DFSMS Macro Instructions for Data Sets

Total Page:16

File Type:pdf, Size:1020Kb

DFSMS Macro Instructions for Data Sets z/OS Version 2 Release 3 DFSMS Macro Instructions for Data Sets IBM SC23-6852-30 Note Before using this information and the product it supports, read the information in “Notices” on page 413. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-15 © Copyright International Business Machines Corporation 1976, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... xi List of Tables.......................................................................................................xiii About this book....................................................................................................xv Preparing your books for use..................................................................................................................... xv Required product knowledge.................................................................................................................... xvi Notational conventions.......................................................................................xvii Macro format............................................................................................................................................xviii Rules for register usage....................................................................................................................... xix Environmental considerations..............................................................................................................xx Rules for continuation lines.................................................................................................................. xx z/OS information................................................................................................xxii How to send your comments to IBM................................................................... xxiii If you have a technical problem.............................................................................................................. xxiii Summary of changes......................................................................................... xxiv Summary of changes for z/OS Version 2 Release 3 (V2R3)................................................................... xxiv Summary of changes for z/OS Version 2 Release 2 (V2R2)................................................................... xxiv Summary of changes for z/OS Version 2 Release 1 (V2R1) as updated September, 2014....................xxv Summary of changes for z/OS Version 2 Release 1 (V2R1) as updated December 2013......................xxv z/OS Version 2 Release 1 summary of changes.......................................................................................xxv Part 1. VSAM Macro Instructions............................................................................1 Chapter 1. Introduction to VSAM programming..........................................................................................3 Chapter 2. VSAM macro descriptions and examples.................................................................................. 5 Subparameters with GENCB, MODCB, SHOWCB, and TESTCB.............................................................5 Use of list, execute, and generate forms of VSAM macros....................................................................6 List-form keyword............................................................................................................................. 6 Execute-form keyword......................................................................................................................7 Generate-form keyword....................................................................................................................7 Examples of generate, list, and execute forms......................................................................................8 Example: generate form (reentrant).................................................................................................8 Example: remote-list form (reentrant).............................................................................................8 Example: execute form (reentrant).................................................................................................. 9 ACB—Generate an access method control block at assembly time..................................................... 9 Example 1: ACB macro................................................................................................................... 16 Example 2: ACB macro................................................................................................................... 16 BLDVRP—Build VSAM resource pool................................................................................................... 17 Example 1: obtaining an LSR pool above 16 megabytes...............................................................20 Example 2: request for separate data and index resource pools..................................................20 BLDVRP—List form.......................................................................................................................... 21 BLDVRP—Execute form...................................................................................................................21 CHECK—Wait for completion of a request........................................................................................... 21 Example 1: check return codes after an asynchronous request................................................... 22 Example 2: check return codes after a synchronous request....................................................... 22 Example 3: overlap processing...................................................................................................... 22 Example 4: suspend a request for many records.......................................................................... 23 CLOSE—Disconnect program and data................................................................................................ 24 Example: CLOSE macro.................................................................................................................. 