background image

Summary of Contents for System/360

Page 1: ...step accounting processing of magnetic tape labels and SVC routines How to implement the data set protection feature of the Operating System How to write a shift initiator program for use when the mu...

Page 2: ...ription of the Data Set Control Blocks the Data Extent Block and the Job File Control Block are dele ted The chapter Cataloged Procedures is deleted Additions and changes to existing material that are...

Page 3: ...k Contents Appendix B Device Code Designations ADDING SVC ROUTINES TO THE CONTROL PROGRAM Writing SVC Routines Characteristics of SVC Routines Programming conventions for SVc Routines 18 19 20 25 25 2...

Page 4: ...ram Data and Command Chaining Control Blocks Input Output Block lOB Event Control Block ECB Data Control Block DCB Data Extent Block DEB 65 65 65 70 70 70 71 72 72 74 75 75 75 76 76 76 76 77 77 77 77...

Page 5: ...Forms of XDAP Macro Instruction Appendix CVT Macro Instruction HOW Format of the CVT Macro Instruction Control Statements Required CVT Macro Definition TO USE THE TRACING ROUTINE HOW TO USE THE TRACI...

Page 6: ...AITR Routine A Coding Example Job Control Language Statements Programming Considerations SYSTEM MACRO INSTRUCTIONS Locate Device Characteristics DEVTYPE Macro Instruction Device Characteristics Inform...

Page 7: ...outine After Receiving Control Frorr the EOV Routine 51 Figure 6 Editor Routine Entry Conditions 57 Figure 7 General Flow of an Editor Routine After Receiving Control From the OPEN Routine 59 Figure 8...

Page 8: ......

Page 9: ...tem 360 operating Systerr Data anagement publication Form C28 6537 contains a general description of the structure of catalog indexes as well as a brief discussion of the volume tatle of contents V ro...

Page 10: ...able of contents How to delete a data set How to rename a data set Accompanying the function descriptions in text are coding examples and programm1ng notes exceptional return condition codes for the m...

Page 11: ...byte area contains the 256 byte volurre list block for data set A B the 3 byte relative track address TTR of the block following the one read into main storage and the 6 byte serial number of the volu...

Page 12: ...e relative generation number that you specified in your 44 byte area with the data sst s absolute generation name pecifying a Name Using an Alias For each of the preceding functions you can specify an...

Page 13: ...BLDX ALEVEL VOINUM INDEXB CAMLST I BLDX BLEVEL VOLNUM INDEXC CAMLST I BLDX CIEVEL VOtNUM VOLNUM DC I CL6 000045 VOLUME SERIAL NUMBER ALEVEL DC I CL2 A INDEX STRUCTURE NAMES BLEVEL DC I CL4 A B FOLLOW...

Page 14: ...pecifying in a DD statement the name of the data set zero space allocation i e SPACE TRK 0 and appropriate DCB parameters HOW TO DELETE AN INDEX You can delete any number of index levels from an exist...

Page 15: ...ed as an alias for index level A is deleted The search for the alias starts on the system residence volume r T T I Name I Operation I Operand I i I I INDEX I DELALIAS DELETE AN ALIAS FOR A I I I Check...

Page 16: ...curth operand specifies the main storage location of a 6 byte area into which you have placed the serial number of the volume to be connected HOW TO DISCONNECT CONTROL VOLUMES You disconnect two contr...

Page 17: ...LUMES I I DC X 30002001 2311 DISK STORAGE I DC CL6 000014 VOLU E SERIAL NUMBER I DC H 0 DATA SET SEQUENCE NUMBER I I DC I X 30002001 2311 DISK STORAGE I DC I CL6 000015 VOLUME SERIAL NUMBER I DC H O S...

Page 18: ...G A NEW VOLUME POINTER TO THE VOLUME CAMLST RECAT DSNAME VOIUMES LIST DC CL6 A B C ONE BLANK FOR DELIMITER DC H 3 THREE VOLUMES DC X 30002001 2311 DISK STORAGE DC CL6 000014 VOLUME SERIAL NUMBER DC H...

Page 19: ...specifies the main storage location of a 350 byte work area that is to contain the DSCB After execution of these macro instructions the first 96 b tes of the work area contain the data portion of the...

