MVS Using the Subsystem Interface

Total Page:16

File Type:pdf, Size:1020Kb

MVS Using the Subsystem Interface z/OS Version 2 Release 3 MVS Using the Subsystem Interface IBM SA38-0679-30 Note Before using this information and the product it supports, read the information in “Notices” on page 567. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1988, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures...................................................................................................... vii List of Tables........................................................................................................ ix About this document.............................................................................................xi Who should use this document...................................................................................................................xi How to use this document.......................................................................................................................... xi z/OS information..........................................................................................................................................xi How to send your comments to IBM.....................................................................xiii If you have a technical problem................................................................................................................xiii Summary of changes...........................................................................................xiv Summary of changes for z/OS Version 2 Release 3..................................................................................xiv Summary of changes for z/OS Version 2 Release 2...................................................................................xv z/OS Version 2 Release 1 summary of changes....................................................................................... xvi Chapter 1. Introduction to subsystems and the subsystem interface....................... 1 What is a subsystem?...................................................................................................................................1 What is the SSI?........................................................................................................................................... 1 Unique attributes of the SSI...................................................................................................................1 Types of subsystem requests.................................................................................................................2 Controlling SSI processing..................................................................................................................... 3 Why write your own subsystem?................................................................................................................. 3 What is a dynamic subsystem?....................................................................................................................4 Chapter 2. Making a request of a subsystem........................................................... 7 Setting up the environment......................................................................................................................... 7 Subsystem options block (SSOB)...........................................................................................................7 SSOB function dependent area..............................................................................................................7 Subsystem identification block (SSIB)...................................................................................................8 Making the request with the IEFSSREQ macro........................................................................................... 9 Checking the return code...........................................................................................................................10 Summary of steps...................................................................................................................................... 11 Chapter 3. SSI function codes your program can request...................................... 13 SSI function code descriptions..................................................................................................................13 Process SYSOUT data sets call — SSI function code 1........................................................................14 User destination validation/conversion — SSI function code 11........................................................ 36 Verify subsystem function call — SSI function code 15...................................................................... 41 Request job ID call — SSI function code 20........................................................................................ 46 Return job ID call — SSI function code 21...........................................................................................52 Request subsystem version information call — SSI function code 54................................................56 Scheduler facilities call — SSI function code 70................................................................................. 72 JES job information services— SSI function code 71..........................................................................81 Notify user message service call — SSI function code 75................................................................ 125 SYSOUT application program interface (SAPI) — SSI function code 79...........................................134 Extended status function call — SSI function code 80..................................................................... 173 JES properties — SSI function code 82............................................................................................. 239 JES device information services — SSI function code 83................................................................. 331 Modify job function call — SSI function code 85...............................................................................412 iii Chapter 4. Setting up your subsystem................................................................ 439 Function routines/function codes........................................................................................................... 439 Environment....................................................................................................................................... 439 Recovery and integrity....................................................................................................................... 440 Placement of function routines......................................................................................................... 440 Do You Need a Subsystem Address Space?........................................................................................... 441 Defining your subsystem......................................................................................................................... 441 Naming your subsystem.....................................................................................................................442 Passing parameters............................................................................................................................442 The primary subsystem......................................................................................................................442 Providing a routine to initialize your subsystem..................................................................................... 443 What your subsystem initialization routine can do........................................................................... 443 How to initialize your subsystem....................................................................................................... 444 Passing accounting parameters to your subsystem............................................................................... 445 Processing the SUBPARM option.......................................................................................................446 Example..............................................................................................................................................447 Chapter 5. Services for building and using your subsystem................................. 449 Adding your subsystem........................................................................................................................... 449 Using the IEFSSNxx parmlib member............................................................................................... 449 Using the IEFSSI macro..................................................................................................................... 450 Using the SETSSI command.............................................................................................................. 450 Initializing your subsystem......................................................................................................................450 Coding the initialization routine.........................................................................................................451 Defining what your
Recommended publications
  • IBM System/360 Operating System Sequential Access Methods Program Logic Manual
    Y28-6604-1 Program Logic IBM System/360 Operating System Sequential Access Methods Program Number 3S0S-DM-50B This publication describes the internal logic of the routines of the queued sequen­ tial access method, the basic sequential access method, and the basic partitioned access method of IBM System/360 Operating System. Program Logic Manuals are intended for use by IBM customer engineers involved in program maintenance, and by system pro­ grammers involved in altering the program design. Program logic information is not necessary for program operation and use; therefore, distribution of this manual is limited to persons with program maintenance or modification responsibilities. Restricted Distribution PREFACE This publication describes the sequen­ • Buffer pool management routines that tial access method facilities in IBM Oper­ furnish buffer space in main storage. ating System/360. It describes routines in five categories: PREREQUISITE PUBLICATIONS • Queued sequential access method rou­ tines that cause storage and retrieval Knowledge of the information in the of data records arranged in sequential following publications is required for an order .• understanding of this publication: • Basic sequential access method routines IBM system/360 Operating System: Data that cause storage and retrieval of Management, Form C28-6537 data blocks arranged in sequential order. IB,M Systerol360 Operating System: Intro­ duction to Control Program Logic. Pro­ • Basic partitioned access method rou­ gram Logic Manual, Form Y28-6605 tines that cause storage and retrieval of data blocks in a member of a parti­ tioned data set, and construct entries and search for entries in the directory RECOMMENDED READING of a partitioned data set. The publication IBM System/360 Operating • Executors that operate with System: Control Program SerVices, Form input/output supp~rt routines.
