version 2 release 3 z/os€¦ · group authorization parameters (group or isfgrp).....28 group...

652
z/OS Version 2 Release 3 SDSF Operation and Customization IBM SA23-2274-30

Upload: others

Post on 16-Apr-2020

71 views

Category:

Documents


0 download

TRANSCRIPT

  • z/OSVersion 2 Release 3

    SDSF Operation and Customization

    IBM

    SA23-2274-30

  • Note

    Before using this information and the product it supports, read the information in “Notices” on page567.

    This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications untilotherwise indicated in new editions.

    Last updated: 2019-03-28© Copyright International Business Machines Corporation 1997, 2019.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract withIBM Corp.© Rocket Software, Inc. 2017, 2019.

  • Contents

    List of Figures...................................................................................................xxviiList of Tables.....................................................................................................xxix

    About this document........................................................................................ xxxvz/OS information............................................................................................ xxxviiHow to send your comments to IBM............................................................... xxxviii

    If you have a technical problem.......................................................................................................... xxxviiiSummary of changes....................................................................................... xxxix

    Summary of changes, Version 2 Release 3 (V2R3)...............................................................................xxxix

    Chapter 1. Exploiting new functions....................................................................... 1z/OS V2R3 summary as updated July, 2017...............................................................................................1

    CFC panel................................................................................................................................................1CFS panel................................................................................................................................................ 2CSR panel................................................................................................................................................2DEV panel................................................................................................................................................2FS panel.................................................................................................................................................. 3GT panel.................................................................................................................................................. 3Job Module (JC) panel............................................................................................................................4JT panel.................................................................................................................................................. 4NA panel..................................................................................................................................................5SMSG panel.............................................................................................................................................5SMSV panel............................................................................................................................................. 5SSI panel.................................................................................................................................................6VMAP panel.............................................................................................................................................6

    z/OS V2R2 summary as updated October, 2016........................................................................................ 7AS panel.................................................................................................................................................. 7DYNX panel............................................................................................................................................. 7PROC panel............................................................................................................................................. 8

    z/OS V2R2 summary as updated June, 2016............................................................................................. 8z/OS V2R2 summary as updated April, 2016............................................................................................. 8

    Enqueue panel........................................................................................................................................9System Symbols panel........................................................................................................................... 9

    z/OS V2R2 summary as updated December, 2015.................................................................................. 10Authorized program facility panel........................................................................................................10Link list panel........................................................................................................................................10Link pack area panel.............................................................................................................................11Page panel............................................................................................................................................ 11PARM panel...........................................................................................................................................12SRCH panel...........................................................................................................................................12System panel........................................................................................................................................ 12

    Chapter 2. Using ISFPARMS for customization and security.................................. 15ISFPARMS overview...................................................................................................................................15

    ISFPARMS format alternatives.............................................................................................................15Converting ISFPARMS assembler macros to statements.........................................................................16Reverting to the ISFPARMS defined with assembler macros...................................................................17

    NOPARM fallback................................................................................................................................. 17Samples......................................................................................................................................................17Auditing ISFPARMS....................................................................................................................................18

    iii

  • Diagnosing security....................................................................................................................................18Rules for coding ISFPARMS.......................................................................................................................18

    Statements........................................................................................................................................... 18Assembler macros................................................................................................................................19

    Conditional processing.............................................................................................................................. 19WHEN Statement..................................................................................................................................20System symbols................................................................................................................................... 22

    Global initialization parameters (OPTIONS or ISFPMAC).........................................................................22Example of the OPTIONS statement and ISFPMAC macro.................................................................22OPTIONS or ISFPMAC reference......................................................................................................... 23

    Server connection (CONNECT).................................................................................................................. 27Example of the CONNECT statement.................................................................................................. 27CONNECT statement............................................................................................................................ 27

    Group authorization parameters (GROUP or ISFGRP)..............................................................................28Group membership.............................................................................................................................. 28Group function......................................................................................................................................29Examples of the GROUP statement and ISFGRP macro..................................................................... 29Group membership parameters reference..........................................................................................30Group function parameters reference................................................................................................. 32Action characters and overtypeable fields for each command level..................................................64

    Variable field lists (FLD or ISFFLD)............................................................................................................79Example of the FLD statement and ISFFLD macro............................................................................. 80FLD and ISFFLD syntax........................................................................................................................ 80