Page 20: ...T OVRD VOLUMES IGNORING I DC I CL44 A B C THE EXPIRATION I DC I B 2 DATE IN THE DSCB I DC I X 30002001 2311 DISK STORAGE I DC I CL6 000017 VOLUME SERIAL NO I DC I H O SEQUENCE NUMEER I DC I X 30002001...

Page 21: ...the next volume indicated in the volume list is processed or requested Example In the following example data set A B C is renamed D E F The data set extends across two volumes r T T I Name I Operation...

Page 22: ......

Page 23: ...ollist relexp13 OVRD1B I 1 I Change the data set I symbol I RENAME I list addrx1 I I name in a DSCB I list name I CAMLST I RENAME dsname relexp6 new name relexp11 vol list relexp13 I L __________ ____...

Page 24: ...ifies the main storage location of a fully qualified data set name The area that contains the name must be 44 bytes long The name must be defined by a C type Define Constant DC instruction 4f 7 cvol r...

Page 25: ...data sets cataloged under it The index is unchanged 16 The qualified name specified when building an index or generation index implies an index structure that does not exist the high level index spec...

Page 26: ...ins binary zeros Field 8 count of index Unused Bytes in Last Block 2 bytes contains the binary the number of unused bytes in the last block of the volume An index control entry is the first entry in a...

Page 27: ...t resides on more than five volumes a volume control block n ust be used to point to the volumes The volume control block is identified by a volume control block pointer entry not a data set pointer e...

Page 28: ...in field 1 An alias entry can appear in voluITe indexes only An alias entry is 20 bytes long and contains four fields Field 1 Name Field 8 bytes contains the alias of the high level index identified i...

Page 29: ...he value of this field is reduced by 20 for each subsequent volume list block If a data set is on 61 volumes for example it has four volume list blocks The first field of each block contains 61 41 21...

Page 30: ...isk Storage Drive IBM 2301 Drum Storage IBIvl 2302 Disk Storage IBM 2303 Drum Storage IBlvJ 2314 Direct Access Storage Facility Features 7 track Compatibility 7 track Compatibility Data Conversion Pha...

Page 31: ......

Page 32: ...al logic of the supervisor and its relationship to the remainder of the control program can be obtained through your IBM Branch Office PREREQUISITE PUBLICATIONS The IBM System 360 Operating System Ass...

Page 33: ...n size However you nust divide a type 4 SVC routine into load modules of 1024 bytes or less The size of a type 3 SVC routine must not exceed 1024 bytes Design of the routine Type 1 SVC routines must b...

Page 34: ...ntents at IRegisters 3 4 5 and 14 contain I 4 I lentry time Icommunication pointers registers 0 I I I 11 and 15 are parameter registers I I t T T T i IMay contain reloca I Yes I Yes I No I No I 5 I It...

Page 35: ...CT or START instruction Type 3 must te named IGCOOnnn nnn is the signed decimal nurober of the SVC routine This name must be the name of a member of a partitioned data set Type 4 must be named IGCssnn...

Page 36: ...ants Types 1 ana 2 are not affected by this restriction since they are part of the resident control program You can extend the SVRB in 8 byte increments from 96 bytes up to 144 bytes The extended area...

Page 37: ...efore the resident abnormal is entered the CPU must maskable interruptions but interruption and registers contain the following termination routine be masked for all the machine check 0 1 and 14 must...

Page 38: ...instruction to specify the SVC number the type of SVC routine and for type 2 3 or 4 routines the number of double words in the extended save area Inserting SVC Routines During the System Generation Pr...

Page 39: ......

Page 40: ...below Documentation of the internal lcgic of the scheduler can be obtained through your IBM Branch Office PREREQUISITE PUBLICATIONS The IBM System 360 Assemtler Lan C28 6514 contains the sary to code...

Page 41: ...tement did not contain accounting information this pointer indicates a four byte field whose last byte is zeroed These data fields contain the accounting information that was specified in the JOB stat...

Page 42: ...rol prograrr either before or after the systere generation process In either caSE you must specify that you have an accounting routine This is done during the system generation process ty using the AC...

