1 only and this version is no longer supported.

Yes, if you are using the SSH protocol version 1 and enabled compression option with a specifiedcompression level.

Action: Use SSH protocol version 2 without specifying compression option and itscompression level.

The HostKeyAlgorithms keyword

Previously, host key algorithms ssh-dss, ssh-dss-cert-v00@openssh.com,ssh-dss-cert-v01@openssh.com, and ssh-rsa-cert-v00@openssh.com are supported and listed in thedefault list. Now, ssh-dss-cert-v00@openssh.com ssh-rsa-cert-v00@openssh.com is no longer supported;ssh-dss and ssh-dss-cert-v01@openssh.com are removed from the default host key algorithms list.

Yes, if you are specifying ssh-dss, ssh-dss-cert-v00@openssh.com, ssh-dss-cert-v01@openssh.com orssh-rsa-cert-v00@openssh.com, or using the previous default host key algorithms list.

Action: Do not specify unsupported host key algorithms: ssh-dss-cert-v00@openssh.com andssh-rsa-cert-v00@openssh.com. When specifying ssh-dss or ssh-dss-cert-v01@openssh.com, specify thesame host key algorithm in sshd.

The IdentityFile keyword

Previously, SSH protocol version 1 identity ~/.ssh/identity is supported. Now SSH protocolversion 1 is no longer supported so ~/.ssh/identity or any other specified SSH protocol version 1identity is no longer available.

Yes, if you use the default identity list or SSH protocol version 1 identity such as~/.ssh/identity is specified. If specifying SSH protocol version 1 identity, error message “FOTS3785key_load_public: invalid format” is returned.

Action: Do not specify SSH protocol version 1 identity, use default SSH protocol version 2identities only.

The KeepAlive keyword

Previously, this keyword is kept for compatibility with versions of OpenSSH before 3.8.1p1 tospecify whether the system should send TCP keepalive messages to the other side. Now this keyword isno longer supported and is replaced by TCPKeepAlive.

Yes, if you are using this keyword to specify whether the system should send TCP keepalivemessages to the other side.

Action: Update your application. Use TCPKeepAlive instead of KeepAlive.

The KexAlgorithms keyword

Previously, the default list contains diffie-hellman-group1-sha1. Now, the default KEX list doesnot contain diffie-hellman-group1-sha1.

Yes, if you are specifying the use of diffie-hellman-group1-sha1. When specifyingdiffie-hellman-group1-sha1, an error message “no matching key exchange method found” isreturned.

Action: Do not use hellman-group1-sha1 as the only KEX algorithm.

The LocalForward keyword

Previously, IPv6 addresses could be specified with the syntax: [bind_address/]port/host/hostport.Now, the forward slash (/) is not supported as a separator in the format. IPv6 ad-dresses arespecified by enclosing the address in square brackets, such as[ipv6_bind_address:]port:host:hostport.

Yes, if you are using the previous format to specify the IPv6 address.

Action: Do not use the previous format, use [ipv6_bind_address:]port:host:hostport tospecify IPv6 address instead.

The MACs keyword

Previously, MAC algorithms hmac-ripemd160, hmac-ripemd160@openssh.com, andhmac-ripemd160-etm@openssh.com are supported. Now, hmac-ripemd160, hmac-ripemd160@openssh.com, andhmac-ripemd160-etm@openssh.com are no longer supported.

Also, the previous default MAC algorithm list contains hmac-ripemd160,hmac-ripemd160@openssh.com, hmac-ripemd160-etm@openssh.com, hmac-sha1-96,hmac-sha1-96-etm@openssh.com, hmac-md5, hmac-md5-etm@openssh.com, hmac-md5-96, andhmac-md5-96-etm@openssh.com.

Now the default list does not contain hmac-ripemd160, hmac-ripemd160@openssh.com,hmac-ripemd160-etm@openssh.com, hmac-sha1-96, hmac-sha1-96-etm@openssh.com, hmac-md5,hmac-md5-etm@openssh.com, hmac-md5-96, and hmac-md5-96-etm@openssh.com.

Yes, if you specified any of the removed MAC algorithms: hmac-ripemd160,hmac-ripemd160@openssh.com and hmac-ripemd160-etm@openssh.com, or using MAC algorithms that aredisabled by default: hmac-sha1-96, hmac-sha1-96-etm@openssh.com, hmac-md5, hmac-md5-etm@openssh.com,hmac-md5-96, and hmac-md5-96-etm@openssh.com.

Action: Do not specify unsupported MAC algorithms: hmac-ripemd160,hmac-ripemd160@openssh.com, and hmac-ripemd160-etm@openssh.com. To use hmac-sha1-96,hmac-sha1-96-etm@openssh.com, hmac-md5, hmac-md5-etm@openssh.com, hmac-md5-96, orhmac-md5-96-etm@openssh.com, specify the same MAC algorithm in sshd.

The Protocol keyword

Previously, this keyword specified the SSH protocol version to use. The available arguments are1 and 2. Now, because SSH protocol version 1 is no longer supported, argument ‘1’ is ignored andonly SSH protocol version 2 is used by default.

Yes, if you are specifying ‘1’ to use SSH protocol version 1. When ‘1’ is specified, thisargument is ignored and SSH protocol version 2 is used instead.