25 iii DLVRP—Delete VSAM resource pool....................................................................................................25 Example: DLVRP macro.................................................................................................................. 26 DLVRP—Execute form..................................................................................................................... 26 ENDREQ—Terminate a request............................................................................................................ 27 Example: release positioning for another request.........................................................................27 ERASE—Delete a record....................................................................................................................... 28 Example 1: keyed-direct deletion (KSDS, RRDS)...........................................................................28 Example 2: addressed-sequential deletion (ESDS, KSDS)............................................................29 EXLST—Generate an exit list at assembly time................................................................................... 30 Example: EXLST macro...................................................................................................................31 GENCB—Generate an access method control block at execution time..............................................31 Example: GENCB macro (generate an access method control block).......................................... 36 Example: GENCB macro (generate an access method control block).......................................... 37 GENCB—Generate an exit list at execution time................................................................................. 37 Example: GENCB macro (generate an exit list)..............................................................................39 GENCB—Generate a request parameter list at execution time.......................................................... 40 Building a chain of request parameter lists................................................................................... 43 Example: GENCB macro (generate a request parameter list).......................................................44 Example: GENCB macro (generate a request parameter list).......................................................44 GENCB—List form........................................................................................................................... 45 GENCB—Execute form.................................................................................................................... 45 GENCB—Generate form..................................................................................................................46 GET—Retrieve a record.........................................................................................................................46 Example 1: keyed-sequential retrieval—forward (KSDS, RRDS)................................................... 46 Example 2: keyed-sequential
Recommended publications
  • IBM System/360 Operating System Sequential Access Methods Program Logic Manual
    Y28-6604-1 Program Logic IBM System/360 Operating System Sequential Access Methods Program Number 3S0S-DM-50B This publication describes the internal logic of the routines of the queued sequen­ tial access method, the basic sequential access method, and the basic partitioned access method of IBM System/360 Operating System. Program Logic Manuals are intended for use by IBM customer engineers involved in program maintenance, and by system pro­ grammers involved in altering the program design. Program logic information is not necessary for program operation and use; therefore, distribution of this manual is limited to persons with program maintenance or modification responsibilities. Restricted Distribution PREFACE This publication describes the sequen­ • Buffer pool management routines that tial access method facilities in IBM Oper­ furnish buffer space in main storage. ating System/360. It describes routines in five categories: PREREQUISITE PUBLICATIONS • Queued sequential access method rou­ tines that cause storage and retrieval Knowledge of the information in the of data records arranged in sequential following publications is required for an order .• understanding of this publication: • Basic sequential access method routines IBM system/360 Operating System: Data that cause storage and retrieval of Management, Form C28-6537 data blocks arranged in sequential order. IB,M Systerol360 Operating System: Intro­ duction to Control Program Logic. Pro­ • Basic partitioned access method rou­ gram Logic Manual, Form Y28-6605 tines that cause storage and retrieval of data blocks in a member of a parti­ tioned data set, and construct entries and search for entries in the directory RECOMMENDED READING of a partitioned data set. The publication IBM System/360 Operating • Executors that operate with System: Control Program SerVices, Form input/output supp~rt routines.
    [Show full text]
  • CA MII Data Sharing for Z/OS CA MII Programming Guide
    CA MII Data Sharing for z/OS CA MII Programming Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe: z/OS Basics An introduction to mainframe computing on the IBM zSeries platform z/OS concepts and facilities for students and beginners zSeries hardware and peripheral devices Mike Ebbers Wayne O’Brien Bill Ogden ibm.com/ International Technical Support Organization z/OS Basics March 2005 SG24-6366-00 Note: Before using this information and the product it supports, read the information in “Notices” on page -1. First Edition (March 2005) © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . xvii How this text is organized . xvii How each chapter is organized . xviii Acknowledgements . xix Comments welcome. xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 1-1 1.1 The new mainframe. 1-2 1.2 Evolving architecture . 1-2 1.3 Mainframes in our midst . 1-4 1.4 What is a mainframe? . 1-5 1.5 Who uses mainframe computers?. 1-7 1.6 Factors contributing to mainframe use . 1-8 1.6.1 Reliability, availability, and serviceability. 1-9 1.6.2 Security . 1-10 1.6.3 Scalability . 1-10 1.6.4 Continuing compatibility . 1-11 1.7 Typical mainframe workloads . 1-11 1.7.1 Batch processing. 1-12 1.7.2 Online transactional processing . 1-15 1.8 Roles in the mainframe world . 1-17 1.8.1 Who is the system programmer? . 1-19 1.8.2 Who is the system administrator? .