Page 43: ...editor routine into the 18K jobname stepname SYSPRINT SYSUTl SYSL OD SYSLIN JOB EXEC DD DD DD DD parameters PGM IEWL pararr eters SYSOUT A UNIT SYSDA SPACE parameters DSNAME SYS1 LINKLIB DISP OLD acc...

Page 44: ...nes can be obtained through your IBM Branch Office Prerequisite Publications The IBM System 360 Operating System Assembler Language publication Forrr C28 6514 contains the information neces sary to co...

Page 45: ...program then issues a message to the operator requesting that the correct volume be mounted When the new volume is mounted your routine is entered again after the contrcl program has checked the initi...

Page 46: ...macro instruction Design of the routine Nonstandard label processing routines must be reenterable Relocatable address constants cannot be used in coding these routines or in coding any channel command...

Page 47: ...labels and to position volumes must be performed by using the execute channel program EXCP macro instruction The use of EXCP normally requires that you build several control blocks in your work area H...

Page 48: ...ch DCB specified in the OPEN or CLOSE macro instruction a combined work and control block area is built Register 6 contains the starting address of a table that contains an address for each work and c...

Page 49: ...s the symbolic names of all these I I fields The macro definition and how to add it to the macro I I library are in the Appendix of this chapter Code this macro I I instruction with a null operand fie...

Page 50: ...rocessing Routine The Figures 3 4 and 5 show the logic that you could Each block in the flowcharts is numbered and the an item in the list of explanations of the blocks Figure 3 General Flow of a Nons...

Page 51: ...Storage 3 Release 21 Save Registers Main Storage Return to 22 Control Program No 13 Set Up Set Up CCW CCW Adjust Create 16 18 for Next Label DCB 18 General Flow of a Nonstandard Label Processing Rout...

Page 52: ...mine Type of I O Operation Set Up CCW 1 2 3 9 10 13 14 Yes 16 Process Label Restore Registers Release Main Storage 20 21 22 1 9 Set Bit in UCB to 1 Figure 5 GenE ral Flow of a Nonsta dard Label Proces...

Page 53: ...ob file control block JFCB this field contains a hexadecimal 04 when nonstandard labels have been specified 7 The final DCB entry in the list of DCB addresses contains a one in its high order bit posi...

Page 54: ...g sequence ill strates an exit from your routine during OPEN or CLOSE operations 1 MVC 2 LA XCTL MODNAME DC o a 6 MODNArJjE 15 DXCCW12 EPLOC 6 DCB O SF E 15 C IGGxxxxx 1 The name of the module you are...

Page 55: ...d the names of members to be included in the SVC library Member names for the first load module of each type of label processing routine are shown below Member names for additional load modules must b...

Page 56: ...h the label type and or density of the currently mounted volume Or your installation may desire a combination of these actions including dismounting under certain conditions All these possible actions...

Page 57: ...nflicts by altering the characteristics of the mounted volume ENTRY CONDITIONS Figure 6 presents the four conditions under which the control program OPEN or EOV routines transfer control to your edito...

Page 58: ...IOverwrite standard label with al I I I Itapemark i e cancel Seel I I I IFigure 7 blocks 15 15a 16 1 I I I IDepending on whether NL or NSLI I I I Iis specified by the program I I I I IOPEN or EOV will...

Page 59: ...receiving control froIT the OPEN routine You must test all the DeBs defined by the OPEN macro instruction before returning control to the OPEN routine When receiving control from the EOV routine you o...

Page 60: ...me Issue Mount Message 13 8 Test Bits 1 2 in JFCBMASK 5 15a Write a Standard Volume Label or Tapemark Zero UCB 17 Vol Ser No and Set Mount Switch ON 15b Get Label Type From JFCBLTYP Field Return to Co...

Page 61: ...me 0 Test Bits 1 2 in JFCBMASK S Write a Standard Vol ume Label or Tapemark Zero UCB Vol Ser No and Set Mount Switch ON Restore Registers Insert X 03 in Reg 8 Release Main Storage Return to Control Pr...