    [Show full text]
  • CA MII Data Sharing for Z/OS CA MII Programming Guide
    CA MII Data Sharing for z/OS CA MII Programming Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe: z/OS Basics An introduction to mainframe computing on the IBM zSeries platform z/OS concepts and facilities for students and beginners zSeries hardware and peripheral devices Mike Ebbers Wayne O’Brien Bill Ogden ibm.com/ International Technical Support Organization z/OS Basics March 2005 SG24-6366-00 Note: Before using this information and the product it supports, read the information in “Notices” on page -1. First Edition (March 2005) © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . xvii How this text is organized . xvii How each chapter is organized . xviii Acknowledgements . xix Comments welcome. xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 1-1 1.1 The new mainframe. 1-2 1.2 Evolving architecture . 1-2 1.3 Mainframes in our midst . 1-4 1.4 What is a mainframe? . 1-5 1.5 Who uses mainframe computers?. 1-7 1.6 Factors contributing to mainframe use . 1-8 1.6.1 Reliability, availability, and serviceability. 1-9 1.6.2 Security . 1-10 1.6.3 Scalability . 1-10 1.6.4 Continuing compatibility . 1-11 1.7 Typical mainframe workloads . 1-11 1.7.1 Batch processing. 1-12 1.7.2 Online transactional processing . 1-15 1.8 Roles in the mainframe world . 1-17 1.8.1 Who is the system programmer? . 1-19 1.8.2 Who is the system administrator? .
    [Show full text]
  • Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973)
    GC28-0661-1 File No. S370-34 Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973) This edition is a reprint of GC28-0661{) incorporating some editorial changes. It does not obsolete GC28-0661-O. This edition applies to Release 2 of OS/VS2 and to all subsequent releases until otherwise indicated in new editions or Technical Newsletters. Changes are continually made to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/360 and System/370 Bibliography, Order No. GA22-6822, and the current SRL Newsletter. Order No. GN20-0360, for the editions that are applicable and current. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this pUblication. If the form has been removed, comments may be addressed to IBM Corporation, Publications Development, iJepartment 058, Building 706-2, PO Box 390, Poughkeepsie, N.Y. 12602. Comments and suggestions become the property of IBM. © Copyright International Business Machines Corporation 1973 Preface This publication contains introductory information Design Concepts -- shows sequence of operation and about OS/VS2 Release 2, a system control other highlights of system design. program (SCP) that features virtual storage, System Requirements -- lists the basic hardware multiprogramming, multiprocessing, time sharing, requirements. and job entry subsystems. It is assumed that readers have a basic knowledge of programming Compatibility -- points out the major differences systems such as OS/MVT or OS/VS2 Release 1.
    [Show full text]
  • High Level Assembler for Z/OS & Z/VM & Z/VSE: Programmer's Guide
    High Level Assembler for z/OS & z/VM & z/VSE Programmer's Guide Version 1 Release 6 SC26-4941-06 Note Before using this information and the product it supports, be sure to read the general information under “Notices” on page 397. This edition applies to IBM High Level Assembler for z/OS & z/VM & z/VSE, Release 6, Program Number 5696-234 and to any subsequent releases until otherwise indicated in new editions. Make sure that you are using the correct edition for the level of the product. Order publications through your IBM representative or the IBM branch office serving your locality. IBM welcomes your comments. For information on how to send comments, see “How to send your comments to IBM” on page xix. © Copyright IBM Corporation 1992, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...............ix *PROCESS statement options .......37 Default options ............37 Tables ...............xi Invoking the assembler dynamically .....37 Coding rules .............37 Assembler options ............38 About this document ........xiii ADATA...............39 Who should use this document .......xiii ALIGN ...............39 Programming interface information ......xiii ASA (z/OS and CMS) ..........40 Organization of this document........xiii BATCH...............40 High Level Assembler documents .......xv CODEPAGE .............41 Documents .............xv COMPAT ..............42 Collection kits ............xvi DBCS ...............43 Related publications ...........xvi DECK ...............43 Syntax notation .............xvi DISK (CMS) .............44 DXREF ...............44 How to send your comments to IBM xix ERASE (CMS) ............45 If you have a technical problem .......xix ESD................45 EXIT................46 Summary of changes ........xxi FLAG ...............48 FOLD ...............51 Chapter 1.
