Sign In
Upload
Manuals
Brands
IBM Manuals
Server
SC34-6814-04
IBM SC34-6814-04 Manuals
Manuals and User Guides for IBM SC34-6814-04. We have
1
IBM SC34-6814-04 manual available for free PDF download: Customization Manual
IBM SC34-6814-04 Customization Manual (953 pages)
CICS Transaction Server for z/OS
Brand:
IBM
| Category:
Server
| Size: 3.31 MB
Table of Contents
Table of Contents
5
How to Use this Book
19
Notes on Terminology
19
Preface
19
What this Book Is about
19
What You Need to Know to Understand this Book
19
Who this Book Is for
19
Syntax Notation and Conventions Used in this Book
20
Changes for CICS Transaction Server for Z/Os, Version 3 Release 1
21
Changes for CICS Transaction Server for Z/Os, Version 3 Release 2
21
Summary of Changes
21
Changes for CICS Transaction Server for Z/Os, Version 2 Release 3
22
Part 1. Customizing with User Exit Programs
23
Chapter 1. Global User Exit Programs
25
Writing Global User Exit Programs
25
Register Conventions
25
31-Bit Addressing Implications
26
Using CICS Services
26
Using Channels and Containers
27
Assembler Programs and LEASM
28
EDF and Global User Exits
28
The Global Work Area
28
Making Trace Entries
28
Parameters Passed to the Global User Exit Program
29
Returning Values to CICS
32
Restrictions on the Use of Fields as Programming Interfaces
33
Exit Programs and the CICS Storage Protection Facility
33
Errors in User Exit Programs
34
Defining, Enabling, and Disabling an Exit Program
34
Viewing Active Global User Exits
35
Invoking more than One Exit Program at a Single Exit
35
Invoking a Single Exit Program at more than One Exit
36
Making Programs Threadsafe
36
Sample Global User Exit Programs
37
Basic Sample and Example Programs
37
Sample Programs for Specific Exits
40
Alphabetical List of Global User Exit Points
47
Global User Exit Points by Functional Area
54
Activity Keypoint Program Exit XAKUSER
54
Application Associated Data Exit, XAPADMGR, in the AP Domain
55
Basic Mapping Support Exits XBMIN and XBMOUT
56
Bridge Facility Exit XFAINTU
60
Data Tables Management Exits XDTRD, XDTAD, and XDTLC
62
DBCTL Interface Control Program Exit XXDFA
67
DBCTL Tracking Program Exits XXDFB and XXDTO
68
Dispatcher Domain Exits XDSBWT and XDSAWT
69
DL/I Interface Program Exits XDLIPRE and XDLIPOST
70
Dump Domain Exits XDUREQ, XDUREQC, XDUCLSE, and XDUOUT
75
Enqueue EXEC Interface Program Exits XNQEREQ and XNQEREQC
82
EXEC Interface Program Exits XEIIN, XEIOUT, XEISPIN, and XEISPOUT
89
File Control Domain Exits, XFCFRIN and XFCFROUT
94
File Control EXEC Interface API Exits XFCREQ and XFCREQC
107
File Control EXEC Interface SPI Exits XFCAREQ and XFCAREQC
120
File Control File State Program Exits XFCSREQ and XFCSREQC
133
File Control Open/Close Program Exit XFCNREC
143
File Control Quiesce Receive Exit, XFCVSDS
144
File Control Quiesce Send Exit XFCQUIS
146
File Control Recovery Program Exits XFCBFAIL, XFCBOUT, XFCBOVER, and XFCLDEL
148
Front End Programming Interface Exits XSZARQ and XSZBRQ
159
Good Morning Message Program Exit XGMTEXT
160
HTTP Client Open and Send Exits: XWBAUTH, XWBOPEN and XWBSNDO
160
Intersystem Communication Program Exits XISCONA and XISLCLQ
160
Interval Control Program Exits XICREQ, XICEXP, and XICTENF
165
Interval Control EXEC Interface Program Exits XICEREQ, XICERES, and XICEREQC
167
Loader Domain Exits XLDLOAD and XLDELETE
184
Log Manager Domain Exit XLGSTRM
186
Message Domain Exit XMEOUT
190
Monitoring Domain Exit XMNOUT
194
Pipeline Domain Exits
196