Page 62: ...instruction see Appendix defines the fields of the unit control block 5 Bit configurations in the byte addressed by JFCBMASK 5 incicate whether label checks or density checks have occurred and in the...

Page 63: ...ained from the UCBNAME field of the unit control block 14 Step 6 provides directions for handling the 1 0 operation 15 Test bit 3 of the byte at JFCB ASK 5 If set to one control was received as a resu...

Page 64: ...ion Exclusive OR XC the SRTEVOLI field with itself OR OI the SRTEDMCT field with X 80 18 When receiving control from the OPEN routine you must process the entire DCB list The last entry in the list ca...

Page 65: ...k for OPEN ENTRY NAME OMODVOLl OMODVOL1 R object deck for EOV ENTRY NAME EMODVOLl EMODVOL1 R Caution You should not attempt to insert routines into the SVC library when you are running in a multi task...

Page 66: ...precede it with a DSECT statement Note The IEFJFCBN rracro instruction is used in the assembly of IECDSFCT The macro definition for IEFJFCBN nlust be present in the macro library SYSi MACLIB for succ...

Page 67: ...S DS CLS LABELS DSCB VOLUME LABEL FILE LABEL 1 FILE LABEL 2 FORMAT 1 FORMAT 3 KEY FORMAT 3 DATA CORE ADDRESS OF NEXT DSCB MESSAGE AREA 100 BYTES 2 JFCB 176 BYTES 3 ECB 4 BYTES 4 IOB 40 BY_TES S DEB 44...

Page 68: ...SPACE 1 SPACE 1 ORG DXDSCB DS OCL40 DENSITY FILE POSITION JOB STEP IDENTIFICATION JOB IDENTIFICATION SLASH STEP IDENTIFICATION TAPE RECORDING TECHNICUE CARRIAGE CONTROL CHARACTER RESERVED FOR FUTURE...

Page 69: ...INSTRUCTION LTH INC MSG SER 3 MESSAGE UNIT NAME LENGTH 6 MESSAGE VOLUME SERIAL LENGTH LENGTH MAY BE DEFINED BY EACH MODULE TO FIT REQUIREMENT LENGTH OF FULL MSG DEFINED BY EACH MODULE MESSAGE FORMAT...

Page 70: ...O X OO X OO X OOOO XLi AL3 DXCCW XLi AL3 DXDCB XLi XL3 X OOOO XL2 D 1 KEY OOOO COMMAND ADDRESS STATUS BYTE 0 STATUS BYTE 1 COUNT DIRECT ACCESS ADDRESS MBBCCHHR DATA EXTENT BLOCK SPACE DS EQU DC DS DC...

Page 71: ...___________________________ _ IEFUCBOB Macro Definition MACRO IEFUCBOB UCBOB EQU DS OF SRTEJBNR DS XLi SRTECHAN DS XLi UCBID DS XLi SRTESTAT DS XLi SRTEONLI EQU 128 SRTECHGS EQU 64 SRTERESV EQU 32 SRT...

Page 72: ...PTION FIEIL BIT 5 OF OPTION FIELD BIT 6 OF OPTION FIELD BIT 7 OF OPTION FIELD BYTE 2 OF UCBTYPE OPTIONS BYTE 3 OF UCBTYPE CLASS BIT 0 OF CLASS TAPE BIT 1 OF CLASS COMMUNIC BIT 2 OF CLASS DIRECT AC BIT...

Page 73: ...BIND2 DS CLl JFCBSTAT EQU 64 JFCBSCTY EQU 16 JFCBUFNO DS JFCBUFRQ DS JFCBFTEK DS JFCBFALN DS JFCBUFL DS JFCEROPT DS JFCTRTCH DS JFCKEYIE DS JFCMODE DS JFCCODE DS JFCSTACK DS JFCPRTSP DS 72 ALl ALl OBL...

Page 74: ...S THE FIRST FIVE LENGTH OF BLOCK OF EXTRA VOLUME SERIAL NUMBERS BEYOND FIVE TRACK ADDRESS OF BLOCK OF EXTRA VOLUME SERIAL NUMBERS PRIMARY QUANTITY OF D A STOHAGE REQUIRED INDICATES WHETHER CYLINDERS T...