    [Show full text]
  • IBM Mainframe Utility Programs ­ Wikipedia, the Free Encyclopedia IBM Mainframe Utility Programs from Wikipedia, the Free Encyclopedia
    9/11/2015 IBM mainframe utility programs ­ Wikipedia, the free encyclopedia IBM mainframe utility programs From Wikipedia, the free encyclopedia IBM mainframe utility programs are Utility software supplied with IBM mainframe operating systems such as MVS to carry out various tasks associated with datasets, etc. The following list describes utilities distributed with OS/360 and successors. No VSE or VM utilities are included. Contents 1 History/Common JCL 2 Dataset utilities 2.1 IDCAMS 2.2 IEBCOMPR 2.3 IEBCOPY 2.4 IEBDG 2.5 IEBEDIT 2.6 IEBGENER 2.7 IEBIMAGE 2.8 IEBISAM 2.9 IEBPTPCH 2.10 IEBUPDTE 3 Scheduler utilities 3.1 IEFBR14 4 System utilities 4.1 ICKDSF 4.2 IEHDASDR 4.3 IEHINITT 4.4 IEHLIST 4.5 IEHMOVE 4.6 IEHPROGM 5 Supporting programs 5.1 SORT 5.2 Compilers/Linker 5.3 DFSMS 6 References 7 See also 8 External links History/Common JCL Many of these utilities were designed by IBM users, through the group SHARE, and then modified or extended by IBM from versions originally written by a user. https://en.wikipedia.org/wiki/IBM_mainframe_utility_programs 1/14 9/11/2015 IBM mainframe utility programs ­ Wikipedia, the free encyclopedia These utilities are usually invoked via Job Control Language (JCL). They tend to use common JCL DD identifiers for their data sets: DDNAME Usual function input file for the 'commands' for the utility. Often set to DUMMY if the default action is SYSIN desired SYSUT1 input file SYSUT2 output file SYSUT3 work (spill) file for input (SYSUT1) (often not used) SYSUT4 work (spill) file for output (SYSUT2) (often not used) SYSPRINT output file for printed output from the utility SYSOUT output file for messages from the utility SYSUDUMP output file for a system 'dump' if the program fails Dataset utilities IDCAMS IDCAMS ("Access Method Services") generates and modifies Virtual Storage Access Method (VSAM) and Non­VSAM datasets.
    [Show full text]
  • Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973)
    GC28-0661-1 File No. S370-34 Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973) This edition is a reprint of GC28-0661{) incorporating some editorial changes. It does not obsolete GC28-0661-O. This edition applies to Release 2 of OS/VS2 and to all subsequent releases until otherwise indicated in new editions or Technical Newsletters. Changes are continually made to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/360 and System/370 Bibliography, Order No. GA22-6822, and the current SRL Newsletter. Order No. GN20-0360, for the editions that are applicable and current. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this pUblication. If the form has been removed, comments may be addressed to IBM Corporation, Publications Development, iJepartment 058, Building 706-2, PO Box 390, Poughkeepsie, N.Y. 12602. Comments and suggestions become the property of IBM. © Copyright International Business Machines Corporation 1973 Preface This publication contains introductory information Design Concepts -- shows sequence of operation and about OS/VS2 Release 2, a system control other highlights of system design. program (SCP) that features virtual storage, System Requirements -- lists the basic hardware multiprogramming, multiprocessing, time sharing, requirements. and job entry subsystems. It is assumed that readers have a basic knowledge of programming Compatibility -- points out the major differences systems such as OS/MVT or OS/VS2 Release 1.
    [Show full text]
  • High Level Assembler for Z/OS & Z/VM & Z/VSE: Programmer's Guide
    High Level Assembler for z/OS & z/VM & z/VSE Programmer's Guide Version 1 Release 6 SC26-4941-06 Note Before using this information and the product it supports, be sure to read the general information under “Notices” on page 397. This edition applies to IBM High Level Assembler for z/OS & z/VM & z/VSE, Release 6, Program Number 5696-234 and to any subsequent releases until otherwise indicated in new editions. Make sure that you are using the correct edition for the level of the product. Order publications through your IBM representative or the IBM branch office serving your locality. IBM welcomes your comments. For information on how to send comments, see “How to send your comments to IBM” on page xix. © Copyright IBM Corporation 1992, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...............ix *PROCESS statement options .......37 Default options ............37 Tables ...............xi Invoking the assembler dynamically .....37 Coding rules .............37 Assembler options ............38 About this document ........xiii ADATA...............39 Who should use this document .......xiii ALIGN ...............39 Programming interface information ......xiii ASA (z/OS and CMS) ..........40 Organization of this document........xiii BATCH...............40 High Level Assembler documents .......xv CODEPAGE .............41 Documents .............xv COMPAT ..............42 Collection kits ............xvi DBCS ...............43 Related publications ...........xvi DECK ...............43 Syntax notation .............xvi DISK (CMS) .............44 DXREF ...............44 How to send your comments to IBM xix ERASE (CMS) ............45 If you have a technical problem .......xix ESD................45 EXIT................46 Summary of changes ........xxi FLAG ...............48 FOLD ...............51 Chapter 1.