Program Control Program Exits XPCREQ, XPCERES, XPCREQC, XPCFTCH, XPCHAIR, XPCTA, and XPCABND
197
Table of Contents
209
DFHPCUE Fields Are Significant
211
Pcue_Control_Bits
211
Pcue_Logical_Level
211
Resource Manager Interface Program Exits XRMIIN and XRMIOUT
215
Resource Management Install and Discard Exit XRSINDI
217
Signon and Signoff Exits XSNON, XSNOFF, and XSNEX
221
Statistics Domain Exit XSTOUT
224
System Recovery Program Exit XSRAB
225
System Termination Program Exit XSTERM
228
Temporary Storage Domain Exits XTSQRIN, XTSQROUT, XTSPTIN, and XTSPTOUT
229
Temporary Storage EXEC Interface Program Exits XTSEREQ and XTSEREQC
234
Terminal Allocation Program Exit XALCAID
243
Terminal Control Program Exits XTCIN, XTCOUT, and XTCATT
245
Terminal Not Known' Condition Exits XALTENF and XICTENF
246
Transaction Manager Domain Exit XXMATT
254
Transient Data Program Exits XTDREQ, XTDIN, and XTDOUT
256
Transient Data EXEC Interface Program Exits XTDEREQ and XTDEREQC
258
User Log Record Recovery Program Exits XRCINIT and XRCINPT
266
VTAM Terminal Management Program Exit XZCATT
269
VTAM Working-Set Module Exits XZCIN, XZCOUT, XZCOUT1, and XZIQUE
270
XISQUE Exit for Managing IPIC Intersystem Queues
280
XRF Request-Processing Program Exit XXRSTAT
285
Pcue_Program_Name
211
Pcue_Task_Number
211
3-Character Packed Decimal Field Containing the Task Number
211
Pcue_Terminal_Id
211
4-Character Field Containing the Terminal ID (if Any)
211
Pcue_Transaction_Id
211
Terminal-Related Information, and that Can be Mapped Using the
211
Chapter 2. Task-Related User Exit Programs
289
Introduction to the Task-Related User Exit Mechanism (the Adapter)
289
The Stub Program
291
Returning Control to the Application Program
292
Task-Related User Exits and EDF
292
Writing a Task-Related User Exit Program
293
Obligations of OPENAPI Task-Related User Exits
293
User Exit Parameter Lists
295
The Schedule Flag Word
309
Register Handling in the Task-Related User Exit Program
310
Addressing-Mode Implications
311
Exit Programs and the CICS Storage Protection Facility
312
Recursion Within a Task-Related User Exit Program
312
Purging Tasks
312
Using CICS Services in Your Task-Related User Exit Program
313
Using Channels and Containers
314
Assembler Programs and LEASM
314
Wait States in Your Task-Related User Exit Program
314
Work Areas
314
Coding a Program to be Invoked by the CICS SPI
315
Coding a Program to be Invoked by the CICS Syncpoint Manager
315
Return Codes
316
Coding a Program to be Invoked by the CICS Task Manager
319
Coding a Program to be Invoked at CICS Termination
320
Using EDF with Your Task-Related User Exit Program
323
Administering the Adapter
324
What You Must Do before Using the Adapter
325
Tracing a Task-Related User Exit Program
326
Chapter 3. The User Exit Programming Interface (XPI)
327
Overview of the XPI
327
Making an XPI Call
330
Setting up the XPI Environment
334
XPI Register Usage
334
The XPI Copy Books
335
Reentrancy Considerations Resulting from XPI Calls
335
Global User Exit XPI Examples, Showing the Use of Storage
335
An Example Showing How to Build a Parameter List Incrementally
340
XPI Syntax
341
Directory Domain XPI Functions
343
The BIND_LDAP Call
343
The END_BROWSE_RESULTS Call
345
The FLUSH_LDAP_CACHE Call
345
The FREE_SEARCH_RESULTS Call
346
The GET_ATTRIBUTE_VALUE Call
347
The GET_NEXT_ATTRIBUTE Call
348
The GET_NEXT_ENTRY Call
349
The SEARCH_LDAP Call
350
The START_BROWSE_RESULTS Call
351
The UNBIND_LDAP Call
352
Dispatcher XPI Functions
353
Synchronization Protocols for SUSPEND and RESUME Processing