Page 75: ...of specific I O devices are contained in IBM System Reference Library publications for each device Documentation of the internal logic of the input output supervisor can be obtained through your IBM...

Page 76: ...recovery procedures and posts the results of the I O requests USE OF EXCP IN SYSTEM AND PROBLEM PROGRAMS This section briefly explains the procedures performed by the system and the programmer when t...

Page 77: ...e EXCP rr acro instruction you should issue a WAIT macro instruction specifying the event control block to determine whether the channel program has terminated If volume switching is necessary you rrl...

Page 78: ...between the problew program and the system It provides the addresses of other control blocks and maintains inforwation abcut the channel prograro such as the type of chaining and the progress of I O o...

Page 79: ...s is no longer to be used by the input output supervisor and if it is ready to receive information about another request When a request element is made available it is removed from all request queues...

Page 80: ...e familiar with device characteristics that can cause such errors After one of your channel programs has terminated you should not release buffer space until you have determined that your next request...

Page 81: ...ameter the address of the User Purge lOB Address field of the data extent block This causes execution of all the related channel programs The RBSTORE macro definition and how to add it to the wacro li...

Page 82: ...in the DCB macro instruction are loaded into main storage The appendages are linked to the input output supervisor when their addresses are placed into a table of addresses called an appendage vector...

Page 83: ...stem and which registers they may use without saving and restoring start Input Output SIO Appendage This appendage is entered before the input output supervisor issues a start input output SIO instruc...

Page 84: ...ons If you use the return address in register 14 to return control to the system the channel program is posted complete and its request element is made available In the case of unit exception or wrong...

Page 85: ...locks MACRO INSTRUCTIONS If you are using the EXCP macro instruction you must also use DCB OPEN CLOSE and in some cases the EOV macro instruction The parameters of these macro instructions and of the...

Page 86: ...ion routines You may use any of these sources to specify DCB parameters However if a portion of the data control block is not generated by the DCB macro instruction the system does not accept informat...

Page 87: ...FM I EXLST I L T i I I I 40 I TIOT I MACRF I T L 1 I I I 44 I IFLGS I DEB Address I Foundation Block 1 I I I 48 I OFLGS I Reserved I L I I 52 I Reserved I i I I 56 I Reserved I T i I I I 60 I EOEA I P...

Page 88: ...ion of the current record IOBAD relexp specifies the address of an input output block lOB If a pointer to the current lOB is not required you may use this field for any purpose The following parameter...

Page 89: ...ain the fields shown in parentheses The special services are explained in the note that follows the diagram Device dependent portion of data control block when DEVD DA and DSORG PS or po DCB r T Addre...

Page 90: ..._____________ J The following parameters pertain to specific devices and may be specified only when the DEVD parameter is specified KEYLEN value specifies for direct access devices the length in bytes...

Page 91: ...es for a printer the line spacing as either 0 1 2 or 3 OPEN Initialize Data Control Block The OPEN macro instruction initializes one or more data blocks so that their associated data sets can be proce...

Page 92: ...am to be executed EOV End of Volume The EOV macro instruction identifies end of volume and end of data set conditions For an end of volume condition EOV causes s Nitching of volumes and verification o...

Page 93: ...g of their associated data sets can be terminated You must issue CLOSE for all data control blocks that were used by your channel programs Some of the procedures performed when CLOSE is executed are R...

Page 94: ...boundary For nondirect access devices the input output block is 32 bytes in length For direct access devices 8 additional bytes must be provided In Figure 10 the shaded areas indicate fields in which...

Page 95: ...ss of the channel program to be executed Reserved 1 byte is used only by the system DCB ddress 3 bytes specifies the address of the data control block of the data set to be read or written by the chan...

Page 96: ...____ __________ ________________________________________________ J o 1 2 31 Figure 11 Event Control Block After Posting of Completion Code WAIT Bit A one bit in instruction has teen completed Complete...

Page 97: ...the system when an OPEN macro instruction is issued for the data control block You may not modify the fields of the data extent block but you may examine them The Data Extent Block format and field de...

Page 98: ...urged request elements to the request queues The format of this macro instruction is as follows r T T I Name I Operation I Operand I I I RESTORE I User Purge lOB Address I L______L___________L _______...