    [Show full text]
  • Computer Labs for the Introduction to the New Mainframe: Z/OS Basics
    Computer Labs for the Introduction to the New Mainframe: z/OS Basics course Instructor Version The following labs are from the Introduction to the New Mainframe: z/OS Basics course/Redbook. These labs have been run and tested using the computer hub at Marist College in Poughkeepise, NY. You may need to adjust these labs to run on a computer system other than the one at Marist College. Chapter 2 Exercises (Section 2.16) ........................................................................................ 4 To display the CPU configuration ...................................................................................... 4 To display the page data set usage ..................................................................................... 4 To display information about the current Initial Program Load (IPL) ............................... 4 Instructor Notes .................................................................................................................. 4 Chapter 4 Exercises (Section 4.7) .......................................................................................... 5 4.7.1 Logging on to z/OS and entering TSO commands ................................................... 5 4.7.2 Navigating through the ISPF menu options .............................................................. 5 4.7.3 Using the ISPF editor ................................................................................................ 6 4.7.4 Using SDSF ..............................................................................................................
    [Show full text]
  • Z/OS Basics Preface
    Contents Preface . iii How this course is organized . iii How each topic is organized . iv Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The S/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 6 1.5 What is a mainframe? . 7 1.6 Who uses mainframe computers?. 10 1.7 Factors contributing to mainframe use . 11 1.8 Typical mainframe workloads . 14 1.9 Roles in the mainframe world . 21 1.10 z/OS and other mainframe operating systems . 27 1.11 Summary . 29 Chapter 2. z/OS overview. 31 2.1 What is an operating system? . 32 2.2 Overview of z/OS facilities. 32 2.3 What is z/OS? . 34 2.4 Virtual storage and other mainframe concepts . 39 2.5 What is workload management? . 57 2.6 I/O and data management. 60 2.7 Supervising the execution of work in the system . 60 2.8 Defining characteristics of z/OS . 68 2.9 Licensed programs for z/OS . 69 2.10 Middleware for z/OS . 70 2.11 A brief comparison of z/OS and UNIX. 71 2.12 Summary . 73 Chapter 3. TSO/E, ISPF, and UNIX: Interactive facilities of z/OS . 75 3.1 How do we interact with z/OS? . 76 3.2 TSO overview . 76 3.3 ISPF overview . 80 3.4 z/OS UNIX interactive interfaces. 99 3.5 Summary .
    [Show full text]
  • General Disclaimer One Or More of the Following Statements May Affect
    General Disclaimer One or more of the Following Statements may affect this Document This document has been reproduced from the best copy furnished by the organizational source. It is being released in the interest of making available as much information as possible. This document may contain data, which exceeds the sheet parameters. It was furnished in this condition by the organizational source and is the best copy available. This document may contain tone-on-tone or color graphs, charts and/or pictures, which have been reproduced in black and white. This document is paginated as submitted by the original source. Portions of this document are not fully legible due to the historical nature of some of the material. However, it is the best reproduction available from the original submission. Produced by the NASA Center for Aerospace Information (CASI) X-613-70-67 NASA TM X= 638` / A METHOD OF HANDLING MULTIPLE FILE TAPES WITH-OS/360 JACQUES PACQUET MARCH 1970 t - GODDARD SPACE FLIGHT C GREENBELT, MARYLAN ^^ A' vCY13 Pei vEo s = IACE. - ^TMRUI GY K ^^ ^ I ^p^ UR INA A CR OR TN% G4 AD 1VMdE RI ^ 23 ICATROORY) i X-613-70-87 A METHOD OF HANDLING MULTIPLE FILE TAPES WITH OS/360 Jacques Pacquet* Laboratory for Optical Astronomy March 1970 GODDARD SPACE FLIGHT CENTER Greenbelt, Maryland *Service d'Aeronomie, Centre National de la Recherche Scientifique. Fort de Verrieres (Seine et Oise)FRANCE ECEpI 1 47G PA Ge, 8 ABSTRACT A set of general routines to handle tapes on computers using OS/360 is described. More specifically, a method to read a multi- reel multifile "data set" on unlabeled tape and to generate on un- labeled or labeled tapes one or more multi-reel multifile "data sets" is described using the queued sequential access method of the operating system.