353
The ADD_SUSPEND Call
356
The SUSPEND Call
357
The RESUME Call
361
The DELETE_SUSPEND Call
362
The WAIT_MVS Call
362
The CHANGE_PRIORITY Call
366
Dump Control XPI Functions
367
The SYSTEM_DUMP Call
367
The TRANSACTION_DUMP Call
369
Enqueue Domain XPI Functions
371
The ENQUEUE Function
371
The DEQUEUE Function
372
Kernel Domain XPI Functions
373
The START_PURGE_PROTECTION Function
373
The STOP_PURGE_PROTECTION Function
373
Nesting Purge Protection Calls
374
Loader XPI Functions
374
The DEFINE_PROGRAM Call
375
The ACQUIRE_PROGRAM Call
378
The RELEASE_PROGRAM Call
380
The DELETE_PROGRAM Call
381
Log Manager XPI Functions
382
The INQUIRE_PARAMETERS Call
382
The SET_PARAMETERS Call
383
Monitoring XPI Functions
383
The MONITOR Call
384
The INQUIRE_MONITORING_DATA Call
386
Program Management XPI Functions
388
The INQUIRE_PROGRAM Call
388
The INQUIRE_CURRENT_PROGRAM Call
395
The SET_PROGRAM Call
397
The START_BROWSE_PROGRAM Call
401
The GET_NEXT_PROGRAM Call
402
The END_BROWSE_PROGRAM Call
403
The INQUIRE_AUTOINSTALL Call
404
The SET_AUTOINSTALL Call
404
State Data Access XPI Functions
406
The INQ_APPLICATION_DATA Call
406
The INQUIRE_SYSTEM Call
408
The SET_SYSTEM Call
413
Storage Control XPI Functions
414
The GETMAIN Call
414
The FREEMAIN Call
417
The INQUIRE_ACCESS Call
417
The INQUIRE_ELEMENT_LENGTH Call
418
The INQUIRE_SHORT_ON_STORAGE Call
419
The INQUIRE_TASK_STORAGE Call
420
The SWITCH_SUBSPACE Call
421
Trace Control XPI Function
421
The TRACE_PUT Call
422
Transaction Management XPI Functions
423
The INQUIRE_CONTEXT Call
423
The INQUIRE_DTRTRAN Call
425
The INQUIRE_MXT Call
425
The INQUIRE_TCLASS Call
427
The INQUIRE_TRANDEF Call
428
The INQUIRE_TRANSACTION Call
436
The SET_TRANSACTION Call
440
User Journaling XPI Function
441
The WRITE_JOURNAL_DATA Call
441
Part 2. Customizing with Initialization and Shutdown Programs
445
Chapter 4. Writing Initialization and Shutdown Programs
447
Writing Initialization Programs
447
First-Phase PLT Programs
447
Second Phase PLT Programs
448
Effect of Delayed Recovery on PLTPI Processing
449
Writing Shutdown Programs
450
First Phase PLT Programs
450
PLT Programs for the Second Quiesce Stage
450
The Shutdown Assist Utility Program, DFHCESD
451
General Considerations When Writing Initialization and Shutdown Programs
451
Storage Keys for PLT Programs
452
Part 3. Customizing with User-Replaceable Programs
455
Chapter 5. General Notes about User-Replaceable Programs
457
Rewriting User-Replaceable Programs
457
Assembling and Link-Editing User-Replaceable Programs
458
User-Replaceable Programs and the Storage Protection Facility
459
Execution Key for User-Replaceable Programs
459
Data Storage Key for User-Replaceable Programs
460
Chapter 6. Writing a Program Error Program
461
The Sample Program Error Programs
465
Chapter 7. Writing a Transaction Restart Program
467
The DFHREST Communications Area
468
The CICS-Supplied Transaction Restart Program
469
Chapter 8. Writing a Terminal Error Program
471
Background to Error Handling for Sequential Devices
471
When an Abnormal Condition Occurs
471
Terminal Control Program
472
Terminal Abnormal Condition Program
472
Terminal Error Program
472
The Communication Area
473
Terminal Abnormal Condition Line Entry (TACLE)
473
The Sample Terminal Error Program
473
Components of the Sample Terminal Error Program
473
Structure of the Sample Terminal Error Program
475
Sample Terminal Error Program Messages
478
Generating the Sample Terminal Error Program
480