Page 99: ...irect access volumes without using an access method and without writing your own channel frogram SincE most of the specifications for XDAP are similar to those for the Execute Channel program EXCP mac...

Page 100: ...ssuing the XDAP macro instruction you roust issue a DCB macro instruction which produces a data control block DCB for the data set to be read or ppdated You must also issue an OPEN macro instruction w...

Page 101: ...used by the direct access program Sonte of the procedures performed when OPEN is executed are Construction of data extent block DEB Transfer of information from DD statements and data set labels to da...

Page 102: ...ocks are to be located by identification an eighth byte indicating block identification must be included in this field The actual address of a block is in the form MBBCCHHR where M indicates which ext...

Page 103: ...T macro instruction specifying the event control block r T T I WAIT Bit O I Complete Bit l I Remainder of Completion Code I L______________ __________________ ____________________________________ J o...

Page 104: ...ransfer in Channel I I Verify by Identification1 1 3 I Read Key and Data I I Read by Key I 1 I Search Key Equal I I I 2 I Transfer in Channel I I Verify by Key1 I 3 I Read Data I I I 1 I Search ID Equ...

Page 105: ...ress hE indicates the actual track address and R indicates the block identification Are not used by the conversion routine Are used by the conversion routine and are not restored Must be loaded with t...

Page 106: ...CVT I SYS INT I I I I MIN I L______L ___________L ___________________________________________________J You specify in the operand field the control program that you are using VMS designates mUltiprogr...

Page 107: ...DOUBLE WORD THE FIRST CON TAINING THE NEXT TO BE DISPATCHED TCB ADDRESS THE SECOND CONTAINING THE LAST CURRENT TCB ADDRESS ADDRESS OF ROUTINE TO SCHEDULE ASYNC EXITS ADDRESS OF THE LINK LIBRARY DCB J...

Page 108: ...Q QTAM NEXT7 A O NEXTB v IECTRl VJTB ADDR OF TERMINAL TABLE PRESENT IN SYSTEMS WITH QTAM NEXTB ANOP CVTHEAD DC V IEAHEAD ADDRESS OF THE FIRST HIGHEST PRIORITY TCB IN THE READY QUEUE CVTMZOO DC F O MAC...

Page 109: ...ation made availatle ty the tracing routine Before reading this chapter you should be familiar with the information contained in the prerequisite putlication PREREQUISITE PUBLICATION The IBM System 36...

Page 110: ...e traced conditions When the last entry in the table is filled the next entry will overlay the first Table Entry Forrrats Table entry formats are as follows SIO Instruction o 23 13 21 31 0 31 0 3110 3...

Page 111: ...Last Entry I Table Beginning I Table End I L_______________________ _______________________ ______________________J The tracing routine is bypassed during acnormal termination proce dures except when...

Page 112: ...em Data Management publication Form C28 6537 contains a general description of the data set protection feature The IBM System 360 Operating System Operator s Guide publication Form C28 6540 contains a...

Page 113: ...DD statement associated with the data set being placed under protection The Job Control Lan publication describes the entry Note Data sets on magnetic tape are protected only when standard labels are...

Page 114: ...t scan the data set unless the operator enters the password CREATING PROTECTED DATA SETS A data definit ion DD statement parameter LABEL is used to indicate that a data set is to be placed under prote...

Page 115: ...ction indicator set ON 3 If only a volume label processing continues and a protection indicator set cn exists on new label output Data Sets Direct Access Devices the volun e switched to is written wit...

Page 116: ...4 describes how you specify the resident BLDL table and resident access method option in the SUPRVSOR macro instruction at system generation time The IBM Systern 360 Operating System utilities publica...

Page 117: ...IB A standard list and alternative lists may exist for each option IBM provides a standard list for the resident access method option The stanaard lists are processed without operator intervention whe...

Page 118: ...sor s thorough consiueration THE RESIDENT ACCESS METHOD OITION This option places access rrethod load modules in the system nucleus and creates a resident list cf the loaded modules A LOAD macro instr...