    Name tables (NTBL or ISFNTBL)............................................................................................................... 86Examples of the NTBL statement and ISFNTBL macro...................................................................... 86NTBL and ISFNTBL syntax................................................................................................................... 87Usage notes.......................................................................................................................................... 87

    Customized properties (PROPLIST).......................................................................................................... 88Example of the PROPLIST and associated statements.......................................................................88PROPLIST syntax..................................................................................................................................88

    Code page (TRTAB/TRDEF or ISFTR)...................................................................................................... 100Examples of the TRTAB statement and ISFTR macro.......................................................................100TRTAB and ISFTR syntax................................................................................................................... 101Coding a translate table..................................................................................................................... 104

    Chapter 3. Using the SDSF server....................................................................... 107Defining the input.................................................................................................................................... 107Starting the server................................................................................................................................... 107Starting the SDSFAUX server...................................................................................................................108Processing the statements......................................................................................................................108Accessing the server................................................................................................................................108Logging.....................................................................................................................................................108Security.................................................................................................................................................... 109Using the server for sysplex data............................................................................................................ 109

    Device panels..................................................................................................................................... 109Sysplex-wide panels.......................................................................................................................... 109

    Server operator commands.....................................................................................................................109Start the SDSF server......................................................................................................................... 109Start Aux.............................................................................................................................................113Change server options....................................................................................................................... 114Display server options........................................................................................................................117Display Exit......................................................................................................................................... 118Display JES......................................................................................................................................... 118Display Task........................................................................................................................................119Display User........................................................................................................................................120Display information about server communications.......................................................................... 120Refresh ISFPARMS............................................................................................................................. 121

    iv

  • Set Trace.............................................................................................................................................122Start communications........................................................................................................................123Stop communications........................................................................................................................ 123Stop the SDSF server......................................................................................................................... 124Stop Aux............................................................................................................................................. 124Switch Log.......................................................................................................................................... 125Switch Trace....................................................................................................................................... 125

    Chapter 4. Columns on the SDSF panels............................................................. 127Address Space Memory panel (AS).........................................................................................................127Authorized Program Facility panel (APF)................................................................................................ 129CF Connection panel (CFC)......................................................................................................................130CF Structure panel (CFS)......................................................................................................................... 131Common Storage Remaining panel (CSR) ..............................................................................................132Device Activity panel (DEV) .................................................................................................................... 133Display Active Users panel (DA).............................................................................................................. 133Dynamic Exits panel (DYNX)....................................................................................................................136Enclaves panel (ENC)...............................................................................................................................137Enqueue panel (ENQ).............................................................................................................................. 139File Systems panel (FS) .......................................................................................................................... 140Generic Tracker panel (GT) .....................................................................................................................141Health Check History panel (CKH).......................................................................................................... 142Health Checker panel (CK)...................................................................................................................... 142Held Output panel (H)..............................................................................................................................144Initiator panel (INIT)............................................................................................................................... 147Input Queue panel (I).............................................................................................................................. 149JESPLEX panel (JP)..................................................................................................................................152Job Class panel (JC)................................................................................................................................ 152Job Data Set panel (JDS).........................................................................................................................154Job Delay panel (JY)................................................................................................................................158Job Dependency panel (JP).....................................................................................................................159Job Device panel (JD)..............................................................................................................................159Job Group panel (JG)...............................................................................................................................161Job Memory panel (JM)........................................................................................................................... 162Job Module panel (JC) ............................................................................................................................ 163Job Step panel (JS)..................................................................................................................................164Job Tasks panel (JT) ............................................................................................................................... 165Job 0 (J0)................................................................................................................................................. 166Lines panel (LI)........................................................................................................................................ 167Link List panel (LNK)................................................................................................................................ 170Link Pack Area panel (LPA)......................................................................................................................171Multi-Access Spool panel (MAS) and JESPLEX (JP) panel..................................................................... 171Network Activity panel (NA) ................................................................................................................... 173Network Connections (NC) ..................................................................................................................... 174Network Servers (NS).............................................................................................................................. 176Nodes panel (NO).................................................................................................................................... 177Output Descriptors panel (OD)................................................................................................................179Output Queue panel (O).......................................................................................................................... 181Page panel (PAG)..................................................................................................................................... 184PARMLIB panel (PARM)........................................................................................................................... 185Printer panel (PR).................................................................................................................................... 185Proclib panel (PROC)............................................................................................................................... 190Processes panel (PS)............................................................................................................................... 191Punch panel (PUN)...................................................................................................................................192Reader panel (RDR)................................................................................................................................. 195Resource panel (RES).............................................................................................................................. 196Resource Monitor panel (RM)..................................................................................................................197