Writing Your Own Terminal Error Program
492
Why Write Your Own Terminal Error Program
492
Restrictions on the Use of EXEC CICS Commands
492
Addressing the Contents of the Communication Area
493
Addressing the Contents of the TACLE
495
Example of a User-Written Terminal Error Program
497
Chapter 9. Writing a Node Error Program
501
Background to CICS-VTAM Error Handling
502
Why Use a NEP to Supplement CICS Default Actions
502
An Overview of Writing a NEP
503
The Default NEP
504
The Sample NEP
504
Multiple Neps
507
When an Abnormal Condition Occurs
508
The Communication Area
509
The Sample Node Error Program
518
Compatibility with the Sample Terminal Error Program
518
Components of the Sample Node Error Program
518
Generating the Sample Node Error Program
521
Writing Your Own Node Error Program
527
Restrictions on the Use of EXEC CICS Commands
527
Entry and Addressability
528
Coding for the 3270 'Unavailable Printer' Condition
528
Coding for Session Failures
529
Coding for Specific VTAM Sense Codes
530
Writing Multiple Neps
530
DFHZNEPI Macros
530
Handling Shutdown Hung Terminals in the Node Error Program
532
Using the Node Error Program with XRF or Persistent Sessions
532
The Node Error Program in an XRF Environment
532
The Node Error Program with Persistent Session Support
533
Changing the Recovery Notification
533
Changing the Recovery Message
534
Changing the Recovery Transaction
534
Using the Node Error Program with VTAM Generic Resources
534
Chapter 10. Writing a Program to Control Autoinstall of Terminals
537
Autoinstalling Terminals-Preliminary Considerations
537
Coding Entries in the VTAM LOGON Mode Table
538
Using Model Terminal Support (MTS)
538
The Autoinstall Control Program for Terminals
539
The Autoinstall Control Program at INSTALL
539
The Communication Area at INSTALL for Terminals
540
How CICS Builds the List of Autoinstall Models
541
Returning Information to CICS
542
CICS Action on Return from the Control Program
545
The Autoinstall Control Program at DELETE
547
The Communication Area at DELETE for Terminals
547
Naming, Testing, and Debugging Your Autoinstall Control Program
548
Finding the Name of an Autoinstall Control Program
548
Testing and Debugging
548
The Sample Autoinstall Control Programs for Terminals
549
Customizing the Sample Program
550
Chapter 11. Writing a Program to Control Autoinstall of Consoles
557
Autoinstalling Consoles-Preliminary Considerations
557
Leaving It All to CICS
557
Using an Autoinstall Control Program
557
The Autoinstall Control Program at INSTALL
558
The Communication Area at INSTALL for Consoles
558
How CICS Builds the List of Autoinstall Models
560
Returning Information to CICS
560
CICS Action on Return from the Control Program
562
The Autoinstall Control Program at DELETE
562
The Sample Autoinstall Control Programs for Consoles
563
Chapter 12. Writing a Program to Control Autoinstall of APPC Connections
565
Autoinstalling APPC Connections-Preliminary Considerations
565
Local APPC Single-Session Connections Initiated by CINIT
565
Local APPC Parallel-Session and Single-Session Connections Initiated by BIND
565
Autoinstall Templates for APPC Connections
566
Benefits of Autoinstall
566
Requirements for Autoinstall
566
The Autoinstall Control Program for APPC Connections
567
Recovery and Restart
567
The Autoinstall Control Program at INSTALL
567
The Communication Area at INSTALL for APPC Connections
567
The Autoinstall Control Program at DELETE
571
When Autoinstalled APPC Connections Are Deleted
571