Page 119: ...e in a recora and a non blank character in column 72 Subsequent records must start in column 16 The initial record forrrat with continuation is 1 b SYS1 LINKLIB SYS1 SVCLIB 72 b namel name2 name3 X Su...

Page 120: ...IEFW21SD IEFXA X ENDUP IETASM IETDI I TE1 IETE2 IETE2A lETE3 IETE3A IETE4M X IETE4P IETE4S IETE5 IETE5A IETE5E IETE5P IETINP IETMAC X IETPP IETRTA IETRTB IET07 IET071 IET08 IET09 IET09I X IET10 IET10B...

Page 121: ...ffITY Data Set Backward Move Format F FB U Records Backward Locate Format F FB U Records GET Move with CNTL Format V Records Card Reader Magnetic Tape Forward Space or Backspace GET Move with CNTL For...

Page 122: ...of Operating System 360 Recommended Publications The IBM System 360 Oper ting System Control Program Services publication Form C28 6541 describes the WAITR rracro instruction The IBM System 360 Opera...

Page 123: ...e your code must 1 Issue a WAITR macro instruction 2 Dynamically invoke a specified program 3 Restore the PARM field execution of the WAITR program to be invoked of the EXEC statement that initiated r...

Page 124: ...ield statement 4 3 The subject instruction of this EX instruction effectively deletes the invoked program name from the PARM area by moving the remaining parameters in the area to the high order end o...

Page 125: ...d by DUMWAIT must be the first entry in the PARM paraneter list PROGRAMMING CONSIDERATIONS A dummy WAITR routine itself does not require any special considera tions for use with MFT MFT conventions th...

Page 126: ...ations The IBM Sys1 em 360 Oper ting System Control Program Services publication Form C28 6541 contains the notativn conventions used to describe the macro instructions in this chapter The IBM Sys1 em...

Page 127: ...ed and the device is a direct access device five full words of information are placed into your area If DEVTAB is specified and the device is not a direct access device two full words of information a...

Page 128: ...ck Block Overhead the number of bytes to be subtracted if a clock is not keyed Byte 2 bits 0 6 Reserved bit 7 If 1 a tolerance factor must be applied to all blocks except the last block on the track B...

Page 129: ...der W CI 50 01 08 04 80 Not Applicable 2520 Reader Punch 50 00 08 05 80 Not Applicable 2520 Reader Punch W CI 50 01 08 05 80 Not Applicable 2520 B2 B3 11 00 08 05 80 Not Applicable 2520 B2 B3 W CI 11...

Page 130: ...OCBOOOAOE29511414010219 2314 30 CO 20 08 7294 OOC800141C7E922D2DOI0216 CI Card Image Feature UCS Universal Character Set Although certain models can have a larger line size the minimum line size is as...

Page 131: ...ld merged into the JFCB from the DSCB Secondary quantity field merged into the JFCB from the DSCB DCB fields merged into the JFCB from the DSCB DCB fields merged into the JFCB from the DCB Volume seri...

Page 132: ...Job File Control Block S The RDJFCB macro instruction causes a job file control block JFCB to be read from the job queue into roain storage for each data control block specified r T T I Nawe I Operat...

Page 133: ...T I Type of Exit I Hexadecimal Code I Contents of Exit List Entry I I List Entry I high order byte I three low order bytes I i I Job file I 07 I Address of a 176 tyte area to be I I control block I I...

Page 134: ...concatenation 114 counter maintenance 114 operating characteristics 113 SCRATCH and RENAME functions 114 termination of processing 113 volume switching 114 Device code designations catalog and VTOC m...

Page 135: ...siness Machines Corporation Data Processing Division 112 East Post Road White Plains N Y 10601 USA Only IBM World Trade Corporation 821 United Nations Plaza New York New York 10017 International Land...

Page 136: ...____________________________ Please check the items that describe your position _ Customer personnel _Operator _ IBM personnel _ Programmer _ Manager _Custome Engineer _ Systems Analyst _ Instructor f...

Page 137: ...MS PUBLICATIONS DEPT D58 told International Business Machines Corporation Data Processing Division 112 East Post Road White Plains N Y 10601 USA Only IBM World Trade Corporation 821 United Nations Pla...

Reviews: