Installation instructions for fix UI26951 for IBM Rational Developer for System z v80 (FMID HHOP801)

The fix is shipped as file IBM.HHOP801.UI26951

The fix has rework (build) date 2015112 (22 Apr 2015)

The following fixes are prerequisites for this fix:

These prerequisites can be downloaded from the Developer for System z Recommended Fixes page, if not included as file IBM.HHOP801.<prereq>.

Overview of the installation steps

Steps required to install the fix:

  1. Allocate host data sets for the fix.
  2. Upload the fix from your workstation to z/OS.
  3. SMP/E hold information for the fix.
  4. Perform SMP/E ACCEPT for the prerequisites.
  5. Perform SMP/E RECEIVE and APPLY for the fix.
  6. Restart started tasks to activate changes.

Allocate host data sets for the fix

A sequential data set must be allocated on the z/OS system to receive the fix that you will upload from your workstation. You can do this by submitting the job below. Add a job card and modify the parameters to meet your site's requirements before submitting.

//ALLOC    EXEC PGM=IEFBR14
//*
//UI26951    DD DSN=hlq.IBM.HHOP801.UI26951,
//            DISP=(NEW,CATLG,DELETE),
//            DSORG=PS,
//            RECFM=FB,
//            LRECL=80,
//            UNIT=SYSALLDA,
//*            VOL=SER=volser,
//*            BLKSIZE=6160,
//            SPACE=(TRK,(92,10))
//*

Upload the fix from your workstation to z/OS

Upload the file in binary format from your workstation to the z/OS data set. On a Windows system, you can use FTP from a command prompt to upload the file. In the sample dialog shown below, commands or other information entered by the user are in bold, and the following values are assumed:

User enters: Values
mvsaddr TC P/IP address of the z/OS system
tsouid Your TSO user ID
tsopw Your TSO password
d: Your drive containing the fix files
hlq High-level qualifier that you used for the data set that you allocated in the job above
C:\>ftp mvsaddr
Connected to mvsaddr.
220-FTPD1 IBM FTP CS %version% at mvsaddr, %time% on %date%.
220 Connection will close if idle for more than 60 minutes.
 
User (mvsaddr:(none)): tsouid
331 Send password please.
 
Password: tsopw
230 tsouid is logged on.  Working directory is "tsouid.".
 
ftp> cd ..
250 "" is the working directory name prefix.
 
ftp> cd hlq
250 "hlq." is the working directory name prefix.
 
ftp> binary
200 Representation type is Image
 
ftp> put d:\IBM.HHOP801.UI26951
200 Port request OK.
125 Storing data set hlq.IBM.HHOP801.UI26951
250 Transfer completed successfully
5109760 bytes sent in 0.28 seconds
 
ftp> quit
221 Quit command received. Goodbye.

SMP/E hold information for the fix

++HOLD(UI26951) SYS FMID(HHOP801) REASON(ACTION) DATE(15112)                   
   COMMENT                                                                      
    (****************************************************************           
     * Affected function: audit                                     *           
     ****************************************************************           
     * Description: additional audit records                        *           
     ****************************************************************           
     * Timing: post-APPLY                                           *           
     ****************************************************************           
     * Part: n/a                                                    *           
     ****************************************************************           
     This fix introduces new audit records that track z/OS UNIX                 
     activity.                                                                  
     * File access (read, write, create, delete, rename)                        
     * Execution of z/OS UNIX commands                                          
     ****************************************************************           
     * Affected function: CARMA                                     *           
     ****************************************************************           
     * Description: CA Endevor(R) SCM VSAM update                   *           
     ****************************************************************           
     * Timing: post-APPLY                                           *           
     ****************************************************************           
     * Part: SFEKVSM2(CRA0VCAD)                                     *           
     ****************************************************************           
     This maintenance updates the CRADEF VSAM data set                          
     used by the Developer for System z interface to CA Endevor(R).             
                                                                                
     To apply these changes to your active VSAM data set, resubmit              
     the customized SFEKSAMP(CRA$VCAD).                                         
     ****************************************************************           
     * Affected function: RSE                                       *           
     ****************************************************************           
     * Description: new environment variables                       *           
     ****************************************************************           
     * Timing: pre-APPLY                                            *           
     ****************************************************************           
     * Part: /usr/lpp/rdz/samples/rsed.envvars                      *           
     *       [/etc/rdz/rsed.envvars]                                *           
     ****************************************************************           
     This fix updates the sample rsed.envvars by adding the                     
     following optional directives:                                             
                                                                                
     #_RSE_JAVAOPTS="$_RSE_JAVAOPTS -Denable.saf.check=true"                    
                                                                                
     Verify access permits before accessing a data set. The default             
     value is false. Uncomment and specify true if you want RSE to              
     call your security product before accessing a data set to avoid            
     S913 abends (access denied). RSE itself recovers from an S913              
     abend, but Language Environment (LE) does count the S913 abend             
     if you specify a non-zero value for the ERRCOUNT LE option.                
                                                                                
     #_RSE_JAVAOPTS="$_RSE_JAVAOPTS -Denable.dDVIPA=true"                       
                                                                                
     Enable distributed dynamic VIPA support. The default value is              
     false. Uncomment and specify true if you want to use RSE in a              
     distributed dynamic VIPA setup.                                            
                                                                                
     ****************************************************************           
     * Affected function: RSE                                       *           
     ****************************************************************           
     * Description: new environment variables                       *           
     ****************************************************************           
     * Timing: post-APPLY                                           *           
     ****************************************************************           
     * Part: /usr/lpp/rdz/samples/rsed.envvars                      *           
     *       [/etc/rdz/rsed.envvars]                                *           
     ****************************************************************           
     This fix updated sample file rsed.envvars.                                 
     Redo your customizations, if any, after applying this                      
     maintenance.                                                               
     ****************************************************************           
     * Affected function: RSE                                       *           
     ****************************************************************           
     * Description: new environment variables                       *           
     ****************************************************************           
     * Timing: pre-APPLY                                            *           
     ****************************************************************           
     * Part: /usr/lpp/rdz/samples/rsed.envvars                      *           
     *       [/etc/rdz/rsed.envvars]                                *           
     ****************************************************************           
     This fix updates the sample rsed.envvars by adding the                     
     following optional directives:                                             
                                                                                
     #_RSE_JAVAOPTS="$_RSE_JAVAOPTS -Dlog.file.mode=RW.N.N"                     
                                                                                
     Access permission mask for log files and log directories. The              
     default is RW.N.N, which allows the owner read and write access.           
     The owner's default group and everyone else have no access. To             
     set the required access permissions, uncomment and customize.              
     UNIX standards dictate that permissions can be set for three               
     types of users: owner, group, and other. The fields in this                
     variable match this order, and the fields are separated by a               
     period (.). Each field can be empty (which equals N), or have              
     N, R, W, or RW as values, where N = none, R = read and W =                 
     write.                                                                     
                                                                                
     #_RSE_JAVAOPTS="$_RSE_JAVAOPTS -Dlog.secure.mode=true"                     
                                                                                
     Validate log-directory ownership. The default is false, which              
     skips the test where RSE validates that a user (RSE daemon                 
     itself or a client user ID) is the owner of the directory in               
     which the logs will be written. Uncomment and specify true to              
     enable the directory ownership test and write the log files only           
     if it is successful. Console message FEK301E is issued when the            
     test is not successful.                                                    
                                                                                
     ****************************************************************           
     * Affected function: RSE                                       *           
     ****************************************************************           
     * Description: new environment variables                       *           
     ****************************************************************           
     * Timing: post-APPLY                                           *           
     ****************************************************************           
     * Part: /usr/lpp/rdz/samples/rsed.envvars                      *           
     *       [/etc/rdz/rsed.envvars]                                *           
     ****************************************************************           
     This fix updated sample file rsed.envvars.                                 
     Redo your customizations, if any, after applying this                      
     maintenance.                                                               
                                                                                
     ****************************************************************           
     * Affected function: console messages                          *           
     ****************************************************************           
     * Description: new message, FEK301E, FEK303E, FEK304W, FEK305E *           
     ****************************************************************           
     * Timing: post-APPLY                                           *           
     ****************************************************************           
     * Part: n/a                                                    *           
     ****************************************************************           
     This maintenance introduces new console messages                           
                                                                                
     FEK301E = {0} (uid:{1}) does not own the directory of {2}                  
       (file_owner uid:{3})                                                     
     FEK303E = The symbolic link, {0}, cannot be used as a log                  
       directory                                                                
                                                                                
     When rsed.envvars variable log.secure.mode is enabled, RSE will            
     validate that a user (client or RSE itself) owns the directory             
     in which log files will be written, and that the log directory             
     is not a symbolic link. These messages are issued when the                 
     related test fails.                                                        
                                                                                
     FEK304W Invalid {0}, {1}, was specified. The default mode, {3},            
       is used instead.                                                         
                                                                                
     RSE will issue this message when an inviled file permission                
       mask is specified in rsed.envvars.                                       
                                                                                
     FEK305E The ID, {0}, does not have appropriate privileges to               
       access {1}.                                                              
                                                                                
     RSE will issue this message when it cannot access a log                    
     directory.                                                                 
                                                                                
     ****************************************************************           
     * Affected function: log files                                 *           
     ****************************************************************           
     * Description: new script to update log file access permits    *           
     ****************************************************************           
     * Timing: post-APPLY                                           *           
     ****************************************************************           
     * Part: FEK.SFEKSAMP(FEKPBITS)                                 *           
     *       [FEK.#CUST.JCL(FEKPBITS)]                              *           
     ****************************************************************           
     This maintenance adds a new sample JCL, SFEKSAMP(FEKPBITS),                
     which can be used to update existing log file permissions.                 
                                                                                
     It is intended to update an existing log infrastructure so all             
     slog files comply with the new, more secure, file access permits).         
  

Perform SMP/E ACCEPT for the prerequisites

SMP/E ACCEPT the prerequisites to facilitate an easy backout of the fix, if required. Note that once accepted, you cannot backout the accepted prerequisites.

This step can be skipped if there are no prerequisites, or if there is a reason to not make a prerequisite permanent.

You can accept the prerequisites by submitting the job below. Add a job card and modify the parameters to meet your site's requirements before submitting.

//*
//* Change #globalcsi to the data set name of your global CSI.
//* Change #dzone to your CSI distribution zone name.
//*
//ACCEPT   EXEC PGM=GIMSMP,REGION=0M
//SMPCSI   DD DISP=OLD,DSN=#globalcsi
//SMPCNTL  DD *
   SET BOUNDARY(#dzone) .
   ACCEPT SELECT(
                 UK96308
                 UK90246
                 UK81498
                 UK77465
                 UK76573
                 UK72577
                 UK67739
          ) REDO COMPRESS(ALL) BYPASS(HOLDSYS,HOLDERROR).
//*

Perform SMP/E RECEIVE and APPLY for the fix

SMP/E RECEIVE and APPLY the fix.

You can do this by submitting the job below. Add a job card and modify the parameters to meet your site's requirements before submitting.

//*
//* Change hlq to the high level qualifier used to upload the fix.
//* Change (2x) #globalcsi to the data set name of your global CSI.
//* Change #tzone to your CSI target zone name.
//*
//RECEIVE  EXEC PGM=GIMSMP,REGION=0M
//SMPCSI   DD DISP=OLD,DSN=#globalcsi
//SMPPTFIN DD DISP=SHR,DSN=hlq.IBM.HHOP801.UI26951
//SMPCNTL  DD *
   SET BOUNDARY(GLOBAL) .
   RECEIVE SELECT(UI26951) SYSMODS LIST .
//*
//APPLY    EXEC PGM=GIMSMP,REGION=0M
//SMPCSI   DD DISP=OLD,DSN=#globalcsi
//SMPCNTL  DD *
   SET BOUNDARY(#tzone) .
   APPLY SELECT(UI26951) REDO COMPRESS(ALL) BYPASS(HOLDSYS,HOLDERROR).
//*

Restart started tasks to activate changes

Restart started tasks to activate changes.