The Sample Autoinstall Control Program for APPC Connections
572
Default Actions of the Sample Program
572
Resource Definitions
573
Chapter 13. Writing a Program to Control Autoinstall of IPIC Connections
575
Autoinstalling IPIC Connections: Preliminary Considerations
575
The Autoinstall User Program at INSTALL
577
The Autoinstall User Program at DELETE
578
When Autoinstalled Ipconns Are Deleted
579
The Sample Autoinstall User Program for IPIC Connections (IPCONN)
579
Default Actions of the Sample Program
580
Resource Definitions
580
Chapter 14. Writing a Program to Control Autoinstall of Shipped Terminals
581
Installing Shipped Terminals and Connections
581
CICS-Generated Aliases
582
Resetting the Terminal Identifier
582
The Autoinstall Control Program at INSTALL
583
The Communications Area at INSTALL for Shipped Terminals
584
The Autoinstall Control Program at DELETE
586
Default Actions of the Sample Programs
587
Chapter 15. Writing a Program to Control Autoinstall of Virtual Terminals
589
How Client Virtual Terminals Are Autoinstalled
589
Autoinstall Models
589
Terminal Identifiers
589
Why Override Termids
590
How Bridge Facility Virtual Terminals Are Autoinstalled
592
Using the Terminal Autoinstall Control Program for Bridge Facilities
592
Bridge Facility Name Uniqueness
593
The Autoinstall Control Program at INSTALL
593
The Communications Area at INSTALL for Client Virtual Terminals
593
The Communications Area at INSTALL for Bridge Facility Virtual Terminals
595
The Autoinstall Control Program at DELETE
597
The Communications Area at DELETE for Client Virtual Terminals
597
The Communications Area at DELETE for Bridge Facility Virtual Terminals
598
Default Actions of the Sample Programs
599
Chapter 16. Writing a Program to Control Autoinstall of Programs
601
Autoinstalling Programs-Preliminary Considerations
601
Autoinstall Model Definitions
602
Autoinstalling Programs Invoked by EXEC CICS LINK Commands
602
Autoinstall Processing of Mapsets
603
System Autoinstall
603
Benefits of Autoinstalling Programs
603
Reduced System Administration Costs
603
Saving in Virtual Storage
603
Faster Startup Times
604
Requirements for Program Autoinstall
604
The Autoinstall Control Program at INSTALL
605
The Sample Autoinstall Control Program for Programs, DFHPGADX
608
Customizing the Sample Program
608
Resource Definition
609
Testing and Debugging Your Program
610
Chapter 17. Writing a Dynamic Routing Program
611
Routing Transactions Dynamically
612
Dynamic Transactions
612
When the Dynamic Routing Program Is Invoked
612
Information Passed to the Dynamic Routing Program
613
Changing the Target CICS Region
614
Changing the Program Name
615
Telling CICS Whether to Route or Terminate a Transaction
615
If the System Is Unavailable or Unknown
616
Invoking the Dynamic Routing Program at End of Routed Transactions
616
Invoking the Dynamic Routing Program on Abend
616
Modifying the Initial Terminal Data
617
Modifying the Application's Communications Area
617
Receiving Information from a Routed Transaction
618
Some Processing Considerations
618
Unit of Work Considerations
619
Routing DPL Requests Dynamically
619
When the Dynamic Routing Program Is Invoked
620
Changing the Target CICS Region
621
Changing the Program Name
621
Changing the Transaction ID
622
Telling CICS Whether to Route or Terminate a DPL Request
622
If an Error Occurs in Route Selection
622
Using the XPCERES Exit to Check the Availability of Resources on the Target Region
623
