+ All Categories
Home > Documents > z/OS V1R6.0 MVS JCL User's Guide

z/OS V1R6.0 MVS JCL User's Guide

Date post: 02-Jan-2017
Category:
Upload: buinga
View: 243 times
Download: 4 times
Share this document with a friend
324
z/OS MVS JCL User’s Guide SA22-7598-04
Transcript
  • z/OS

    MVS

    JCL

    Users

    Guide

    SA22-7598-04

  • z/OS

    MVS

    JCL

    Users

    Guide

    SA22-7598-04

  • Note

    Before

    using

    this

    information

    and

    the

    product

    it

    supports,

    be

    sure

    to

    read

    the

    general

    information

    under

    Appendix

    E,

    Notices,

    on

    page

    E-1.

    Fifth

    Edition,

    September

    2004

    This

    is

    a

    major

    revision

    of

    SA22-7598-03.

    This

    edition

    applies

    to

    Version

    1

    Release

    6

    of

    z/OS

    (5694-A01)

    and

    to

    all

    subsequent

    releases

    and

    modifications

    until

    otherwise

    indicated

    in

    new

    editions.

    IBM

    welcomes

    your

    comments.

    A

    form

    for

    readers

    comments

    may

    be

    provided

    at

    the

    back

    of

    this

    document,

    or

    you

    may

    address

    your

    comments

    to

    the

    following

    address:

    v

    International

    Business

    Machines

    Corporation

    v

    Department

    55JA,

    Mail

    Station

    P384

    v

    2455

    South

    Road

    v

    Poughkeepsie,

    NY

    12601-5400

    v

    United

    States

    of

    America

    v

    v

    FAX

    (United

    States

    &

    Canada):

    1+845+432-9405

    v

    FAX

    (Other

    Countries):

    v

    Your

    International

    Access

    Code

    +1+845+432-9405

    v

    v

    IBMLink

    (United

    States

    customers

    only):

    IBMUSM10(MHVRCFS)

    v

    Internet

    e-mail:

    [email protected]

    v

    World

    Wide

    Web:

    www.ibm.com/servers/eserver/zseries/zos/webqs.html

    If

    you

    would

    like

    a

    reply,

    be

    sure

    to

    include

    your

    name,

    address,

    telephone

    number,

    or

    FAX

    number.

    Make

    sure

    to

    include

    the

    following

    in

    your

    comment

    or

    note:

    v

    Title

    and

    order

    number

    of

    this

    document

    v

    Page

    number

    or

    topic

    related

    to

    your

    comment

    When

    you

    send

    information

    to

    IBM,

    you

    grant

    IBM

    a

    nonexclusive

    right

    to

    use

    or

    distribute

    the

    information

    in

    any

    way

    it

    believes

    appropriate

    without

    incurring

    any

    obligation

    to

    you.

    Copyright

    International

    Business

    Machines

    Corporation

    1988,

    2004.

    All

    rights

    reserved.

    US

    Government

    Users

    Restricted

    Rights

    Use,

    duplication

    or

    disclosure

    restricted

    by

    GSA

    ADP

    Schedule

    Contract

    with

    IBM

    Corp.

    http://www.ibm.com/servers/eserver/zseries/zos/webqs.html

  • Contents

    Figures

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xi

    Tables

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xiii

    About

    This

    Book

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xv

    Who

    Should

    Use

    This

    Book

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xv

    Where

    to

    Find

    More

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xv

    Programs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xv

    Hardware

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xv

    Accessing

    z/OS

    licensed

    documents

    on

    the

    Internet

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xvi

    Using

    LookAt

    to

    look

    up

    message

    explanations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xvi

    Summary

    of

    Changes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xix

    Part

    1.

    Introduction

    Chapter

    1.

    Introduction

    -

    Job

    Control

    Statements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 1-1

    JCL

    Statements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 1-1

    JECL

    Statements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 1-2

    Chapter

    2.

    Introduction

    -

    Job

    Control

    Language

    (JCL)

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-1

    Understanding

    JCL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-1

    Chez

    MVS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-1

    How

    This

    Relates

    to

    JCL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-1

    Job

    Control

    Statements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-2

    Required

    Control

    Statements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-3

    Exercise:

    Creating

    and

    Entering

    a

    Job

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-3

    Before

    You

    Begin

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-3

    Step

    1.

    Allocate

    a

    Data

    Set

    to

    Contain

    Your

    JCL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-4

    Step

    2.

    Edit

    the

    JCL

    Data

    Set

    and

    Add

    the

    Necessary

    JCL

    .

    .

    .

    .

    .

    .

    . 2-4

    Step

    3.

    Submit

    the

    JCL

    to

    the

    System

    as

    a

    Job

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-6

    Step

    4.

    View

    and

    Understand

    the

    Output

    from

    the

    Job

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-7

    Step

    5.

    Make

    Changes

    to

    Your

    JCL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-8

    Step

    6.

    View

    and

    Understand

    Your

    Final

    Output

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-9

    More

    Complex

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-11

    In-Stream

    and

    Cataloged

    Procedures

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-11

    Input

    Streams

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-12

    Additional

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-13

    Installation

    Conventions

    Worksheet

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-13

    Using

    ISPF

    to

    Allocate

    and

    Edit

    a

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-13

    Using

    SDSF

    to

    View

    Held

    Output

    from

    a

    Job

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-15

    Helpful

    Utilities

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-17

    Chapter

    3.

    Job

    Control

    Tasks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-1

    Entering

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-1

    Processing

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-2

    Requesting

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-2

    Task

    Charts

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-2

    Part

    2.

    Tasks

    for

    Entering

    Jobs

    Chapter

    4.

    Entering

    Jobs

    -

    Identification

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-1

    Copyright

    IBM

    Corp.

    1988,

    2004

    iii

  • Identification

    of

    Job

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-1

    Identification

    of

    Step

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-2

    Identification

    of

    Procedure

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-2

    Identification

    of

    INCLUDE

    Group

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-3

    Identification

    of

    Account

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-3

    For

    Local

    Execution

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-3

    For

    Remote

    Execution

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-4

    Identification

    of

    Programmer

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-4

    Chapter

    5.

    Entering

    Jobs

    -

    Execution

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-1

    Execution

    of

    Program

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-1

    Execution

    of

    Procedure

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-2

    Execution

    when

    Restarting

    and

    with

    Checkpointing

    (non-APPC)

    .

    .

    .

    .

    .

    . 5-2

    Restarting

    after

    Abnormal

    Termination

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-2

    Restarting

    When

    the

    System

    Failed

    in

    a

    JES2

    System

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-3

    Restarting

    When

    the

    System

    Failed

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-3

    Deadline

    or

    Periodic

    Execution

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-4

    Use

    of

    Deadline

    Scheduling

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-4

    Use

    of

    Periodic

    Scheduling

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-4

    Execution

    when

    Dependent

    on

    Other

    Jobs

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    . 5-4

    Execution

    at

    Remote

    Node

    (non-APPC)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-6

    Considerations

    when

    Submitting

    a

    Remote

    Job

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-7

    Chapter

    6.

    Entering

    Jobs

    -

    Job

    Input

    Control

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6-1

    Job

    Input

    Control

    by

    Holding

    Job

    Entrance

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    .

    .

    . 6-1

    Job

    Input

    Control

    by

    Holding

    Local

    Input

    Reader

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    . 6-2

    Job

    Input

    Control

    by

    Copying

    Input

    Stream

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    .

    .

    . 6-2

    Job

    Input

    Control

    from

    Remote

    Work

    Station

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6-3

    JES2

    Remote

    Job

    Entry

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6-3

    JES3

    Remote

    Job

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6-4

    Chapter

    7.

    Entering

    Jobs

    -

    Communication

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-1

    Communication

    from

    JCL

    to

    System

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-1

    Communication

    from

    JCL

    to

    Operator

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-2

    Communication

    from

    JCL

    to

    Programmer

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-2

    Communication

    from

    JCL

    to

    Program

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-2

    PARM

    Values

    for

    IBM-Supplied

    Programs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-2

    Communication

    from

    System

    to

    Operator

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-3

    Messages

    during

    Volume

    Mounting

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-3

    Messages

    When

    Job

    Exceeds

    Output

    Limit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-3

    Communication

    from

    System

    to

    Userid

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-4

    Job

    Completion

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-5

    Print

    Completion

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-5

    Communication

    from

    Time

    Sharing

    Userid

    to

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    . 7-5

    Communication

    from

    Functional

    Subsystem

    to

    Programmer

    .

    .

    .

    .

    .

    .

    .

    . 7-6

    Communication

    through

    Job

    Log

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-6

    Printing

    Job

    Log

    and

    Sysout

    Data

    Sets

    Together

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-7

    Chapter

    8.

    Entering

    Jobs

    -

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 8-1

    Protection

    through

    RACF

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 8-1

    Chapter

    9.

    Entering

    Jobs

    -

    Resource

    Control

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-1

    Resource

    Control

    of

    Program

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-1

    System

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-1

    Private

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-2

    Temporary

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-4

    iv

    z/OS

    V1R6.0

    MVS

    JCL

    Users

    Guide

  • Resource

    Control

    of

    Procedure

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-4

    Retrieving

    a

    Procedure

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-5

    Updating

    a

    Procedure

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-5

    Resource

    Control

    of

    INCLUDE

    Group

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-6

    Retrieving

    an

    INCLUDE

    Group

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-6

    Resource

    Control

    of

    Address

    Space

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-6

    Types

    of

    Storage

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-6

    Requesting

    Amount

    and

    Type

    of

    Storage

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-7

    Resource

    Control

    of

    the

    Processor

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-8

    Selecting

    a

    Processor

    Using

    A

    Scheduling

    Environment

    .

    .

    .

    .

    .

    .

    .

    . 9-8

    Selecting

    a

    Processor

    in

    JES2

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-9

    Selecting

    a

    Processor

    in

    JES3

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-10

    Resource

    Control

    of

    Spool

    Partitions

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-11

    Part

    3.

    Tasks

    for

    Processing

    Jobs

    Chapter

    10.

    Processing

    Jobs

    -

    Processing

    Control

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-1

    Processing

    Control

    by

    Conditional

    Execution

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-1

    Bypassing

    or

    Executing

    Steps

    Based

    on

    the

    Evaluation

    of

    Previous

    Steps

    10-1

    Bypassing

    or

    Executing

    Steps

    Based

    on

    Return

    Codes

    .

    .

    .

    .

    .

    .

    .

    . 10-5

    Processing

    Control

    by

    Cancelling

    a

    Job

    that

    Exceeds

    Output

    Limit

    .

