version 2 release 3 z/os - ibm...preparing for data movement.....91 evaluating the use of logical...
TRANSCRIPT
-
z/OSVersion 2 Release 3
DFSMSdss Storage Administration
IBM
SC23-6868-30
-
Note
Before using this information and the product it supports, read the information in “Notices” on page599.
This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications untilotherwise indicated in new editions.
Last updated: 2019-07-02© Copyright International Business Machines Corporation 1984, 2019.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract withIBM Corp.
-
Contents
Figures................................................................................................................ xv
Tables................................................................................................................xvii
About this document...........................................................................................xixRequired product knowledge.................................................................................................................... xix
z/OS information.................................................................................................xxi
How to send your comments to IBM................................................................... xxiiiIf you have a technical problem.............................................................................................................. xxiii
Summary of changes.......................................................................................... xxvSummary of changes for z/OS Version 2 Release 3 (V2R3).................................................................... xxvSummary of changes for z/OS Version 2 Release 2 (V2R2) as updated December 2015....................xxviiSummary of changes for z/OS Version 2 Release 2 (V2R2).................................................................. xxviiSummary of changes for z/OS Version 2 Release 1 (V2R1) as updated February 2015...................... xxviiSummary of changes for z/OS Version 2 Release 1 (V2R1) as updated September, 2014..................xxviiz/OS Version 2 Release 1 summary of changes....................................................................................xxviii
Part 1. DFSMSdss Storage Administration Guide.....................................................1
Chapter 1. Introduction to the DFSMSdss component of DFSMS.............................................................. 3Understanding the role of DFSMSdss.................................................................................................... 3
Managing user data with SMS...........................................................................................................3Sequential data striping....................................................................................................................4Record counting................................................................................................................................ 4Installation exit routines...................................................................................................................4Authorization checking..................................................................................................................... 5
Managing availability with DFSMSdss....................................................................................................5Backing up and restoring volumes and data sets............................................................................ 6Backing up and restoring individual UNIX files................................................................................6Using DFSMShsm for backup............................................................................................................8Using concurrent copy...................................................................................................................... 8Using the stand-alone restore program of DFSMSdss.....................................................................9
Managing data movement with DFSMSdss............................................................................................9Moving data....................................................................................................................................... 9Moving data in an SMS-managed environment................................................................................9Moving data with concurrent copy................................................................................................. 10Moving data with FlashCopy...........................................................................................................10Moving data with SnapShot............................................................................................................ 10
Converting data to and from SMS management..................................................................................10Converting data sets with data movement.................................................................................... 10Converting volumes without data movement................................................................................ 11
Managing space with DFSMSdss..........................................................................................................11
Chapter 2. Requirements for running DFSMSdss..................................................................................... 13Understanding the operating environment......................................................................................... 13Storage requirements...........................................................................................................................13
iii
-
Hardware requirements....................................................................................................................... 15Volume formats.................................................................................................................................... 15Indexed VTOC.......................................................................................................................................16Data set organizations..........................................................................................................................16Temporary data set names.................................................................................................................. 17
Chapter 3. Logical and physical processing and data set filtering........................................................... 19UNIX file filtering.................................................................................................................................. 19
Choosing files for processing..........................................................................................................19Defining logical and physical processing.............................................................................................19
Logical processing...........................................................................................................................19Physical processing........................................................................................................................ 20Data integrity considerations......................................................................................................... 21
Choosing data sets for processing—filtering....................................................................................... 22Filtering by data set names............................................................................................................ 22Filtering by data set characteristics............................................................................................... 23The FILTERDD keyword.................................................................................................................. 24Uses of filtering............................................................................................................................... 24
Chapter 4. Invoking DFSMSdss................................................................................................................. 27Invoking DFSMSdss with ISMF............................................................................................................ 27
How to invoke ISMF........................................................................................................................ 27Invoking DFSMSdss with JCL...............................................................................................................27Invoking DFSMSdss with the application interface.............................................................................27
User interaction module exit functions.......................................................................................... 28
Chapter 5. Protecting DFSMSdss functions.............................................................................................. 29Protecting DFSMSdss and ISMF functions with RACF........................................................................ 29
ISMF functions you might want to protect.....................................................................................29Setting up the authorization structure........................................................................................... 29
Protecting DFSMSdss functions with RACF FACILITY class profiles.................................................. 31Name-hiding......................................................................................................................................... 32
Chapter 6. Managing availability with DFSMSdss..................................................................................... 33Planning an availability strategy.......................................................................................................... 33
Backup and recovery...................................................................................................................... 33Disaster recovery............................................................................................................................ 34Maintaining vital records................................................................................................................ 35Archiving data sets..........................................................................................................................36
Backing up data sets............................................................................................................................ 36Logical data set dump.....................................................................................................................37Physical data set dump...................................................................................................................38Renaming data sets during dump processing................................................................................38Backup with concurrent copy.........................................................................................................39Backing up data sets to an object storage cloud........................................................................... 41Using DFSMSdss as a backup utility for CICSVR............................................................................42A backup scenario...........................................................................................................................43
Backing up data sets with special requirements.................................................................................43Dumping HFS data sets.................................................................................................................. 43Dumping zFS data sets................................................................................................................... 44Dumping multivolume data sets.................................................................................................... 44Dumping integrated catalog facility user catalogs.........................................................................45Dumping non-VSAM data sets that have aliases........................................................................... 46Dumping VSAM spheres................................................................................................................. 46Dumping indexed VSAM data sets................................................................................................. 47Dumping SYS1 system data sets....................................................................................................47Dumping data sets containing records past the last-used-block pointer.....................................47Backing up SMS-managed data sets..............................................................................................48
iv
-
Backing up data sets being accessed with record level sharing................................................... 48Backing up data sets with extended attributes............................................................................. 48
Backing up UNIX files...........................................................................................................................48Hard links........................................................................................................................................ 49Sparse files......................................................................................................................................49Last backup date.............................................................................................................................49Backup with CLONE processing......................................................................................................49
Backing up volumes............................................................................................................................. 50Logical volume DUMP..................................................................................................................... 50Physical volume dump....................................................................................................................50Backing up system volumes........................................................................................................... 50Backing up VM-format volumes..................................................................................................... 50
Dumping data efficiently...................................................................................................................... 51Combining volume copy and volume dump to reduce your backup window................................51Space considerations......................................................................................................................53Performance considerations.......................................................................................................... 54Shared DASD considerations..........................................................................................................58Backing up and restoring volumes with incremental FlashCopy.................................................. 58
Securing your tape backups.................................................................................................................61Using host-based encryption to secure backups...........................................................................62DFSMSdss processing of dump encryption requests.................................................................... 66
Restoring data sets...............................................................................................................................67Logical data set restore.................................................................................................................. 68DFSMSdss handling of the expiration date during logical restore.................................................71DFSMSdss handling of the data-set-changed indicator during restore ....................................... 72Physical data set restore................................................................................................................ 72Coexistence considerations............................................................................................................73
Restoring data sets with special requirements................................................................................... 73Restoring multivolume data sets and restoring data sets using multiple target volumes
(spill volumes)............................................................................................................................73Restoring integrated catalog facility catalogs................................................................................74Restoring non-VSAM data sets that have aliases.......................................................................... 76Restoring indexed sequential, unmovable, direct, and absolute track data sets......................... 76Restoring an undefined DSORG data set........................................................................................77Restoring an extended-format VSAM data set with stripe count of one.......................................78Restoring a VSAM sphere............................................................................................................... 78Restoring a preallocated VSAM cluster..........................................................................................78Restoring the VVDS and the VTOCIX..............................................................................................78Restoring a PDSE............................................................................................................................ 79Restoring a damaged PDS.............................................................................................................. 79Restoring data sets in an SMS-managed environment..................................................................79Converting non-VSAM data sets to multivolume........................................................................... 80Restoring SMS-managed data sets................................................................................................ 80Restoring GDG data sets.................................................................................................................83Restoring non-SMS-managed data sets.........................................................................................83Logical restore of data sets with phantom catalog entries............................................................83Logical restore of preformatted empty VSAM data sets................................................................84
Restoring UNIX files............................................................................................................................. 84Determining what files are in a backup..........................................................................................85Restoring to pre-existing files........................................................................................................ 85Hard links........................................................................................................................................ 86Last backup date.............................................................................................................................86
Restoring volumes................................................................................................................................86Specifying output volumes............................................................................................................. 87Recovering VM-format volumes..................................................................................................... 89Coexistence considerations............................................................................................................89
Chapter 7. Managing data movement with DFSMSdss.............................................................................91
v
-
Preparing for data movement.............................................................................................................. 91Evaluating the use of logical and physical copy.............................................................................91Controlling what DFSMSdss copies................................................................................................92Moving data sets............................................................................................................................. 92Moving volumes.............................................................................................................................. 92
Logical data set copy............................................................................................................................92Physical data set copy..........................................................................................................................93Specifying input volumes..................................................................................................................... 94Selecting output volumes.................................................................................................................... 94Renaming data sets..............................................................................................................................95Expiration date handling...................................................................................................................... 97
SMS to SMS..................................................................................................................................... 97SMS to non-SMS..............................................................................................................................97Non-SMS to SMS............................................................................................................................. 98Non-SMS to non-SMS..................................................................................................................... 98
Defining RACF profiles..........................................................................................................................98Moving data sets with utilities............................................................................................................. 98Moving data sets with concurrent copy.............................................................................................100
Specifying concurrent copy for COPY requests........................................................................... 100Moving data sets with FlashCopy...................................................................................................... 101
Designating FlashCopy usage...................................................................................................... 102Moving data sets with SnapShot.................................................................................................. 104
Moving data sets with special requirements.....................................................................................105Moving undefined DSORG and empty non-VSAM data sets........................................................105Moving system data sets.............................................................................................................. 106Moving catalogs............................................................................................................................ 106Moving non-VSAM data sets that have aliases............................................................................ 106Moving multivolume data sets..................................................................................................... 107Converting VSAM and non-VSAM data sets to multivolume....................................................... 108Moving VSAM data sets................................................................................................................ 108Moving a PDSE.............................................................................................................................. 109Moving a damaged PDS................................................................................................................ 109Moving unmovable data sets........................................................................................................110Moving data sets to unlike devices.............................................................................................. 110Moving indexed sequential data sets...........................................................................................110Moving direct access data sets.................................................................................................... 111Moving GDG data sets.................................................................................................................. 111Moving SMS-managed data sets.................................................................................................. 112Moving non-SMS-managed data sets.......................................................................................... 114Moving to preallocated data sets................................................................................................. 114Moving data sets being accessed with record level sharing....................................................... 117Moving preformatted empty VSAM data sets.............................................................................. 118
VTOC considerations for moving volumes.........................................................................................118Logical volume copy operation.......................................................................................................... 118Physical volume copy operation........................................................................................................ 119Moving volumes with FlashCopy....................................................................................................... 120
Designating FlashCopy usage...................................................................................................... 120Determining why FlashCopy cannot be used...............................................................................120Freeing subsystem resources...................................................................................................... 121Choosing space efficient FlashCopy ............................................................................................121Initializing the volume with the FCWITHDRAW keyword............................................................122Backing up volumes with FlashCopy consistency group.............................................................123
Moving volumes with SnapShot.........................................................................................................124Designating SnapShot usage........................................................................................................125Determining why SnapShot cannot be used................................................................................125
Moving volumes to like devices of equal capacity............................................................................ 125Moving volumes to like devices of greater capacity..........................................................................125Moving volumes to unlike devices..................................................................................................... 126
vi
-
Moving VM-format volumes............................................................................................................... 126
Chapter 8. Converting data to and from SMS management...................................................................127Evaluating conversion to SMS management..................................................................................... 127
Data sets ineligible for conversion to SMS...................................................................................127Data sets ineligible for conversion from SMS.............................................................................. 128Volumes eligible for conversion to SMS.......................................................................................128
Conversion by data movement.......................................................................................................... 128Converting to SMS management by data movement.................................................................. 128Conversion from SMS management by data movement............................................................. 129
Conversion without data movement..................................................................................................129Simulating conversion.................................................................................................................. 129Preparing a volume for conversion...............................................................................................130
Converting to SMS management without data movement............................................................... 130SMS report.................................................................................................................................... 131
Special data set requirements for conversion to SMS...................................................................... 131VSAM sphere eligibility.................................................................................................................131Multivolume data sets.................................................................................................................. 132GDG data sets............................................................................................................................... 133Temporary data sets.....................................................................................................................133VTOC and VVDS............................................................................................................................ 133
Converting from SMS management without data movement...........................................................133Special data set requirements for conversion from SMS..................................................................133
Multivolume data sets.................................................................................................................. 133GDG data sets............................................................................................................................... 134Temporary data sets.....................................................................................................................134VTOC and VVDS............................................................................................................................ 134
Special considerations for using non-SMS-managed targets...........................................................134
Chapter 9. Managing space with DFSMSdss...........................................................................................135Reclaiming DASD space..................................................................................................................... 135
Releasing unused space in data sets........................................................................................... 135Compressing a PDS.......................................................................................................................135Deleting unwanted data sets........................................................................................................136Combining data set extents..........................................................................................................137
Consolidating free space and extents on volumes............................................................................138When to run DEFRAG and CONSOLIDATE functions................................................................... 138Designating FlashCopy usage...................................................................................................... 139Preserve Mirror FlashCopy........................................................................................................... 139Determining why FlashCopy cannot be used...............................................................................140Designating SnapShot usage........................................................................................................140Determining why SnapShot cannot be used................................................................................140Data sets excluded from DEFRAG or CONSOLIDATE processing................................................141DEFRAG options............................................................................................................................141Serialization.................................................................................................................................. 143Security considerations................................................................................................................ 145
Maximizing track utilization by reblocking data sets........................................................................ 145
Chapter 10. Diagnosing problems in DFSMSdss operations.................................................................. 147Determining the source of the failure: DFSMSdfp, DFSMSdss, or DFSMShsm................................ 147Using keywords to identify the problem............................................................................................148
Component identification keyword.............................................................................................. 148Release-level keyword................................................................................................................. 148Type-of-failure and function keywords........................................................................................149Module keyword........................................................................................................................... 153Maintenance-level keyword......................................................................................................... 155
Using the IBM Support Center...........................................................................................................155Using the software support facility.............................................................................................. 156
vii
-
Using IBMLink/ServiceLink...........................................................................................................156Info/System.................................................................................................................................. 156
Chapter 11. ACS routine information...................................................................................................... 157ACS variables available during Copy function................................................................................... 157ACS variables available during RESTORE and CONVERTV processing............................................. 158
Using SIZE and MAXSIZE variables............................................................................................. 159
Chapter 12. Dumping and restoring Linux for System z partitions and volumes...................................161Preparing to work with Linux volumes.............................................................................................. 161
Understanding the hardware environment..................................................................................161Choosing VOLSERs for Linux volumes..........................................................................................162Formatting and partitioning Linux volumes................................................................................. 162Obtaining authorization for Linux volumes.................................................................................. 163Backing up a Linux volume with partitions.................................................................................. 163
Using DFSMSdss dump and restore commands............................................................................... 164Example 1. DUMP FULL................................................................................................................ 164Example 2. DUMP FULL with CONCURRENT COPY..................................................................... 165Example 3. DUMP DATASET......................................................................................................... 165Example 4. COPY FULL................................................................................................................. 166Example 5. COPY FULL COPYVOLID ALLEXCP.............................................................................166Example 6. RESTORE FULL...........................................................................................................167Example 7. RESTORE DATASET....................................................................................................167Example 8. COPYDUMP................................................................................................................169
Submitting JCL batch jobs to a z/OS system using FTP.................................................................... 169Using DFSMSdss stand-alone services............................................................................................. 169
Chapter 13. Format of the DFSMSdss dump data set............................................................................ 171Data set and volume backup format..................................................................................................171ADRBMB data area.............................................................................................................................172
ADRBMB constants.......................................................................................................................172ADRBMB cross-reference.............................................................................................................173
ADRTAPB data area............................................................................................................................173ADRTAPB constants......................................................................................................................183ADRTAPB cross-reference............................................................................................................184
z/OS UNIX file format.........................................................................................................................191ADRTAPB version 2 data area............................................................................................................192
ADRTAPB constants......................................................................................................................193ADRTAPB cross-reference............................................................................................................193
Chapter 14. DFSMSdss patch area..........................................................................................................195Using RESET with CLONE...................................................................................................................195Sample JCL.........................................................................................................................................195Forcing the use of preallocated VSAM data sets (PN04574)............................................................196Ignoring VSAM duplicate key errors (PN05529)............................................................................... 196Modifying the timeout period for enqueue lockout detection (PL84514)........................................197Controlling the wait/retry time for serialization of system resources (PN11523)........................... 197Using CONVERTV on data sets with a revoked user ID in the RESOWNER field (OY59957)........... 198Restoring inconsistent PDSE data sets (OY60301)...........................................................................198Changing default protection status during RESTORE (PN37489).................................................... 199Overwriting existing objects during logical data set DUMP to an object store cloud.......................199Restoring or copying undefined, multivolume SMS-managed data sets (OY63818).......................200Bypassing backup-while-open processing (OY63531).................................................................... 200Bypassing storage and management class authorization checking during RESTORE (OY65348).. 200Issuing notification for tape and migrated data sets (OY66092)..................................................... 201Using RESET with concurrent copy (OY65555).................................................................................201Forcing RESTORE after message ADR482E (OY67532)................................................................... 202
viii
-
Restoring VSAM KSDS or VRRDS after messages ADR789W, ADR364W, and ADR417W(OY67942).....................................................................................................................................202
Restoring VSAM data sets with expiration date of 1999365 (OW00780)........................................203Restoring VSAM data sets with expiration dates beyond 2000 (OW00780)................................... 203Changing default insertion of EOF track during COPY with ALLDATA specified (OW15003)...........204Using RESET or UNCATALOG in a logical data set dump (PN60114)............................................... 204Changing secondary allocation quantity in format 1 DSCB for PDSE data sets (OW07755)...........204Changing reference date default settings during data set COPY and RESTORE processing
(OW12011)....................................................................................................................................206Changing default protection processing during COPY (OW10314)..................................................206Bypassing management and storage class access checks during COPY (PN72592)...................... 206Changing default handling of invalid tracks created during data set COPY and RESTORE
processing (OW08174).................................................................................................................207Forcing RESTORE to the same volumes as the source VSAM data set (OW07077)........................ 207Modifying number of volumes allocated for SMS data sets during logical RESTORE and COPY
(OW15880)....................................................................................................................................208Dumping a keyed VSAM data set that has data CAs without corresponding index CIs
(OW17877)....................................................................................................................................209Changing the default DEFRAG processing of checkpointed data sets (OW20285)......................... 209Setting the percentage to overallocate target data set space (OW27837)......................................210Bypassing RLS processing (OW32817)............................................................................................. 210Changing creation date default settings during data set COPY and RESTORE (OW19618)............ 211Copying and dumping a PDSE data set using the VALIDATE PDSE option (OW48074)...................212Changing the default maximum number of active parallel subtasks............................................... 212Changing the default initialization processing during DUMP with FCWITHDRAW (OA18929)........212Changing the default DEFRAG processing of LINKLIST-indicated data sets (OW43874)............... 213Changing the FASTREPLICATION default setting during Copy and Defrag (OA11637)...................214Tuning hardware assisted compression (OA13300).........................................................................214Resetting the data-set-changed indicator during physical full or partial RESTORE operation
(OA20907).....................................................................................................................................215Requesting that DFSMSdss double-check data set high used RBA values for LDS data sets
(OA23805).....................................................................................................................................215Enabling or disabling use of the catalog search interface for data set name filtering..................... 216Requesting that DFSMSdss restore the VM-formatted volume that was DUMPed by z/OS
V1R10 before OA27531 was applied...........................................................................................216Adding timestamps to messages.......................................................................................................217Enabling building appropriate channel programs............................................................................. 217Requesting that DFSMSdss attempt to fix ESDSes with corrupted RDFs.........................................217ADRPTCHB data area......................................................................................................................... 218
ADRPTCHB cross-reference......................................................................................................... 220Overriding the EATTR attribute during logical COPY.........................................................................222Restore an extended-format data set that was dumped with the ZCOMPRESS keyword when
zEDC services were not used........................................................................................................223
Part 2. DFSMSdss Storage Administration Reference.......................................... 225
Chapter 15. Specifying DFSMSdss commands.......................................................................................227Command syntax................................................................................................................................227How many subkeywords are allowed?.............................................................................................. 228Specifying subkeywords in a command data set.............................................................................. 228How to read syntax diagrams............................................................................................................ 228JCL that you need...............................................................................................................................230
How to control DFSMSdss through PARM information in the EXEC statement.......................... 231Examples of invoking DFSMSdss with JCL...................................................................................234
Chapter 16. DFSMSdss filtering—choosing the data sets you want processed.....................................237How DFSMSdss filters data sets........................................................................................................ 237
ix
-
Virtual storage access method (VSAM) data set considerations................................................ 237Filtering by data set names................................................................................................................238
Using an asterisk in partially qualified data set names............................................................... 238Using a percent sign in partially qualified data set names..........................................................238Examples of fully and partially qualified data set names............................................................238Relative generation filtering......................................................................................................... 239
Filtering by data set characteristics.................................................................................................. 240Some examples of the BY keywords............................................................................................245
Standard catalog search order.......................................................................................................... 245Broken data set considerations................................................................................................... 245
Chapter 17. DFSMSdss filtering—choosing the z/OS UNIX files you want processed...........................247Path name considerations................................................................................................................. 247UNIX wildcard characters.................................................................................................................. 248
Chapter 18. Syntax—DFSMSdss function commands............................................................................ 249What DFSMSdss commands do......................................................................................................... 249
Building the stand-alone IPL-able core image............................................................................ 249Using DUMP and RESTORE for backup and recovery.................................................................. 249Moving data with COPY.................................................................................................................249Converting to and from Storage Management Subsystem (SMS) with CONVERTV.................... 250Managing space with COMPRESS, CONSOLIDATE, DEFRAG, and RELEASE...............................250Using COPY for partitioned data set (PDS) and partitioned data set extended (PDSE)
conversions..............................................................................................................................250Copying DFSMSdss-produced dump data with COPYDUMP....................................................... 250Printing for diagnostic purposes with PRINT...............................................................................250Managing extent space efficient volume space with SPACEREL.................................................251
BUILDSA command for DFSMSdss....................................................................................................251BUILDSA syntax............................................................................................................................252Explanation of BUILDSA command keywords.............................................................................252BUILDSA command examples..................................................................................................... 254
CGCREATED command for DFSMSdss...............................................................................................256CGCREATED syntax.......................................................................................................................256Explanation of CGCREATED command keywords........................................................................256
COMPRESS command for DFSMSdss................................................................................................ 257COMPRESS syntax........................................................................................................................ 258Explanation of COMPRESS command keywords......................................................................... 258Example of compress operations.................................................................................................261
CONSOLIDATE command for DFSMSdss...........................................................................................262CONSOLIDATE command syntax................................................................................................. 262Explanation of CONSOLIDATE command keywords....................................................................264Example of a CONSOLIDATE operation....................................................................................... 272
CONVERTV command for DFSMSdss.................................................................................................272CONVERTV command syntax....................................................................................................... 272Explanation of CONVERTV command keywords..........................................................................273Examples of CONVERTV operations.............................................................................................276
COPY Command for DFSMSdss......................................................................................................... 276Special Considerations for COPY................................................................................................. 277COPY DATASET Command Syntax for Logical Data Set...............................................................278COPY DATASET Command Syntax for Physical Data Set.............................................................280COPY FULL and COPY TRACKS Syntax.........................................................................................282Explanation of COPY Command Keywords.................................................................................. 285Data Integrity Considerations for Full or Tracks Copy Operation................................................329Examples of Full and Tracks Copy Operations.............................................................................329Examples of Data Set Copy Operations....................................................................................... 330ALLDATA and ALLEXCP Interactions............................................................................................ 334
COPYDUMP command for DFSMSdss................................................................................................337COPYDUMP syntax........................................................................................................................338
x
-
Explanation of COPYDUMP command keywords.........................................................................338Examples of COPYDUMP operations............................................................................................338
DEFRAG command for DFSMSdss..................................................................................................... 339DEFRAG syntax............................................................................................................................. 341Explanation of DEFRAG command keywords.............................................................................. 341Examples of DEFRAG operations................................................................................................. 351Results of a successful DEFRAG operation..................................................................................352
DUMP command for DFSMSdss.........................................................................................................354Special considerations for dump..................................................................................................355DUMP FULL and DUMP TRACKS syntax....................................................................................... 355DUMP DATASET syntax for logical data set..................................................................................358DUMP DATASET syntax for physical data set...............................................................................360DUMP PATH syntax....................................................................................................................... 362Explanation of DUMP command keywords..................................................................................362Data integrity considerations for full or tracks dump operation................................................. 389Format of the output data set...................................................................................................... 389Examples of full and tracks dump operations............................................................................. 390Examples of physical data set dump operations.........................................................................390Examples of logical data set dump operations............................................................................392Examples of file dump operation................................................................................................. 395
PRINT command for DFSMSdss........................................................................................................ 395PRINT syntax................................................................................................................................ 396Explanation of PRINT command keywords................................................................................. 397Examples of print operations....................................................................................................... 402
RELEASE command for DFSMSdss....................................................................................................403RELEASE syntax for physical processing..................................................................................... 404RELEASE syntax for logical processing........................................................................................ 404Explanation of RELEASE command keywords............................................................................. 406Example of a release operation....................................................................................................413
RESTORE command for DFSMSdss................................................................................................... 413Special considerations for RESTORE........................................................................................... 414Data integrity considerations for full or tracks restore operations............................................. 415RESTORE FULL and RESTORE TRACKS command syntax...........................................................415RESTORE DATASET command syntax for logical data set...........................................................416RESTORE DATASET command syntax for physical data set........................................................419RESTORE PATH command syntax................................................................................................ 421Explanation of RESTORE command keywords............................................................................ 421DFSMSdss RESTORE process.......................................................................................................451Examples of full and tracks restore operations........................................................................... 456Examples of physical data set restore operations.......................................................................457Examples of logical data set restore operations......................................................................... 459
SPACEREL command for DFSMSdss..................................................................................................461SPACEREL syntax..........................................................................................................................462Explanation of SPACEREL command keywords...........................................................................462
Chapter 19. Syntax—auxiliary commands.............................................................................................. 465Writing to the operator for DFSMSdss............................................................................................... 465
WTO command............................................................................................................................. 465WTOR command for DFSMSdss................................................................................................... 465
Scheduling tasks................................................................................................................................ 466SERIAL command for DFSMSdss................................................................................................. 466PARALLEL command for DFSMSdss.............................................................................................466
Controlling task processing............................................................................................................... 466SET command—setting condition codes and patch bytes...........................................................467IF-THEN-ELSE command sequence for DFSMSdss—using condition codes.............................. 468EOJ command—ending your DFSMSdss step.............................................................................. 472
Chapter 20. DFSMSdss stand-alone services ........................................................................................ 473
xi
-
Preparing to run the stand-alone services program......................................................................... 473Running stand-alone services......................................................................................................473Running stand-alone services with a predefined console...........................................................474Using a tape library.......................................................................................................................474Using an automatic cartridge loader............................................................................................476Controlling command sequence processing................................................................................476
IPLing and running the Stand-Alone Services Program....................................................................477IPLing Stand-Alone Services........................................................................................................ 478RESTORE—restoring a formatted dump tape.............................................................................. 481TAPECNTL—rewinding and unloading a tape...............................................................................485
Building the IPL-able core image.......................................................................................................486BUILDSA function......................................................................................................................... 486Understanding BUILDSA command authorization levels............................................................487
Chapter 21. Data security and authorization checking.......................................................................... 489Effects of SPECIAL, OPERATIONS, and DASDVOL............................................................................ 489
SPECIAL........................................................................................................................................ 489OPERATIONS................................................................................................................................ 490DASDVOL.......................................................................................................................................490
General data security information.....................................................................................................491Protecting resources and data sets............................................................................................. 491Protecting the usage of DFSMSdss.............................................................................................. 491Password protection.....................................................................................................................492Protected user and group data sets.............................................................................................493Generic and discrete profile considerations................................................................................493Security-level, category, and label checking............................................................................... 494Protect-all and always-call...........................................................................................................495Standard naming conventions......................................................................................................495DFSMSdss temporary data set names......................................................................................... 495Discretely protected multivolume data set................................................................................. 497Erase-on-scratch.......................................................................................................................... 497SMS-managed data set protection.............................................................................................. 497Logging..........................................................................................................................................498
DFSMSdss storage administrator...................................................................................................... 498ADMINISTRATOR keyword...........................................................................................................498FACILITY class profiles for the ADMINISTRATOR keyword........................................................ 499
DFSMSdss access authority...............................................................................................................500Volume access and DASDVOL...................................................................................................... 500Data set access authorization levels............................................................................................503Protected catalogs........................................................................................................................503Non-SMS versus SMS authorization.............................................................................................503System operator authorization, special data set types............................................................... 504
Access authorization for DFSMSdss commands............................................................................... 504CGCREATED.................................................................................................................................. 505COMPRESS....................................................................................................................................505CONSOLIDATE.............................................................................................................................. 505CONVERTV.................................................................................................................................... 505COPY............................................................................................................................................. 505COPYDUMP................................................................................................................................... 510DEFRAG.........................................................................................................................................510DUMP............................................................................................................................................ 510PRINT............................................................................................................................................511RELEASE....................................................................................................................................... 511RESTORE.......................................................................................................................................511
Chapter 22. Data integrity—serialization................................................................................................ 517Volume serialization...........................................................................................................................518
Avoiding lockout........................................................................................................................... 519
xii
-
The WAIT option........................................................................................................................... 519Data set serialization..........................................................................................................................519
Enqueuing—ENQ...........................................................................................................................519Dumping HFS data sets................................................................................................................ 520zFS data sets.................................................................................................................................521Dynamic allocation (DYNALLOC).................................................................................................. 522Enqueuing versus dynamic allocation of data sets..................................................................... 522Read/Write serialization scheme................................................................................................. 522WAIT option.................................................................................................................................. 525An example of RESERVE-ENQUEUE processing..........................................................................526
Backup-while-open data sets (CICS and DFSMStvs)........................................................................526Backup-while-open status definition...........................................................................................528Backup-while-open processing................................................................................................... 528Backup-while-open and concurrent copy................................................................................... 529TOLERATE (ENQFAILURE) and SHARE considerations............................................................... 530CICS recovery data....................................................................................................................... 530
Backup-while-open data sets (IMS)..................................................................................................530Object serialization............................................................................................................................ 531
Chapter 23. Application programming interface.................................................................................... 533Calling block structure....................................................................................................................... 533User interactions................................................................................................................................ 535
Service considerations................................................................................................................. 536Cross-memory Application Interface overview...........................................................................536Using the cross memory application interface to control DFSMSdss......................................... 537
System programming information.....................................................................................................539Application interface blocks.........................................................................................................539Exit identification block................................................................................................................ 539Application programming interface restrictions..........................................................................542Cross-memory application interface restrictions........................................................................ 543
User interaction module exit option descriptions.............................................................................544Function startup (Eioption 00)..................................................................................................... 544Reading SYSIN record (Eioption 01)............................................................................................ 544Printing SYSPRINT record (Eioption 02)...................................................................................... 545Reading physical tape record (Eioption 03).................................................................................545Reading logical tape record (Eioption 04)....................................................................................546Writing logical tape record (Eioption 05)..................................................................................... 546Writing physical tape record (Eioption 06).................................................................................. 546Reading disk track (Eioption 07).................................................................................................. 547Writing disk track (Eioption 08)....................................................................................................547Reading utility SYSPRINT (Eioption 09).......................................................................................547Writing SYSPRINT record (Eioption 10)....................................................................................... 547Writing WTO message (Eioption 11)............................................................................................ 548Writing WTOR message (Eioption 12)..........................................................................................548Presenting ADRUFO record (Eioption 13).................................................................................... 548Function ending (Eioption 14)...................................................................................................... 549Presenting WTOR response (Eioption 15)................................................................................... 549OPEN/EOV tape volume security and verification exit (Eioption 16).......................................... 549OPEN/EOV nonspecific tape volume mount (Eioption 17)..........................................................549Insert logical VSAM record during restore (Eioption 18).............................................................550Output tape I/O error (Eioption 19)............................................................................................. 550Volume notification (Eioption 20)................................................................................................ 550Data set verification (Eioption 21)................................................................................................551Bypass verification exit (Eioption 22).......................................................................................... 551Data set processed notification exit (Eioption 23)...................................................................... 554Concurrent copy initialization complete (Eioption 24)................................................................ 556Backspace physical tape record (Eioption 25)............................................................................ 557Dump volume output notification (Eioption 26).......................................................................... 557
xiii
-
Physical data set processed notification exit (Eioption 27)........................................................ 558Target data set allocation notification exit (Eioption 28)............................................................ 559Physical data set volume allocation notification exit (Eioption 30)............................................ 559Store application metadata object (Eioption 31).........................................................................560Retrieve application metadata object (Eioption 32)....................................................................560Output object notification exit (Eioption 33)............................................................................... 560z/OS UNIX file path notification (Eioption 41)............................................................................. 561z/OS UNIX file path bypass notification (Eioption 42).................................................................561z/OS UNIX file path processed notification (Eioption 43)........................................................... 562z/OS UNIX file path clone initialization notification (Eioption 44).............................................. 562
Avoiding lockout.................................................................................................................................562Application interface summary..........................................................................................................563ADREID0 data area............................................................................................................................ 564
Constants for ADREID0................................................................................................................ 573Cross reference for ADREID0.......................................................................................................574
Example: invoking DFSMSdss by using an application program...................................................... 578How to determine DFSMSdss version, release, and modification level......................................579
Chapter 24. Examples of the application program with the user interaction module (UIM)................ 581
Chapter 25. Data set attributes...............................................................................................................587
Chapter 26. z/OS UNIX file attributes..................................................................................................... 591
Appendix A. Coexistence Considerations............................................................593Restoring backups using DFSMSdss....................................................................................................... 593
Appendix B. Accessibility...................................................................................595Accessibility features.............................................................................................................................. 595Consult assistive technologies................................................................................................................ 595Keyboard navigation of the user interface.............................................................................................. 595Dotted decimal syntax diagrams.............................................................................................................595
Notices..............................................................................................................599Terms and conditions for product documentation................................................................................. 600IBM Online Privacy Statement................................................................................................................ 601Policy for unsupported hardware............................................................................................................601Minimum supported hardware................................................................................................................602Programming interface information........................................................................................................602Trademarks.............................................................................................................................................. 602
Glossary............................................................................................................ 603
Index................................................................................................................ 621
xiv
-
Figures
1. Output from a Dump of an Integrated Catalog Facility User Catalog........................................................ 46
2. Output from Restore of Integrated Catalog Facility User Catalog............................................................. 75
3. SMS Report................................................................................................................................................131
4. Sample JCL for dumping the contents of a volume................................................................................. 164
5. Sample JCL for dumping two or more output tapes at the same time....................................................165
6. Sample JCL for DUMP FULL with CONCURRENT COPY............................................................................165
7. Sample JCL for DUMP DATASET................................................................................................................166
8. Sample JCL for dumping all of the Linux partitions................................................................................. 166
9. Sample JCL for making a full volume copy of a volume...........................................................................166
10. Sample JCL for creating a backup copy of a Linux volume....................................................................167
11. Sample JCL for restoring a full volume from a DFSMSdss dump.......................................................... 167
12. Sample JCL for restoring individual partitions or data sets...................................................................168
13. Sample JCL for renaming data sets to be restored................................................................................168
14. Sample JCL for restoring only one partition of a volume.......................................................................169
15. Sample JCL for copying Linux volume dumps........................................................................................169
19. Printed Output Resulting from a Successful DEFRAG Run on nonEAV:................................................ 353
20. A Section of the Printed Output Resulting from a Successful DEFRAG Run on EAV:............................353
21. Output Resulting from a PRINT Command............................................................................................ 403
22. Restore Actions on Non-VSAM Data Sets...............................................................................................453
23. DFSMSdss Target Class Selection.......................................................................................................... 455
24. Stand-Alone Services Restore Process Overview..................................................................................477
25. DFSMSdss Data Security Decisions........................................................................................................501
26. Block Diagram for Backup-While-Open Serialization............................................................................527
xv
-
27. DFSMSdss Application Interface Structure........................................................................................... 535
28. DFSMSdss Exit Interface Structure........................................................................................................539
29. The Application Program Process.......................................................................................................... 581
30. Application Interface Program Example................................................................................................ 582
31. Application Interface Program Example (continued)............................................................................ 582
32. Application Interface Program Example (continued)............................................................................ 582
33. User Interaction Module Example..........................................................................................................584
34. User Interaction Module Example (continued)......................................................................................584
35. User Interaction Module Example (continued)......................................................................................584
36. User Interaction Module Example (continued)......................................................................................584
37. User Interaction Module Example (continued)......................................................................................584
38. User Interaction Module Example (continued)......................................................................................584
39. User Interaction Module Example (continued)......................................................................................584
40. User Interaction Module Example (continued)......................................................................................584
41. User Interaction Module Example (continued)......................................................................................584
42. User Interaction Module Example (continued)......................................................................................584
43. User Interaction Module Example (continued)......................................................................................584
44. Output Resulting from Use of the UIM Exits.......................................................................................... 585
45. Output Resulting from Use of the UIM Exits (continued)...................................................................... 585
xvi
-
Tables
1. Minimum Storage Requirements for DFSMSdss Operations with I/O Buffers below 16-MegabyteVirtual.......................................................................................................................