DFSMS Macro Instructions for Data Sets
Total Page:16
File Type:pdf, Size:1020Kb
z/OS Version 2 Release 3 DFSMS Macro Instructions for Data Sets IBM SC23-6852-30 Note Before using this information and the product it supports, read the information in “Notices” on page 413. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-15 © Copyright International Business Machines Corporation 1976, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... xi List of Tables.......................................................................................................xiii About this book....................................................................................................xv Preparing your books for use..................................................................................................................... xv Required product knowledge.................................................................................................................... xvi Notational conventions.......................................................................................xvii Macro format............................................................................................................................................xviii Rules for register usage....................................................................................................................... xix Environmental considerations..............................................................................................................xx Rules for continuation lines.................................................................................................................. xx z/OS information................................................................................................xxii How to send your comments to IBM................................................................... xxiii If you have a technical problem.............................................................................................................. xxiii Summary of changes......................................................................................... xxiv Summary of changes for z/OS Version 2 Release 3 (V2R3)................................................................... xxiv Summary of changes for z/OS Version 2 Release 2 (V2R2)................................................................... xxiv Summary of changes for z/OS Version 2 Release 1 (V2R1) as updated September, 2014....................xxv Summary of changes for z/OS Version 2 Release 1 (V2R1) as updated December 2013......................xxv z/OS Version 2 Release 1 summary of changes.......................................................................................xxv Part 1. VSAM Macro Instructions............................................................................1 Chapter 1. Introduction to VSAM programming..........................................................................................3 Chapter 2. VSAM macro descriptions and examples.................................................................................. 5 Subparameters with GENCB, MODCB, SHOWCB, and TESTCB.............................................................5 Use of list, execute, and generate forms of VSAM macros....................................................................6 List-form keyword............................................................................................................................. 6 Execute-form keyword......................................................................................................................7 Generate-form keyword....................................................................................................................7 Examples of generate, list, and execute forms......................................................................................8 Example: generate form (reentrant).................................................................................................8 Example: remote-list form (reentrant).............................................................................................8 Example: execute form (reentrant).................................................................................................. 9 ACB—Generate an access method control block at assembly time..................................................... 9 Example 1: ACB macro................................................................................................................... 16 Example 2: ACB macro................................................................................................................... 16 BLDVRP—Build VSAM resource pool................................................................................................... 17 Example 1: obtaining an LSR pool above 16 megabytes...............................................................20 Example 2: request for separate data and index resource pools..................................................20 BLDVRP—List form.......................................................................................................................... 21 BLDVRP—Execute form...................................................................................................................21 CHECK—Wait for completion of a request........................................................................................... 21 Example 1: check return codes after an asynchronous request................................................... 22 Example 2: check return codes after a synchronous request....................................................... 22 Example 3: overlap processing...................................................................................................... 22 Example 4: suspend a request for many records.......................................................................... 23 CLOSE—Disconnect program and data................................................................................................ 24 Example: CLOSE macro.................................................................................................................. 25 iii DLVRP—Delete VSAM resource pool....................................................................................................25 Example: DLVRP macro.................................................................................................................. 26 DLVRP—Execute form..................................................................................................................... 26 ENDREQ—Terminate a request............................................................................................................ 27 Example: release positioning for another request.........................................................................27 ERASE—Delete a record....................................................................................................................... 28 Example 1: keyed-direct deletion (KSDS, RRDS)...........................................................................28 Example 2: addressed-sequential deletion (ESDS, KSDS)............................................................29 EXLST—Generate an exit list at assembly time................................................................................... 30 Example: EXLST macro...................................................................................................................31 GENCB—Generate an access method control block at execution time..............................................31 Example: GENCB macro (generate an access method control block).......................................... 36 Example: GENCB macro (generate an access method control block).......................................... 37 GENCB—Generate an exit list at execution time................................................................................. 37 Example: GENCB macro (generate an exit list)..............................................................................39 GENCB—Generate a request parameter list at execution time.......................................................... 40 Building a chain of request parameter lists................................................................................... 43 Example: GENCB macro (generate a request parameter list).......................................................44 Example: GENCB macro (generate a request parameter list).......................................................44 GENCB—List form........................................................................................................................... 45 GENCB—Execute form.................................................................................................................... 45 GENCB—Generate form..................................................................................................................46 GET—Retrieve a record.........................................................................................................................46 Example 1: keyed-sequential retrieval—forward (KSDS, RRDS)................................................... 46 Example 2: keyed-sequential