    .

    .

    . 10-12

    Limiting

    Output

    in

    an

    APPC

    Scheduling

    Environment

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-12

    Limiting

    Output

    in

    a

    Non-APPC

    Scheduling

    Environment

    .

    .

    .

    .

    .

    .

    . 10-12

    Use

    in

    Testing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-13

    Processing

    Control

    by

    Timing

    Execution

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-13

    JOB

    and

    EXEC

    TIME

    Parameter

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-14

    JES2

    Time

    Parameters

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-15

    OS/390

    UNIX

    System

    Services

    Considerations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-15

    Processing

    Control

    for

    Testing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-15

    Altering

    Usual

    Processing

    for

    Testing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-15

    Chapter

    11.

    Processing

    Jobs

    -

    Performance

    Control

    .

    .

    .

    .

    .

    .

    .

    .

    . 11-1

    Performance

    Control

    by

    Job

    Class

    Assignment

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    . 11-1

    Performance

    Control

    by

    Selection

    Priority

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    .

    .

    . 11-2

    Priority

    for

    JES2

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 11-2

    Priority

    for

    JES3

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 11-3

    Priority

    Aging

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 11-3

    Performance

    Control

    by

    I/O-to-Processing

    Ratio

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    . 11-3

    Part

    4.

    Tasks

    for

    Requesting

    Data

    Set

    Resources

    Chapter

    12.

    Data

    Set

    Resources

    -

    Identification

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-1

    Identification

    of

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-1

    Permanent

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-1

    Temporary

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-3

    Copying

    the

    Data

    Set

    Name

    from

    an

    Earlier

    DD

    Statement

    .

    .

    .

    .

    .

    .

    . 12-4

    Concatenating

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-5

    Identification

    of

    In-Stream

    Data

    Set

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-5

    Entering

    Data

    Through

    the

    Input

    Stream

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-5

    In-Stream

    Data

    Sets

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-6

    Identification

    of

    Data

    Set

    on

    3540

    Diskette

    Input/Output

    Unit

    .

    .

    .

    .

    .

    .

    . 12-6

    Identification

    through

    Catalog

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-6

    Using

    Private

    Catalogs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-7

    Identification

    through

    Label

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-8

    Identification

    by

    Location

    on

    Tape

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-10

    Contents

    v

    ||

  • Identification

    as

    TCAM

    Message

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-10

    Identification

    as

    Data

    Set

    from

    or

    to

    Terminal

    (Non-APPC)

    .

    .

    .

    .

    .

    .

    .

    . 12-10

    Chapter

    13.

    Data

    Set

    Resources

    -

    Description

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13-1

    Description

    of

    Status

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13-1

    Data

    Set

    Integrity

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13-2

    Description

    of

    Data

    Attributes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13-4

    In

    Data

    Control

    Block

    (DCB)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13-4

    Migration

    and

    Backup

    (with

    SMS)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13-7

    Chapter

    14.

    Data

    Set

    Resources

    -

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-1

    Protection

    through

    RACF

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-1

    Protection

    with

    the

    PROTECT

    Parameter

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-1

    Protection

    with

    the

    SECMODEL

    Parameter

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-2

    Protection

    for

    ISO/ANSI/FIPS

    Version

    3

    Tapes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-2

    Protection

    by

    Passwords

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-2

    Protection

    of

    Access

    to

    BSAM

    or

    BDAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-3

    Chapter

    15.

    Data

    Set

    Resources

    -

    Allocation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-1

    Allocation

    of

    Device

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-2

    Device

    Allocation

    for

    SMS-Managed

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-2

    Device

    Allocation

    for

    Non-SMS-Managed

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-3

    Device

    Allocation

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-11

    Allocation

    of

    Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-15

    Volume

    Allocation

    for

    SMS-Managed

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-16

    Volume

    Allocation

    for

    Non-SMS-Managed

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-17

    Volume

    Allocation

    for

    Non-System-Managed

    Data

    Sets

    and

    Data

    Sets

    on

    a

    System-Managed

    Tape

    Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-17

    Interactions

    Between

    Device

    and

    Volume

    Allocation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-24

    Relationship

    of

    the

    UNIT

    and

    VOLUME

    Parameters

    (Non-SMS-Managed

    Data

    Sets)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-24

    Relationship

    of

    the

    UNIT

    and

    VOLUME

    Parameters

    (SMS-Managed

    Data

    Sets)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-28

    Unit

    and

    Volume

    Affinity

    for

    Non-System-Managed

    Data

    Sets

    and

    Data

    Sets

    on

    a

    System-Managed

    Tape

    Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-29

    Stacking

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-37

    Examples

    of

    Data

    Set

    Stacking

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-38

    Data

    Set

    Stacking

    and

    Tape

    Mount

    Management

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-40

    Allocation

    of

    Direct

    Access

    Space

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-42

    Requesting

    System

    Assigned

    Space

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-43

    Requesting

    Specific

    Tracks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-47

    Allocation

    of

    Virtual

    I/O

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-47

    Backward

    References

    to

    VIO

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-49

    Allocation

    with

    Volume

    Premounting

    in

    a

    JES2

    System

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-50

    Dynamic

    Allocation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-50

    Chapter

    16.

    Data

    Set

    Resources

    -

    Processing

    Control

    .

    .

    .

    .

    .

    .

    .

