Longpela Expertise logo
Longpela Expertise Consulting
Longpela Expertise
Home | Press Room | Contact Us | Site Map
FAQ


LongEx Mainframe Quarterly - May 2010
 

technical: Cross Memory Communications for Beginners

One of the strengths of z/OS is its concept of address spaces. Every process (or address space) has its own storage, and believes that it has the entire z/OS to itself. Separating tasks into address spaces means that a task in one address space cannot access data or affect (crash) a task in another.

However there are times when a task in one address space needs to access data, or even run a program, in another address space. In this article, we look at the options for people new to cross memory communications.

1. SRB

In the early days of z/OS (or MVS, as it was called then), the only way to access storage or run a program in a different address space was to use an SRB (Service Request Block) routine. The SRB actually refers to the control block that holds information on the routine to be run.

SRBs are special beasts - they're not normal tasks. They operate outside the normal TCB-RB control block chain. They are aligned either with the ASCB (local SRB) or the master scheduler (global SRB). This means that they:

  • Always run in supervisor state.
  • Cannot call any SVCs except ABEND (but can use branch entry forms of some macros).
  • Cannot be interrupted except for a page fault or unavailable lock. This means that they can't WAIT.
  • Can run in cross memory and AR mode (we talk more about these shortly).
  • Can issue a PC, or schedule another SRB.
  • Can be very dangerous in the wrong hands.

Here's how they work:

  1. The caller builds a routine to run as an SRB and stores it in CSA.
  2. The caller creates and populates an SRB control block in CSA (not required if using IEAMSCHD).
  3. The caller schedules the SRB using SCHEDULE or IEAMSCHD.
  4. If the caller wants to wait for the SRB, it WAITs on an ECB in CSA.
  5. The SRB runs in the remote address space.
  6. If the caller is waiting, the SRB performs a cross-memory POST when done.

The SRB routine and ECB are put into CSA so they are addressable in the target address space.

Using the more modern IEAMSCHD macro is easier than SCHEDULE. You can include an automatic wait if required, and there's no need to manually build the SRB. You also have more control over the SRBs environment.

SRBs are intended for very short units of work - long running SRBs can 'freeze' an address space. SRBs can be scheduled in cross memory mode (which we talk about a bit later). Although SRBs are often used with existing system, few new ones are being written today. Most of the features can be performed with synchronous cross memory and PCs - with more control, and less scope for disaster.

Advantages:

  • The remote address space doesn't have to be swapped in.
  • The SRB can do whatever it likes in the remote address space.

Disadvantages:

  • Tricky to create.
  • Because the SRB is so powerful, it has a lot of scope for destroying not only address spaces, but the entire z/OS image.
  • SRBs require strong error handling and recovery.
  • The calling program cannot access memory directly. It must rely on the SRB routine to pass the memory back and forth.

2. Basic Cross Memory Mode

Cross memory mode was introduced after the SRB, and allowed a program to access memory in another address space before the invention of access registers and PC instructions. To use this, the caller:

  • Sets AXSET=1 to allow access to any address space.
  • Uses SSAR to set the secondary space to the remote address space.
  • Uses MVCS and MVCP to move data between address spaces.
  • Uses SSAR to set secondary space back.
  • Sets AXSET=0.
This is not very clearly documented by IBM, but works fine when the target address space is non-swappable. If the target address space is swapped out, a S0C4 abend will occur.

Advantages

  • Easy to understand – no complicated synchronous cross memory.
  • Easy to code.

Disadvantages

  • Remote address space must be non-swappable.
  • If another task has set AXSET to something other than 1 or 0, you can't then set it to 1. You're locked out.
  • Cannot access memory in more than two address spaces (primary and secondary) at the same time.
  • Caller must be APF authorised.
  • Must use MVCP and MVCS to move data between the primary and secondary address spaces - cannot use other instructions like CLC, MVST, MVCL to address anything in the secondary address space.

Sample Code

In this sample routine, the ASID of the target (remote) address space is already stored in the RMTASID word.

* ---------------------------------------------------
* Setup everything
* ---------------------------------------------------
        XC   RMTASN,RMTASN
        LH   R1,RMTASID     Get remote ASID
        ST   R1,REQASN+2    Save it
        XR   R2,R2
        ESAR R2             Get Our ASN
        ST   R2,HOMEASN     Save Our ASN
		
* ---------------------------------------------------
* Get into cross memory mode
* ---------------------------------------------------
        MODESET KEY=ZERO,MODE=PROB  Into key 0
        LA   R2,1
        AXSET AX=(R2)       Auth index = 1 (all)
        L    R2,RMTASN
        SSAR R2             Into Cross memory mode

* ---------------------------------------------------
* Move storage
* ---------------------------------------------------
    (use MVCS and MVCP for copying storage)

* ---------------------------------------------------
* Get out of cross memory mode
* ---------------------------------------------------
        MODESET KEY=NZERO,MODE=PROB Back to key 8
        L    R2,OURASN
        SSAR R2  
        XR   R2,R2  
        AXSET AX=(R2)       Auth index = 0 (none)

* ---------------------------------------------------
* Back to caller
* ---------------------------------------------------
        BR   R14

* ---------------------------------------------------
* Storage
* ---------------------------------------------------
HOMEASN DS   F              Home ASN
RMTASN  DS   F              Remote ASN

The basic cross memory facility introduced the idea of home, primary and secondary address spaces:

  • Home - where the program was called from, or where the program's TCB is.
  • Primary - where the instructions for the program are, and the default area where the data is.
  • Secondary - a second address space where data can be accessed.

In the above example, the instruction SSAR is used to set the secondary address space, and ESAR to get it. EPAR can be used to get the primary address space (but there's no instruction to set it).

Many macros and services cannot be called in cross memory mode. Check the relevant documentation before using them.

The use of basic cross memory services is not recommended - Access Register mode is a far better option.

3. Access Register Mode

With access registers (ARs), cross memory became more stylish. For every general register (GPR), there is a corresponding AR. So AR3 is paired with GPR3. In AR mode, the AR can be used to determine the address space that the corresponding GPR refers to. To use this, the caller:

  • Gets the access list entry token (ALET) for the remote address space.
  • Puts the ALET into the access register (say AR3).
  • Sets AR mode (SAC 512 instruction).
  • Uses the corresponding general register when referring to memory in the remote address space (GPR3 in this case).
  • Gets out of AR mode (SAC 0) when done.
  • Clears the AR.

Advantages

  • Remote address space doesn't have to be swapped in.
  • Can call SVCs.
  • Can communicate with up to 16 address spaces at the same time.
  • Have access to all instructions (like CLC and MVI) to access remote address space memory. Do not need to move storage from one address space to another to reference it.

Code Example

In this example, the address of the ASSB for the target (remote) address space is already held in the RMTASSB word (this can be found in the ASCBASSB field of the target ASCB), and RMTADDR holds the address in the target address space of 50 bytes of data.

* -----------------------------------------------------
* Setup environment
* -----------------------------------------------------
        LAM  R0,R15,=16F'0'   Set all ARs to zero

* -----------------------------------------------------
* Get ALET of remote address space
* -----------------------------------------------------
        USING ASSB,R12
        L    R12,RMTASSB      Load remote ASSB addr
        ALESERV ADD,STOKEN=ASSBSTKN,ALET=RMTALET,CHKEAX=NO
        DROP R12
        LTR  R15,R15          Check return code
        BNZ  ERROR            If unsuccessful skip out

* -----------------------------------------------------
* Copy first word and next 50 bytes from remote
* address space
* -----------------------------------------------------
        LAM  R3,R3,RMTALET    Store ALET in AR3
        SAC  512              Into AR mode
        SYSSTATE ASCENV=AR    Tell macros are in AR mode
        L    R3,RMTADDR       Store address in GPR3
        L    R4,0(,R3)        Move first word into R4
        MVC  AREA1(50),4(R3)  Move 50 bytes from rmt a/s
        SAC  0                Out of AR mode
        SYSSTATE ASCENV=P     Tell macros out of AR mode

* -----------------------------------------------------
* Cleanup access registers and ALET
* -----------------------------------------------------
        LAM  R3,R3,=F'0'      Clear AR3
        ALESERV DELETE,ALET=RMTALET,CHKEAX=NO

Notes:

