DFSMS Macro Instructions for Data Sets

DFSMS Macro Instructions for Data Sets

z/OS Version 2 Release 3 DFSMS Macro Instructions for Data Sets IBM SC23-6852-30 Note Before using this information and the product it supports, read the information in “Notices” on page 413. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-15 © Copyright International Business Machines Corporation 1976, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... xi List of Tables.......................................................................................................xiii About this book....................................................................................................xv Preparing your books for use..................................................................................................................... xv Required product knowledge.................................................................................................................... xvi Notational conventions.......................................................................................xvii Macro format............................................................................................................................................xviii Rules for register usage....................................................................................................................... xix Environmental considerations..............................................................................................................xx Rules for continuation lines.................................................................................................................. xx z/OS information................................................................................................xxii How to send your comments to IBM................................................................... xxiii If you have a technical problem.............................................................................................................. xxiii Summary of changes......................................................................................... xxiv Summary of changes for z/OS Version 2 Release 3 (V2R3)................................................................... xxiv Summary of changes for z/OS Version 2 Release 2 (V2R2)................................................................... xxiv Summary of changes for z/OS Version 2 Release 1 (V2R1) as updated September, 2014....................xxv Summary of changes for z/OS Version 2 Release 1 (V2R1) as updated December 2013......................xxv z/OS Version 2 Release 1 summary of changes.......................................................................................xxv Part 1. VSAM Macro Instructions............................................................................1 Chapter 1. Introduction to VSAM programming..........................................................................................3 Chapter 2. VSAM macro descriptions and examples.................................................................................. 5 Subparameters with GENCB, MODCB, SHOWCB, and TESTCB.............................................................5 Use of list, execute, and generate forms of VSAM macros....................................................................6 List-form keyword............................................................................................................................. 6 Execute-form keyword......................................................................................................................7 Generate-form keyword....................................................................................................................7 Examples of generate, list, and execute forms......................................................................................8 Example: generate form (reentrant).................................................................................................8 Example: remote-list form (reentrant).............................................................................................8 Example: execute form (reentrant).................................................................................................. 9 ACB—Generate an access method control block at assembly time..................................................... 9 Example 1: ACB macro................................................................................................................... 16 Example 2: ACB macro................................................................................................................... 16 BLDVRP—Build VSAM resource pool................................................................................................... 17 Example 1: obtaining an LSR pool above 16 megabytes...............................................................20 Example 2: request for separate data and index resource pools..................................................20 BLDVRP—List form.......................................................................................................................... 21 BLDVRP—Execute form...................................................................................................................21 CHECK—Wait for completion of a request........................................................................................... 21 Example 1: check return codes after an asynchronous request................................................... 22 Example 2: check return codes after a synchronous request....................................................... 22 Example 3: overlap processing...................................................................................................... 22 Example 4: suspend a request for many records.......................................................................... 23 CLOSE—Disconnect program and data................................................................................................ 24 Example: CLOSE macro.................................................................................................................. 25 iii DLVRP—Delete VSAM resource pool....................................................................................................25 Example: DLVRP macro.................................................................................................................. 26 DLVRP—Execute form..................................................................................................................... 26 ENDREQ—Terminate a request............................................................................................................ 27 Example: release positioning for another request.........................................................................27 ERASE—Delete a record....................................................................................................................... 28 Example 1: keyed-direct deletion (KSDS, RRDS)...........................................................................28 Example 2: addressed-sequential deletion (ESDS, KSDS)............................................................29 EXLST—Generate an exit list at assembly time................................................................................... 30 Example: EXLST macro...................................................................................................................31 GENCB—Generate an access method control block at execution time..............................................31 Example: GENCB macro (generate an access method control block).......................................... 36 Example: GENCB macro (generate an access method control block).......................................... 37 GENCB—Generate an exit list at execution time................................................................................. 37 Example: GENCB macro (generate an exit list)..............................................................................39 GENCB—Generate a request parameter list at execution time.......................................................... 40 Building a chain of request parameter lists................................................................................... 43 Example: GENCB macro (generate a request parameter list).......................................................44 Example: GENCB macro (generate a request parameter list).......................................................44 GENCB—List form........................................................................................................................... 45 GENCB—Execute form.................................................................................................................... 45 GENCB—Generate form..................................................................................................................46 GET—Retrieve a record.........................................................................................................................46 Example 1: keyed-sequential retrieval—forward (KSDS, RRDS)................................................... 46 Example 2: keyed-sequential

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    482 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us