Action: Do not specify to use SSH protocol version 1, use the default SSH protocol version2.

The RemoteForwardkeyword

Previously, IPv6 addresses can be specified with a syntax: [bind_address/]port/host/hostport.Now, forward slash (/) is not supported as a separator in the format, IPv6 addresses are specifiedby enclosing the address in square brackets, such as [ipv6_bind_address:]port:host:hostport.

Yes, if you are using the previous format to specify the IPv6 address.

Action: Do not use the previous format, use [ipv6_bind_address:]port:host:hostport tospecify IPv6 address instead.

The RhostsRSAAuthentication keyword

Previously, this keyword indicated whether to try rhosts-based authentication with RSA hostauthentication in SSH protocol version 1. Now, this keyword is removed because SSH protocol version1 is no longer supported.

Yes, if you are using rhost-based authentication with RSA host authentication in SSH protocolversion 1. If specifying this keyword, error message “Unsupported option "RhostsRSAAuthentication"”is returned.

Action: Update your application. Do not specify the RhostsRSAAuthentication keyword.

The RSAAuthentication keyword

Previously, this keyword indicated whether to try RSA authentication in SSH protocol version 1.Now, this keyword is removed because SSH protocol version 1 is no longer supported.

Yes, if you are using RSA authentication in SSH protocol version 1. If specifying this keyword,error message “Unsupported option "RSAAuthentication"” is returned.

Action: Update your application. Do not specify the RSAAuthentication keyword.

The UsePrivilegedPort keyword

Previously, this keyword indicated whether to use a privileged port for outgoing connections.Now privileged port is not allowed to be used and this keyword is removed.

Yes, if you are using privileged port. If specifying UsePrivilegedPort, this keyword is ignored.

Action: Update your application. Do not specify the UsePrivilegedPort keyword.

Changes to the sshd_config file that might require an upgrade action

What Changed Upgrade action needed?

The AcceptEnv keyword

Previously, the TERM environment variable is not sent if TERM is not specified in the AcceptEnvkeyword whenever the client requests a pseudo-terminal.

Now, the TERM environment variable is always sent whenever the client requests apseudo-termina.l

Yes, if you specify TERM as an environment variable in AcceptEnv though ssh and sshd decidewhether TERM environment variable is copied into the session's environment.

Action: Avoid using TERM as the environment variable for SendEnv.

The AFSTokenPassing keyword

Previously, this keyword indicated whether to pass an AFS token to a remote host. It was notsupported in z/OS UNIX.

Now, AFSTokenPassing keyword is removed.

No. Because AFSTokenPassing is not supported on z/OS UNIX in previous version.

The Ciphers keyword

Previously, arcfour, arcfour128, arcfour256, blowfish-cbc, and cast128-cbc are supported byCipher. And 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc were in the default cipher list.

Now, arcfour, arcfour128, arcfour256, blowfish-cbc, and cast128-cbc algorithms are not supportedby Cipher and removed from the default list. And 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbcare removed from the default cipher list.

Yes, if you want to use any of the listed ciphers: arcfour, arcfour128, arcfour256, blowfish-cbc,cast128-cbc, 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc.

Action: Do not specify unsupported Cipher algorithm: arcfour, arcfour128, arcfour256,blowfish-cbc, and cast128-cbc.

Also, specify 3des-cbc, aes128-cbc, aes192-cbc, or aes256-cbc on the Ciphers keyword if you wantto use these cipher algorithms.

The Compression keyword

Previously, the default value is “no” and "delayed" means to enable delayed (zlib@openssh.com)compression only. Now, the default is “yes” and delayed is a legacy synonym for yes.

Yes, if you want to use the previous default value of compression and want to use delay to enabledelayed compression only.

Action: Specify no if you want to use the previous default value.

The HostKey keyword

Previously, the default host key is /etc/ssh/ssh_host_key for protocol version 1.

Now, the /etc/ssh/ssh_host_key is not supported because protocol version 1 is not supported.

Yes, if you want to use /etc/ssh/ssh_host_key as a file to contain a private host key.

Action: Do not specify /etc/ssh/ssh_host_key as a file for containing a private hostkey.

The KeepAlive keyword

Previously, this keyword specified whether the system should send TCP keepalive messages to theother side for OpenSSH version before 3.8.1p1.

Now, KeepAlive keyword is removed.

No. On systems that use OpenSSH 3.8.1p1 or later, use the keyword TCPKeepAlive instead.

The KexAlgorithms keyword

Previously, the default list contains diffie-hellman-group1-sha1.

Now, the default KexAlgorithms list does not contain diffie-hellman-group1-sha1.

Yes, if you want to use diffie-hellman-group1-sha1.

Action: Specify hellman-group1-sha1 on KexAlgorithms.

The MACs keyword

Previously, MAC algorithms hmac-ripemd160, hmac-ripemd160@openssh.com, andhmac-ripemd160-etm@openssh.com are supported. Now, hmac-ripemd160, hmac-ripemd160@openssh.com, andhmac-ripemd160-etm@openssh.com are no longer supported.