    [Show full text]
  • C28-6537-1 Os
    File No. S360-30 Form C28-6537-1 OS Systems Reference Library IBM System/360 Operating System Data Management This publication contains information concerning the data management facilities of the IBM System/360 Operating system. It provides programmers coding in the assem­ bler language with the information neces­ sary to deSign programs using these facili­ ties. This publication describes the catalog­ ing, space allocation, and data access features of the operating system. Informa­ tion is also included on record and label formats and data organizations. PREFACE This publication, primarily directed to glossary of IBM System/360 Operatinq Sys­ applications programmers coding in the tem: Concepts and Facilities, Form assembler language, is a guide to the data C28-6535. management facilities of the System/360 Operating System. Because it provides detailed information on the facilities It is suggested that the reader be available and how they are used, program­ familiar with the information contained in mers coding in a language other than the the prerequisite publications listed below, assembler language will also find this as well as with the functional and opera­ publication useful. tional characteristics of direct-access devices as described in the recommended ,This is one of a group of publications publication. that describe the organization, functions, and applications of the System/360 Operat­ ing System. Detailed information on and PREREQUISITE PUBLICATIONS coding specifications for the macro­ instructions and the control statements IBM System/360 Operating System: Intro­ described herein may be found in the duction, Form C28-6534 publications IBM System/360 Operating Sys­ tem: control Program Services, Form IBM System/360 Operating System: Con­ C28-6541 and IBM System/360 Operating Sys­ cepts and Facilities, Form C28-6535 tem: Job control Language, Form C28-6539, respectively.
    [Show full text]
  • Systems OS/VS Virtual Storage Access Method (VSAM) Planning Guide
    GC26-3799-0 OS/VS Virtual Storage Access Method (VSAM) Systems Planning Guide First Edition (July 1972) This edition applies to release 2 of OS/VS1, to release 1 of OS/VS2, and to all subsequent releases until otherwise indicated in new editions or technical newsletters. Changes may be made to the information in this publication at any time; before using this publication in connection with the operation of IBM systems, consult the System/360 and System/370 Bibliography~ GA22-6822, and the latest System/360 and System/3 70 SRL Newsletter~ GN20-0360, for the editions that are applicable and current. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. Forms for readers' comments are provided at the back of this publication. If the forms have been removed, comments may be addressed to IBM Corporation, Programming Publications, Department D78, Monterey and Cottle Roads, San Jose, California 95114. Comments become the property of IBM. © Copyright International Business Machines Corporation 1972 USING THIS PUBLICATION This publication is intended to enable prospective users of VSAM (virtual storage access method), an access method of OS/VS (operating system/virtual storage), to prepare for using VSAM. The intended audience is data-processing managers whose decisions will influence the use of VSAM, system and application programmers who will make detailed preparations, and others seeking an introduction to VSAM. This planning guide has six chapters: "Introducing VSAM" outlines how VSAM meets the requirements of an access method in today's data-processing environment.
    [Show full text]
  • DFSMS Basics: Data Set Fundamentals Get to Know Your Data Sets!
    DFSMS Basics: Data Set Fundamentals Get to Know Your Data Sets! Neal Bohling and Tom Reed DFSMS Defect Support @ IBM August 7, 2014 Session Number 16119 What'sWhat's youryour experienceexperience level?level? IBM 7094 1965 ~500KHz Background To fully understand z/OS Data Sets, let's look at how data is stored Tape Disk (Sequential) (Direct) DASD Structure ModernModern Devices Devices are are Modeled Modeled after after this this architecture: architecture: 1 1 Track Track = = 56664 56664 Bytes Bytes 1 1 Cylinder Cylinder = = 15 15 Tracks Tracks Data Sets • Volumes provide a stream of data. 1100100111000010110101001100100111100010111000111100100011000101110000101100010111100010111000111100001111010110110101001 1010111111001001110001111001001110101011100011111000011110101101101010011010111110000011101010111101000110010011100001011 0101001100100111100010111000111100100011000101110000101100010111100010111000111100001111010110110101001101011111100100111 0001111001001110101011100011111000011110101101101010011010111110000011101010111101000110010011100001011010100110010011110 0010111000111100100011000101110000101100010111100010111000111100001111010110110101001101011111100100111000111100100111010 1011100011111000011110101101101010011010111110000011101010111101000110010011100001011010100110010011110001011100011110010 0011000101110000101100010111100010111000111100001111010110110101001101011111100100111000111100100111010101110001111100001 1110101101101010011010111110000011101010111101000110010011100001011010100110010011110001011100011110010001100010111000010
    [Show full text]