    v

  • Scheduling Environment panel (SE)........................................................................................................198Spool Offload panel (SO)......................................................................................................................... 198Spool Volumes panel (SP)....................................................................................................................... 201Search panel (SRCH)................................................................................................................................203SMS Groups panel (SMSG) ..................................................................................................................... 204SMS Volumes panel (SMSV) ................................................................................................................... 205Status panel (ST)..................................................................................................................................... 205Subsystem panel (SSI)............................................................................................................................ 209System Symbols panel (SYM)..................................................................................................................210System panel (SYS)..................................................................................................................................211System Requests panel (SR)................................................................................................................... 213Virtual Storage Map panel (VMAP) ......................................................................................................... 214

    Chapter 5. Using SAF for security....................................................................... 215Relationship of SAF and ISFPARMS........................................................................................................ 215

    Using ISFPARMS as a backup to SAF................................................................................................ 215Changing authorization dynamically....................................................................................................... 216Auditing access attempts........................................................................................................................ 216Diagnosing security................................................................................................................................. 216SAF concepts for SDSF resources........................................................................................................... 217

    Protecting SDSF function................................................................................................................... 217

    Chapter 6. SDSF and RACF.................................................................................231Security administration........................................................................................................................... 231Brief summary of RACF commands........................................................................................................ 231Delegation of RACF administrative authority..........................................................................................232

    SDSF resource group class................................................................................................................ 232Establishing SAF security with RACF...................................................................................................... 233

    RACF authorization checking and ISFPARMS security..................................................................... 233Considerations for broad access....................................................................................................... 233

    Using RACLIST and REFRESH................................................................................................................. 233Using RACLIST and REFRESH with the SDSF class...........................................................................234Using RACLIST and REFRESH with the OPERCMDS class................................................................ 234

    Using conditional access......................................................................................................................... 234Sample RACF commands........................................................................................................................ 235Multilevel Security................................................................................................................................... 235

    Chapter 7. Protecting SDSF functions................................................................. 237Action characters.....................................................................................................................................237

    Protecting the objects of action characters...................................................................................... 237Protecting the generated MVS and JES commands..........................................................................238Protecting action characters as separate resources ........................................................................238Setting up generic profiles................................................................................................................. 239Examples of protecting action characters.........................................................................................239Tables of action characters................................................................................................................240

    Authorized program facility data sets..................................................................................................... 268Protecting authorized program facility data sets.............................................................................. 268Example of protecting authorized program facility data sets...........................................................269

    Authorized SDSF commands...................................................................................................................269Protecting SDSF commands.............................................................................................................. 269Setting up generic profiles................................................................................................................. 272Examples of protecting commands................................................................................................... 272

    CF connections........................................................................................................................................ 272Protecting CF connections................................................................................................................. 272Example of CF connections................................................................................................................273

    CF structures............................................................................................................................................273Protecting CF structures.................................................................................................................... 273

    vi

  • Example of CF structures...................................................................................................................273Checks on the CK and CKH panels.......................................................................................................... 273

    Protecting checks...............................................................................................................................273Example of protecting checks............................................................................................................274

    Destination names...................................................................................................................................274Protecting destination names............................................................................................................275Initializing destinations......................................................................................................................275Example of protecting destination names.........................................................................................275

    Destination operator authority................................................................................................................ 276Protecting operator authority by destination.................................................................................... 276

    Device activity information......................................................................................................................277Protecting device activity...................................................................................................................277Example of protecting device information........................................................................................ 278

    Dynamic exit information........................................................................................................................ 278Protecting dynamic exits....................................................................................................................278Example of protecting dynamic exits................................................................................................ 278

    Enclaves................................................................................................................................................... 279Protecting enclaves............................................................................................................................279Example of protecting enclaves.........................................................................................................279

    Enqueue information............................................................................................................................... 279Protecting Enqueue Information....................................................................................................... 279Example of protecting enqueue information.....................................................................................279

    File system information........................................................................................................................... 280Protecting file systems.......................................................................................................................280Example of protecting file systems................................................................................................... 280

    Generic tracker events............................................................................................................................ 280Protecting generic tracker events......................................................................................................280Example of protecting generic tracker events...................................................................................281

    Initiators...................................................................................................................................................281Protecting initiators............................................................................................................................281Example of protecting initiators........................................................................................................ 281