And previously, the default MAC algorithm list contains hmac-ripemd160,hmac-ripemd160@openssh.com, hmac-ripemd160-etm@openssh.com, hmac-sha1-96, hmac-sha1-96-etm@openssh.com, hmac-md5,hmac-md5-etm@openssh.com, hmac-md5-96, and hmac-md5-96-etm@openssh.com. Now the default list doesnot contain hmac-ripemd160, hmac-ripemd160@openssh.com, hmac- ripemd160-etm@openssh.com,hmac-sha1-96, hmac-sha1-96-etm@openssh.com,hmac-md5, hmac-md5-etm@openssh.com, hmac-md5-96, and hmac-md5-96-etm@openssh.com.

Yes, if you specified the unsupported MAC algorithms: hmac-ripemd160, hmac-ripemd160@openssh.comand hmac-ripemd160-etm@openssh.com, or are using MAC algorithms that are disabled by default:hmac-sha1-96, hmac-sha1-96-etm@openssh.com, hmac-md5, hmac-md5-etm@openssh.com, hmac-md5-96, andhmac-md5-96-etm@openssh.com.

Action: Do not specify unsupported MAC algorithms: hmac-ripemd160,hmac-ripemd160@openssh.com, and hmac-ripemd160-etm@openssh.com.

Specify hmac-sha1-96, hmac-sha1-96-etm@openssh.com, hmac-md5, hmac-md5-etm@openssh.com, hmac-md5-96, orhmac-md5-96-etm@openssh.com to MACs if you want to use these MAC algorithms.

The PAMAuthenticationViaKbdInt keyword

Previously, this keyword whether PAM challenge-response authentication is allowed and is notsupported on z/OS UNIX.

Now, PAMAuthenticationViaKbdInt keyword is removed.

No. Because PAMAuthenticationViaKbdInt is not supported on z/OS UNIX in previous version.

The PermitRootLogin keyword

Previously, prohibit-password is not a supported value for PermitRootLogin and the default valueis yes. Now, prohibit-password as a deprecated alias of without-password to indicate that passwordauthentication is disabled for root and the default value is prohibit-password.

Yes, if you use the previous default value of yes.

Action: Specify "yes” for this keyword if you want to use the previous default value.

The Protocol keyword

Previously, this keyword specified the protocol versions that sshd must support.

Now, this keyword is removed because protocol 1 is not supported. The protocol of sshd is always2.

Yes, if you want to use protocol 1.

Action: Update your application. Do not use this keyword to Specify protocol.

The RhostsAuthentication keyword

Previously, this keyword indicated whether authentication using rhosts or /etc/hosts.equiv filesis sufficient for OpenSSH version before 3.8.1p1.

Now, RhostsAuthentication keyword is removed.

No, because RhostsAuthentication is not supported on z/OS UNIX in the previous version.

The RhostsRSAAuthentication keyword

Previously, this keyword specified whether rhosts or /etc/hosts.equiv authentication togetherwith successful RSA host authentication is allowed and applied only to protocol version 1.

Now, RhostsRSAAuthentication is removed because protocol version 1 is not supported.

Yes, if you are using RhostsRSAAuthentication, an error message “Deprecated optionRSAAuthentication” is returned.

Action: Update your application. Do not use RhostsRSAAuthentication keyword.

The RSAAuthentication keyword

Previously, this keyword specified whether pure RSA authentication is allowed and applied only toprotocol version 1.

Now, RSAAuthentication is removed because protocol version 1 is not supported.

Yes, if you are using RSAAuthentication, an error message “Deprecated option RSAAuthentication”is returned.

Action: Update your application. Do not use RSAAuthentication keyword.

The ServerKeyBits keyword

Previously, this keyword determined the number of bits in the ephemeral protocol version 1 server key.

Now, ServerKeyBits is removed because protocol version 1 is not supported.

Yes, if you are using ServerKeyBits, an error message “Deprecated option ServerKeyBits” isreturned.

Action: Update your application. Do not use the ServerKeyBits keyword.

The UseLogin keyword

Previously, this keyword specified whether login is used for interactive login sessions.

Now, this keyword is removed.

Yes, if you use the UseLogin keyword to specify the interactive login sessions, an error message is returned: “Deprecated option UseLogin”

Action: Update your application. Do not use the UseLogin keyword.

The UsePrivilegeSeparation keyword

Previously, this keyword indicated whether sshd separates privileges by creating an unprivilegedchild process to handle incoming network traffic.

Now, sshd is changed so that APF authorization is not propagated to unprivileged childprocesses.

Yes, if you want to use UsePrivilegeSeparation to run without privilege separation for sshd,which is no longer supported. If you use this keyword, the following error message is returned:“Deprecated option UsePrivilegeSeparation”

Action: Update your application. Do not use the UsePrivilegeSeparation keyword.

The UseDNS keyword

Previously, yes was the default value.

Now, no is the default value. It indicates that only addresses and not hostnames can be used in~/.ssh/authorized_keys from and sshd_config Match Host directives.

Yes, if you use the previous default value and use hostnames in ~/.ssh/authorized_keys fromsshd_config Match Host directives. The previous default value was yes.

Action: Specify yes on this keyword if you want to use the previous default value.

The VerifyReverseMapping keyword

Previously, this keyword indicated whether sshd should try to verify the remote hostname andcheck that the resolved hostname for the remote IP address maps to the same IP address for OpenSSHversion before 3.8.1p1.

No. On systems that use OpenSSH 3.8.1p1 or later, use the keyword UseDNS instead.

Changes to the ssh command that might require an upgrade action

What Changed Upgrade action needed?

The -1 option

Previously, this option is used to specify the support of SSH protocol version 1. Now SSHprotocol version 1 is no longer supported and SSH protocol version 2 is used by default in OpenSSH 7.6p1.

Yes, if you force ssh to use SSH protocol version 1. If specifying -1 option, error message “SSH protocol v.1 is no longer supported” is returned.

Action: Update your application. Do not specify -1 option.

The -2 option

Previously, this option was used to request SSH protocol version 2. Now SSH protocol version 2 isused by default in OpenSSH 7.6p1 without any specification.

No. Specifying -2 option in the previous version is the same as using SSH protocol version 2 by default in OpenSSH 7.6p1.

The -c option

Previously, SSH protocol version 1 ciphers and version 2 ciphers blowfish-cbc, arcfour,arcfour128, arcfour256, cast128-cbc, 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc are supportedand listed in the default list. Now SSH protocol version 1 ciphers and blowfish-cbc, arcfour,arcfour128, arcfour256, and cast128-cbc are no longer supported. SSH protocol version 2 ciphers3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc are removed from the default cipher lists.

Yes, if you are using any of the SSH protocol version 1 ciphers or SSH protocol version 2 ciphers blowfish-cbc, arcfour, arcfour128, arcfour256, cast128-cbc, 3des-cbc, aes128-cbc, aes192-cbc, and aes256-cbc. If you specify a cipher that is no longer supported, an error message such as “Unknowncipher type '3des'” is returned.

Action: Do not specify no longer supported ciphers. To use 3des-cbc, aes128-cbc,aes192-cbc, and aes256-cbc, specify the same cipher on sshd.

The -C option

Previously, this option is used to specify whether to use compression in SSH protocol version 1.Now this option is removed because it applies to SSH protocol version 1 only and this version is nolonger supported.

Yes, if you are using compression option in SSH protocol version 1.

Action: Do not specify to use SSH protocol version 1 and enable compression option. UseSSH protocol version 2 without specifying compression option.

The -i option

Previously, SSH protocol version 1 identity ~/.ssh/identity is supported. Now SSH protocolversion 1 is no longer supported so ~/.ssh/identity or any other specified SSH protocol version 1 identity is no longer available.

Yes, if you use the default identity list or SSH protocol version 1 identity such as~/.ssh/identity is specified. If specifying SSH protocol version 1 identity, error message “FOTS3785key_load_public: invalid format” is returned.

Action: Do not specify SSH protocol version 1 identity, use default SSH protocol version 2identities only.

The -L option

Previously, IPv6 addresses were specified with a syntax: [bind_address/]port/host/hostport. Now,forward slash (/) is not supported as a separator in the format, IPv6 addresses are specified byenclosing the address in square brackets, such as [ipv6_bind_address:]port:host:hostport.

Yes, if you are using the previous format to specify the IPv6 address.

Action: Do not use the previous format. Instead, use[ipv6_bind_address:]port:host:hostport to specify a IPv6 address.

The -m option

Previously, MAC algorithms hmac-ripemd160, hmac-ripemd160@openssh.com, andhmac-ripemd160-etm@openssh.com are supported. Now, hmac-ripemd160, hmac-ripemd160@openssh.com, andhmac-ripemd160-etm@openssh.com are no longer supported.

Also, the previous default MAC algorithm list contains hmac-ripemd160,hmac-ripemd160@openssh.com, hmac-ripemd160-etm@openssh.com, hmac-sha1-96,hmac-sha1-96-etm@openssh.com, hmac-md5, hmac-md5-etm@openssh.com, hmac-md5-96, and hmac-md5-96-etm@openssh.com.

Now the default list does not contain hmac-ripemd160, hmac-ripemd160@openssh.com,hmac-ripemd160-etm@openssh.com, hmac-sha1-96, hmac-sha1-96-etm@openssh.com, hmac-md5,hmac-md5-etm@openssh.com, hmac-md5-96, and hmac-md5-96-etm@openssh.com.

Yes, if you specified any of the removed MAC algorithms: hmac-ripemd160,hmac-ripemd160@openssh.com and hmac-ripemd160-etm@openssh.com, or using MAC algorithms that aredisabled by default: hmac-sha1-96, hmac-sha1-96-etm@openssh.com, hmac-md5, hmac-md5-etm@openssh.com,hmac-md5-96, and hmac-md5-96-etm@openssh.com.

Action: Do not specify unsupported MAC algorithms: hmac-ripemd160,hmac-ripemd160@openssh.com, and hmac-ripemd160-etm@openssh.com.

To use hmac-sha1-96, hmac-sha1-96-etm@openssh.com, hmac-md5, hmac-md5-etm@openssh.com,hmac-md5-96, or hmac-md5-96-etm@openssh.com, specify the same MAC algorithm in ssh daemon.

The -Q option

Previously, supported message integrity codes are specified as ‘MAC’ and key exchange algorithmsis specified as ‘KEX’. Now, message integrity codes are specified in lowercase ‘mac’ and the latteris also specified in lowercase: ‘kex’.

Yes, if you are specifying ‘MAC’ or ‘KEX’ as a protocol feature argument in the previousversion.

Action: Instead of using uppercase for specification, use lowercase ‘mac’ and ‘kex’instead.

The -R option

Previously, IPv6 addresses can be specified with a syntax: [bind_address/]port/host/hostport.Now, forward slash (/) is not supported as a separator in the format, IPv6 addresses are specifiedby enclosing the address in square brackets, such as [ipv6_bind_address:]port:host:hostport.

Yes, if you are using the previous format to specify the IPv6 address.

Action: Do not use the previous format. Instead, use[ipv6_bind_address:]port:host:hostport to specify a IPv6 address.

Changes to the sshd command that might require an upgrade action

What Changed Upgrade action needed?

The -b option

Previously, this option specified the number of bits in the ephemeral protocol version 1 serverkey.

Now, the -b option is removed because protocol version 1 is not supported.

Yes, if you want to use -b option to specify the number of bits, this option is ignored.

Action: Update your application. Do not use -b option.

The -h option

Previously, /etc/ssh/ssh_host_key was used for protocol version 1.

Now, /etc/ssh/ssh_host_key is removed from the supported host key because protocol version 1 isnot supported.

Yes. If you want to use /etc/ssh/ssh_host_key as the host key.

Action: Do not specify /etc/ssh/ssh_host_key host key file with this option.

The -k option

Previously, this option specified how often the ephemeral protocol version 1 server key isregenerated.

Now, the -k option is removed because protocol version 1 is not supported.

Yes, if you want to use -k option to specify how often the ephemeral protocol version 1 serverkey is regenerated, this option is ignored.

Action: Update your application. Do not use -1 option.

Changes to the scp command that might require an upgrade action

What Changed Upgrade action needed?

The -1 option.

Previously, -1 indicated protocol version 1.

Now, the –1 is removed because protocol 1 is not supported. The protocol of scp is always 2.

Yes. If you are using -1 option for protocol version 1, you need to change it to -2 or remove the-1 option.

Action: Update your application. Do not use -1 option.

Changes to the sftp command that might require an upgrade action

What Changed Upgrade action needed?

The -1 option.

Previously, -1 indicated protocol version 1.

Now, –1 is removed because protocol 1 is not supported. The protocol for sftp is always 2.

Yes. If you are using -1 option for protocol version 1, you need to change it to -2 or remove the-1 option.

Action: Update your application. Do not use -1 option.

Changes to the ssh-keygen command that might require an upgrade action

What Changed Upgrade action needed?

The –t option.

Previously, the key types that supported are rsa1, rsa, dsa, and ecdsa.

Now, the rsa1 key type was removed since the protocol version 1 is no longer supported.

Yes. Check whether you are still using key type rsa1.

Action: Replace the rsa1 key with an appropriate key type.

The -b option

Previously, for RSA keys, the minimum number of bits in the key to create is 768.

Now, the minimum RSA keys bits changed to 1024.

Yes. If you are still using 768 bits for RSA keys generating, change it to 1024 bits or higher.The maximum size is 16384 bits, and the default is 2048 bits.

Action: If you are still using 768 bits for RSA keys generating, change it to 1024 bits orhigher.

Changes to the ssh-keyscan command that might require an upgrade action

What Changed Upgrade action needed?

The –t option.

Previously, the key types that supported are rsa1, rsa, dsa, and ecdsa.

Now, the rsa1 key type was removed since the protocol version 1 is no longer supported.

Yes. Key type rsa1 is no longer supported in OpenSSH 7.6p1, as in z/OS V2R4.

Action: Check whether you are still having rsa1 type keys. If so, replace the rsa1 keywith an appropriate key type.

Changes to the /samples/ssh_smf.h and FOTSMF77 in SYS1.MACLIB that might require an upgrade action

What Changed Upgrade action needed?

/samples/ssh_smf.h and

SYS1.MACLIB(FOTSMF77)

Yes, if you use ssh_smf.h and FOTSMF77.

Action: Update your application.

For more information, see the topic on SMF Type 119 records in IBM Ported Tools for z/OS:OpenSSH User's Guide.

Reference information

For more information, see OpenSSH User’s Guide.

If z/OS OpenSSH client connections encounter warnings or failures,see the following APARs for additional information:

  • OA61535 "REMOTE HOST IDENTIFICATION HAS CHANGED may occur after enabling DSA support for host keys"
  • OA60340 "WHEN CPACF OR ICSF IS AVAILABLE AND CONFIGURED FOR USE BY Z/OS OPENSSH SOFTWARE (OPENSSL) CIPHERS MAY FAIL WHEN SELECTED"

Instructions:

This portion of the Workflow will guide you to submit jobs to run two health checks that are associated with this upgrade action, IBMSSH,ZOSMIGV2R4_SSH_CONFIG and IBMSSH,ZOSMIGV2R4_SSHD_CONFIG.

These checks will be activated if they are not already active. If the checks are activated, they will be deactivated at the end of the job, so that they remain in the same state as they were found.

If the health checks run with no exceptions, this step will be marked "Complete" indicating that this upgrade action requires no further activity.

If either of the health checks find an exception, this step will be marked as "Failed". If so, further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (using any method you use to view health check output, such as SDSF) and correct any situations as appropriate. You can then re-run this workflow step to submit the health check job again, until the health checks no longer receive exceptions and the step is marked "Complete".

NOTE: The successful running of these health checks only partially covers this upgrade action. Refer to the upgrade action text for the complete list of steps to take.