    [Show full text]
  • Z/OS Basics Preface
    Contents Preface . iii How this course is organized . iii How each topic is organized . iv Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The S/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 6 1.5 What is a mainframe? . 7 1.6 Who uses mainframe computers?. 10 1.7 Factors contributing to mainframe use . 11 1.8 Typical mainframe workloads . 14 1.9 Roles in the mainframe world . 21 1.10 z/OS and other mainframe operating systems . 27 1.11 Summary . 29 Chapter 2. z/OS overview. 31 2.1 What is an operating system? . 32 2.2 Overview of z/OS facilities. 32 2.3 What is z/OS? . 34 2.4 Virtual storage and other mainframe concepts . 39 2.5 What is workload management? . 57 2.6 I/O and data management. 60 2.7 Supervising the execution of work in the system . 60 2.8 Defining characteristics of z/OS . 68 2.9 Licensed programs for z/OS . 69 2.10 Middleware for z/OS . 70 2.11 A brief comparison of z/OS and UNIX. 71 2.12 Summary . 73 Chapter 3. TSO/E, ISPF, and UNIX: Interactive facilities of z/OS . 75 3.1 How do we interact with z/OS? . 76 3.2 TSO overview . 76 3.3 ISPF overview . 80 3.4 z/OS UNIX interactive interfaces. 99 3.5 Summary .
    [Show full text]
  • General Disclaimer One Or More of the Following Statements May Affect
    General Disclaimer One or more of the Following Statements may affect this Document This document has been reproduced from the best copy furnished by the organizational source. It is being released in the interest of making available as much information as possible. This document may contain data, which exceeds the sheet parameters. It was furnished in this condition by the organizational source and is the best copy available. This document may contain tone-on-tone or color graphs, charts and/or pictures, which have been reproduced in black and white. This document is paginated as submitted by the original source. Portions of this document are not fully legible due to the historical nature of some of the material. However, it is the best reproduction available from the original submission. Produced by the NASA Center for Aerospace Information (CASI) X-613-70-67 NASA TM X= 638` / A METHOD OF HANDLING MULTIPLE FILE TAPES WITH-OS/360 JACQUES PACQUET MARCH 1970 t - GODDARD SPACE FLIGHT C GREENBELT, MARYLAN ^^ A' vCY13 Pei vEo s = IACE. - ^TMRUI GY K ^^ ^ I ^p^ UR INA A CR OR TN% G4 AD 1VMdE RI ^ 23 ICATROORY) i X-613-70-87 A METHOD OF HANDLING MULTIPLE FILE TAPES WITH OS/360 Jacques Pacquet* Laboratory for Optical Astronomy March 1970 GODDARD SPACE FLIGHT CENTER Greenbelt, Maryland *Service d'Aeronomie, Centre National de la Recherche Scientifique. Fort de Verrieres (Seine et Oise)FRANCE ECEpI 1 47G PA Ge, 8 ABSTRACT A set of general routines to handle tapes on computers using OS/360 is described. More specifically, a method to read a multi- reel multifile "data set" on unlabeled tape and to generate on un- labeled or labeled tapes one or more multi-reel multifile "data sets" is described using the queued sequential access method of the operating system.
