Execute Channel Program: Difference between revisions

Content deleted Content added
Yobot (talk | contribs)
m FIx REFPUNCT + other minor fixes
appendages, fix z/OS wikilink
Line 33:
| section = Chapter 4. Executing Your Own Channel Programs
| pages = 151–210
| section-url = https://www-01.ibm.com/servers/resourcelink/svc00100.nsf/pages/zOSV2R4sc236861/$file/idas300_v2r4.pdf#page=181
| url = https://www-01.ibm.com/servers/resourcelink/svc00100.nsf/pages/zOSV2R4sc236861/$file/idas300_v2r4.pdf
| id = SC23-6861-40}}
</ref> is more specifically described in the OS System Programmer's Guide.;<ref>{{cite manual|publisher=IBM|title=IBM System/360 Operating System System Programmer's Guide|id=C28-6550-2|date=March 1967|url=http://www.bitsavers.org/pdf/ibm/360/os/R01-08/C28-6550-2_OSsysPrmg_Mar67.pdf}}</ref> EXCP for [[DOS/360 and successors]]<ref name="Stotts1990">{{cite book
Line 57:
| id = SC34-2709-00}}
</ref>
This article mostly reflects OS/360 through [[z/OS]]; some details are different for TOS/360 and DOS/360 through [[z/VSE]].
 
==Specifying datasets==
Line 66:
 
==Appendages==
A comprehensive list of ''appendages''{{sfn|DFSMSdfp|loc=[https://www-01.ibm.com/servers/resourcelink/svc00100.nsf/pages/zOSV2R4sc236861/$file/idas300_v2r4.pdf#page=229 EXCP and EXCPVR Appendages]|pp=199-200}} ([[User exit|exits]] in the EXCP context) allows authorized programs{{efn|There are several type of authorization for the use of appendages:
A comprehensive list of ''[[User exit|exits]]'' (called, in the EXCP context, ''appendages'') allows authorized programs to override or augment many of the system security and data integrity checks. Most of these appendages are supported for compatibility with earlier instances of the OS, but the functions of several have been modified or extended for MVS. The appendages are specified in the DCB as the last two characters of the module name IGG019xx, where xx = WA to Z9, inclusive. These module names are reserved for installation-written appendages. Any other name of the form IGG019xx is reserved for use by IBM access methods.<ref>IGG = I/O Support component prefix; 019 = Open SVC sub-component; xx = sub-function</ref> Appendages must reside in SYS1.SVCLIB (SYS1.LPALIB in SVS or later instances of the OS).
*A program that is APF authorized, running in a system (0-7) key or in Supervisor Mode may use any appendage.
*A program may use any appendage that is automatically selected by OPEN for the use of an access method.
*A prgram may use any appendage that is defined at IPL time in IEAAPP00.{{sfn|DFSMSdfp|loc=[https://www-01.ibm.com/servers/resourcelink/svc00100.nsf/pages/zOSV2R4sc236861/$file/idas300_v2r4.pdf#page=231 The Authorized Appendage List (IEAAPP00)],pp=201-202}}
A comprehensive list of ''[[User exit|exits]]'' (called, in the EXCP context, ''appendages'') allows authorized programs}} to override or augment many of the system security and data integrity checks. Most of these appendages are supported for compatibility with earlier instances of the OS, but the functions of several have been modified or extended for MVS. The appendages are specified in the DCB as the last two characters of the module name IGG019xx, where xx = WA to Z9, inclusive. These module names are reserved for installation-written appendages. Any other name of the form IGG019xx is reserved for use by IBM access methods.<ref>IGG = I/O Support component prefix; 019 = Open SVC sub-component; xx = sub-function</ref> Appendages must reside in SYS1.SVCLIB (SYS1.LPALIB in SVS or later instances of the OS).
 
==Dataset integrity==
Line 142 ⟶ 146:
| 0000 1101 || '0D'X || Write key and data
|}
 
==Notes==
{{notelist}}
 
==References==
;DFSMSdfp
:{{cite manual
| publisher = IBM
| title = z/OS Version 2 Release 4 DFSMSdfp Advanced Services
| date = August 2020
| url = https://www.ibm.com/servers/resourcelink/svc00100.nsf
| id = SC23-6861-40
| ref = {{sfnref|DFSMSdfp}}
}}
<references />