Version 2 Release 3 z/OS - IBM › ... › $file › adru000_v2r3.pdf · 2019-07-03 · Summary of...

672
z/OS Version 2 Release 3 DFSMSdss Storage Administration IBM SC23-6868-30

Transcript of Version 2 Release 3 z/OS - IBM › ... › $file › adru000_v2r3.pdf · 2019-07-03 · Summary of...

  • z/OSVersion 2 Release 3

    DFSMSdss Storage Administration

    IBM

    SC23-6868-30

  • Note

    Before using this information and the product it supports, read the information in “Notices” on page599.

    This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications untilotherwise indicated in new editions.

    Last updated: 2019-07-02© Copyright International Business Machines Corporation 1984, 2019.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract withIBM Corp.

  • Contents

    Figures................................................................................................................ xv

    Tables................................................................................................................xvii

    About this document...........................................................................................xixRequired product knowledge.................................................................................................................... xix

    z/OS information.................................................................................................xxi

    How to send your comments to IBM................................................................... xxiiiIf you have a technical problem.............................................................................................................. xxiii

    Summary of changes.......................................................................................... xxvSummary of changes for z/OS Version 2 Release 3 (V2R3).................................................................... xxvSummary of changes for z/OS Version 2 Release 2 (V2R2) as updated December 2015....................xxviiSummary of changes for z/OS Version 2 Release 2 (V2R2).................................................................. xxviiSummary of changes for z/OS Version 2 Release 1 (V2R1) as updated February 2015...................... xxviiSummary of changes for z/OS Version 2 Release 1 (V2R1) as updated September, 2014..................xxviiz/OS Version 2 Release 1 summary of changes....................................................................................xxviii

    Part 1. DFSMSdss Storage Administration Guide.....................................................1

    Chapter 1. Introduction to the DFSMSdss component of DFSMS.............................................................. 3Understanding the role of DFSMSdss.................................................................................................... 3

    Managing user data with SMS...........................................................................................................3Sequential data striping....................................................................................................................4Record counting................................................................................................................................ 4Installation exit routines...................................................................................................................4Authorization checking..................................................................................................................... 5

    Managing availability with DFSMSdss....................................................................................................5Backing up and restoring volumes and data sets............................................................................ 6Backing up and restoring individual UNIX files................................................................................6Using DFSMShsm for backup............................................................................................................8Using concurrent copy...................................................................................................................... 8Using the stand-alone restore program of DFSMSdss.....................................................................9

    Managing data movement with DFSMSdss............................................................................................9Moving data....................................................................................................................................... 9Moving data in an SMS-managed environment................................................................................9Moving data with concurrent copy................................................................................................. 10Moving data with FlashCopy...........................................................................................................10Moving data with SnapShot............................................................................................................ 10

    Converting data to and from SMS management..................................................................................10Converting data sets with data movement.................................................................................... 10Converting volumes without data movement................................................................................ 11

    Managing space with DFSMSdss..........................................................................................................11

    Chapter 2. Requirements for running DFSMSdss..................................................................................... 13Understanding the operating environment......................................................................................... 13Storage requirements...........................................................................................................................13

    iii

  • Hardware requirements....................................................................................................................... 15Volume formats.................................................................................................................................... 15Indexed VTOC.......................................................................................................................................16Data set organizations..........................................................................................................................16Temporary data set names.................................................................................................................. 17

    Chapter 3. Logical and physical processing and data set filtering........................................................... 19UNIX file filtering.................................................................................................................................. 19

    Choosing files for processing..........................................................................................................19Defining logical and physical processing.............................................................................................19

    Logical processing...........................................................................................................................19Physical processing........................................................................................................................ 20Data integrity considerations......................................................................................................... 21

    Choosing data sets for processing—filtering....................................................................................... 22Filtering by data set names............................................................................................................ 22Filtering by data set characteristics............................................................................................... 23The FILTERDD keyword.................................................................................................................. 24Uses of filtering............................................................................................................................... 24

    Chapter 4. Invoking DFSMSdss................................................................................................................. 27Invoking DFSMSdss with ISMF............................................................................................................ 27

    How to invoke ISMF........................................................................................................................ 27Invoking DFSMSdss with JCL...............................................................................................................27Invoking DFSMSdss with the application interface.............................................................................27

    User interaction module exit functions.......................................................................................... 28

    Chapter 5. Protecting DFSMSdss functions.............................................................................................. 29Protecting DFSMSdss and ISMF functions with RACF........................................................................ 29

    ISMF functions you might want to protect.....................................................................................29Setting up the authorization structure........................................................................................... 29

    Protecting DFSMSdss functions with RACF FACILITY class profiles.................................................. 31Name-hiding......................................................................................................................................... 32

    Chapter 6. Managing availability with DFSMSdss..................................................................................... 33Planning an availability strategy.......................................................................................................... 33

    Backup and recovery...................................................................................................................... 33Disaster recovery............................................................................................................................ 34Maintaining vital records................................................................................................................ 35Archiving data sets..........................................................................................................................36

    Backing up data sets............................................................................................................................ 36Logical data set dump.....................................................................................................................37Physical data set dump...................................................................................................................38Renaming data sets during dump processing................................................................................38Backup with concurrent copy.........................................................................................................39Backing up data sets to an object storage cloud........................................................................... 41Using DFSMSdss as a backup utility for CICSVR............................................................................42A backup scenario...........................................................................................................................43

    Backing up data sets with special requirements.................................................................................43Dumping HFS data sets.................................................................................................................. 43Dumping zFS data sets................................................................................................................... 44Dumping multivolume data sets.................................................................................................... 44Dumping integrated catalog facility user catalogs.........................................................................45Dumping non-VSAM data sets that have aliases........................................................................... 46Dumping VSAM spheres................................................................................................................. 46Dumping indexed VSAM data sets................................................................................................. 47Dumping SYS1 system data sets....................................................................................................47Dumping data sets containing records past the last-used-block pointer.....................................47Backing up SMS-managed data sets..............................................................................................48

    iv

  • Backing up data sets being accessed with record level sharing................................................... 48Backing up data sets with extended attributes............................................................................. 48

    Backing up UNIX files...........................................................................................................................48Hard links........................................................................................................................................ 49Sparse files......................................................................................................................................49Last backup date.............................................................................................................................49Backup with CLONE processing......................................................................................................49

    Backing up volumes............................................................................................................................. 50Logical volume DUMP..................................................................................................................... 50Physical volume dump....................................................................................................................50Backing up system volumes........................................................................................................... 50Backing up VM-format volumes..................................................................................................... 50

    Dumping data efficiently...................................................................................................................... 51Combining volume copy and volume dump to reduce your backup window................................51Space considerations......................................................................................................................53Performance considerations.......................................................................................................... 54Shared DASD considerations..........................................................................................................58Backing up and restoring volumes with incremental FlashCopy.................................................. 58

    Securing your tape backups.................................................................................................................61Using host-based encryption to secure backups...........................................................................62DFSMSdss processing of dump encryption requests.................................................................... 66

    Restoring data sets...............................................................................................................................67Logical data set restore.................................................................................................................. 68DFSMSdss handling of the expiration date during logical restore.................................................71DFSMSdss handling of the data-set-changed indicator during restore ....................................... 72Physical data set restore................................................................................................................ 72Coexistence considerations............................................................................................................73

    Restoring data sets with special requirements................................................................................... 73Restoring multivolume data sets and restoring data sets using multiple target volumes

    (spill volumes)............................................................................................................................73Restoring integrated catalog facility catalogs................................................................................74Restoring non-VSAM data sets that have aliases.......................................................................... 76Restoring indexed sequential, unmovable, direct, and absolute track data sets......................... 76Restoring an undefined DSORG data set........................................................................................77Restoring an extended-format VSAM data set with stripe count of one.......................................78Restoring a VSAM sphere............................................................................................................... 78Restoring a preallocated VSAM cluster..........................................................................................78Restoring the VVDS and the VTOCIX..............................................................................................78Restoring a PDSE............................................................................................................................ 79Restoring a damaged PDS.............................................................................................................. 79Restoring data sets in an SMS-managed environment..................................................................79Converting non-VSAM data sets to multivolume........................................................................... 80Restoring SMS-managed data sets................................................................................................ 80Restoring GDG data sets.................................................................................................................83Restoring non-SMS-managed data sets.........................................................................................83Logical restore of data sets with phantom catalog entries............................................................83Logical restore of preformatted empty VSAM data sets................................................................84

    Restoring UNIX files............................................................................................................................. 84Determining what files are in a backup..........................................................................................85Restoring to pre-existing files........................................................................................................ 85Hard links........................................................................................................................................ 86Last backup date.............................................................................................................................86

    Restoring volumes................................................................................................................................86Specifying output volumes............................................................................................................. 87Recovering VM-format volumes..................................................................................................... 89Coexistence considerations............................................................................................................89

    Chapter 7. Managing data movement with DFSMSdss.............................................................................91

    v

  • Preparing for data movement.............................................................................................................. 91Evaluating the use of logical and physical copy.............................................................................91Controlling what DFSMSdss copies................................................................................................92Moving data sets............................................................................................................................. 92Moving volumes.............................................................................................................................. 92

    Logical data set copy............................................................................................................................92Physical data set copy..........................................................................................................................93Specifying input volumes..................................................................................................................... 94Selecting output volumes.................................................................................................................... 94Renaming data sets..............................................................................................................................95Expiration date handling...................................................................................................................... 97

    SMS to SMS..................................................................................................................................... 97SMS to non-SMS..............................................................................................................................97Non-SMS to SMS............................................................................................................................. 98Non-SMS to non-SMS..................................................................................................................... 98

    Defining RACF profiles..........................................................................................................................98Moving data sets with utilities............................................................................................................. 98Moving data sets with concurrent copy.............................................................................................100

    Specifying concurrent copy for COPY requests........................................................................... 100Moving data sets with FlashCopy...................................................................................................... 101

    Designating FlashCopy usage...................................................................................................... 102Moving data sets with SnapShot.................................................................................................. 104

    Moving data sets with special requirements.....................................................................................105Moving undefined DSORG and empty non-VSAM data sets........................................................105Moving system data sets.............................................................................................................. 106Moving catalogs............................................................................................................................ 106Moving non-VSAM data sets that have aliases............................................................................ 106Moving multivolume data sets..................................................................................................... 107Converting VSAM and non-VSAM data sets to multivolume....................................................... 108Moving VSAM data sets................................................................................................................ 108Moving a PDSE.............................................................................................................................. 109Moving a damaged PDS................................................................................................................ 109Moving unmovable data sets........................................................................................................110Moving data sets to unlike devices.............................................................................................. 110Moving indexed sequential data sets...........................................................................................110Moving direct access data sets.................................................................................................... 111Moving GDG data sets.................................................................................................................. 111Moving SMS-managed data sets.................................................................................................. 112Moving non-SMS-managed data sets.......................................................................................... 114Moving to preallocated data sets................................................................................................. 114Moving data sets being accessed with record level sharing....................................................... 117Moving preformatted empty VSAM data sets.............................................................................. 118

    VTOC considerations for moving volumes.........................................................................................118Logical volume copy operation.......................................................................................................... 118Physical volume copy operation........................................................................................................ 119Moving volumes with FlashCopy....................................................................................................... 120

    Designating FlashCopy usage...................................................................................................... 120Determining why FlashCopy cannot be used...............................................................................120Freeing subsystem resources...................................................................................................... 121Choosing space efficient FlashCopy ............................................................................................121Initializing the volume with the FCWITHDRAW keyword............................................................122Backing up volumes with FlashCopy consistency group.............................................................123

    Moving volumes with SnapShot.........................................................................................................124Designating SnapShot usage........................................................................................................125Determining why SnapShot cannot be used................................................................................125

    Moving volumes to like devices of equal capacity............................................................................ 125Moving volumes to like devices of greater capacity..........................................................................125Moving volumes to unlike devices..................................................................................................... 126

    vi

  • Moving VM-format volumes............................................................................................................... 126

    Chapter 8. Converting data to and from SMS management...................................................................127Evaluating conversion to SMS management..................................................................................... 127

    Data sets ineligible for conversion to SMS...................................................................................127Data sets ineligible for conversion from SMS.............................................................................. 128Volumes eligible for conversion to SMS.......................................................................................128

    Conversion by data movement.......................................................................................................... 128Converting to SMS management by data movement.................................................................. 128Conversion from SMS management by data movement............................................................. 129

    Conversion without data movement..................................................................................................129Simulating conversion.................................................................................................................. 129Preparing a volume for conversion...............................................................................................130

    Converting to SMS management without data movement............................................................... 130SMS report.................................................................................................................................... 131

    Special data set requirements for conversion to SMS...................................................................... 131VSAM sphere eligibility.................................................................................................................131Multivolume data sets.................................................................................................................. 132GDG data sets............................................................................................................................... 133Temporary data sets.....................................................................................................................133VTOC and VVDS............................................................................................................................ 133

    Converting from SMS management without data movement...........................................................133Special data set requirements for conversion from SMS..................................................................133

    Multivolume data sets.................................................................................................................. 133GDG data sets............................................................................................................................... 134Temporary data sets.....................................................................................................................134VTOC and VVDS............................................................................................................................ 134

    Special considerations for using non-SMS-managed targets...........................................................134

    Chapter 9. Managing space with DFSMSdss...........................................................................................135Reclaiming DASD space..................................................................................................................... 135

    Releasing unused space in data sets........................................................................................... 135Compressing a PDS.......................................................................................................................135Deleting unwanted data sets........................................................................................................136Combining data set extents..........................................................................................................137

    Consolidating free space and extents on volumes............................................................................138When to run DEFRAG and CONSOLIDATE functions................................................................... 138Designating FlashCopy usage...................................................................................................... 139Preserve Mirror FlashCopy........................................................................................................... 139Determining why FlashCopy cannot be used...............................................................................140Designating SnapShot usage........................................................................................................140Determining why SnapShot cannot be used................................................................................140Data sets excluded from DEFRAG or CONSOLIDATE processing................................................141DEFRAG options............................................................................................................................141Serialization.................................................................................................................................. 143Security considerations................................................................................................................ 145

    Maximizing track utilization by reblocking data sets........................................................................ 145

    Chapter 10. Diagnosing problems in DFSMSdss operations.................................................................. 147Determining the source of the failure: DFSMSdfp, DFSMSdss, or DFSMShsm................................ 147Using keywords to identify the problem............................................................................................148

    Component identification keyword.............................................................................................. 148Release-level keyword................................................................................................................. 148Type-of-failure and function keywords........................................................................................149Module keyword........................................................................................................................... 153Maintenance-level keyword......................................................................................................... 155

    Using the IBM Support Center...........................................................................................................155Using the software support facility.............................................................................................. 156

    vii

  • Using IBMLink/ServiceLink...........................................................................................................156Info/System.................................................................................................................................. 156

    Chapter 11. ACS routine information...................................................................................................... 157ACS variables available during Copy function................................................................................... 157ACS variables available during RESTORE and CONVERTV processing............................................. 158

    Using SIZE and MAXSIZE variables............................................................................................. 159

    Chapter 12. Dumping and restoring Linux for System z partitions and volumes...................................161Preparing to work with Linux volumes.............................................................................................. 161

    Understanding the hardware environment..................................................................................161Choosing VOLSERs for Linux volumes..........................................................................................162Formatting and partitioning Linux volumes................................................................................. 162Obtaining authorization for Linux volumes.................................................................................. 163Backing up a Linux volume with partitions.................................................................................. 163

    Using DFSMSdss dump and restore commands............................................................................... 164Example 1. DUMP FULL................................................................................................................ 164Example 2. DUMP FULL with CONCURRENT COPY..................................................................... 165Example 3. DUMP DATASET......................................................................................................... 165Example 4. COPY FULL................................................................................................................. 166Example 5. COPY FULL COPYVOLID ALLEXCP.............................................................................166Example 6. RESTORE FULL...........................................................................................................167Example 7. RESTORE DATASET....................................................................................................167Example 8. COPYDUMP................................................................................................................169

    Submitting JCL batch jobs to a z/OS system using FTP.................................................................... 169Using DFSMSdss stand-alone services............................................................................................. 169

    Chapter 13. Format of the DFSMSdss dump data set............................................................................ 171Data set and volume backup format..................................................................................................171ADRBMB data area.............................................................................................................................172

    ADRBMB constants.......................................................................................................................172ADRBMB cross-reference.............................................................................................................173

    ADRTAPB data area............................................................................................................................173ADRTAPB constants......................................................................................................................183ADRTAPB cross-reference............................................................................................................184

    z/OS UNIX file format.........................................................................................................................191ADRTAPB version 2 data area............................................................................................................192

    ADRTAPB constants......................................................................................................................193ADRTAPB cross-reference............................................................................................................193

    Chapter 14. DFSMSdss patch area..........................................................................................................195Using RESET with CLONE...................................................................................................................195Sample JCL.........................................................................................................................................195Forcing the use of preallocated VSAM data sets (PN04574)............................................................196Ignoring VSAM duplicate key errors (PN05529)............................................................................... 196Modifying the timeout period for enqueue lockout detection (PL84514)........................................197Controlling the wait/retry time for serialization of system resources (PN11523)........................... 197Using CONVERTV on data sets with a revoked user ID in the RESOWNER field (OY59957)........... 198Restoring inconsistent PDSE data sets (OY60301)...........................................................................198Changing default protection status during RESTORE (PN37489).................................................... 199Overwriting existing objects during logical data set DUMP to an object store cloud.......................199Restoring or copying undefined, multivolume SMS-managed data sets (OY63818).......................200Bypassing backup-while-open processing (OY63531).................................................................... 200Bypassing storage and management class authorization checking during RESTORE (OY65348).. 200Issuing notification for tape and migrated data sets (OY66092)..................................................... 201Using RESET with concurrent copy (OY65555).................................................................................201Forcing RESTORE after message ADR482E (OY67532)................................................................... 202

    viii

  • Restoring VSAM KSDS or VRRDS after messages ADR789W, ADR364W, and ADR417W(OY67942).....................................................................................................................................202

    Restoring VSAM data sets with expiration date of 1999365 (OW00780)........................................203Restoring VSAM data sets with expiration dates beyond 2000 (OW00780)................................... 203Changing default insertion of EOF track during COPY with ALLDATA specified (OW15003)...........204Using RESET or UNCATALOG in a logical data set dump (PN60114)............................................... 204Changing secondary allocation quantity in format 1 DSCB for PDSE data sets (OW07755)...........204Changing reference date default settings during data set COPY and RESTORE processing

    (OW12011)....................................................................................................................................206Changing default protection processing during COPY (OW10314)..................................................206Bypassing management and storage class access checks during COPY (PN72592)...................... 206Changing default handling of invalid tracks created during data set COPY and RESTORE

    processing (OW08174).................................................................................................................207Forcing RESTORE to the same volumes as the source VSAM data set (OW07077)........................ 207Modifying number of volumes allocated for SMS data sets during logical RESTORE and COPY

    (OW15880)....................................................................................................................................208Dumping a keyed VSAM data set that has data CAs without corresponding index CIs

    (OW17877)....................................................................................................................................209Changing the default DEFRAG processing of checkpointed data sets (OW20285)......................... 209Setting the percentage to overallocate target data set space (OW27837)......................................210Bypassing RLS processing (OW32817)............................................................................................. 210Changing creation date default settings during data set COPY and RESTORE (OW19618)............ 211Copying and dumping a PDSE data set using the VALIDATE PDSE option (OW48074)...................212Changing the default maximum number of active parallel subtasks............................................... 212Changing the default initialization processing during DUMP with FCWITHDRAW (OA18929)........212Changing the default DEFRAG processing of LINKLIST-indicated data sets (OW43874)............... 213Changing the FASTREPLICATION default setting during Copy and Defrag (OA11637)...................214Tuning hardware assisted compression (OA13300).........................................................................214Resetting the data-set-changed indicator during physical full or partial RESTORE operation

    (OA20907).....................................................................................................................................215Requesting that DFSMSdss double-check data set high used RBA values for LDS data sets

    (OA23805).....................................................................................................................................215Enabling or disabling use of the catalog search interface for data set name filtering..................... 216Requesting that DFSMSdss restore the VM-formatted volume that was DUMPed by z/OS

    V1R10 before OA27531 was applied...........................................................................................216Adding timestamps to messages.......................................................................................................217Enabling building appropriate channel programs............................................................................. 217Requesting that DFSMSdss attempt to fix ESDSes with corrupted RDFs.........................................217ADRPTCHB data area......................................................................................................................... 218

    ADRPTCHB cross-reference......................................................................................................... 220Overriding the EATTR attribute during logical COPY.........................................................................222Restore an extended-format data set that was dumped with the ZCOMPRESS keyword when

    zEDC services were not used........................................................................................................223

    Part 2. DFSMSdss Storage Administration Reference.......................................... 225

    Chapter 15. Specifying DFSMSdss commands.......................................................................................227Command syntax................................................................................................................................227How many subkeywords are allowed?.............................................................................................. 228Specifying subkeywords in a command data set.............................................................................. 228How to read syntax diagrams............................................................................................................ 228JCL that you need...............................................................................................................................230

    How to control DFSMSdss through PARM information in the EXEC statement.......................... 231Examples of invoking DFSMSdss with JCL...................................................................................234

    Chapter 16. DFSMSdss filtering—choosing the data sets you want processed.....................................237How DFSMSdss filters data sets........................................................................................................ 237

    ix

  • Virtual storage access method (VSAM) data set considerations................................................ 237Filtering by data set names................................................................................................................238

    Using an asterisk in partially qualified data set names............................................................... 238Using a percent sign in partially qualified data set names..........................................................238Examples of fully and partially qualified data set names............................................................238Relative generation filtering......................................................................................................... 239

    Filtering by data set characteristics.................................................................................................. 240Some examples of the BY keywords............................................................................................245

    Standard catalog search order.......................................................................................................... 245Broken data set considerations................................................................................................... 245

    Chapter 17. DFSMSdss filtering—choosing the z/OS UNIX files you want processed...........................247Path name considerations................................................................................................................. 247UNIX wildcard characters.................................................................................................................. 248

    Chapter 18. Syntax—DFSMSdss function commands............................................................................ 249What DFSMSdss commands do......................................................................................................... 249

    Building the stand-alone IPL-able core image............................................................................ 249Using DUMP and RESTORE for backup and recovery.................................................................. 249Moving data with COPY.................................................................................................................249Converting to and from Storage Management Subsystem (SMS) with CONVERTV.................... 250Managing space with COMPRESS, CONSOLIDATE, DEFRAG, and RELEASE...............................250Using COPY for partitioned data set (PDS) and partitioned data set extended (PDSE)

    conversions..............................................................................................................................250Copying DFSMSdss-produced dump data with COPYDUMP....................................................... 250Printing for diagnostic purposes with PRINT...............................................................................250Managing extent space efficient volume space with SPACEREL.................................................251

    BUILDSA command for DFSMSdss....................................................................................................251BUILDSA syntax............................................................................................................................252Explanation of BUILDSA command keywords.............................................................................252BUILDSA command examples..................................................................................................... 254

    CGCREATED command for DFSMSdss...............................................................................................256CGCREATED syntax.......................................................................................................................256Explanation of CGCREATED command keywords........................................................................256

    COMPRESS command for DFSMSdss................................................................................................ 257COMPRESS syntax........................................................................................................................ 258Explanation of COMPRESS command keywords......................................................................... 258Example of compress operations.................................................................................................261

    CONSOLIDATE command for DFSMSdss...........................................................................................262CONSOLIDATE command syntax................................................................................................. 262Explanation of CONSOLIDATE command keywords....................................................................264Example of a CONSOLIDATE operation....................................................................................... 272

    CONVERTV command for DFSMSdss.................................................................................................272CONVERTV command syntax....................................................................................................... 272Explanation of CONVERTV command keywords..........................................................................273Examples of CONVERTV operations.............................................................................................276

    COPY Command for DFSMSdss......................................................................................................... 276Special Considerations for COPY................................................................................................. 277COPY DATASET Command Syntax for Logical Data Set...............................................................278COPY DATASET Command Syntax for Physical Data Set.............................................................280COPY FULL and COPY TRACKS Syntax.........................................................................................282Explanation of COPY Command Keywords.................................................................................. 285Data Integrity Considerations for Full or Tracks Copy Operation................................................329Examples of Full and Tracks Copy Operations.............................................................................329Examples of Data Set Copy Operations....................................................................................... 330ALLDATA and ALLEXCP Interactions............................................................................................ 334

    COPYDUMP command for DFSMSdss................................................................................................337COPYDUMP syntax........................................................................................................................338

    x

  • Explanation of COPYDUMP command keywords.........................................................................338Examples of COPYDUMP operations............................................................................................338

    DEFRAG command for DFSMSdss..................................................................................................... 339DEFRAG syntax............................................................................................................................. 341Explanation of DEFRAG command keywords.............................................................................. 341Examples of DEFRAG operations................................................................................................. 351Results of a successful DEFRAG operation..................................................................................352

    DUMP command for DFSMSdss.........................................................................................................354Special considerations for dump..................................................................................................355DUMP FULL and DUMP TRACKS syntax....................................................................................... 355DUMP DATASET syntax for logical data set..................................................................................358DUMP DATASET syntax for physical data set...............................................................................360DUMP PATH syntax....................................................................................................................... 362Explanation of DUMP command keywords..................................................................................362Data integrity considerations for full or tracks dump operation................................................. 389Format of the output data set...................................................................................................... 389Examples of full and tracks dump operations............................................................................. 390Examples of physical data set dump operations.........................................................................390Examples of logical data set dump operations............................................................................392Examples of file dump operation................................................................................................. 395

    PRINT command for DFSMSdss........................................................................................................ 395PRINT syntax................................................................................................................................ 396Explanation of PRINT command keywords................................................................................. 397Examples of print operations....................................................................................................... 402

    RELEASE command for DFSMSdss....................................................................................................403RELEASE syntax for physical processing..................................................................................... 404RELEASE syntax for logical processing........................................................................................ 404Explanation of RELEASE command keywords............................................................................. 406Example of a release operation....................................................................................................413

    RESTORE command for DFSMSdss................................................................................................... 413Special considerations for RESTORE........................................................................................... 414Data integrity considerations for full or tracks restore operations............................................. 415RESTORE FULL and RESTORE TRACKS command syntax...........................................................415RESTORE DATASET command syntax for logical data set...........................................................416RESTORE DATASET command syntax for physical data set........................................................419RESTORE PATH command syntax................................................................................................ 421Explanation of RESTORE command keywords............................................................................ 421DFSMSdss RESTORE process.......................................................................................................451Examples of full and tracks restore operations........................................................................... 456Examples of physical data set restore operations.......................................................................457Examples of logical data set restore operations......................................................................... 459

    SPACEREL command for DFSMSdss..................................................................................................461SPACEREL syntax..........................................................................................................................462Explanation of SPACEREL command keywords...........................................................................462

    Chapter 19. Syntax—auxiliary commands.............................................................................................. 465Writing to the operator for DFSMSdss............................................................................................... 465

    WTO command............................................................................................................................. 465WTOR command for DFSMSdss................................................................................................... 465

    Scheduling tasks................................................................................................................................ 466SERIAL command for DFSMSdss................................................................................................. 466PARALLEL command for DFSMSdss.............................................................................................466

    Controlling task processing............................................................................................................... 466SET command—setting condition codes and patch bytes...........................................................467IF-THEN-ELSE command sequence for DFSMSdss—using condition codes.............................. 468EOJ command—ending your DFSMSdss step.............................................................................. 472

    Chapter 20. DFSMSdss stand-alone services ........................................................................................ 473

    xi

  • Preparing to run the stand-alone services program......................................................................... 473Running stand-alone services......................................................................................................473Running stand-alone services with a predefined console...........................................................474Using a tape library.......................................................................................................................474Using an automatic cartridge loader............................................................................................476Controlling command sequence processing................................................................................476

    IPLing and running the Stand-Alone Services Program....................................................................477IPLing Stand-Alone Services........................................................................................................ 478RESTORE—restoring a formatted dump tape.............................................................................. 481TAPECNTL—rewinding and unloading a tape...............................................................................485

    Building the IPL-able core image.......................................................................................................486BUILDSA function......................................................................................................................... 486Understanding BUILDSA command authorization levels............................................................487

    Chapter 21. Data security and authorization checking.......................................................................... 489Effects of SPECIAL, OPERATIONS, and DASDVOL............................................................................ 489

    SPECIAL........................................................................................................................................ 489OPERATIONS................................................................................................................................ 490DASDVOL.......................................................................................................................................490

    General data security information.....................................................................................................491Protecting resources and data sets............................................................................................. 491Protecting the usage of DFSMSdss.............................................................................................. 491Password protection.....................................................................................................................492Protected user and group data sets.............................................................................................493Generic and discrete profile considerations................................................................................493Security-level, category, and label checking............................................................................... 494Protect-all and always-call...........................................................................................................495Standard naming conventions......................................................................................................495DFSMSdss temporary data set names......................................................................................... 495Discretely protected multivolume data set................................................................................. 497Erase-on-scratch.......................................................................................................................... 497SMS-managed data set protection.............................................................................................. 497Logging..........................................................................................................................................498

    DFSMSdss storage administrator...................................................................................................... 498ADMINISTRATOR keyword...........................................................................................................498FACILITY class profiles for the ADMINISTRATOR keyword........................................................ 499

    DFSMSdss access authority...............................................................................................................500Volume access and DASDVOL...................................................................................................... 500Data set access authorization levels............................................................................................503Protected catalogs........................................................................................................................503Non-SMS versus SMS authorization.............................................................................................503System operator authorization, special data set types............................................................... 504

    Access authorization for DFSMSdss commands............................................................................... 504CGCREATED.................................................................................................................................. 505COMPRESS....................................................................................................................................505CONSOLIDATE.............................................................................................................................. 505CONVERTV.................................................................................................................................... 505COPY............................................................................................................................................. 505COPYDUMP................................................................................................................................... 510DEFRAG.........................................................................................................................................510DUMP............................................................................................................................................ 510PRINT............................................................................................................................................511RELEASE....................................................................................................................................... 511RESTORE.......................................................................................................................................511

    Chapter 22. Data integrity—serialization................................................................................................ 517Volume serialization...........................................................................................................................518

    Avoiding lockout........................................................................................................................... 519

    xii

  • The WAIT option........................................................................................................................... 519Data set serialization..........................................................................................................................519

    Enqueuing—ENQ...........................................................................................................................519Dumping HFS data sets................................................................................................................ 520zFS data sets.................................................................................................................................521Dynamic allocation (DYNALLOC).................................................................................................. 522Enqueuing versus dynamic allocation of data sets..................................................................... 522Read/Write serialization scheme................................................................................................. 522WAIT option.................................................................................................................................. 525An example of RESERVE-ENQUEUE processing..........................................................................526

    Backup-while-open data sets (CICS and DFSMStvs)........................................................................526Backup-while-open status definition...........................................................................................528Backup-while-open processing................................................................................................... 528Backup-while-open and concurrent copy................................................................................... 529TOLERATE (ENQFAILURE) and SHARE considerations............................................................... 530CICS recovery data....................................................................................................................... 530

    Backup-while-open data sets (IMS)..................................................................................................530Object serialization............................................................................................................................ 531

    Chapter 23. Application programming interface.................................................................................... 533Calling block structure....................................................................................................................... 533User interactions................................................................................................................................ 535

    Service considerations................................................................................................................. 536Cross-memory Application Interface overview...........................................................................536Using the cross memory application interface to control DFSMSdss......................................... 537

    System programming information.....................................................................................................539Application interface blocks.........................................................................................................539Exit identification block................................................................................................................ 539Application programming interface restrictions..........................................................................542Cross-memory application interface restrictions........................................................................ 543

    User interaction module exit option descriptions.............................................................................544Function startup (Eioption 00)..................................................................................................... 544Reading SYSIN record (Eioption 01)............................................................................................ 544Printing SYSPRINT record (Eioption 02)...................................................................................... 545Reading physical tape record (Eioption 03).................................................................................545Reading logical tape record (Eioption 04)....................................................................................546Writing logical tape record (Eioption 05)..................................................................................... 546Writing physical tape record (Eioption 06).................................................................................. 546Reading disk track (Eioption 07).................................................................................................. 547Writing disk track (Eioption 08)....................................................................................................547Reading utility SYSPRINT (Eioption 09).......................................................................................547Writing SYSPRINT record (Eioption 10)....................................................................................... 547Writing WTO message (Eioption 11)............................................................................................ 548Writing WTOR message (Eioption 12)..........................................................................................548Presenting ADRUFO record (Eioption 13).................................................................................... 548Function ending (Eioption 14)...................................................................................................... 549Presenting WTOR response (Eioption 15)................................................................................... 549OPEN/EOV tape volume security and verification exit (Eioption 16).......................................... 549OPEN/EOV nonspecific tape volume mount (Eioption 17)..........................................................549Insert logical VSAM record during restore (Eioption 18).............................................................550Output tape I/O error (Eioption 19)............................................................................................. 550Volume notification (Eioption 20)................................................................................................ 550Data set verification (Eioption 21)................................................................................................551Bypass verification exit (Eioption 22).......................................................................................... 551Data set processed notification exit (Eioption 23)...................................................................... 554Concurrent copy initialization complete (Eioption 24)................................................................ 556Backspace physical tape record (Eioption 25)............................................................................ 557Dump volume output notification (Eioption 26).......................................................................... 557

    xiii

  • Physical data set processed notification exit (Eioption 27)........................................................ 558Target data set allocation notification exit (Eioption 28)............................................................ 559Physical data set volume allocation notification exit (Eioption 30)............................................ 559Store application metadata object (Eioption 31).........................................................................560Retrieve application metadata object (Eioption 32)....................................................................560Output object notification exit (Eioption 33)............................................................................... 560z/OS UNIX file path notification (Eioption 41)............................................................................. 561z/OS UNIX file path bypass notification (Eioption 42).................................................................561z/OS UNIX file path processed notification (Eioption 43)........................................................... 562z/OS UNIX file path clone initialization notification (Eioption 44).............................................. 562

    Avoiding lockout.................................................................................................................................562Application interface summary..........................................................................................................563ADREID0 data area............................................................................................................................ 564

    Constants for ADREID0................................................................................................................ 573Cross reference for ADREID0.......................................................................................................574

    Example: invoking DFSMSdss by using an application program...................................................... 578How to determine DFSMSdss version, release, and modification level......................................579

    Chapter 24. Examples of the application program with the user interaction module (UIM)................ 581

    Chapter 25. Data set attributes...............................................................................................................587

    Chapter 26. z/OS UNIX file attributes..................................................................................................... 591

    Appendix A. Coexistence Considerations............................................................593Restoring backups using DFSMSdss....................................................................................................... 593

    Appendix B. Accessibility...................................................................................595Accessibility features.............................................................................................................................. 595Consult assistive technologies................................................................................................................ 595Keyboard navigation of the user interface.............................................................................................. 595Dotted decimal syntax diagrams.............................................................................................................595

    Notices..............................................................................................................599Terms and conditions for product documentation................................................................................. 600IBM Online Privacy Statement................................................................................................................ 601Policy for unsupported hardware............................................................................................................601Minimum supported hardware................................................................................................................602Programming interface information........................................................................................................602Trademarks.............................................................................................................................................. 602

    Glossary............................................................................................................ 603

    Index................................................................................................................ 621

    xiv

  • Figures

    1. Output from a Dump of an Integrated Catalog Facility User Catalog........................................................ 46

    2. Output from Restore of Integrated Catalog Facility User Catalog............................................................. 75

    3. SMS Report................................................................................................................................................131

    4. Sample JCL for dumping the contents of a volume................................................................................. 164

    5. Sample JCL for dumping two or more output tapes at the same time....................................................165

    6. Sample JCL for DUMP FULL with CONCURRENT COPY............................................................................165

    7. Sample JCL for DUMP DATASET................................................................................................................166

    8. Sample JCL for dumping all of the Linux partitions................................................................................. 166

    9. Sample JCL for making a full volume copy of a volume...........................................................................166

    10. Sample JCL for creating a backup copy of a Linux volume....................................................................167

    11. Sample JCL for restoring a full volume from a DFSMSdss dump.......................................................... 167

    12. Sample JCL for restoring individual partitions or data sets...................................................................168

    13. Sample JCL for renaming data sets to be restored................................................................................168

    14. Sample JCL for restoring only one partition of a volume.......................................................................169

    15. Sample JCL for copying Linux volume dumps........................................................................................169

    19. Printed Output Resulting from a Successful DEFRAG Run on nonEAV:................................................ 353

    20. A Section of the Printed Output Resulting from a Successful DEFRAG Run on EAV:............................353

    21. Output Resulting from a PRINT Command............................................................................................ 403

    22. Restore Actions on Non-VSAM Data Sets...............................................................................................453

    23. DFSMSdss Target Class Selection.......................................................................................................... 455

    24. Stand-Alone Services Restore Process Overview..................................................................................477

    25. DFSMSdss Data Security Decisions........................................................................................................501

    26. Block Diagram for Backup-While-Open Serialization............................................................................527

    xv

  • 27. DFSMSdss Application Interface Structure........................................................................................... 535

    28. DFSMSdss Exit Interface Structure........................................................................................................539

    29. The Application Program Process.......................................................................................................... 581

    30. Application Interface Program Example................................................................................................ 582

    31. Application Interface Program Example (continued)............................................................................ 582

    32. Application Interface Program Example (continued)............................................................................ 582

    33. User Interaction Module Example..........................................................................................................584

    34. User Interaction Module Example (continued)......................................................................................584

    35. User Interaction Module Example (continued)......................................................................................584

    36. User Interaction Module Example (continued)......................................................................................584

    37. User Interaction Module Example (continued)......................................................................................584

    38. User Interaction Module Example (continued)......................................................................................584

    39. User Interaction Module Example (continued)......................................................................................584

    40. User Interaction Module Example (continued)......................................................................................584

    41. User Interaction Module Example (continued)......................................................................................584

    42. User Interaction Module Example (continued)......................................................................................584

    43. User Interaction Module Example (continued)......................................................................................584

    44. Output Resulting from Use of the UIM Exits.......................................................................................... 585

    45. Output Resulting from Use of the UIM Exits (continued)...................................................................... 585

    xvi

  • Tables

    1. Minimum Storage Requirements for DFSMSdss Operations with I/O Buffers below 16-MegabyteVirtual.......................................................................................................................