    JES2 resources on the RM panel.............................................................................................................281Protecting JES2 resources.................................................................................................................281Example of protecting JES2 resources..............................................................................................283

    Job classes...............................................................................................................................................283Protecting job classes........................................................................................................................ 283Example of protecting job classes.....................................................................................................283

    Job devices.............................................................................................................................................. 283Protecting job devices........................................................................................................................283Example of protecting job devices.....................................................................................................284

    Jobs, job groups, output groups, and SYSIN/SYSOUT data sets........................................................... 284Protecting jobs, job groups, output groups, and SYSIN/SYSOUT data sets..................................... 284Permitting other users to view your data.......................................................................................... 287Providing function comparable to NOTIFY authority........................................................................ 287Examples of protecting jobs and output groups............................................................................... 287

    Lines......................................................................................................................................................... 289Protecting lines.................................................................................................................................. 289Example of protecting lines............................................................................................................... 289

    Link list data sets..................................................................................................................................... 290Protecting link list data sets...............................................................................................................290Example of protecting link list data sets........................................................................................... 290

    MAS and JESPLEX members................................................................................................................... 290Protecting MAS and JESPLEX members............................................................................................290Example of protecting MAS members............................................................................................... 291

    Membership in groups.............................................................................................................................291Controlling membership in groups.................................................................................................... 291Example of protecting membership in a group in ISFPARMS...........................................................291

    MVS and JES commands on the command line......................................................................................291

    vii

  • Protecting the slash command.......................................................................................................... 291Slash command and User Log............................................................................................................292Example of protecting the slash command.......................................................................................292

    Network activity.......................................................................................................................................292Protecting network activity................................................................................................................ 292Example of protecting network activity.............................................................................................293

    Network connections...............................................................................................................................293Protecting network connections........................................................................................................293Example of protecting network connections.....................................................................................293

    Network servers.......................................................................................................................................294Protecting network servers................................................................................................................294Example of protecting network servers.............................................................................................294

    Nodes....................................................................................................................................................... 294Protecting nodes................................................................................................................................ 294Example of protecting nodes............................................................................................................. 295

    OPERLOG................................................................................................................................................. 295Protecting the log stream...................................................................................................................295

    Overtypeable fields..................................................................................................................................295Protecting the overtypeable field...................................................................................................... 296Protecting the objects of overtypeable fields....................................................................................296Protecting the generated MVS and JES commands..........................................................................296Generic profiles.................................................................................................................................. 297Examples of protecting overtypeable fields......................................................................................297Tables of overtypeable fields.............................................................................................................298

    Page data sets..........................................................................................................................................337Protecting page data sets.................................................................................................................. 337Example of protecting page data sets............................................................................................... 338

    PARMLIB data sets.................................................................................................................................. 338Protecting PARM data sets.................................................................................................................338Example of protecting PARM data sets............................................................................................. 338

    Printers.....................................................................................................................................................338Protecting printers............................................................................................................................. 338Permitting access only while using SDSF.......................................................................................... 339Examples of protecting printers........................................................................................................ 339

    Processes (z/OS UNIX System Services)................................................................................................ 339Protecting processes..........................................................................................................................339Example of protecting processes...................................................................................................... 340

    Proclibs.................................................................................................................................................... 340Protecting proclibs............................................................................................................................. 340Example of protecting proclibs..........................................................................................................340

    Punches................................................................................................................................................... 340Protecting punches............................................................................................................................ 341Permitting access only while using SDSF.......................................................................................... 341Example of protecting punches......................................................................................................... 341

    Readers.................................................................................................................................................... 341Protecting readers..............................................................................................................................341Example of protecting readers.......................................................................................................... 342

    Resources defined to WLM......................................................................................................................342Protecting WLM resources................................................................................................................. 342Example of protecting resources.......................................................................................................342

    Scheduling environments........................................................................................................................343Protecting scheduling environments.................................................................................................343Example of protecting scheduling environments..............................................................................343

    SDSF server..............................................................................................................................................343Protecting the SDSF server................................................................................................................ 343Examples of protecting the SDSF server........................................................................................... 344

    SMS storage groups................................................................................................................................. 344Protecting SMS storage groups..........................................................................................................344

    viii

  • Example of protecting SMS storage groups...................................................................................... 345SMS volumes............................................................................................................................................345

    Protecting SMS volumes.................................................................................................................... 345Example of protecting SMS volumes................................................................................................. 345

    Spool offloaders.......................................................................................................................................345Protecting spool offloaders................................................................................................................345Example of protecting spool offloaders............................................................................................ 346