    . 16-1

    Processing

    Control

    by

    Suppressing

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16-1

    Processing

    Control

    by

    Postponing

    Specification

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16-2

    Processing

    Control

    with

    Checkpointing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16-4

    Processing

    Control

    by

    Subsystem

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16-4

    Requesting

    Subsystem

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16-4

    Program

    Control

    Statements

    for

    a

    Subsystem

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16-4

    Processing

    Control

    by

    TCAM

    Job

    or

    Task

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16-5

    Chapter

    17.

    Data

    Set

    Resources

    -

    End

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-1

    vi

    z/OS

    V1R6.0

    MVS

    JCL

    Users

    Guide

  • Unallocation

    End

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-1

    Disposition

    End

    Processing

    of

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-1

    Disposition

    Controlled

    by

    DISP

    Parameter

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-1

    Disposition

    Controlled

    by

    Time

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-10

    Release

    of

    Unused

    Direct

    Access

    Space

    in

    End

    Processing

    .

    .

    .

    .

    .

    .

    . 17-10

    Disposition

    End

    Processing

    of

    Volume

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-11

    Disposition

    of

    Removable

    Volumes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-11

    Volume

    Retention

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-12

    Part

    5.

    Tasks

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    Chapter

    18.

    Sysout

    Resources

    -

    Identification

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 18-1

    Identification

    as

    a

    Sysout

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 18-1

    Identification

    of

    Output

    Class

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 18-1

    Identification

    of

    Data

    Set

    on

    3540

    Diskette

    Input/Output

    Unit

    .

    .

    .

    .

    .

    .

    . 18-2

    Chapter

    19.

    Sysout

    Resources

    -

    Description

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 19-1

    Description

    of

    Data

    Attributes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 19-1

    Chapter

    20.

    Sysout

    Resources

    -

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 20-1

    Protection

    of

    Printed

    Output

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 20-1

    Chapter

    21.

    Sysout

    Resources

    -

    Performance

    Control

    .

    .

    .

    .

    .

    .

    .

    . 21-1

    Performance

    Control

    by

    Queue

    Selection

    (non-APPC)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 21-1

    Chapter

    22.

    Sysout

    Resources

    -

    Processing

    Control

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-1

    Processing

    Control

    with

    Additional

    Parameters

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-2

    Adding

    Parameters

    from

    OUTPUT

    JCL

    Statement

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-2

    Adding

    Parameters

    from

    JES2

    /*OUTPUT

    Statement

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-4

    Adding

    Parameters

    from

    JES3

    //*FORMAT

    Statement

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-4

    Processing

    Control

    by

    Segmenting

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-4

    Processing

    Control

    with

    Other

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-5

    Using

    Output

    Class

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-5

    Using

    Sysout

    Data

    Set

    Size

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-5

    Using

    Groups

    in

    a

    JES2

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-6

    Processing

    Control

    by

    External

    Writer

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-6

    Processing

    Control

    by

    Mode

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-7

    Processing

    Control

    by

    Holding

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-7

    Holding

    Using

    the

    DD

    Statement

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-7

    Holding

    Using

    the

    OUTPUT

    JCL

    Statement

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-7

    Processing

    Control

    by

    Suppressing

    Output

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-8

    Using

    Dummy

    Status

    to

    Suppress

    Output

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-8

    Using

    Class

    to

    Suppress

    Output

    in

    a

    JES2

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-9

    Using

    the

    OUTPUT

    JCL

    Statement

    to

    Suppress

    Output

    in

    a

    JES2

    System

    22-9

    Processing

    Control

    with

    Checkpointing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-10

    Processing

    Control

    by

    Print

    Services

    Facility

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-10

    Identifying

    a

    Library

    to

    PSF

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-11

    Chapter

    23.

    Sysout

    Resources

    -

    End

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 23-1

    Unallocation

    End

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 23-1

    Chapter

    24.

    Sysout

    Resources

    -

    Destination

    Control

    .

    .

    .

    .

    .

    .

    .

    .

    . 24-1

    Destination

    Control

    to

    Local

    or

    Remote

    Device

    or

    to

    Another

    Node

    .

    .

    .

    .

    . 24-1

    Multiple

    Destinations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24-2

    Controlling

    Output

    Destination

    in

    a

    JES2

    Network

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24-2

    Controlling

    Output

    Destination

    in

    a

    JES3

    Network

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24-4

    Contents

    vii

  • Destination

    Control

    to

    Another

    Processor

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    .

    . 24-5

    Destination

    Control

    to

    Internal

    Reader

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24-5

    Destination

    Control

    to

    Terminal

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24-7

    Destination

    Control

    to

    Assist

    in

    Sysout

    Distribution

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24-7

    Chapter

    25.

    Sysout

    Resources

    -

    Output

    Formatting

    .

    .

    .

    .

    .

    .

    .

    .

    . 25-1

    Output

    Formatting

    to

    Any

    Printer

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 25-1

    Output

    Formatting

    to

    3800

    Printing

    Subsystem

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 25-2

    Copy

    Modification

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 25-3

    Character

    Arrangements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 25-3

    Output

    Formatting

    to

    3211

    Printer

    with

    Indexing

    Feature

    in

    a

    JES2

    System

    25-4

    Output

    Formatting

    to

    Punch

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 25-4

    Interpretation

    of

    Punched

    Cards

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 25-5

    Output

    Formatting

    of

    Dumps

    on

    3800

    Printing

    Subsystem

    .

    .

    .

    .

    .

    .

    .

    . 25-5

    Chapter

    26.

    Sysout

    Resources

    -

    Output

    Limiting

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26-1

    Output

    Limiting

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26-1

    Limiting

    Output

    in

    an

    APPC

    Scheduling

    Environment

    .

    .

    .

    .

    .

    .

    .

    .

    . 26-1

    Limiting

    Output

    in

    a

    Non-APPC

    Scheduling

    Environment

    .

    .

    .

    .

    .

    .

    .

    . 26-2

    Actions

    when

    Limit

    Exceeded

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26-2

    Chapter

    27.

    Sysout

    Resources

    -

    USERDATA

    OUTPUT

    JCL

    Keyword

    27-1

    References

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 27-1

    Examples

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 27-1

    Part

    6.

    Examples

    Chapter

    28.

    Example

    -

    Assemble,

    Linkedit,

    and

    Go

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 28-1

    Chapter

    29.

    Example

    -

    Multiple

    Output

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 29-1

    Chapter

    30.

    Example

    -

    Obtaining

    Output

    in

    a

    JES2

    System

    .

    .

    .

    .

    .

    . 30-1

    Chapter

    31.

    Example

    -

    Obtaining

    Output

    in

    a

    JES3

    System

    .

    .

    .

    .

    .

    . 31-1

    Chapter

    32.

    Example

    -

    Identifying

    Data

    Sets

    to

    the

    System

    .

    .

    .

    .

    .

    . 32-1

    Part

    7.

    Appendixes

    Appendix

    A.

    Indexed

    Sequential

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . A-1

    Creating

    an

    Indexed

    Sequential

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . A-1

    Procedure

    when

    Allocation

    Error

    Occurs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . A-4

    Area

    Arrangement

    of

    an

    Indexed

    Sequential

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    . A-4

    Retrieving

    an

    Indexed

    Sequential

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . A-5

    Appendix

    B.

    Generation

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . B-1

    Building

    a

    GDG

    Base

    Entry

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . B-2

    Defining

    Attributes

    for

    SMS-Managed

    Generation

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    . B-2

    Creating

    an

    SMS-Managed

    Generation

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . B-3

    Disposition

    of

    SMS-Managed

    Generation

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . B-3

    Defining

    Attributes

    for

    Non-SMS-Managed

    Generation

    Data

    Sets

    .

    .

    .

    .

    . B-4

    Creating

    a

    Non-SMS-Managed

    Generation

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . B-5

    Retrieving

    a

    Generation

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . B-6

    Deleting

    and

    Uncataloging

    Generation

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . B-9

    Submitting

    a

    Job

    for

    Restart

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . B-10

    viii

    z/OS

    V1R6.0

    MVS

    JCL

    Users

    Guide

  • Appendix

    C.

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-1

    VSAM

    Data

    Sets

    -

    With

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-1

    Creating

    a

    VSAM

    Data

    Set

    -

    With

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-1

    Retrieving

    an

    Existing

    VSAM

    Data

    Set

    -

    With

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-1

    Migration

    Consideration

    for

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-1

    DD

    Statement

    Parameters

    -

    With

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-1

    VSAM

    Data

    Sets

    -

    Without

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-4

    Creating

    a

    VSAM

    Data

    Set

    -

    Without

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-4

    Retrieving

    an

    Existing

    VSAM

    Data

    Set

    -

    Without

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    . C-4

    DD

    Statement

    Parameters

    -

    Without

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . C-5

    Appendix

    D.

    Data

    Sets

    with

    SMS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-1

    SMS

    Constructs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-1

    Existing

    JCL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-2

    Default

    Unit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-2

    Specifying

    Constructs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-2

    Overriding

    Attributes

    Defined

    in

    the

    Data

    Class

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-3

    Overriding

    Attributes

    Defined

    in

    the

    Management

    Class

    .

    .

    .

    .

    .

    .

    .

    . D-3

    Overriding

    Attributes

    Defined

    in

    the

    Storage

    Class

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-3

    Protecting

    Data

    Sets

    with

    RACF

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-4

    Modeling

    Data

    Set

    Attributes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . D-4

    Appendix

    E.

    Notices

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . E-1

    Trademarks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . E-2

    Index

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . X-1

    Contents

    ix

  • x

    z/OS

    V1R6.0

    MVS

    JCL

    Users

    Guide

  • Figures

    2-1.

    JCL-Related

    Actions

    (User

    and

    MVS)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-2

    2-2.

    Output

    from

    Job

    Invoking

    IEFBR14

    Program

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-8

    2-3.

    Output

    from

    Job

    Invoking

    SORT

    Program

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-10

    Copyright

    IBM

    Corp.

    1988,

    2004

    xi

  • xii

    z/OS

    V1R6.0

    MVS

    JCL

    Users

    Guide

  • Tables

    1-1.

    MVS

    Job

    Control

    Language

    (JCL)

    Statements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 1-1

    1-2.

    Job

    Entry

    Control

    Language

    (JECL)

    Statements

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 1-2

    2-1.

    In-Stream

    Procedure

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-11

    2-2.

    Cataloged

    Procedure:

    Member

    MYPROC

    in

    SYS1.PROCLIB

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-12

    2-3.

    Job

    that

    Executes

    Cataloged

    Procedure

    MYPROC

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-12

    2-4.

    Job

    Boundaries

    in

    a

    Three-Job

    Input

    Stream

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-12

    2-5.

    Tasks

    and

    Utility

    Programs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 2-17

    3-1.

    Tasks

    for

    Entering

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-3

    3-2.

    Tasks

    for

    Processing

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-4

    3-3.

    Tasks

    for

    Requesting

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-5

    3-4.

    Tasks

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 3-6

    4-1.

    Identification

    Task

    for

    Entering

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 4-1

    5-1.

    Execution

    Task

    for

    Entering

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5-1

    6-1.

    Input

    Control

    Task

    for

    Entering

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6-1

    7-1.

    Communication

    Task

    for

    Entering

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 7-1

    8-1.

    Protection

    Task

    for

    Entering

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 8-1

    9-1.

    Resource

    Control

    Task

    for

    Entering

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 9-1

    10-1.

    Processing

    Control

    Task

    for

    Processing

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 10-1

    11-1.

    Performance

    Control

    Task

    for

    Processing

    Jobs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 11-1

    12-1.

    Identification

    Task

    for

    Requesting

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 12-1

    13-1.

    Description

    Task

    for

    Requesting

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13-1

    13-2.

    Data

    Set

    Integrity

    Processing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 13-3

    14-1.

    Protection

    Task

    for

    Requesting

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-1

    14-2.

    Processing

    with

    DD

    LABEL

    Subparameter

    IN

    or

    OUT

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 14-3

    15-1.

    Allocation

    Task

    for

    Requesting

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-1

    15-2.

    Effect

    of

    Device

    Status

    on

    Allocation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-3

    15-3.

    JES3

    Job

    Setup

    (SETUP=JOB)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-13

    15-4.

    JES3

    High

    Watermark

    Setup

    (SETUP=HWS)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-14

    15-5.

    JES3

    Explicit

    Setup

    (SETUP=ddname)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-15

    15-6.

    Unit-Affinity

    Examples

    of

    Tape

    Library

    Requests

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-31

    15-7.

    Unit

    and

    Volume

    Affinity

    (Non-SMS-Managed

    Data

    Sets)

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-33

    15-8.

    IBM-Recommended

    Parameters

    for

    Data

    Set

    Stacking

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 15-37

    16-1.

    Processing

    Control

    Task

    for

    Requesting

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 16-1

    17-1.

    End

    Processing

    Task

    for

    Requesting

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 17-1

    18-1.

    Identification

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 18-1

    19-1.

    Description

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 19-1

    20-1.

    Protection

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 20-1

    21-1.

    Performance

    Control

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    . 21-1

    22-1.

    Processing

    Control

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22-1

    23-1.

    End

    Processing

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 23-1

    24-1.

    Destination

    Control

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 24-1

    25-1.

    Output

    Formatting

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 25-1

    26-1.

    Output

    Limiting

    Task

    for

    Requesting

    Sysout

    Data

    Set

    Resources

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26-1

    A-1.

    Area

    Arrangement

    of

    ISAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . A-5

    A-2.

    DD

    Parameters

    for

    Retrieving

    or

    Extending

    an

    ISAM

    Data

    Set

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . A-7

    C-1.

    With

    SMS,

    DD

    Parameters

    to

    Use

    when

    Processing

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    . C-2

    C-2.

    With

    SMS,

    DD

    Parameters

    to

    Avoid

    when

    Processing

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    .

    . C-3

    C-3.

    Without

    SMS,

    DD

    Parameters

    to

    Use

    when

    Processing

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    . C-5

    C-4.

    Without

    SMS,

    DD

    Parameters

    to

    Avoid

    when

    Processing

    VSAM

    Data

    Sets

    .

    .

    .

    .

    .

    .

    .

    . C-6

    Copyright

    IBM

    Corp.

    1988,

    2004

    xiii

  • xiv

    z/OS

    V1R6.0

    MVS

    JCL

    Users

    Guide

  • About

    This

    Book

    This

    book

    describes

    the

    job

    control

    tasks

    needed

    to

    enter

    jobs

    into

    the

    operating

    system,

    control

    the

    systems

    processing

    of

    jobs,

    and

    request

    the

    resources

    needed

    to

    run

    jobs.

    To

    perform

    the

    tasks,

    programmers

    code

    job

    control

    statements.

    This

    book

    describes

    how

    to

    use

    these

    statements,

    which

    consist

    of:

    v

    Job

    control

    language

    (JCL)

    statements

    v

    Job

    entry

    subsystem

    2

    (JES2)

    control

    statements

    v

    Job

    entry

    subsystem

    3

    (JES3)

    control

    statements

    This

    book

    is

    designed

    as

    a

    users

    guide,

    to

    be

    used

    when

    deciding

    how

    to

    perform

    job

    control

    tasks.

    It

    does

    not

    describe

    how

    to

    code

    the

    statements.

    For

    an

    introduction

    to

    the

    statements

    and

    for

    coding

    information,

    see

    the

    companion

    book,

    z/OS

    MVS

    JCL

    Reference,

    SA22-7597.

    Who

    Should

    Use

    This

    Book

    This

    book

    is

    for

    system

    and

    application

    programmers

    who

    enter

    programs

    into

    the

    operating

    system.

    Those

    using

    this

    book

    should

    understand

    the

    concepts

    of

    job

    management

    and

    data

    management.

    Where

    to

    Find

    More

    Information

    To

    have

    complete

    JCL

    information,

    you

    need

    the

    following

    book:

    z/OS

    MVS

    JCL

    Reference,

    SA22-7597

    Where

    necessary,

    this

    book

    references

    information

    in

    other

    books,

    using

    shortened

    versions

    of

    the

    book

    title.

    For

    complete

    titles

    and

    order

    numbers

    of

    the

    books

    for

    all

    products

    that

    are

    part

    of

    z/OS,

    see

    z/OS

    Information

    Roadmap.

    The

    following

    tables

    list

    titles

    and

    order

    numbers

    for

    books

    related

    to

    other

    products.

    Programs

    Short

    Title

    Used

    in

    This

    Book

    Title

    Order

    Number

    ACF/TCAM

    Installation

    Reference

    Advanced

    Communications

    Function

    for

    TCAM,

    Version

    2

    Installation

    Reference

    SC30-3133

    ISPF/PDF

    Guide

    and

    Reference

    ISPF/PDF

    Guide

    and

    Reference

    V3.4

    for

    MVS

    SC34-4258

    PSF/MVS

    System

    Programming

    Guide

    PSF/MVS

    System

    Programming

    Guide

    S544-3672

    PSF/MVS

    Application

    Programming

    Guide

    PSF/MVS

    Application

    Programming

    Guide

    S544-3673

    Hardware

    Short

    Title

    Used

    in

    This

    Book

    Title

    Order

    Number

    2821

    Component

    Description

    IBM

    2821

    Control

    Unit

    Component

    Description

    GA24-3312

    None

    IBM

    3340

    Disk/Storage

    -

    Fixed

    Head

    Feature

    Users

    Guide

    GA26-1632

    3540

    Programmers

    Reference

    OS/VS2

    IBM

    3540

    Programmers

    Reference

    GC24-5111

    3800

    Programmers

    Guide

    IBM

    3800

    Printing

    Subsystem

    Programmers

    Guide

    GC26-3846

    Copyright

    IBM

    Corp.

    1988,

    2004

    xv

  • Short

    Title

    Used

    in

    This

    Book

    Title

    Order

    Number

    Forms

    Design

    Reference

    Guide

    for

    the

    3800

    Forms

    Design

    Reference

    Guide

    for

    the

    IBM

    3800

    Printing

    Subsystem

    GA26-1633

    Accessing

    z/OS

    licensed

    documents

    on

    the

    Internet

    z/OS

    licensed

    documentation

    is

    available

    on

    the

    Internet

    in

    PDF

    format

    at

    the

    IBM

    Resource

    Link

    Web

    site

    at:

    http://www.ibm.com/servers/resourcelink

    Licensed

    documents

    are

    available

    only

    to

    customers

    with

    a

    z/OS

    license;

    access

    to

    these

    documents

    requires

    an

    IBM

    Resource

    Link

    user

    ID

    and

    password,

    and

    a

    key

    code.

    Based

    on

    which

    offering

    you

    chose

    (ServerPac,

    CBPDO,

    SystemPac),

    information

    concerning

    the

    key

    code

    is

    available

    in

    the

    Installation

    Guide

    that

    is

    delivered

    with

    z/OS

    and

    z/OS.e

    orders

    as

    follows:

    v

    ServerPac

    Installing

    Your

    Order

    v

    CBPDO

    Memo

    to

    Users

    Extension

    v

    SystemPac

    Installation

    Guide

    To

    obtain

    your

    IBM

    Resource

    Link

    user

    ID

    and

    password,

    log

    on

    to:

    http://www.ibm.com/servers/resourcelink

    To

    register

    for

    access

    to

    the

    z/OS

    licensed

    documents:

    1.

    Sign

    in

    to

    Resource

    Link

    using

    your

    Resource

    Link

    user

    ID

    and

    password.

    2.

    Select

    User

    Profiles

    located

    on

    the

    left-hand

    navigation

    bar.

    Note:

    You

    cannot

    access

    the

    z/OS

    licensed

    documents

    unless

    you

    have

    registered

    for

    access

    to

    them

    and

    received

    an

    e-mail

    confirmation

    informing

    you

    that

    your

    request

    has

    been

    processed.

    Printed

    licensed

    documents

    are

    not

    available

    from

    IBM.

    You

    can

    use

    the

    PDF

    format

    on

    either

    z/OS

    Licensed

    Product

    Library

    CD-ROM

    or

    IBM

    Resource

    Link

    to

    print

    licensed

    documents.

    Using

    LookAt

    to

    look

    up

    message

    explanations

    LookAt

    is

    an

    online

    facility

    that

    lets

    you

    look

    up

    explanations

    for

    most

    of

    the

    IBM

    messages

    you

    encounter,

    as

    well

    as

    for

    some

    system

    abends

    and

    codes.

    Using

    LookAt

    to

    find

    information

    is

    faster

    than

    a

    conventional

    search

    because

    in

    most

    cases

    LookAt

    goes

    directly

    to

    the

    message

    explanation.

    You

    can

    use

    LookAt

    from

    the

    following

    locations

    to

    find

    IBM

    message

    explanations

    for

    z/OS

    elements

    and

    features,

    z/VM,

    VSE/ESA,

    and

    Clusters

    for

    AIX

    and

    Linux:

    v

    The

    Internet.

    You

    can

    access

    IBM

    message

    explanations

    directly

    from

    the

    LookAt

    Web

    site

    at

    http://www.ibm.com/eserver/zseries/zos/bkserv/lookat/.

    v

    Your

    z/OS

    TSO/E

    host

    system.

    You

    can

    install

    code

    on

    your

    z/OS

    or

    z/OS.e

    systems

    to

    access

    IBM

    message

    explanations,

    using

    LookAt

    from

    a

    TSO/E

    command

    line

    (for

    example,

    TSO/E

    prompt,

    ISPF,

    or

    z/OS

    UNIX

    System

    Services

    running

    OMVS).

    xvi

    z/OS

    V1R6.0

    MVS

    JCL

    Users

    Guide

    http://www.ibm.com/servers/resourcelinkhttp://www.ibm.com/servers/resourcelinkhttp://www.ibm.com/servers/eserver/zseries/zos/bkserv/lookat/

  • v

    Your

    Microsoft

    Windows

    workstation.

    You

    can

    install

    code

    to

    access

    IBM

    message

    explanations

    on

    the

    z/OS

    Collection

    (SK3T-4269),

    using

    LookAt

    from

    a

    Microsoft

    Windows

    command

    prompt

    (also

    known

    as

    the

    DOS

    command

    line).

    v

    Your

    wireless

    handheld

    device.

    You

    can

    use

    the

    LookAt

    Mobile

    Edition

    with

    a

    handheld

    device

    that

    has

    wireless

    access

    and

    an

    Internet

    browser

    (for

    example,

    Internet

    Explorer

    for

    Pocket

    PCs,

    Blazer,

    or

    Eudora

    for

    Palm

    OS,

    or

    Opera

    for

    Linux

    handheld

    devices).

    Link

    to

    the

    LookAt

    Mobile

    Edition

    from

    the

    LookAt

    Web

    site.

    You

    can

    obtain

    code

    to

    install

    LookAt

    on

    your

    host

    system

    or

    Microsoft

    Windows

    workstation

    from

    a

    disk

    on

    your

    z/OS

    Collection

    (SK3T-4269),

    or

    from

    the

    LookAt

    Web

    site

    (click

    Download,

    and

    select

    the

    platform,

    release,

    collection,

    and

    location

    that

    suit

    your

    needs).

    More

    information

    is

    available

    in

    the

    LOOKAT.ME

    files

    available

    during

    the

    download

    process.

    About

    This

    Book

    xvii

  • xviii

    z/OS

    V1R6.0

    MVS

    JCL

    Users

    Guide

  • Summary

    of

    Changes

    Summary

    of

    Changes

    for

    SA22-7598-04

    z/OS

    Version

    1

    Release

    6

    The

    book

    contains

    information

    previously

    presented

    in

    SA22-7598-03,

    which

    supports

    z/OS

    Version

    1

    Release

    5.

    This

    document

    contains

    terminology,

    maintenance,

    and

    editorial

    changes,

    including

    changes

    to

    improve

    consistency

    and

    retrievability.

    Technical

    changes

    or

    additions

    to

    the

    text

    and

    illustrations

    are

    indicated

    by

    a

    vertical

    line

    to

    the

    left

    of

    the

    change.

    Starting

    with

    z/OS

    V1R2,

    you

    may

    notice

    changes

    in

    the

    style

    and

    structure

    of

    some

    content

    in

    this

    documentfor

    example,

    headings

    that

    use

    uppercase

    for

    the

    first

    letter

    of

    initial

    words

    only,

    and

    procedures

    that

    have

    a

    different

    look

    and

    format.

    The

    changes

    are

    ongoing

    improvements

    to

    the

    consistency

    and

    retrievability

    of

    information

    in

    our

    documents.

    Summary

    of

    Changes

    for

    SA22-7598-03

    z/OS

    Version

    1

    Release

    5

    The

    book

    contains

    information

    previously

    presented

    in

    SA22-7598-02,

    which

    supports

    z/OS

    Version

    1

    Release

    4.

    This

    document

    contains

    terminology,

    maintenance,

    and

    editorial

    changes,

    including

    changes

    to

    improve

    consistency

    and

    retrievability.

    Summary

    of

    Changes

    for

    SA22-7598-02

    z/OS

    Version

    1

    Release

    4

    as

    updated

    October,

    2003

    The

    book

    contains

    information

    previously

    presented

    in

    SA22-7598-01,

    which

    supports

    z/OS

    Version

    1

    Release

    2.

    The

    XMIT

    statement

    is

    now

    supported

    by

    JES2

    -

    previously,

    it

    was

    supported

    only

    by

    JES3.

    This

    document

    contains

    terminology,

    maintenance,

    and

    editorial

    changes,

    including

    changes

    to

    improve

    consistency

    and

    retrievability.

    Summary

    of

    Changes

    for

    SA22-7598-01

    z/OS

    Version

    1

    Release

    2

    The

    book

    contains

    information

    previously

    presented

    in

    SA22-7598-00,

    which

    supports

    z/OS

    Version

    1

    Release

    1.

    This

    book

    contains

    terminology,

    maintenance,

    and

    editorial

    changes.

    Technical

    changes

    or

    additions

    to

    the

    text

    and

    illustrations

    are

    indicated

    by

    a

    vertical

    line

    to

    the


Recommended