    [Show full text]
  • C28-6537-1 Os
    File No. S360-30 Form C28-6537-1 OS Systems Reference Library IBM System/360 Operating System Data Management This publication contains information concerning the data management facilities of the IBM System/360 Operating system. It provides programmers coding in the assem­ bler language with the information neces­ sary to deSign programs using these facili­ ties. This publication describes the catalog­ ing, space allocation, and data access features of the operating system. Informa­ tion is also included on record and label formats and data organizations. PREFACE This publication, primarily directed to glossary of IBM System/360 Operatinq Sys­ applications programmers coding in the tem: Concepts and Facilities, Form assembler language, is a guide to the data C28-6535. management facilities of the System/360 Operating System. Because it provides detailed information on the facilities It is suggested that the reader be available and how they are used, program­ familiar with the information contained in mers coding in a language other than the the prerequisite publications listed below, assembler language will also find this as well as with the functional and opera­ publication useful. tional characteristics of direct-access devices as described in the recommended ,This is one of a group of publications publication. that describe the organization, functions, and applications of the System/360 Operat­ ing System. Detailed information on and PREREQUISITE PUBLICATIONS coding specifications for the macro­ instructions and the control statements IBM System/360 Operating System: Intro­ described herein may be found in the duction, Form C28-6534 publications IBM System/360 Operating Sys­ tem: control Program Services, Form IBM System/360 Operating System: Con­ C28-6541 and IBM System/360 Operating Sys­ cepts and Facilities, Form C28-6535 tem: Job control Language, Form C28-6539, respectively.
    [Show full text]
  • DP STD No. 08.01 Security Overview (01/05/93)
    IT Standards Number: 11.17 VSAM VIRTUAL STORAGE ACCESS METHOD November 2007 IT-Standard Number: 11.17 Effective: 11/01/2007 Table of Contents 1 INTRODUCTION ..................................................................................................................................... 1 1.1 PURPOSE...................................................................................................................................... 1 1.2 SCOPE ......................................................................................................................................... 2 1.3 APPLICABILITY ............................................................................................................................... 2 1.4 COMMENTS AND SUGGESTIONS ....................................................................................................... 3 2 VIRTUAL STORAGE ACCESS METHOD ................................................................................................ 4 2.1 VSAM ORGANIZATION TYPES ......................................................................................................... 4 2.1.1 ESDS ............................................................................................................................. 4 2.1.2 RRDS ............................................................................................................................. 4 2.1.3 KSDS ............................................................................................................................. 4 2.2
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe z/OS Basics Basic mainframe concepts, including usage and architecture z/OS fundamentals for students and beginners Mainframe hardware and peripheral devices Mike Ebbers John Kettner Wayne O’Brien Bill Ogden ibm.com/redbooks International Technical Support Organization Introduction to the New Mainframe: z/OS Basics March 2011 SG24-6366-02 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Third Edition (March 2011) © Copyright International Business Machines Corporation 2006, 2009, 2011. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii How this text is organized . xiv How each chapter is organized . xiv The team who wrote this book . xv Acknowledgements . xvi Now you can become a published author, too! . xix Comments welcome. xix Stay connected to IBM Redbooks . xix Summary of changes . xxi March 2011, Third Edition . xxi August 2009, Second Edition . xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The System/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 8 1.5 What is a mainframe . 9 1.6 Who uses mainframe computers. 12 1.7 Factors contributing to mainframe use . 15 1.8 Typical mainframe workloads . 22 1.9 Roles in the mainframe world . 29 1.10 z/OS and other mainframe operating systems .
    [Show full text]
  • VSE to OS/390 Migration Workbook
    IBML VSE to OS/390 Migration Workbook Cliff Bays ** Dave Greenough ** John Hutchinson Dan Janda ** Kevin Jones ** Gilbert Saint-flour International Technical Support Organization http://www.redbooks.ibm.com This book was printed at 240 dpi (dots per inch). The final production redbook with the RED cover will be printed at 1200 dpi and will provide superior graphics resolution. Please see “How to Get ITSO Redbooks” at the back of this book for ordering instructions. SG24-2043-00 IBML International Technical Support Organization SG24-2043-00 VSE to OS/390 Migration Workbook October 1998 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix D, “Special Notices” on page 553. First Edition (October 1998) This edition applies to Version 2 Release 3 of IBM Virtual Storage Extended/Enterprise Systems Architecture (VSE/ESA), Program Number 5690-VSE, and to all subsequent releases and modifications until otherwise indicated in new editions. It also applies to Version 2 Release 4 of OS/390 (5647-A01) and to all subsequent releases and modifications until otherwise indicated in new editions. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HYJ Mail Station P099 522 South Road Poughkeepsie, New York 12601-5400 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1998. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • MVS JCL User's Guide
    z/OS Version 2 Release 3 MVS JCL User's Guide IBM SA23-1386-30 Note Before using this information and the product it supports, read the information in “Notices” on page 261. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1988, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... xi List of Tables.......................................................................................................xiii About this document............................................................................................xv Who should use this document..................................................................................................................xv Where to find more information................................................................................................................. xv How to send your comments to IBM.................................................................... xvii If you have a technical problem............................................................................................................... xvii Summary of changes........................................................................................
    [Show full text]