  • In this example, the access registers are set to zero at the beginning. This is a good habit to get in to, so there's no chance of accidentally addressing a different address space.
  • Always use the SYSSTATE macro when going into and out of AR mode, so any macros called will be expanded correctly. Some macros have a different expansion, depending on the addressing mode.
  • You don't have to use the ALESERV to get the ALET. There are three special ALETs:
    • 0 = Primary Address Space
    • 1 = Secondary Address Space
    • 2 = Home Address Space
    So you could use the basic cross memory functions to set the secondary address space, then use an ALET of 1 in the AR.
  • Many macros and services cannot be called in AR mode. Check the relevant documentation before using them.
  • Access Registers only affect the base register for all instructions. In the above example, the first word from the area in the remote address space is loaded into R4. We used the instruction
          L R4,0(,R3)
    R3 is the base register. If we had used
          L R4,0(R3)
    (with R3 as the index register) we would have moved the word from the primary address space, not the target address space.

4. Synchronous Cross Memory

This is the Program Call (PC) routine. A service provider creates a routine, and stores it in memory. The provider then sets up a PC routine number pointing to this routine, authorisation (who can access it - which address space, authorised or non-authorised etc.) and the environment.

z/OS provides some 'hard-wired' PCs with fixed PC numbers. For the rest of us, we need to setup PC routines with standard macros provided by z/OS. The service provider must:

  1. Define a PC routine and environment using ETDEF.
  2. Create an entry table using ETCRE.
  3. Connect the PC routine to the linkage table for the client address space using a linkage index (LX) - either a system linkage (all address spaces can use it) or a non-system LX (specific address spaces can use it).
  4. Provide the user with a PC number (obtained by concatenating the LX and the entry table index - EX). This cannot be known before the PC is created. The provider must also provide a way for callers to obtain this number: by storing this number in a control block accessible to the calling program (almost always in CSA) or using a Name/Token pair.
  5. Create correct PT and SSAR authority for the PC routine using the ATSET and AXSET macros.
The caller must:
  1. Obtain the PC number of the routine (from the control block or Name/Token pair).
  2. Setup any parameters to be passed to the PC routine.
  3. Call the PC routine. 

There are two types of PC routine:

  • Basic - The original PC routine. It receives control in Primary mode, and supervisor or problem state (but almost always supervisor state so the PCLINK macro can be used to save and restore the caller's environment). The PC routine must manually save and restore the caller's environment.
  • Stacking - The new kid on the block. It receives control in Primary or AR mode, and the system automatically saves the caller's environment.

Almost everyone uses stacking PC instructions.

Advantages

  • Client does not have to be APF authorised.
  • Can use cross memory and AR mode to access memory in different address spaces.
  • PC routine owner has a lot of control as to who can use the PC routine, and in which environment.
  • No interrupt when PC is called (unlike SVC).
  • PC routine is dynamically added and changed.
  • There is no way to bypass or update the PC using something similar to the SVCUPDTE or SVC Screen Facility.
  • PC routine can be called from users that cannot call an SVC (as there's no interrupt).
  • PC routines can call another PC routine.

The PC routine can provide a client with resources to access other address spaces and perform authorised services. PC routines are rapidly replacing SVC routines.

References

Article Modifications

The special ALET values in the original article were incorrect, and modified in Jun-2014. Thanks to Benjamin Dissen and Phil Smith III for letting us know


David Stephens



LongEx Quarterly is a quarterly eZine produced by Longpela Expertise. It provides Mainframe articles for management and technical experts. It is published every November, February, May and August.

The opinions in this article are solely those of the author, and do not necessarily represent the opinions of any other person or organisation. All trademarks, trade names, service marks and logos referenced in these articles belong to their respective companies.

Although Longpela Expertise may be paid by organisations reprinting our articles, all articles are independent. Longpela Expertise has not been paid money by any vendor or company to write any articles appearing in our e-zine.

Inside This Month

Printer Friendly Version

Read Previous Articles


Longpela Expertise can develop, debug and support assembler applications, exits and systems routines. Contact us to get your own assembler expert.
© Copyright 2010 Longpela Expertise  |  ABN 55 072 652 147
Legal Disclaimer | Privacy Policy Australia
Website Design: Hecate Jay