Step 4.31 : z/OS UNIX upgrade actions


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes upgrade actions for base element z/OS UNIX System Services (z/OS UNIX).


Step 4.31.1 : z/OS UNIX actions to perform before installing z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes z/OS UNIX upgrade actions that you can perform on your current (old) system. You do not need the z/OS V2R5 level of code to make these changes, and the changes do not require the z/OS V2R5 level of code to run after they are made.


Step 4.31.1.1 : z/OS UNIX: Migrate from HFS file systems to zFS file systems


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

As of z/OS V2R5, z/OS no longer supports the hierarchical file system (HFS) data structure. You can no longer mount a data structure that is DSNTYPE=HFS.

IBM provides equivalent if not superior functionality with z/OS File System (zFS). zFS is the strategic file system for z/OS UNIX and continues to be enhanced to provide superior performance, reliability, and data integrity. If you have not done so already, it is time to migrate your HFS file systems to zFS. The z/OS operating system includes utilities to aid you in the migration process.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS UNIX.

When change was introduced:

z/OS V2R5. Also, see IBM United States Software Announcement 217-085, "IBM z/OS Version 2 Release 3 - Engine for digital transformation," dated February 21, 2017.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before installing z/OS V2R5.

Is the upgrade action required?

Yes, because z/OS no longer supports the hierarchical file system (HFS) data structure.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

  • Understand the zFS recommendations and limits. For more information, see Minimum and maximum file sizes in z/OS File System Administration
  • The DDNAME() keyword of the BPXPRMxx ROOT and MOUNT statements is not supported by zFS. Use the FILESYSTEM(name) keyword instead.

System impacts:

None.

Related IBM Health Checker for z/OS check:

To verify that all file systems are mounted, use check IBMUSS,USS_HFS_DETECTED. This check issues exception message BPXH068E if any HFS file systems are found.

Steps to take

Follow these steps:

  1. Before beginning the migration, do the following:
    • Establish backout procedures.
    • Decide on naming conventions.
    • Decide on unavailability.
    • Understand any cloning or deployment changes that are required by zFS systems being linear data sets. Considerations would include any copy utility invocations, BPXPRMxx specifications for symbolics, and placement of zFS file systems on system volumes.
  2. Perform the conversion from an HFS to zFS file system.

    You can use the BPXWH2Z tool to perform the conversion. It is an ISPF-based tool that migrates HFS file systems to zFS file systems. Using its panel interface, you can alter the space allocation, placement, SMS classes, and data set names. A HELP panel is provided. With this tool, you can:

    • Migrate HFS file systems (both mounted and unmounted) to zFS file systems. If the HFS being migrated is mounted, the tool automatically unmounts it and then mounts the new zFS file system on its current mount point.
    • Define zFS aggregates by default to be approximately the same size as the HFS. The new allocation size can also be increased or decreased.
    • Have the migration run in TSO/E foreground or UNIX background.

    You can use the JCL sample ISPBTCH in SYS1.SAMPLIB to start BPXWH2Z as an ISPF batch job. Before you run the job, read the notes section. When you run BPXWH2Z on your z/OS system, make sure it uses that same z/OS level of the pax command. You can manually migrate from an HFS to zFS file system without using the tool. However, you would need to allocate and format the target zFS file systems.

    Requirement: The BPXWH2Z tool requires the zFS address space to be operational. Therefore, before attempting to migrate existing HFS to zFS file systems by using BPXWH2Z, ensure that the zFS address space is configured and initialized.

    Tip: You can dynamically migrate the HFS sysplex root in a shared file system configuration to zFS while the root is in use, without disrupting workloads. Although the shared file system configuration is required, the sysplex can be a single system.

    Note: You can use the bpxwmigf shell command to migrate HFS file systems to zFS file systems without incurring interruptions to running workloads. The HFS file system does not have to be unmounted first. bpxwmigf is also available as a TSO/E command or REXX system command. For more information about this command, see z/OS UNIX System Services Command Reference.

  3. Change policies and scripts, and so on, to reflect the change from the HFS file system to zFS file system. Use the RMF Monitor III option to report on zFS activity. Tip:

    Use the RMF Monitor III option to report on zFS activity.

  4. The DDNAME(name) keyword of the BPXPRMxx ROOT and MOUNT statements is not supported by zFS. If you use them. Change these statements to use the FILESYSTEM(name) keyword instead.

Migrating the sysplex root file system from HFS to zFS after IPLing your previous z/OS system:

Before you begin the migration:

  • Ensure that the following requirements are met:
    • All systems in the sysplex are at the V1R12 level.
    • The current sysplex root file system PFS, and the new sysplex root file system PFS, are up in all the systems in shared file system configuration.
  • Be aware of the following restrictions:
    • The current sysplex root file system must be mounted as a read-only file system.
    • The systems that do not meet the requirements for this upgrade action cannot join the sysplex during the sysplex root file system migration processing. However, these systems can join the sysplex after the sysplex root migration is completed.
    • The current sysplex root and the new sysplex root must be either HFS or zFS in any combination. If the new sysplex root is zFS, then it must be HFS-compatible.
    • The sysplex root or any directories on it cannot have been exported by the DFS or SMB server.
  • Note the following:
    • Remote NFS mounts of the sysplex root or any directories on it are considered active use of the current sysplex root file system.
    • During the migration, the new zFS sysplex root file system must not be HSM-migrated, mounted, or in use.
    • Mount parameters are preserved during the migration or replacement of the sysplex root file system of the same file system type (PFS). They are dropped if the file system type is different.
    • Directories, data, files, and links are not copied from one file system to another.

Perform the migration as follows:

  1. Ensure that a file system is mounted read-only as the current sysplex root file system. When the root is mounted read-only, there are no function-shipping clients if the physical paths to the DASD are available to each system. To verify that there are no function-shipping clients, enter:
    D OMVS,F,NAME=root_file_system_name

    You should see CLIENT=N on each system.

  2. Allocate and set up the new zFS sysplex root file system:
    1. Create a zFS file system to be used as the new sysplex root file system. z/OS File System Administration discusses creating and managing zFS file systems. Rules :
      • The UID, GID, and permission bits of the root directory in the new sysplex root file system must be same as the root directory in the current sysplex root file system.
      • If the SECLABEL class is active and the MLFSOBJ option is active, the security label for the new zFS file system must match the assumed security label of the current sysplex root file system.
    2. On the new sysplex root file system, set up the active mount points and the symbolic links. The mount points and symbolic links must be the same as the ones on the current sysplex root file system. You can set them up either (1) manually or (2) by using the pax shell command to populate the new sysplex root file system using the existing sysplex root as a source. To do it manually, create a mount point in the existing sysplex root (for example, /newroot) and mount the new sysplex root file system in the MODE(RDWR) on that mount point. After you mount the new sysplex root file system, manually enter MKDIRs and ln -s to create the mount point directories and symbolic links similar to the existing sysplex root file system. The new sysplex root file system must contain all active mount points and symbolic links exactly as on the existing sysplex root file system.
    3. Use the pax shell command to populate the new file system, using the existing sysplex root as a source. Example :
      cd / pax -wr -pe -XCM ./ /newroot

      For more information about using pax to copy data from an HFS file system to a zFS file system, see z/OS File System Administration.

    4. Unmount the new zFS file system.
  3. On any system in the shared file system configuration, enter the following command:
    F OMVS,NEWROOT=new.root.file.system.name,COND=<YesNo>
    YES
    Proceed conditionally. The system checks for active usage in the current sysplex root file system and reports the active usage in a BPXF245I message. If file activity is found, the command fails with EBUSY return code and JrActivityFound reason code. If file activity is not found, the command continues processing to replace the sysplex root. YES is the default.
    NO
    Proceed unconditionally. The system checks for active usage in the current sysplex root file system and reports the active usage in a BPXF245I message. Replacement of the sysplex root file system continues.

    The migration of the sysplex root file system begins. During the migration, active connections to files and directories in the current sysplex root file system are broken.

    After the migration completes:

    • The root CWD ('/') is updated on all systems in the sysplex to point to the new sysplex root file system.
    • New opens go to the new sysplex root file system. The current sysplex root for the root directory is replaced for all processes in all systems. The current directory for root directory is replaced for any processes that use it
    • Old connections in the previous sysplex root file system might encounter EIO errors.
  4. Update the TYPE parameter and name of the sysplex root file system in the BPXPRMxx member of SYS1.PARMLIB. Because the DDNAME() keyword of the BPXPRMxx ROOT and CMOUNT statements is not supported by zFS, change these statements to use the FILESYSTEM(name) keyword instead.

Reference information

For more information, see the following references:

Instructions:

This portion of the Workflow will guide you to submit a job to run an IBM Health Check for z/OS associated with this upgrade action, IBMUSS,USS_HFS_DETECTED.

This check will be activated if it is not already active. If the check is activated, it will be deactivated at the end of the job, so that it remains in the same state as it was found.

If the health check runs with no exception, this step will be marked "Complete" indicating that this upgrade action requires no more activity.

If the health check finds an exception, this step will be marked as "Failed". This tells you that further investigation (and possibly more work) is necessary to complete this upgrade action. If the step is marked "Failed", you should review the health check output (via any method you use to view health check output, such as SDSF) and correct any situation that you find appropriate. You can then re-run this Workflow step to submit the health check job again, until the health check no longer receives an exception and the step is marked "Complete".


Step 4.31.2 : z/OS UNIX actions to perform before the first IPL of z/OS V2R5


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
UnassignednoFeedbackNo

Description:

This topic describes z/OS UNIX migration actions that you can perform after you have installed z/OS V2R5, but before the first time you IPL. These actions might require the z/OS V2R5 level of code to be installed but do not require it to be active.


Step 4.31.2.1 : z/OS UNIX: Accommodate the new LIMMSG default


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In the BPXPRMxx parmlib member, the parameter LIMMSG is used to control the display of console messages that indicate when parmlib limits are reaching critical levels. This option allows you to determine when certain resources are starting to reach high levels and act upon the issue prior to function failure.

In z/OS V2R5, the default setting for the parameter LIMMSG is changed from NONE to SYSTEM. With this change, console messages are displayed for all processes that reach 85% of system limits.

In addition, messages are displayed for each process limit if either of the following conditions are true:

  • The process limit or limits are defined in the OMVS segment of the owning user ID
  • The process limit or limits are changed with a SETOMVS PID=pid,process_limit command.

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS UNIX System Services.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

Yes, if you use the LIMMSG parameter to limit the display of console messages.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Additional messages might be seen with the new LIMMSG default. The messages are informational only; no system function or processing is changed.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Examine the LIMMSG setting in your active BPXPRMxx parmlib member:

  • If the LIMMSG option is not specified, you are using the old default (NONE). If you want to continue using the old default, you must add LIMMSG(NONE) to the BPXPRMxx member.
  • If the LIMMSG option is specified, and you want to continue using the current setting, you have no action to take. If LIMMSG is set to SYSTEM, you are already using the new default behavior.

Reference information

For more information, see the description of the SETOMVS command in z/OS MVS System Commands.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.31.2.2 : z/OS UNIX: Remove references to the MAXSHAREPAGES option in BPXPRMxx


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

In the BPXPRMxx parmlib member, the option MAXSHAREPAGES is used to to limit the combined UNIX System Services usage of shared pages to avoid system storage constraints. Recently, the system storage constraint associated with shared pages was removed, which eliminates the need to limit shared-page usage by z/OS UNIX System Services.

In z/OS V2R5, the MAXSHAREPAGES parmlib option will be processed for compatibility reasons, but the setting is ignored. For clarity, IBM recommends removing the MAXSHAREPAGES option from BPXPRMxx parmlib members.

z/OS UNIX System Services does not track shared pages or limit their overall usage. MAXSHAREPAGES is no longer included when options are displayed (DISPLAY OMVS,OPTIONS) or in any LIMMSG output, including displaying limits (DISPLAY OMVS,LIMITS).

Information about this upgrade action

The following table provides more details about the upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS UNIX System Services.

When change was introduced:

z/OS V2R5.

Applies to upgrade from:

z/OS V2R4 and z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended if you use the MAXSHAREPAGES option in BPXPRMxx.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

MAXSHAREPAGES is no longer displayed in the output of 'D OMVS,LIMITS' or 'D OMVS,OPTIONS' commands. No shared page usage messages related to MAXSHAREPAGES are issued by the LIMMSG facility.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Remove the MAXSHAREPAGES specification from any BPXPRMxx parmlib members that include it.

Reference information

For more information, see the description of the 'D OMVS' command in z/OS MVS System Commands.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.31.2.3 : z/OS UNIX: Optionally delete the FORKCOPY(COW) option of BPXPRMxx


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Previously, with the FORKCOPY option in the BPXPRMxx parmlib member, copy-on-write (COW) mode could be specified for fork processing. The default was FORKCOPY(COW). In z/OS V2R4, the COW option is disabled. FORKCOPY(COPY) will always be used even if FORKCOPY(COW) is specified.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS UNIX

When change was introduced:

V2R4

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No, but recommended for clarity in the BPXPRMxx parmlib member because FORKCOPY(COPY) will always be used even if FORKCOPY(COW) is specified.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

Less ESQA will be used.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine whether your BPXPRMxx parmlib member specifies FORKCOPY(COW) mode. If so, remove it. FORKCOPY(COPY) is always used, even when FORKCOPY(COW) is specified.

Reference information

For more information about BPXPRMxx, see z/OS MVS Initialization and Tuning Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 4.31.2.4 : z/OS UNIX: Optionally delete the KERNELSTACKS option of BPXPRMxx


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

Description

Previously, with the KERNELSTACK option in the BPXPRMxx parmlib member, stacks could be allocated either above or below the bar. The default was KERNELSTACKS(BELOW). As of z/OS V2R4, stacks are always allocated above the bar. If KERNELSTACKS(BELOW) is specified, it is ignored and the stacks are allocated above the bar.

Information about this upgrade action

The following table provides more details about this upgrade action. Use this information to plan your changes to the system.

Element or feature:

z/OS UNIX

When change was introduced:

V2R4

Applies to upgrade from:

z/OS V2R3.

Timing:

Before the first IPL of z/OS V2R5.

Is the upgrade action required?

No.

Target system hardware requirements:

None.

Target system software requirements:

None.

Other system (coexistence or fallback) requirements:

None.

Restrictions:

None.

System impacts:

None.

Related IBM Health Checker for z/OS check:

None.

Steps to take

Determine whether your BPXPRMxx parmlib member uses the KERNELSTACK option. If so, remove it. The stacks will always be allocated above the bar.

Reference information

For more information about BPXPRMxx, see z/OS MVS Initialization and Tuning Reference.

Instructions:

This information was provided for your understanding and possible further action as dictated by your site policies


Step 5 : Provide feedback to IBM on your upgrade experience


Step State:Step Owner:Step Assignee:Step Feedback:Step Skills:Has called workflow:
Unassignedincompletez/OS Systems ProgrammerNo

Description:

IBM would like your feedback on your upgrade experience

Instructions:

In this example step, you generate a feedback summary file by selecting the workflow instance and clicking "Generate Feedback Summary" in the "Action" drop-own menu. The summary is based on the values that were entered previously. This step is optional.

You may edit the file as you wish after it has been produced. You may re-produce the file, if you change your feedback answers.

Once you would like to send it to IBM, attach the file in an email and sent it to zosmig@us.ibm.com. As you can see in the produced feedback file, only the information you wish to provide will be seen by IBM. No other information will be gathered.

Thank you for providing your feedback to IBM.