    Spool volumes......................................................................................................................................... 346Protecting spool volumes.................................................................................................................. 346Example of protecting spool volumes............................................................................................... 347

    Subsystems..............................................................................................................................................347Protecting subsystems.......................................................................................................................347Example of protecting subsystems................................................................................................... 347

    SYSLOG.................................................................................................................................................... 347Protecting the logical log................................................................................................................... 348

    System Symbol information.................................................................................................................... 348Protecting system symbol information..............................................................................................348Example of protecting system symbol information.......................................................................... 348

    System information................................................................................................................................. 348Protecting system information.......................................................................................................... 348Example of protecting system information....................................................................................... 350

    System requests...................................................................................................................................... 350Protecting system requests............................................................................................................... 350Example of protecting system requests............................................................................................ 350

    User log (ULOG)....................................................................................................................................... 350Protecting the ULOG...........................................................................................................................350Examples of protecting ULOG............................................................................................................351

    Chapter 8. Converting ISFPARMS to SAF security............................................... 353Getting started.........................................................................................................................................353SDSF environment................................................................................................................................... 353Migration considerations......................................................................................................................... 353Examples of RACF security for SDSF groups.......................................................................................... 354

    Providing group authority...................................................................................................................354Group 1 — system programmers....................................................................................................... 355Group 2 — operators.......................................................................................................................... 357Group 3 — end users.......................................................................................................................... 360Summary of profiles for group 1, group 2, and group 3.................................................................... 363Using the Security Conversion Assist................................................................................................ 366

    Diagnosing security................................................................................................................................. 370

    Chapter 9. Using installation exit routines.......................................................... 371Installation exit routines......................................................................................................................... 371

    Using the ISFUSER module................................................................................................................371Installation exit points.............................................................................................................................372

    SAF considerations for exit points.....................................................................................................372Initialization exit point....................................................................................................................... 372Command authority exit point........................................................................................................... 375SYSOUT display authority exit point.................................................................................................. 377SDSF termination exit point............................................................................................................... 377Pre-SAF exit point.............................................................................................................................. 378Post-SAF exit point.............................................................................................................................378SAF indeterminate exit point............................................................................................................. 379Table build exit point..........................................................................................................................380

    Chapter 10. Installation and configuration considerations.................................. 381JES3 considerations................................................................................................................................ 381

    ix

  • Getting started running SDSF in the JES3 environment................................................................... 381JES2 considerations................................................................................................................................ 383

    DESTDEF considerations....................................................................................................................383SDSF with a secondary JES2 subsystem...........................................................................................383

    SDSF considerations................................................................................................................................383Issuing MVS and JES commands............................................................................................................ 383

    Console for issuing MVS and JES commands....................................................................................383Storing MVS and JES commands....................................................................................................... 384

    RMF considerations................................................................................................................................. 385ISPF considerations.................................................................................................................................386

    Scrollable main menu and fallback................................................................................................... 387ISFISP entry point..............................................................................................................................387Specifying that SDSF should process JES2.......................................................................................388

    z/OSMF considerations............................................................................................................................388Using the SDSF classic interface....................................................................................................... 401

    Chapter 11. Introduction to SDSF application services........................................403

    Chapter 12. SDSF messages and codes...............................................................405Displaying message help.........................................................................................................................405User authorization................................................................................................................................... 405SDSF messages....................................................................................................................................... 405

    ACTIVE MODIFY INVALID ................................................................................................................. 406AFD CURSOR row,column ..................................................................................................................406AFD ERROR error-number ................................................................................................................. 406ALLOC ERROR return-code error-code information-code .................................................................407ALLOCATION ERROR - error-code .....................................................................................................407APPL NOT AVAILABLE .......................................................................................................................407ARR CRITERIA DISCARDED...............................................................................................................407ARRANGE CRITERIA OBSOLETE ...................................................................................................... 407ARRANGE PENDING ..........................................................................................................................407AUTHORIZED DEST REQUIRED ........................................................................................................ 407AUTHORIZED DESTINATION REQUIRED. PRESS THE HELP KEY FOR MORE INFORMATION ....... 408**** AUTO UPDATE - number SECONDS **** ................................................................................... 408BLOCK COMMAND INCOMPLETE ......................................................................................................408BLOCK COMMAND INVALID ..............................................................................................................408BLOCK INPUT REQUIRED ................................................................................................................. 408BLOCK IS INCOMPLETE .................................................................................................................... 408BOOKMANAGER IS REQUIRED .........................................................................................................408BOOKMGR SELECT RC=return-code ................................................................................................. 408*BOTTOM OF DATA REACHED* .........................................................................................................409BRIF ERROR RC=return-code ............................................................................................................409BROWSE NOT AVAILABLE .................................................................................................................409CANNOT MOVE FIXED FIELD ............................................................................................................409number CHARS 'string'....................................................................................................................... 409CHARS 'string' FOUND .......................................................................................................................409number CHARS 'string' FOUND ......................................................................................................... 409CHECK NO LONGER VALID ................................................................................................................409CHECKPOINT OUT OF DATE ............................................................................................................. 410CHECKPOINT READ ERROR ..............................................................................................................410CHOICE NOT AVAILABLE ON THIS PANEL ....................................................................................... 410CKPT OBT ERR return-code-reason-code .........................................................................................410CKPT REL ERR return-code-reason-code ..........................................................................................410CLEAR COMPLETE ............................................................................................................................. 410CMD NOT ISSUED – NO CONS .......................................................................................................... 410count CMDS NOT ISSUED ..................................................................................................................411COLUMN NOT FOUND ....................................................................................................................... 411

    x

  • COLUMN NOT UNIQUE ......................................................................................................................411COLUMN TRUNCATED ....................................................................................................................... 411COMM NO LONGER AVAIL .................................................................................................................411COMMAND ISSUED ........................................................................................................................... 411COMMAND NOT APPLICABLE ...........................................................................................................411COMMAND NOT AUTHORIZED ......................................................................................................... 411COMMAND NOT ISSUED ................................................................................................................... 411COMMAND NOT VALID ......................................................................................................................412COMMAND OBSOLETE ...................................................................................................................... 412COMMAND SAVED ............................................................................................................................. 412COMMAND TRUNCATED ....................................................................................................................412command-count COMMANDS ISSUED ............................................................................................. 412CONS ACT ERR returncode-reasoncode ........................................................................................... 412CONS ACT ERR – IN USE ...................................................................................................................412CONS DEACT ERR returncode-reasoncode .......................................................................................412CONSOLE console-name SHARED .................................................................................................... 413CONVERSION COMPLETE ................................................................................................................. 413DATA ACCESS ERROR ........................................................................................................................413DATA NOT AVAIL system-name .........................................................................................................413DATA NOT SAVED .............................................................................................................................. 413DATA SET ALLOCATED .......................................................................................................................413DATA SET DISPLAYED ....................................................................................................................... 413**** DATA SET NOT CATALOGED DSNAME= data-set-name ............................................................413DATA SET NOT ELIGIBLE .................................................................................................................. 414DATA SET NOT FOUND ...................................................................................................................... 414***** DATA SET NOT ON VOLUME DSNAME= data-set-name .......................................................... 414**** DATA SET OPEN DSNAME = data-set-name ..............................................................................414**** DATA SET UNAVAILABLE DSNAME= data-set-name ................................................................ 414DATA TRUNCATED FOR EDIT ............................................................................................................ 414DEALLOCATION ERROR - error-code ................................................................................................ 414DEST ALREADY EXISTS ..................................................................................................................... 415DEST NOT FOUND ............................................................................................................................. 415DETAIL NOT AVAIL ............................................................................................................................ 415DISPLAY RESET ................................................................................................................................. 415DSORG NOT PS OR PO ...................................................................................................................... 415EDIF ERROR RC=return-code ............................................................................................................415EDIT NOT AVAILABLE ....................................................................................................................... 415ENC IMPLICITLY QUIESCED ............................................................................................................. 415END OF DATA ON MENU ....................................................................................................................415%exec-name ENDED ......................................................................................................................... 416ENGLISH HELP NOT AVAILABLE ...................................................................................................... 416ENTER REQUIRED FIELD .................................................................................................................. 416ERROR IN ASSEMBLING PARAMETERS. RETURN CODE return-code ............................................. 416ERROR PROCESSING DATA ...............................................................................................................416ERROR PROCESSING LINE line-number: text-of-line .......................................................................416EXEC NAME REQUIRED .....................................................................................................................416service FAILED WITH RC=return-code REASON=ispf-message-text ............................................... 417FIELD INVALID .................................................................................................................................. 417FIELD NOT NUMERIC ........................................................................................................................ 417FILE SIZE NOT AVAILABLE ............................................................................................................... 417FILTER CRIT DISCARDED ................................................................................................................. 417FILTER CRITERIA OBSOLETE ........................................................................................................... 417FILTER NOT FOUND .......................................................................................................................... 417FILTER VALUE TRUNCATED .............................................................................................................. 418FILTERING IS ON|OFF .......................................................................................................................418GDDM ERROR severity-msgnumber .................................................................................................. 418GDDM LEVEL ERR gddm-level ........................................................................................................... 418GDDM NOT AVAILABLE ..................................................................................................................... 418

    xi

  • GET ERROR RC=return-code ............................................................................................................. 418GROUP NAME NOT VALID .................................................................................................................418HC NOT ACTIVE sysname | count SYSTEMS ..................................................................................... 418HELP MENU ERROR= member-name ................................................................................................419HEX STRING INVALID ....................................................................................................................... 419INACTIVE MODIFY INVALID .............................................................................................................419INCONSISTENT PARAMETERS ......................................................................................................... 419**** INCORRECT UNIT NAME SUPPLIED ......................................................................................... 419INPUT FILE ALLOC FAILED ............................................................................................................... 419INPUT INVALID WITH BLOCK ...........................................................................................................419INPUT INVALID WITHIN BLOCK .......................................................................................................419INT CONSOLE NOT ALLOWED ...........................................................................................................420INVALID CALL TYPE .......................................................................................................................... 420INVALID CLASS class ENTERED ....................................................................................................... 420INVALID CLASS NAME ...................................................................................................................... 420INVALID COLUMN: column-info ........................................................................................................420INVALID COMMAND ..........................................................................................................................420INVALID DESTINATION NAME ......................................................................................................... 421INVALID DSN - LENGTH .................................................................................................................... 421INVALID DSN - QUOTES ....................................................................................................................421INVALID HEX STRING ....................................................................................................................... 421INVALID LEFT BOUNDARY ................................................................................................................421INVALID RETURN CODE ....................................................................................................................421INVALID SAVED DEST ....................................................................................................................... 421INVALID SCROLL AMOUNT ............................................................................................................... 421INVALID SELECTION .........................................................................................................................422INVALID SYNTAX ...............................................................................................................................422INVALID UNIT ................................................................................................................................... 422INVALID UPDATE VALUE ...................................................................................................................422INVALID VALUE ................................................................................................................................. 422IRXEXEC RC=return-code ..................................................................................................................422ISFTRACE DD MISSING .................................................................................................................... 422ISPF REQUIRED ................................................................................................................................ 423JAPANESE HELP NOT AVAILABLE .................................................................................................... 423JCT NOT AVAILABLE ......................................................................................................................... 423jesx NOT ACTIVE................................................................................................................................ 423JES REQUIRED................................................................................................................................... 423JES REQUIRED FOR MAS...................................................................................................................423JES 1.7 REQUIRED.............................................................................................................................423JES2 ENVIRONMENT ONLY .............................................................................................................. 423JES3 ENVIRONMENT ONLY .............................................................................................................. 423JES2 REQUIRED FOR MAS.................................................................................................................424JOB IS PROTECTED............................................................................................................................424JOB NO LONGER VALID..................................................................................................................... 424JPN HELP NOT AVAILABLE................................................................................................................ 424number LINES PRINTED ................................................................................................................... 424LINE NOT AVAILABLE........................................................................................................................ 424LOCATE ERROR return-code ..............................................................................................................424LOG BROWSE ERR returncode-reasoncode ......................................................................................424LOG CONN ERR returncode-reasoncode ...........................................................................................425LOG DISC ERR returncode-reasoncode ............................................................................................ 425LOG FUNCTION INOPERATIVE..........................................................................................................425LOGIC ERROR 1..................................................................................................................................425LOGIC ERROR 2..................................................................................................................................425LOGIC ERROR 3..................................................................................................................................425LOGLIM yyyy.ddd hh:mm:ss .............................................................................................................. 425LRECL TOO LARGE FOR GDDM ......................................................................................................... 426MEMBER NAME MISSING.................................................................................................................. 426

    xii

  • MEMBER NAME NOT ALLOWED.........................................................................................................426MEMBER NOT FOUND........................................................................................................................ 426MENU READ LOOP..............................................................................................................................426MERGE ERROR returncode-reasoncode ........................................................................................... 426MIGRAT ALLOC FAILURE....................................................................................................................426MOD NOT ALLOWED FOR PDS........................................................................................................... 426MODULE NOT FOUND........................................................................................................................ 426MODIFY ISSUED-number DS ............................................................................................................ 427MUTUALLY EXCLUSIVE UPD.............................................................................................................. 427NO sysid SYSLOG FOUND ..................................................................................................................427NO CHARS 'string' FOUND .................................................................................................................427NO COMMAND PROVIDED................................................................................................................. 427NO DATA IN DATA SETS..................................................................................................................... 427NO DATA SETS ALLOCATED............................................................................................................... 427NO DATA SETS AUTHORIZED............................................................................................................ 428NO DATA SETS OPENED.....................................................................................................................428NO DATA TO DISPLAY ........................................................................................................................428NO DISPLAYABLE DATA..................................................................................................................... 428NO FILTERS AVAILABLE.....................................................................................................................428NO HELP AVAILABLE..........................................................................................................................428NO OPERLOG FOUND.........................................................................................................................428NO PREFIX 'string' FOUND ................................................................................................................428NO PREVIOUS INPUT.........................................................................................................................428NO PROMPT AVAILABLE ................................................................................................................... 429NO RESPONSE FROM RMF.................................................................................................................429NO RESPONSE RECEIVED..................................................................................................................429NO STEP DATA FOUND ...................................................................................................................... 429NO SUFFIX 'string' FOUND ................................................................................................................ 429NO WORD 'string' FOUND ..................................................................................................................429NOT ALL SYMBOLS SHOWN...............................................................................................................429NOT ALLOWED - PRIOR OD ...............................................................................................................430NOT ALLOWED WITH OUTDESC........................................................................................................ 430NOT AUTH TO LOGSTREAM............................................................................................................... 430NOT AUTH TO OPERLOG....................................................................................................................430NOT AUTHORIZED BY EXIT............................................................................................................... 430NOT AUTHORIZED FOR CHECK......................................................................................................... 430NOT AUTHORIZED FOR CHOICE....................................................................................................... 430NOT AUTHORIZED FOR CLASS..........................................................................................................430NOT AUTHORIZED FOR CMD.............................................................................................................431NOT AUTHORIZED FOR CONS........................................................................................................... 431NOT AUTHORIZED FOR DEV..............................................................................................................431NOT AUTHORIZED FOR DEST............................................................................................................431NOT AUTHORIZED FOR ENC..............................................................................................................431NOT AUTHORIZED FOR FUNCTION.................................................................................................. 431NOT AUTHORIZED FOR INIT............................................................................................................. 431NOT AUTHORIZED FOR JOB..............................................................................................................432NOT AUTHORIZED FOR NODE...........................................................................................................432NOT AUTHORIZED FOR PROC........................................................................................................... 432NOT AUTHORIZED FOR PRT.............................................................................................................. 432NOT AUTHORIZED FOR RES.............................................................................................................. 432NOT AUTHORIZED FOR SE................................................................................................................ 432NOT AUTHORIZED FOR SYS.............................................................................................................. 432NOT AUTHORIZED TO DATA.............................................................................................................. 433NOT PAGE MODE DATA...................................................................................................................... 433NOT VALID FOR TYPE........................................................................................................................ 433NOT VALID WHEN REXX.................................................................................................................... 433"O" ACTION REQUIRED..................................................................................................................... 433OBTAIN ERROR return-code ............................................................................................................. 433

    xiii

  • OFFSET NOT ZERO.............................................................................................................................433OPERLOG NOT ACTIVE...................................................................................................................... 433OPTION LOCALLY DISABLED............................................................................................................. 433OPTS=mask REC-CNT=record-count DSNAME=data-set-name ......................................................434**** OS CVOL ERROR......................................................................................................................... 434OUTADD ERROR return-code-reason-code ...................................................................................... 434OUTPUT DESC NOT AVAIL return-code ............................................................................................ 434OVERTYPE VALUE TOO LONG............................................................................................................ 434number PAGES PRINTED .................................................................................................................. 434PARM INVALID................................................................................................................................... 434PARM NOT ACCEPTABLE....................................................................................................................435PARTIAL DATA SHOWN...................................................................................................................... 435POINT ERROR RC=return-code .........................................................................................................435number PREFIX string ....................................................................................................................... 435PREFIX INVALID................................................................................................................................ 435PRINT ABEND abend-code ............................................................................................................... 435PRINT ALREADY OPEN...................................................................................................................... 435PRINT CLOSED number LINE ............................................................................................................436PRINT ENDED — LOOP COND............................................................................................................ 436PRINT FIL