Invoking the Dynamic Routing Program at End of Routed Requests
624
Modifying the Application's Input Communications Area
624
Monitoring the Application's Output Communications Area
624
Some Processing Considerations
624
Unit of Work Considerations
625
Routing Bridge Requests Dynamically
625
Changing Bridge Request Parameters
626
Rejecting a Link3270 Bridge Request
627
Handling Route Selection Errors of Link3270 Bridge Requests
627
Using the XPCERES Exit to Check the Availability of Resources on the Target Region
627
Re-Invoking the Dynamic Routing Program after Link3270 Bridge Requests
628
Link3270 Bridge Dynamic Routing Considerations
628
Modifying the Application's Containers
629
Routing by User ID
629
Parameters Passed to the Dynamic Routing Program
629
Naming Your Dynamic Routing Program
643
Testing Your Dynamic Routing Program
643
Dynamic Transaction Routing Sample Programs
644
Chapter 18. Writing a Distributed Routing Program
645
Differences between the Distributed and Dynamic Routing Interfaces
646
Routing BTS Activities
647
Which BTS Activities Can be Dynamically Routed
647
When the Distributed Routing Program Is Invoked
648
Changing the Target CICS Region
649
Telling CICS Whether to Route the Activity
649
If an Error Occurs in Route Selection
650
Invoking the Distributed Routing Program on the Target Region
650
Routing Method Requests for Enterprise Beans and CORBA Stateless Objects
651
Where Workload Balancing Occurs
651
Which Requests Can be Dynamically Routed
653
When the Distributed Routing Program Is Invoked
654
Changing the Target CICS Region
655
Telling CICS Whether to Route the Method Request
656
If an Error Occurs in Route Selection
656
Invoking the Distributed Routing Program on the Target Region
656
Dealing with a Disabled Corbaserver
657
Performing a Rolling Upgrade of an EJB/CORBA Server
659
Routing Non-Terminal-Related START Requests
659
Which Requests Can be Dynamically Routed
659
When the Distributed Routing Program Is Invoked
660
Changing the Target CICS Region
661
Telling CICS Whether to Route the Request
661
If an Error Occurs in Route Selection
662
Using the XICERES Exit to Check the Availability of Resources on the Target Region
662
Invoking the Distributed Routing Program on the Target Region
663
Routing Inbound Web Service Requests
663
Which Requests Can be Dynamically Routed
663
When the Distributed Routing Program Is Invoked
664
Changing the Target CICS Region
665
Telling CICS Whether to Route the Request
665
If an Error Occurs in Route Selection
666
Invoking the Distributed Routing Program on the Target Region
666
Routing by User ID
666
Dealing with an Abend on the Target Region
666
Some Processing Considerations
667
Parameters Passed to the Distributed Routing Program
667
Naming Your Distributed Routing Program
678
Distributed Transaction Routing Sample Programs
679
Chapter 19. Writing a CICS-DBCTL Interface Status Program
681
The Sample CICS-DBCTL Interface Status Program
682
Chapter 20. Writing a 3270 Bridge Exit Program
683
Chapter 21. Writing a Security Exit Program for IIOP
685
The Sample Programs
687
Dfhxopus
687
Dfheburm
688
Chapter 22. Writing Programs to Customize Jvms
689
Writing Java Classes to Redirect JVM Stdout and Stderr Output
689
The Com.ibm.cics.server.outputredirectionplugin Interface
690
Possible Destinations for Output
691
Handling Output Redirection Errors and Internal Errors
691
Using DFHJVMRO to Modify the Language Environment Enclave for a JVM
692
Using DFHJVMAT to Modify Options in a JVM Profile
693
Options in the JVM Profile that Are Available to DFHJVMAT
694
Chapter 23. Writing a Distinguished Name Program for Clients of Enterprise Beans
697
Sample Programs and Copy Books
699
Chapter 24. Writing an EJB Event Program
701
Overview of the EJB Event Program
701
The DFHEJEP Communications Area
702
Event Codes
703
The EJB Event Sample Program
704
Actions of the Default Program
704
Writing Your Own EJB Event Program
704
Chapter 25. Writing Programs to Customize Language Environment Run-Time Options for Xplink Programs
707
Dfhapxpo
707
Defining Run-Time Options
707
Part 4. Customizing the XRF Overseer Program
709
Chapter 26. The Extended Recovery Facility Overseer Program
711
The Sample XRF Overseer Program
711
The Functions of the Sample Program
711
How the Sample Overseer Program Interfaces with CICS
715
How to Tell the Overseer Which Actives and Alternates to Monitor
715
The DFHWOSM Macros
717
The DFHWOSM Tokens
717
DFHWOSM FUNC=BUILD Macro
718
DFHWOSM FUNC=CLOSE Macro
718
DFHWOSM FUNC=DSECT Macro
719
DFHWOSM FUNC=JJC Macro
719
DFHWOSM FUNC={JJS|QJJS} Macro
719
DFHWOSM FUNC=OPEN Macro
720
DFHWOSM FUNC=OSCMD Macro
721
DFHWOSM FUNC=READ Macro
721
DFHWOSM FUNC=TERM Macro
725
Customizing the Sample XRF Overseer Program
725
Loop or Wait Detection
727
Assembling and Link-Editing the Overseer Program
727
Part 5. CICS Journaling, Monitoring, and Statistics
729
Chapter 27. CICS Logging and Journaling
731
The CICS Log Manager
731
Log Stream Storage
731
Enabling, Disabling, and Reading Journals
733
Enabling and Disabling a Journal
733
Reading Journal Records Offline
734
Structure and Content of CICS Transaction Server for Z/Os Format Journal Records
734
Format of General Log Block Header
735
Format of General Log Journal Record
736
Start-Of-Run Record
738
Format of Caller Data
738
Structure and Content of COMPAT41-Format Journal Records
751
Format of COMPAT41 Journal Control Label Header
751
Format of Journal Record
753
Identifying Records for the Start of Tasks and Uows
759
Format of Journal Records Written to SMF
759
The SMF Block Header
760
The CICS Product Section
762
The CICS Data Section
764
Chapter 28. CICS Monitoring
765
Introduction to CICS Monitoring
765
How CICS Monitoring Data Is Passed to SMF
765
Coding Additional Event-Monitoring Points
766
Application Naming Event Monitoring Points
766
The Monitoring Control Table (MCT)
769
CICS Monitoring Record Formats
772
SMF Header and SMF Product Section
772
CICS Data Section
776
Chapter 29. Writing Statistics Collection and Analysis Programs
791
Writing a Program to Collect CICS Statistics
791
Background Information
791
Resetting Statistics Counters
792
Using the EXEC CICS COLLECT and EXTRACT STATISTICS Commands
792
CICS Statistics Record Format
793
SMF Header and SMF Product Section
793
CICS Statistics Data Section
795
Using an XSTOUT Global User Exit Program to Filter Statistics Records
798
Processing the Output from CICS Statistics
799
Part 6. Customizing CICS Compatibility Interfaces
801
Chapter 30. The Dynamic Allocation Sample Program
803
Overview of the Dynamic Allocation Program
803
Installing the Program and Transaction Definitions
804
The Dynamic Allocation Program-Terminal Operation
804
Using the Dynamic Allocation Program's Help Feature
804
The Dynamic Allocation Program-Values
805
Abbreviation Rules for Keywords
806
System Programming Considerations
806
The Flow of Control When a DYNALLOC Request Is Issued
806
Part 7. Customizing CICS Security Processing
809
Chapter 31. Invoking an External Security Manager
811
An Overview of the CICS-ESM Interface
811
The MVS Router
811
The MVS Router Exit
811
Using ESM Exit Programs to Access CICS-Related Information
813
For Non-RACF Users - the ESM Parameter List
814
For RACF Users - the RACF User Exit Parameter List
814
The Installation Data Parameter List
815
CICS Security Control Points
818
Using Early Verification Processing
819
Writing an Early Verification Routine
820
Using CICS API Commands in an Early Verification Routine
821
Return and Reason Codes from the Early Verification Routine
821
Chapter 32. Writing a "Good Night" Program
823
The Communications Area of the "Good Night" Program
823
The Sample "Good Night" Program, DFH0GNIT
825
What the Sample Program Does
825
Customizing the Sample "Good Night" Program
826
Part 8. Examining and Modifying Resource Attributes
829
Chapter 33. Using the Programmable Interface to CEDA
831
Using DFHEDAP in a DTP Environment
832
When to Use the Programmable Interface
832
An Overview of DFHCSDUP
835
Chapter 34. User Programs for the System Definition Utility Program (DFHCSDUP)
835
Invoking a User Program from DFHCSDUP
836
Writing a Program to be Invoked During EXTRACT Processing
836
The EXTRACT Command
836
When the User Program Is Invoked
837
Parameters Passed from DFHCSDUP to the User Program
837
The Sample EXTRACT Programs
838
Assembling and Link-Editing EXTRACT Programs
841
Invoking DFHCSDUP from a User Program
843
Entry Parameters for DFHCSDUP
844
Responsibilities of the User Program
846
The User Exit Points in DFHCSDUP
846
Parameters Passed to the User Exit Routines
846
The Initialization Exit
847
The Get-Command Exit
847
The Extract Exit
848
The Put-Message Exit
849
The Termination Exit
850
The Sample Program, DFH$CUS1
851
Part 9. Appendixes
853
Appendix A. Coding Entries in the VTAM LOGON Mode Table
855
Overview of the VTAM LOGON Mode Table
855
TYPETERM Device Types and Pointers to Related LOGON Mode Data
855
VTAM MODEENT Macro Operands
857
PSERVIC Screen Size Values for Lutypex Devices
862
Matching Models and LOGON Mode Entries
863
LOGON Mode Definitions for CICS-Supplied Autoinstall Models
872
Appendix B. Default Actions of the Node Abnormal Condition Program
877
DFHZNAC-Default Actions for Terminal Error Codes
877
CICS Messages Associated with VTAM Errors
883
DFHZNAC-Default Actions for System Sense Codes
888
Action Flag Settings and Meanings
890
Appendix C. Analyzing CICS Restart Information
893
Appendix D. Using the Transient Data Write-To-Terminal Program (DFH$TDWT)
895
DFH$TDWT-Resource Definitions Required
895
Appendix E. Uppercase Translation
897
Translating National Characters to Uppercase
897
Using the XZCIN Exit
897
Using Dfhtctxx
897
Translating TS Data Sharing Messages to Uppercase
898
Appendix F. the Example Program for the XTSEREQ Global User Exit, DFH$XTSE
899
Appendix G. Threadsafe XPI Commands
915
Bibliography
917
The CICS Transaction Server for Z/Os Library
917
The Entitlement Set
917
PDF-Only Books
917
Books from Related Libraries
919
MVS Books
919
VTAM Books
920
Other Related Books
920
Other CICS Books
919
Determining if a Publication Is Current
920
Accessibility
923
Index
925
Notices
945
Trademarks
947
Advertisement
Advertisement
Related Products
IBM SC41-5420-04
IBM SC34-7012-01
IBM SCOD-3ZVQ5W
IBM ISERIES SC41-5210-04
IBM SC25-R345-20
IBM SC88-P919-40
IBM BladeCenter S 7779
IBM SBX82
IBM Power Systems Series
IBM SV2
IBM Categories
Server
Desktop
Storage
Laptop
Monitor
More IBM Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL