CEMT INQUIRE commands

Most CEMT requests either inquire about (INQUIRE), or change (SET) the status of one or more named instances of a resource (such as a terminal), a particular subgroup of resources (such as a class of terminals), or all resources of a particular type (such as all terminals).

The INQUIRE command causes the status of the specified resources to be displayed. The SET command makes the changes that you specify, and displays the new status of the resources. No changes are made if there are syntax errors in the SET command.

If, for example, you want to inquire about a resource, enter INQUIRE (or a suitable abbreviation) on the command line. The keywords you can use with CEMT INQUIRE are described in the rest of this section.

If you want to perform those functions that are not concerned with resource status, enter PERFORM (or a suitable abbreviation) on the command line. The keywords you can use with PERFORM are described in CEMT PERFORM commands.

And finally, if you want to change the attributes of a resource, enter SET (or a suitable abbreviation) on the command line. The keywords you can use with SET are described in CEMT SET commands.

If you enter INQUIRE, you get the following display:

Figure 62. Sample of the screen following the INQUIRE command
  INQ                                                              <*Command Line

  STATUS:  ENTER ONE OF THE FOLLOWING OR HIT ENTER FOR DEFAULT     <*Status Line

                                                                   <**Resources
 AUTInstmodel DSName       JVM          TAsk          WEBService                
 AUTOinstall  DUmpds       JVMPool      TCLass       WOrkrequest                
 AUXtrace     ENQ          Line         TCPIP                                   
 BEan         ENQModel     MODename     TCPIPService                            
 BRfacility   EXci         MONitor      TDqueue                                 
 CFdtpool     FEConnection Netname      TErminal                                
 CLasscache   FENode       PArtner      TRAnsaction                             
 CONnection   FEPOol       PIpeline     TRDumpcode                              
 CORbaserver  FEPRopset    PROCesstype  TSModel                                 
 DB2Conn      FETarget     PROFile      TSPool                                  
 DB2Entry     FIle         PROGram      TSQueue                                 
 DB2Tran      Gtftrace     REquestmodel UOW                                     
 DEletshipped Start of changeHostEnd of change         RRms         UOWDsnfail                              
 DIspatcher   INttrace     STAtistics   UOWLink                                 
 DJar         IRc          STReamname   Start of changeURimapEnd of change                                  
 DOctemplate  JModel       SYDumpcode   Vtam                                    
 DSAs         JOurnalname  SYStem       WEb          
                                                     SYSID=CICS APPLID=CICSHTC1
 PF 1 HELP       3 END      5 VAR                     9 MSG        <*PF keys

You can inquire about any of the displayed options by typing its keyword after INQUIRE on the command line. For example,

INQUIRE PROGRAM

gives you the status of all programs, and for each program gives its attributes. Full details are given in CEMT INQUIRE PROGRAM.

CEMT INQUIRE AUTINSTMODEL

Function

Find out whether a named autoinstall model is present.

Description

The INQUIRE AUTINSTMODEL command returns the names of all the autoinstall models installed in your system. There is no CEMT SET AUTINSTMODEL function, but the INQUIRE AUTINSTMODEL screens allow you to use the DISCARD function.

For information about autoinstall models, see the CICS® Resource Definition Guide.

Input

Press the Clear key and type CEMT INQUIRE AUTINSTMODEL (the minimum abbreviation is CEMT I AUTI).

You will get a display screen, a sample of which is shown below.

If you do not type the name of a specific autoinstall model (the name can be up to 8 characters long--for example, cemt i auti(dfhlu0e2)), the names of all the autoinstall models will be displayed.

Sample screen

Figure 63. CEMT INQUIRE AUTINSTMODEL screen
  IN AUTIN
  STATUS:  RESULTS
   Auti(DFHLU0E2)
   Auti(DFHLU0M2)
   Auti(DFHLU0M3)
   Auti(DFHLU0M4)
   Auti(DFHLU0M5)
   Auti(DFHLU2  )
   Auti(DFHLU2E2)
   Auti(DFHLU2E3)
   Auti(DFHLU2E4)
   Auti(DFHLU2M2)
   Auti(DFHLU2M3)
   Auti(DFHLU2M4)
   Auti(DFHLU2M5)
   Auti(DFHLU3  )
   Auti(DFHLU62T)
   Auti(DFHSCSP )
   Auti(DFH3270 )
 + Auti(DFH3270P)
 
Note:
The ‘+’ symbol in the left margin by the last item on the screen indicates that further model names are displayed when the PF8 key is pressed.
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE AUTOINSMODEL
 
>>-CEMT Inquire AUTInstmodel--+-----+--------------------------><
                              '-All-'
 

Displayed fields

All
Automatic switching occurs as necessary until the end of this CICS session without the need for operator intervention.

CEMT INQUIRE AUTOINSTALL

Function

Retrieve information about autoinstall values.

Description

The INQUIRE AUTOINSTALL command displays information and parameters that control the automatic installation (autoinstall) of VTAM terminals, APPC connections, virtual terminals including bridge facilities used by the 3270 bridge mechanism,and MVS consoles.

For background information about autoinstall, see CICS Resource Definition Guide.

Input

Press the Clear key and type CEMT INQUIRE AUTOINSTALL (the minimum abbreviation is CEMT I AUTO).

You will see a display screen, a sample of which is shown below. If you want to change any of the values shown, you can tab to the highlighted fields and overtype them as required.

Sample screen

Figure 64. CEMT INQUIRE AUTOINSTALL screen
  INQ AUTOINSTALL
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Auto Max( 100 ) Pro( DFHZATDX ) Cur(000) Pro Ena

 

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 65.

Figure 65. The expanded display of an individual entry
 IN AUTOIN
 RESULT - OVERTYPE TO MODIFY
   Autoinstall
   Maxreqs( 100 )
   Program( DFHZATDX )
   Curreqs( 000 )
   Consoles( Fullauto )
   Enablestatus( Enabled )
   Aibridge( Autotermid )
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE AUTOINSTALL
 
>>-CEMT Inquire AUTOinstall------------------------------------><
 

Displayed fields

Aibridge
indicates whether the autoinstall user replaceable module (URM) is called for bridge facilities. The values are:
AUTOTERMID
Bridge facilities are defined automatically by CICS. The autoinstall URM is not called.
URMTERMID
The autoinstall URM is called.
Autoinstall
identifies this panel as relating to terminal autoinstall.
Consoles(value)
displays the status of autoinstall for MVS consoles in the CICS region. The values are:
Fullauto
Autoinstall for consoles is active without any support from the autoinstall control program. CICS generates the required terminal ID automatically without calling the control program, and sets the default delete-delay period (60 minutes) for the console entry.
Progauto
Autoinstall for consoles is active, with the support of the autoinstall control program (specified on the AIEXIT system initialization parameter). The autoinstall control program is required to provide the terminal ID and, optionally, a delete-delay period.
Noauto
Autoinstall for consoles is not active.
Note:
You can change this attribute by overtyping it with a different value.
Curreqs(value)
displays the number of autoinstall requests that are currently being processed. (This is not the number of terminals currently installed using autoinstall.)
Enablesatus(value)
displays the overall status of the terminal autoinstall facility, indicating whether CICS is enabled to install VTAM terminals and MVS consoles. The values displayed are:
Enabled
CICS can currently install consoles, or terminals, or both. To determine which of these the facility is enabled for, check the values returned on the MAXREQS and CONSOLES options. Enabled is returned for the following conditions:
Terminals
MAXREQS not equal 0 and autoinstall control program is enabled.
Consoles
  1. CONSOLES displays FULLAUTO.
  2. CONSOLES displays PROGAUTO and the autoinstall control program is enabled.
Disabled
Neither consoles nor terminals can be autoinstalled in CICS. DISABLED is returned for the following conditions:
Terminals
MAXREQS equal 0, or autoinstall control program is disabled.
Consoles
  1. CONSOLES displays NOAUTO.
  2. CONSOLES displays PROGAUTO but the autoinstall control program is disabled.
Maximum(value)
displays the largest number of autoinstall requests that are allowed to queue at any one time. (This is not the largest number of terminals that can be installed using autoinstall.)
Note:
You can reset this value by overtyping it with a different value.
Program(value)
displays the name of the program that controls the autoinstall process. This is either the CICS-supplied default autoinstall program, DFHZATDX, or a user-written program.
Note:
You can reset this value by overtyping it with a different value.

CEMT INQUIRE AUXTRACE

Function

Retrieve information about the status of auxiliary trace.

Description

Auxiliary trace entries are made to a pair of CICS-controlled BSAM data sets, ‘A’ and ‘B’.

INQUIRE AUXTRACE tells you:

You can start, stop, or pause tracing, and specify that automatic switching of the auxiliary data set is to occur when needed. You can use the SWITCH option to change the data set.

Instead of using the SET command, you can overtype your changes on the INQUIRE screen after tabbing to the appropriate field (see Overtyping a display).

For information on using auxiliary tracing, see the CICS Problem Determination Guide. See also the description of the CETR transaction, CETR--trace control.

Input

Press the Clear key and type CEMT INQUIRE AUXTRACE (the minimum abbreviation is CEMT I AUX).

You will get a display screen, a sample of which is shown below. If you want to change any of the values shown, you can then tab to the highlighted or blank fields and overtype them as required.

Sample screen

Figure 66. CEMT INQUIRE AUXTRACE screen
  I AUX
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Aux Cur(A) Sto

Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 67.

Figure 67. The expanded display of an individual entry
 I AUX
 RESULT - OVERTYPE TO MODIFY
   Auxtrace
   Curauxds(A)
   Status( Stop )
   Switchstatus( Noswitch )
   Switchaction(              )
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE AUXTRACE
 
>>-CEMT Inquire AUXtrace---------------------------------------><
 

Displayed fields

Auxiliary
identifies this panel as relating to auxiliary trace.
Curauxds(value)
displays a 1-character identifier of the current auxiliary data set, which can be ‘A’ or ‘B’. This value is blank if there is no auxiliary trace data set.
Status(value)
displays the status of auxiliary tracing in your CICS system. The values are:
Start
Auxiliary tracing is in progress (the auxiliary trace data set is open).
Pause
Auxiliary tracing has stopped, but the trace data set has been left open. A subsequent START request causes trace entries to be written immediately following those that were written before the PAUSE request.
Stop
Auxiliary tracing has stopped, and the trace data set is closed.
Note:
You can reset this value by overtyping it with a different value.
Switchaction(value) (input only field)
specifies that the trace data set is to be switched. The value is:
Switch
Makes an immediate switch from the current auxiliary trace data set to the alternate trace data set.
Switchstatus(value)
displays whether automatic data set switching is to occur when the current auxiliary trace data set becomes full. The values are:
Noswitch
Switching does not occur without operator intervention.
NExt
Automatic switching occurs when the current trace data set is full, but not subsequently.
ALl
Automatic switching occurs as necessary until the end of this CICS session without the need for operator intervention.
Note:
You can reset this value by overtyping it with a different value.

CEMT INQUIRE BEAN

Function

Retrieve information about an installed enterprise bean.

Description

INQUIRE BEAN returns information about any currently installed enterprise bean.

Input

Press the Clear key and type CEMT INQUIRE BEAN (the minimum abbreviation is CEMT I B). You get a display that lists the names and status of any installed enterprise bean. Note that you cannot change any of the displayed information.

Sample screen

Figure 68. CEMT INQUIRE BEAN screen
INQ BEAN
STATUS:  RESULTS
 Bean(Managed                   ) Corba(CORA) Djar(IJAR                            )
 Bean(Mandatory                 ) Corba(CORB) Djar(BJAR                            )
 Bean(MasterTs                  ) Corba(CORA) Djar(IJAR                            )
 Bean(Never                     ) Corba(CORB) Djar(BJAR                            )
 Bean(NotSupported              ) Corba(CORA) Djar(IJAR                            )
 Bean(Required                  ) Corba(CORB) Djar(BJAR                            )
 Bean(RequiresNew               ) Corba(CORA) Djar(IJAR                            )
 Bean(Supports                  ) Corba(CORB) Djar(BJAR                            )






  SYSID=QT20 APPLID=IYCQST20
RESPONSE: NORMAL                             TIME:  11.09.09  DATE: 19.01.01
  PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format.

Figure 69. The expanded display of an individual entry
i bean
RESULT
  Bean(Managed)
  Corbaserver(CORA)
  Djar(IJAR                            )




SYSID=QT20 APPLID=IYCQST20
TIME:  11.10.42  DATE: 19.01.01
  PF 1 HELP 2 HEX 3 END       5 VAR        7 SBH 8 SFH       10 SB 11 SF

If you inquire against a specific bean and press ENTER, CICS displays an expanded format.

Figure 70. The expanded display of a specific entry
inq bean(Managed) corba(CORA)
STATUS:  RESULTS
 Bean(Managed                   ) Corba(CORA)
 Djar(IJAR                            )




SYSID=QT20 APPLID=IYCQST20
TIME:  11.10.42  DATE: 19.01.01
  PF 1 HELP 2 HEX 3 END       5 VAR        7 SBH 8 SFH       10 SB 11 SF
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE BEAN
 
                      .-All-----.
>>-CEMT Inquire BEAN--+---------+--+--------------------+------->
                      '-(value)-'  '-Corbaserver(value)-'
 
>--+-------------+---------------------------------------------><
   '-Djar(value)-'
 

Displayed fields

All
is the default.
(value)
is a 1-240 character bean name.
Corbaserver (value)
displays a 4-character CorbaServer name.
Djar (value)
displays a 1-32 character deployed JAR file name.

CEMT INQUIRE BRFACILITY

Function

Retrieve information about a virtual terminal (bridge facility) used by the 3270 bridge mechanism.

Description

INQUIRE BRFACILITY returns information about a bridge facility. This is a virtual terminal used by the 3270 bridge mechanism to simulate a real 3270 when running a CICS 3270 application in a bridged environment..

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

Sample screen

Figure 72. CEMT INQUIRE BRFACILITY screen
   I BR                                                                          
  STATUS:  RESULTS - OVERTYPE TO MODIFY                                         
   Brf(0008000100000016) Net(AAA.    ) Ter(AAA.) Tra(NACT)                      
      Tas(0005730) Use(JANEDJ  ) Kee(97105) Acq                                 
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                      SYSID=ST50 APPLID=IYCSST50
   RESPONSE: NORMAL                             TIME:  11.13.29  DATE: 08.05.01 
 PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF         

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown:

Figure 73. The expanded display of an individual bridge facility entry
  I BR                                                                          
  RESULT - OVERTYPE TO MODIFY                                                   
    Brfacility(0008000100000016)                                                
    Netname(AAA.)                                                               
    Termid(AAA.)                                                                
    Transaction(NACT)                                                           
    Taskid(0005730)                                                             
    Userid(JANEDJ)                                                              
    Keeptime(96908)                                                             
    Termstatus( Acquired )                                                      
    Linksystem()                                                                
    Linksysnet()                                                                
    Remotesystem(CTGC)                                                          
    Remotesysnet( DFHGEN)                                                       
    Namespace(Shared)                                                           
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                      SYSID=ST50 APPLID=IYCSST50
                                                TIME:  11.16.46  DATE: 08.05.01 
 PF 1 HELP 2 HEX 3 END       5 VAR        7 SBH 8 SFH       10 SB 11 SF                                                                       
  
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE BRFACILITY
 
                            .-ALl-----.
>>-CEMT Inquire BRfacility--+---------+--+-----------------+---->
                            '-(value)-'  '-Keeptime(value)-'
 
>--+-------------------+--+-------------------+--+--------+----->
   '-LINKSYSNet(value)-'  '-LINKSYSTem(value)-'  +-LOcal--+
                                                 '-Shared-'
 
>--+----------------+--+---------------------+------------------>
   '-Netname(value)-'  '-REMOTESYSNet(value)-'
 
>--+---------------------+--+---------------+------------------->
   '-REMOTESYSTem(value)-'  '-TAskid(value)-'
 
>--+---------------+--+-----------+--+--------------------+----->
   '-TErmId(value)-'  +-ACquired--+  '-TRansaction(value)-'
                      +-AVailable-+
                      '-RELeased--'
 
>--+---------------+-------------------------------------------><
   '-Userid(value)-'
 

Displayed fields

(value)
is the 8-byte bridge facility token of a specific bridge facility to be displayed.
All
is the default. All bridge facilities are displayed.
Keeptime (value)
displays a full word binary field showing the length of time (in seconds) that the bridge facility is kept if inactive.
    Start of change
  • If the bridge facility being displayed is a Link-Bridge, this value is:
    • the keeptime specified when the facility was allocated,
    • or a default value of 5 minutes if no keeptime was specified,
    if the keeptime, so determined, is larger than the value of SIT parameter BRMAXKEEPTIME, it is reduced to BRMAXKEEPTIME.
  • If the facility being displayed is a Web-Bridge, the keeptime is initially set to be the Webdelay terminal keep time (the second part of the WEBDELAY SIT parm).
  • End of change
Linksysnet(value)
displays the 8-byte applid of the AOR if the Link3270 bridge request is routed to another region. If the request is processed in the same region as the Link3270 router, then this field is blank. This field may change if dynamic transaction routing makes more than one attempt at running the first transaction in a Link3270 session. This field is only set in the router region.
Linksystem(value)
returns the 4-byte sysid of the AOR if the Link3270 bridge request is routed to another region. If the request is processed in the same region as the Link3270 router, then this field is blank. This field may change if dynamic transaction routing makes more than one attempt at running the first transaction in a Link3270 session. This field is only set in the router region.
Namespace
displays the scope of the namespace used to allocate bridge facility names. Values are:
LOCAL
The bridge facility was allocated by the START BREXIT bridge mechanism, so its name is unique only in the local region where it is created.
SHARED
The bridge facility was allocated by the Link3270 bridge mechanism, so its name is unique across all CICS router regions in the CICSplex who have access to a shared DFHBRNSF namespace file.
Netname(value)
displays the 8-byte virtual netname name of the bridge facility about which you are inquiring.
Remotesysnet(value)
displays an 8-byte field giving the applid of the bridge router region. This field is only set in the AOR region. It is blank if the request is processed in the router region and not sent to an AOR.
Remotesystem(value)
displays an 4-byte field giving the sysid of the bridge router region. This field is only set in the AOR region. It is blank if the request is processed in the router region and not sent to an AOR.
Taskid(value)
displays a full word binary field showing the number of the task running the user transaction. This field is only set in the AOR. This field is zero the bridge facility is currently not in use.
Termid(value)
displays the 4-byte virtual terminal name of the bridge facility about which you are inquiring.
Termstatus
displays the status of the bridge facility. Values are:
ACQUIRED
The bridge facility is currently in use.
AVAILABLE
The bridge facility is not in use. It can be reused by the client.
RELEASED
SET BRFACILITY RELEASED has been issued for the bridge facility. It will be deleted on the next cleanup cycle.
Transaction(value)
displays a 4-byte field giving the name of the user transaction being run by the 3270 bridge, as known in the current region. This is blank if the bridge facility is currently not in use.
Userid(value)
displays an 8-byte field giving the userid associated with this bridge facility.

CEMT INQUIRE CFDTPOOL

Function

Retrieves information about coupling facility data table pools.

Description

INQUIRE CFDTPOOL returns information about any currently installed CFDT pool names. CICS installs these automatically whenever it installs a file resource definition that refers to a CFDT.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE CFDTPOOL (the minimum abbreviation is CEMT I CF). You get a display that lists the names and status of any coupling facility data table pools to which CICS is connected through a CFDT server. Note that you cannot change any of the displayed information.

Sample screen

Figure 74. CEMT INQUIRE CFDTPOOL screen
inquire cfdt
STATUS:  RESULTS
 Cfd(DTPOOL1 ) Con






                                               SYSID=HA61 APPLID=CICSHA61
  RESPONSE: NORMAL                        TIME:  15.54.22  DATE: 09.03.98
PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE CFDTPOOL
 
                          .-All-----.
>>-CEMT Inquire CFdtpool--+---------+--------------------------><
                          '-(value)-'
 

Displayed fields

All
This is the default. CICS displays the names of all installed CFDT pools.
Cfdtpool(value)
displays information about a named CFDT pool.

CICS creates a resource entry for a CFDT pool when a file resource definition that refers to a coupling facility data table is first installed. The resource entry is cataloged, and reinstalled from the catalog on a warm or emergency restart.

Note:
You cannot discard CFDT pool entries other than by a cold or initial start of the CICS region.
Connstatus
displays the connection status for the named CFDT pool. The values are:
Connected
The server for the coupling facility data table pool is available in this MVS image, and CICS is currently connected to it.
Unconnected
The server for the coupling facility data table pool is available in this MVS image, but CICS is not currently connected to it.
Unavailable
The server for the coupling facility data table pool is currently unavailable in the MVS image.

CEMT INQUIRE CLASSCACHE

Function

Retrieves information about the shared class cache.

Description

INQUIRE CLASSCACHE returns information about the shared class cache in the CICS region, and reports the presence of any old shared class caches that are awaiting deletion.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE CLASSCACHE (the minimum abbreviation is CEMT I CL). You get a display that describes the active shared class cache and indicates any old shared class caches, a sample of which is shown below.

You can change the status of autostart (to Enabled or Disabled) by overtyping the value for Autostartst. You can also change the displayed values by using CEMT commands as follows:

Sample screen

Figure 75. CEMT INQUIRE CLASSCACHE screen
i classcache
STATUS:  RESULTS - OVERTYPE TO MODIFY
 Cla Ena Sta Pro(DFHJVMCC) Dat(10/14/03) Tim(16:57:24)
    Tot(0002) Old(0000) Pha(0000) Res Caches(50M             )


If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 76.

Figure 76. The expanded display for CEMT INQUIRE CLASSCACHE
 i classcache 
 RESULT - OVERTYPE TO MODIFY
   Classcache
   Autostartst( Enabled )
   Status(Started)
   Profile(DFHJVMCC)
   Datestarted(10/14/03)
   Timestarted(16:57:24)
   Totaljvms(0002)
   Oldcaches(0000)
   Phasingout(0000)
   Reusest(Reset)
   Cachesize(50M                 )
   Cachefree(45260539            )

Read syntax diagramSkip visual syntax diagramINQUIRE CLASSCACHE
 
>>-CEMT INQUIRE CLASSCACHE-------------------------------------><
 

Displayed fields

Autostartst
displays the status of autostart for the shared class cache. The values are:
Enabled
If the shared class cache has been stopped or has not yet been started on this CICS execution, the shared class cache is started as soon as CICS receives a request to run a Java application in a JVM whose profile requires the use of the shared class cache.
Disabled
If the shared class cache has been stopped or has not yet been started on this CICS execution, an explicit CEMT PERFORM CLASSCACHE Start command is required to start it. If the status of the shared class cache is Stopped and autostart is disabled, and CICS receives a request to run a Java application in a JVM whose profile requires the use of the shared class cache, the request fails.
Cachefree(value)
displays the amount of free space in the shared class cache, in bytes.
Cachesize(value)
displays the size of the shared class cache, in bytes, kilobytes (K), megabytes (M) or gigabytes (G). If the status of the shared class cache is Stopped, this is the size that will be used by default when the shared class cache is started. If the status of the shared class cache is Starting or Started, this is the size of the current shared class cache. If the status of the shared class cache is Reloading, this is the size of the new shared class cache that is being loaded.
Datestarted(mm/dd/yy, dd/mm/yy, or yy/mm/dd)
displays the date on which the current shared class cache was started. The format of the date depends on the value that you selected for the DATFORM system intialization parameter for your CICS region.
Oldcaches(value)
displays the number of old shared class caches that are still present in the region because they are waiting for worker JVMs that are dependent on them to be phased out. If the status of the current shared class cache is Stopped, and worker JVMs are still dependent on it, then that shared class cache is included in the number of old shared class caches.
Phasingout(value)
displays the number of worker JVMs that are dependent on an old shared class cache, and are being phased out. If the status of the current shared class cache is Stopped, then any worker JVMs that are still dependent on it are included in the number of worker JVMs being phased out.
Profile(value)
If the status of the shared class cache is Stopped, this displays the eight-character name of the JVM profile that will be used for a master JVM to start the shared class cache. If the status of the shared class cache is Started, Starting or Reloading, this displays the eight-character name of the JVM profile that was used for the last valid request to start or reload the shared class cache. This name is displayed even if the shared class cache fails to start or reload. The displayed JVM profile is used next time you issue the command to start or reload the shared class cache, unless you specify a different JVM profile using the Profile option.
Reusest
displays the level of reusability for the master JVM that initializes the shared class cache. All the worker JVMs in a CICS region inherit their level of reusability from the master JVM. The values are:
Reset
The master JVM and worker JVMs are resettable.
Reuse
The master JVM and worker JVMs are continuous.
Unknown
The level of reusability for the master JVM and worker JVMs is not known, because the shared class cache is not started.
Status
displays the status of the current shared class cache. The values are:
Started
The shared class cache is ready, and it can be used by worker JVMs. This value in the CEMT display includes both the status STARTED and the transient status RELOADING, which occurs when a CEMT PERFORM CLASSCACHE Reload command has been issued, and a new shared class cache is being loaded to replace the existing shared class cache. While the shared class cache is reloading, worker JVMs, both those that were already allocated to tasks and those that were allocated to tasks after the command was issued, continue to use the existing shared class cache until the new shared class cache is ready.
Stopped
The shared class cache has either not been initialized on this CICS execution, or it has been stopped by a CEMT PERFORM CLASSCACHE Phaseout, Purge or Forcepurge or CEMT SET JVMPOOL Phaseout, Purge or Forcepurge command. If autostart is disabled, requests to run a Java application in a JVM whose profile requires the use of the shared class cache (that is, requests for worker JVMs) will fail. If autostart is enabled, a new shared class cache will be initialized as soon as CICS receives a request to run a Java application in a JVM whose profile requires the use of the shared class cache. This value in the CEMT display includes both the status STOPPED and the transient status STARTING, which occurs when the shared class cache is being initialized, either through the autostart facility or because an explicit CEMT PERFORM CLASSCACHE Start command was issued. While the shared class cache is starting, worker JVMs that require the use of the shared class cache wait until the startup process is complete and the shared class cache is ready. If initialization of the shared class cache is unsuccessful, any waiting requests for worker JVMs fail.
Timestarted(hh:mm:ss)
displays the time, as an absolute value measured from midnight, that the current shared class cache was started. The time is in the format hh:mm:ss.
Totaljvms(value)
displays the number of worker JVMs in the CICS region that are dependent on a shared class cache. This includes both the worker JVMs that are dependent on the current shared class cache, and any worker JVMs that are dependent on an old shared class cache and are being phased out.

CEMT INQUIRE CONNECTION

Function

Retrieve information about system connections.

Description

CEMT INQUIRE CONNECTION returns information about the status of connections to a remote system or to another CICS region.

You can reset the options either by typing the SET command or by overtyping at the appropriate place on the INQUIRE screen.

If you want to install a new connection definition when one is already installed, and:

See the CICS Resource Definition Guide for further information about connections.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You can then tab to the highlighted or blank fields and overtype them with the required values.

(value)
specifies one or more names (1-4 characters) defined for an interregion communication (IRC) or an intersystem communication (ISC) connection.
All
is the default.

Sample screen

Figure 77. CEMT INQUIRE CONNECTION screen
  IN CONN
  STATUS:  RESULTS - OVERTYPE TO MODIFY
    Con(G1GA)                   Ins     Irc Exci
    Con(ISC1) Net(AUHZCIC1)     Ins Acq Vta Appc     Xok Unk
                                               Nqn(GBIBMIYA.AUHZCIC1)
    Con(MRO2) Net(CICSHAA1)     Ins Acq Irc              Unk
    Con(MRO4) Net(CICSHAA2)     Ins Acq Irc              Unk
    Con(MRO5) Net(CICSHAA3)     Ins Acq Irc              Unk
    Con(MRO6) Net(CICSHAB1)     Ins Acq Xcf
    Con(VTA1) Net(IYCQTC03)     Ins Acq Vta Appc
                                               Nqn(GBIBMIYA.IYCQTC03)


 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 78.

Figure 78. The expanded display of an individual entry
  IN CONN
  RESULT - OVERTYPE TO MODIFY
    Connection(MRO5)
    Netname(CICSHAA3)
    Pendstatus( Notpending )
    Servstatus( Inservice )
    Connstatus( Acquired )
    Accessmethod(Irc)
    Purgetype(            )
    Protocol()
    Xlnstatus()
    Recovstatus( Norecovdata )
    Uowaction(              )
    Cqp( Notsupported )
    Grname()
    Membername()
    Affinity(              )
    Nqname()
    Remotesystem()
    Rname()
    Rnetname()
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE CONNECTION
 
>>-CEMT Inquire Connection--+-(value)-+--+----------------+----->
                            '-ALl-----'  '-Netname(value)-'
 
>--+------------+--+------------+--+-----------+---------------->
   +-NOTPending-+  +-INService--+  +-ACquired--+
   '-PEnding----'  '-OUtservice-'  +-RELeased--+
                                   +-OBtaining-+
                                   +-FReeing---+
                                   '-AVailable-'
 
>--+--------------+--+-------------+--+------+--+----------+---->
   +-NOTSupported-+  +-Vtam--------+  +-EXci-+  +-XOk------+
   +-Unattempted--+  +-IRc---------+  +-APpc-+  '-XNotdone-'
   +-COMPlete-----+  +-XM----------+  '-Lu61-'
   '-Failed-------'  +-INDirect----+
                     +-XCf---------+
                     '-RConnection-'
 
>--+-------------+--+-------------+--+---------------+---------->
   +-RECovdata---+  '-Endaffinity-'  '-Grname(value)-'
   +-NORecovdata-+
   '-NRs---------'
 
>--+-------------------+--+---------------+--------------------->
   '-Membername(value)-'  '-Nqname(value)-'
 
>--+---------------------+--+--------------+-------------------->
   '-Remotesystem(value)-'  '-Rname(value)-'
 
>--+-----------------+-----------------------------------------><
   '-Rnetname(value)-'
 

Displayed fields

Accessmethod
displays the access method in use for this connection. The values are:
Vtam
The connection is used for intersystem communication (ISC).
Irc
The connection is used for multiregion operation (MRO), and has been defined to use the interregion communication (IRC) program for communication. If the CONNECTION is ACQUIRED, the MRO partner is running on the same MVS image. If the CONNECTION is RELEASED, the MRO partner may not be on the same MVS image; if it is not, the XCF access method will be used when the connection becomes ACQUIRED.
Xm
The connection is used for multiregion operation (MRO) and has been defined to use MVS cross-memory (XM) services for communication. If the CONNECTION is ACQUIRED, the MRO partner is running on the same MVS image. If the CONNECTION is RELEASED, the MRO partner may not be on the same MVS image; if it is not, the XCF access method will be used when the connection becomes ACQUIRED.
Indirect
Communication between the local CICS system and the system defined by this connection is through the system named in the INDSYS operand of the connection definition.
Xcf
The connection is used for multiregion operation (MRO), and communication uses the cross-system coupling facility (XCF) of MVS. XCF is used for MRO links between CICS regions on different MVS images within an MVS sysplex. It is selected dynamically by CICS for such links when the access method is defined as IRC or XM in the connection definition.
Rconnection
The connection is remote--that is, it is owned by another CICS system.
Affinity (input only field)
specifies, where CICS is a member of a VTAM generic resource group, that VTAM is to end an affinity owned by CICS. This option is valid only for APPC and LU61 connections. The connection must be out of service and in NORECOVDATA state. The value is:
Endaffinity
VTAM is to end an affinity owned by CICS.
Connection(value)
identifies this panel as relating to system connections, and displays the 4-character name by which the connection is known.
Connstatus
displays the state of the connection between CICS and a remote system. The remote system can be an APPC or an MRO partner identified by (value) on the CEMT INQUIRE CONNECTION command. The ACQUIRED and RELEASED values are common to both APPC and MRO; the others are unique to APPC. The values are:
Acquired (APPC and MRO)
The CONNECTION is acquired. The criteria for ACQUIRED for VTAM links are:
  • The partner LU has been contacted.
  • Initial CNOS exchange has been done.

The criteria for ACQUIRED for MRO links are:

  • Both sides of the link are in service.
  • Both sides of the link are successfully logged on to the CICS interregion communication program (DFHIRP).
  • A connection request by each side has been successful for at least one session, and therefore each side can send and receive data.
Released (APPC and MRO)
The connection is released. Although the connection might be in service, it is not usable.

In the case of an MRO link, the released status can be caused by any one of a number of conditions. For example, it could be because the CICS region on the other side has not yet initialized, or not yet signed on to the CICS interregion communication program (DFHIRP); or it could be because CICS interregion communication may have been closed on the other side, or the connection on the other side may have been set out of service.

Obtaining (APPC only)
The connection is being acquired. The connection remains in the OBTAINING state until all the criteria for ACQUIRED have been met.
Freeing (APPC only)
The connection is being released.
Available (APPC only)
The connection is acquired but there are currently no bound sessions because they were unbound for limited resource reasons.

Connstatus can be reset with Acquired or Released.

Cqp(value)
displays the status of the connection quiesce protocol for the connection. The values are:
Notsupported
The connection quiesce protocol is not supported for this connection.
Unattempted
CICS has not attempted to use the connection quiesce protocol (because the connection has not been released).
Complete
The connection quiesce protocol completed succesfully when the connection was release. The status reverts to UNATTEMPTED when the connection is re-acquired.
Failed
The connection quiesce protocol failed (for instance, becasue a session failed while the protocol was executing). The status reverts to UNATTEMPTED when the connection is re-acquired.
Grname(value) (appc only)
displays (for an APPC connection to a generic resource when this system is also a generic resource) the 8-character generic resource name of the connected system. Otherwise this field is blank. CICS assumes that the partner is a generic resource if the two NETNAMEs sent with a BIND are different. Thus, information may be displayed for a partner that is not a generic resource but which uses XRF.
Membername(value)
displays (for an APPC connection to a generic resource when this system is also a generic resource) the 8-character member name (applid) of the connected LU. Otherwise this field is blank. CICS assumes that the partner is a generic resource if the two NETNAMEs sent with a BIND are different. Thus, information may be displayed for a partner that is not a generic resource but which uses XRF.
Netname (value)
displays the 8-character name by which the remote system is known to the network.
Note:
If the netname is a VTAM LU alias, it is different from the netname component of the NQNAME, which always contains the real netname.
Nqname(value)
displays the 17-character network-qualified name by which the remote system is known to the network.
Pendstatus (appc and mro only)
displays whether there are any pending units of work for this connection. The values are:
Notpending
There has been no mismatch of lognames with the partner.
Note:
MRO connections to pre-CICS Transaction Server for z/OS® systems do not use lognames. Therefore, for these connections, PENDSTATUS is always NOTPENDING.
Pending

There is resynchronization work outstanding for the connection but the partner system has performed an initial start, preventing completion of the resynchronization process. (If the partner system is a CICS version earlier than CICS Transaction Server, a cold start performed on the partner system has the same effect.) You can use the SET CONNECTION NOTPENDING command to unilaterally commit or back out the units of work associated with the connection, according to their associated transaction definitions. You can also investigate the units of work individually and force them to commit or back out, in which case you must also complete the recovery activity by using a SET CONNECTION NOTPENDING command to clear the PENDING condition.

If this is an APPC connection, no new syncpoint work (that is, work involving synclevel 2 protocols) can be transmitted across it until a SET CONNECTION NOTPENDING command has been issued. This restriction does not apply to MRO connections.

If you are not concerned by the loss of synchronization caused by the initial (or cold) start of the partner, you can cause the SET CONNECTION NOTPENDING command to be issued automatically by specifying XLNACTION(FORCE) on the CONNECTION definition.

Pendstatus can be reset with Notpending.

For further information about pending units of work, see the CICS Intercommunication Guide.

Protocol
displays the protocol in use if this is a VTAM or external CICS interface connection. The values are:
Appc
The connection uses the VTAM LUTYPE6.2 protocol for intersystem communication, or is remote.
Exci
The connection uses the external CICS interface for communication between CICS and a non-CICS client program.
Lu61
The connection uses the VTAM LUTYPE6.1 protocol for CICS-to-CICS or CICS-to-IMS intersystem communication.
Purgetype (input only field)
specifies how associated transactions are to be purged. The values are:
Purge (vtam only and irc only)
Transactions running on the connected system are abnormally terminated. Transactions are terminated only if system and data integrity can be maintained. A transaction is not purged if its definition specifies SPURGE=NO.
Forcepurge (vtam only)
All transactions running on sessions on the connected system are immediately terminated abnormally. This can lead to unpredictable results and should be used only in exceptional circumstances.

In some extreme cases (for example, if an error occurs during backout processing), CICS might terminate abnormally.

Cancel
Automatic initiate descriptors (AIDs) queuing for the specified connection are to be canceled.

AIDs representing scheduled and allocated requests waiting in the local CICS system for the specified connection are canceled. However, TD AIDs with an associated triggered task already started will not be canceled. In addition, the following CICS system AIDs are not purged unless FCANCEL is specified.

Table 2. System AIDs requiring FCANCEL to remove them
Description Tranid
Remote delete AIDs
Remote scheduler AIDs CRSR
LU6.2 service manager 1 AIDs CLS1
LU6.2 service manager 3 AIDs CLS3
Remote scheduler PURGE AIDs CRSQ
Resource manager resync AIDs CRSY
Autoinstalled terminal delete AIDs CATD
Autoinstalled terminal restart AIDs CATR

When a canceled SCHEDULE request is found to have a precursor in a remote CICS system, that is, the AID was originally scheduled in a remote system, the remote AID is canceled asynchronously.

Message DFHTF0100 is written to CSMT to indicate how many AIDs have been deleted for the connection and how many remain.

An ‘AIDS CANCELED’ message appears on the CEMT panel whenever AIDs are deleted using the CANCEL option of the CEMT SET CONNECTION command.

Fcancel
All AIDs, including system AIDs, queuing for the specified connection are to be canceled. See Table 2 for a list of those system AIDS that require FCANCEL to remove them. This can lead to unpredictable results and should be used only in exceptional circumstances.
Note:
FCANCEL does not remove transient data AIDs with an associated triggered task. These aids may be removed by purging the associated task.

An ‘AIDS CANCELED’ message appears on the CEMT panel whenever AIDs are deleted using the FCANCEL option of the CEMT SET CONNECTION command.

Recovstatus (appc and mro only)
displays whether there is resynchronization work outstanding for this connection. The connection may never have been connected, or may have been quiesced and all resynchronization work completed, or disrupted without quiesce--in which case resynchronization may be necessary. The values are:
Norecovdata
Neither side has recovery information outstanding.
Nrs
CICS does not have recovery outstanding for the connection, but the partner may have.
Recovdata
There are in-doubt units of work associated with the connection, or there are outstanding resyncs awaiting FORGET on the connection. Resynchronization takes place when the connection next becomes active, or when the UOW is unshunted.

If there is recovery outstanding, on completion of exchange of lognames either resynchronization takes place or, in the case of a cold exchange, the PENDING condition is created.

Recovstatus can be reset with Norecovdata.

Remotesystem (value)
displays the 4-character name of a connection, if the subject of the inquiry is a remote or an indirect connection. In either case, the named connection can be either a connection entry that links towards the TOR, or an indirect connection that provides the netname of the TOR.

If the subject of the inquiry is an indirect connection, the value of REMOTESYSTEM is taken from the INDSYS option of the CONNECTION definition.

Otherwise this field is blank.

Rname (value)
displays the 4-character name by which this connection is known in a remote system, if the subject of the inquiry is a remote connection.
Rnetname (value)
displays the 8-character netname of the owning TOR, if the subject of this inquiry is a remote connection. If it is blank, but the connection is remote, the system named in the REMOTESYSTEM field has not been installed, and no value was specified for the REMOTESYSNET option when the connection was defined.
Servstatus
displays whether the system can receive and send data. The values are:
Inservice
The system is in service; that is, it is available for use.
Outservice
The system is out of service; that is, it is not available for use.
Note:
You can reset this value by overtyping it with a different value.
Uowaction (input-only field)
specifies that the normal resynchronization process is to be partially overridden. The value specifies the type of decision to be taken for any units of work that become in-doubt due to a failure of the connection; the decisions are recorded and any data inconsistencies are reported when the connection is next acquired. The values are:
Backout
All UOWs shunted due to the failure of this connection are to be backed out.
Commit
All UOWs shunted due to the failure of this connection are to be committed.
Forceuow
All UOWs shunted due to the failure of this connection are to be forced to BACKOUT or COMMIT, as specified on the INDOUBT option of the TRANSACTION definition.
Resync
Any UOWs shunted due to the failure of this connection are to be retried (that is, exchange lognames resynchronization for this connection is to be attempted). This process should normally be started automatically when a connection is acquired or when a UOW is unshunted.
Xlnstatus
displays the status of the exchange lognames (XLN) process. The values are:
Xok (appc only)
The exchange log names (XLN) process for the APPC connection has completed successfully.
Xnotdone (APPC only)
The exchange log names (XLN) flow for the APPC connection has not completed successfully. The CSMT log can contain information relating to this state. Synchronization level 2 conversations are not allowed on the connection, but synchronization levels 0 and 1 are still allowed.

No status is displayed if exchange log names is not applicable. This can be because the link:

  • Is released
  • Is MRO, LU6.1, or single-session APPC
  • Does not support synchronization level 2 conversations.

For information about the APPC exchange log names process, see the CICS Intercommunication Guide.

CEMT INQUIRE CORBASERVER

Function

Retrieves information about CorbaServers.

Description

INQUIRE CORBASERVER returns information about a particular CorbaServer.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE CORBASERVER (the minimum abbreviation is CEMT I COR). You get a display that lists the names and status of the CorbaServer. Note that you cannot change any of the displayed information.

Sample screen

Figure 79. CEMT INQUIRE CORBASERVER screen
STATUS:  RESULTS - OVERTYPE TO MODIFY
 Corba(CBS1) Suppo       Enab  Sessb( 000060 )     
    Unaut(IIOPUNA )                 Sslun(IIOPSSLU)





                                               SYSID=C2T1 APPLID=IYK4Z2T1
  RESPONSE: NORMAL                        TIME:  11.19.46  DATE: 08.14.01 
PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF
Figure 80. CEMT INQUIRE CORBASERVER expanded display
i corba
RESULT - OVERTYPE TO MODIFY
  Corbaserver(CBS1)
  Outprivacy(Supported)
  Autopublish( Noauto )
  Enablestatus(Enabled)
  Sessbeantime( 000060 )
  Unauth(IIOPUNA)
  Clientcert()
  Sslunauth(IIOPSSLU)
  Asserted()
  Certificate()
  Jndiprefix()
  Host(winmvs26.hursley.ibm.com)
  Shelf(/var/cicsts/)
  Djardir()
  Start of changeCiphers(0504352F0A0903060201)End of change




                                                    SYSID=C2T1 APPLID=IYK4Z2T1
                                              TIME:  11.21.52  DATE: 08.14.01 
PF 1 HELP 2 HEX 3 END       5 VAR        7 SBH 8 SFH       10 SB 11 SF
Read syntax diagramSkip visual syntax diagramINQUIRE CORBASERVER
 
                             .-ALl-----.
>>-CEMT INQUIRE CORBASERVER--+---------+--+-----------------+--->
                             '-(value)-'  '-Asserted(value)-'
 
>--+---------+--+--------------------+--+----------------+------>
   +-Autopub-+  '-CErtificate(value)-'  '-CIphers(value)-'
   '-Noauto--'
 
>--+-------------------+--+------------+--+----------------+---->
   '-CLientcert(value)-'  +-Disabled---+  '-Djardir(value)-'
                          +-Disabling--+
                          +-Discarding-+
                          +-Enabled----+
                          '-Enabling---'
 
>--+-------------+--+-------------------+--+--------------+----->
   '-Host(value)-'  '-Jndiprefix(value)-'  +-Notsupported-+
                                           +-Required-----+
                                           '-Supported----'
 
>--+---------------------+--+--------------+-------------------->
   '-SEssbeantime(value)-'  '-SHelf(value)-'
 
>--+------------------+--+---------------+---------------------><
   '-Sslunauth(value)-'  '-Unauth(value)-'
 

Conditions: NOTAUTH, NOTFND

(value)
specifies the 1-4 character name of the CorbaServer. The acceptable characters are A-Z a-z 0-9. Do not use names beginning with DFH, because these characters are reserved for use by CICS.
ALl
is the default.

Displayed fields

ASserted(value)
returns the 8-character name of a TCPIPSERVICE that defines the characteristics of the port which is used for inbound IIOP with asserted identity authentication.
AUtopublish(value)
displays a value indicating whether enterprise beans are to be automatically published to the JNDI namespace when the deployed JAR file that contains them is successfully installed in the CorbaServer. The values are:
Autopub
Enterprise beans are to be automatically published.
Noauto
Enterprise beans are not to be automatically published.
CEertificate(value)
specifies the 1-56 character label of the certificate in the key ring that is to be used (as a client certificate) in the SSL handshake for outbound IIOP connections.

If this option is not specified, the default certificate for the key ring is used.

Start of changeCIphers(value)End of change
Start of changereturns a 56-character area containing the list of cipher suites that is used to negotiate with clients during the SSL handshake. The list is set by the ENCRYPTION system initialization parameter, but you can edit the list to remove or change the order of cipher suites.End of change
CLientcert(value)
returns the 8-character name of a TCPIPSERVICE that defines the characteristics of the port which is used for inbound IIOP with SSL client certificate authentication.
Djardir(value)
displays the 255-character name of the deployed JAR file directory (also known as the pickup directory) on HFS. (The pickup directory is the place that you put deployed JAR files that you want to be installed into the CorbaServer by the CICS scanning mechanism.)
Enablestatus
displays a value indicating the current state of the CorbaServer. The values are:
DISABLED
The CorbaServer is currently not processing any requests and is unable to accept new requests. It may have failed to initialize properly or have been explicitly disabled.
DISABLING
The CorbaServer is quiescing before entering disabled state. It is not accepting new requests but is allowing currently-executing work to complete.
DISCARDING
A DISCARD request has been received for this CorbaServer. The CorbaServer is quiescing before being discarded. It is not accepting new requests but is allowing currently-executing work to complete.
ENABLED
The CorbaServer is available and is accepting requests.
ENABLING
The CorbaServer is being initialized. It is not yet ready to accept requests.
Host(value)
displays the TCP/IP host name, or a string containing the dotted-decimal TCP/IP address, of this logical EJB/CORBA server.
Jndiprefix(value)
specifies a prefix of up to 255 characters to be used at runtime when publishing enterprise beans to the Java Naming and Directory Interface (JNDI). The acceptable characters are A-Z a-z 0-9 . _ /.

The prefix must include any trailing delimiter, such as a forward slash, because CICS does not insert a delimiter between the prefix and a suffix.

If this option is not specified, no prefix is prepended when publishing beans to JNDI.

Outprivacy
Start of changedisplays the level of SSL encryption used for outbound requests from this CorbaServer. The level is determined by the CIPHERS attribute. Possible values are:
Notsupported
Encryption is not used. During the SSL handshake, CICS advertises only supported cipher suites that do not provide encryption.
Required
Encryption is used. During the SSL handshake, CICS advertises only supported cipher suites that provide encryption.
Supported
Encryption is used if both client and server support it. During the SSL handshake, CICS advertises all supported cipher suites.
End of change
SEssbeantime(value)
displays, in minutes, the period of inactivity after which a session bean may be discarded by CICS.
0
Session beans will not be timed out.
value
Session beans may be discarded after the specified period of inactivity. The maximum value is 357839 (99 days, 23 hours, 59 minutes).
SHelf(value)
specifies the 1-255 character fully-qualified name of a directory (a shelf, primarily for deployed JAR files) on HFS. The acceptable characters are A-Z a-z 0-9 . _ /.

CICS regions into which the CORBASERVER definition is installed must have full permissions to the shelf directory--read, write, and the ability to create subdirectories.

A single shelf directory may be shared by multiple CICS regions and by multiple CORBASERVER definitions. Each CICS region uses a separate subdirectory to keep its files separate from those of other CICS regions. The subdirectories for CORBASERVER definitions are contained within the subdirectories of the CICS regions into which they are installed. When a CICS region performs a cold or initial start, it deletes its subdirectories from the shelf.

You should not modify the contents of a shelf that is referred to by an installed CORBASERVER definition. If you do, the effects are unpredictable.

Sslunauth
returns the 8-character name of a TCPIPSERVICE that defines the characteristics of the port which is used for inbound IIOP with SSL and no authentication.
Unauth(value)
returns the 8-character name of a TCPIPSERVICE that defines the characteristics of the port which is used for inbound IIOP with no authentication.

CEMT INQUIRE DB2CONN

Function

Retrieves information about the CICS DB2 connection.

Description

INQUIRE DB2CONN returns information about the attributes of the currently installed DB2CONN, which defines the connection to DB2.

Note that because there can be only one DB2CONN installed at a time, the name of the DB2CONN is not required on input.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE DB2CONN. You get a display that lists the current status. You can then tab to the highlighted or blank fields and overtype them with the required values.

Sample screen

Figure 81. CEMT INQUIRE DB2CONN screen
  inquire db2conn
  STATUS:  RESULTS - OVERTYPE TO MODIFY
    Accountrec( Txid )               Planexitname( DSNCUEXT )
    Authid(          )               Priority( High )
    Authtype( Userid )               Purgecyclem( 00 )
    Comauthid(          )            Purgecycles( 30 )
    Comauthtype( Cuserid )           Resyncmember( Resync )
    Comthreadlim( 0003 )             Signid( CICSHTC1 )
    Comthreads(0000)                 Security(              )
    Connecterror( Sqlcode )          Standbymode( Reconnect )
    Connectst( Connected )           Statsqueue( CSSL )
    Db2groupid( DFP2 )               Tcblimit( 0012 )
    Db2id( DF2C )                    Tcbs(0000)
    Db2release(0710)                 Threaderror(N906d)
    Drollback(Rollback)              Threadlimit( 0003 )
    Msgqueue1( CSMT )                Threads(0000)
    Msgqueue2(      )                Threadwait( Twait )
    Msgqueue3(      )
    Nontermrel( Norelease )
    Plan(          )
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DB2CONN
 
>>-CEMT Inquire DB2Conn----------------------------------------><
 

Displayed fields

Accountrec
returns the minimum amount of DB2 accounting required for transactions using pool threads. The specified minimum may be exceeded, as described in the following options. The values are:
Uow
The CICS DB2 attachment facility causes an accounting record to be produced for each UOW, assuming that the thread is released at the end of the UOW.
Task
The CICS DB2 attachment facility causes a minimum of one accounting record to be produced for each CICS task.

A transaction containing multiple UOWs may use a different thread for each of its UOWs (assuming the thread is released at syncpoint). The result may be an accounting record produced for each UOW.

Txid
The CICS DB2 attachment facility causes an accounting record to be produced when the transid using the thread changes.

Because pool threads are typically used by a number of different transaction IDs, there is an increased chance that a transaction containing multiple UOWs will use a different thread for each UOW (assuming the thread is released at syncpoint. In this case, an accounting record may be produced for each UOW.

None
No accounting records are required for transactions using pool threads.

DB2 does, however, produce at least one accounting record for each thread when the thread is terminated. Additionally, authorization changes cause accounting records to be produced.

Authid
returns an id to be used for security checking when using pool threads. If an AUTHId is returned, AUTHType is not applicable.
Authtype
returns the type of id to be used for security checking when using pool threads. If an AUTHType is returned, AUTHid is blank. The values are:
Group
The 8-character USERID and the connected group name are used as the authorization ID. The following table shows how these two values are interpreted by DB2.

IDs passed to DB2 How DB2 interprets values
CICS sign-on user ID (USERID) Represents the primary DB2 authorization ID.
RACF® connected group name If the RACF list of group options is not active, DB2 uses the connected group name supplied by the CICS attachment facility as the secondary DB2 authorization ID. If the RACF list of group options is active, DB2 ignores the connected group name supplied by the CICS attachment facility, but the value appears in the DB2 list of secondary DB2 authorization IDs.

If no RACF group ID is available for this USERID, an 8-character field of blanks is passed to DB2 as the group ID.

Sign
The SIGNID parameter of the DB2CONN is used as the resource authorization ID.
Term
The terminal identification (four characters padded to eight) is used as an authorization ID. An authorization ID cannot be obtained in this manner if a terminal is not connected with the transaction.

If a transaction is started (using a CICS command) and has no terminal associated with it, AUTHTYPE(TERM) should not be used.

Tx
The transaction identification (four characters padded to eight) is used as the authorization ID.
Opid
The user operator identification associated with the userid, associated with the CICS transaction, is used as the authorization ID (three characters padded to eight).
Userid
The 8-character USERID associated with the CICS transaction is used as the authorization ID.

When the DB2 sample sign-on exit DSN3@SGN is used with AUTHTYPE(USERID), the exit sends the USERID to DB2 as the primary authorization ID and the RACF group ID to DB2 as the secondary ID. When the sample sign-on exit is used, there is no difference between AUTHTYPE(USERID) and AUTHTYPE(GROUP).

Comauthid
returns an ID to be used for security checking when using command threads. If COMAUTHType is returned, COMAUTHid is not applicable.
Comauthtype
returns the type of ID to be used for security checking when using command threads. If COMAUTHType is returned, COMAUTHid is blank. The values are:
Cgroup
The 8-character USERID and the connected group name are used as the authorization ID. The following table shows how these two values are interpreted by DB2.

IDs passed to DB2 How DB2 interprets values
CICS sign-on user ID (USERID) Represents the primary DB2 authorization ID.
RACF connected group name If the RACF list of group options is not active, DB2 uses the connected group name supplied by the CICS attachment facility as the secondary DB2 authorization ID. If the RACF list of group options is active, DB2 ignores the connected group name supplied by the CICS attachment facility, but the value appears in the DB2 list of secondary DB2 authorization IDs.

If no RACF group ID is available for this USERID, an 8-character field of blanks is passed to DB2 as the group ID.

Csign
The SIGNID parameter of the DB2CONN is used as the resource authorization ID.
Cterm
The terminal identification (four characters padded to eight) is used as an authorization ID. An authorization ID cannot be obtained in this manner if a terminal is not connected with the transaction.

If a transaction is started (using a CICS command) and has no terminal associated with it, COMAUTHTYPE(CTERM) should not be used.

Ctx
The transaction identification (four characters padded to eight) is used as the authorization ID.
Copid
The operator identification associated with the userid that is associated with the CICS transaction is used as the authorization ID (three characters padded to eight).
Cuserid
The 8-character USERID associated with the CICS transaction is used as the authorization ID.

When the DB2 sample sign-on exit DSN3@SGN is used with COMAUTHTYPE(CUSERID), the exit sends the USERID to DB2 as the primary authorization ID and the RACF group ID to DB2 as the secondary ID. When the sample sign-on exit is used, there is no difference between COMAUTHTYPE(CUSERID) and COMAUTHTYPE(CGROUP).

Comthreadlim
returns the current maximum number of command threads the CICS DB2 attachment allows active before requests overflow to the pool.
Comthreads
returns the current number of active command threads.
Connecterror
returns a value when CICS is not connected to DB2 because the adapter is in 'standby mode'. The value shows how this information is to be passed back to an application that has issued a SQL request. The values are:
Abend
The application is abended with abend AEY9.
Sqlcode
The application receives a -923 SQLCODE.
Connectst
returns the status of the CICS DB2 connection. The values are:
Connected
CICS is connected to DB2.
Notconnected
CICS is not connected to DB2.
Db2groupid
If you are using group attach, this returns the name (up to four characters) of a data sharing group of DB2 subsystems that you have specified. CICS attempts to connect to any active member of this group. If the CICS DB2 attachment is connected, the name of the DB2 subsystem that was chosen from the group appears in the Db2id field. If CICS is waiting to reconnect to a specific DB2 subsystem within the data sharing group for which it is holding outstanding units of work, the name of the specific DB2 subsystem appears in the Db2id field, and CEMT displays the message 'Waiting for DB2'. (For this situation to arise, Resyncmember(Resync) must be specified.)
Db2id
If you are not using group attach, this returns the name of the DB2 subsystem that the CICS DB2 attachment is connected to, or if the CICS DB2 attachment is not connected, the name of the DB2 subsystem that you have specified for CICS to connect to. If you are using group attach and the CICS DB2 attachment is connected, this returns the name of the DB2 subsystem that the CICS DB2 attachment is connected to. If you are using group attach and the CICS DB2 attachment is not connected, this field is normally blank. However, if CICS is waiting to reconnect to a specific DB2 subsystem, because Resyncmember(Resync) is specified and the DB2 subsystem for which CICS is holding outstanding units of work is unavailable, this field gives the name of the DB2 subsystem, and CEMT displays the message 'Waiting for DB2'.
Db2release
returns a four-character value indicating the version and release level of the DB2 susbsytem CICS is connected to. When CICS is not connected to DB2, blanks are returned.
Drollback
returns a value showing whether the CICS DB2 attachment is to initiate a SYNCPOINT ROLLBACK if a transaction is selected as victim of a deadlock resolution. The values are:
Rollback
the attachment facility issues a sync point rollback before returning control to the application. An SQL return code of -911 is returned to the program.
Norollback
the attachment facility does not initiate a rollback for a transaction. An SQL return code of -913 is returned to the application.
Msgqueue1
returns the name of the first transient data destination to which unsolicited messages from the CICS DB2 attachment are sent.
Msgqueue2
returns the name of the second transient data destination to which unsolicited messages from the CICS DB2 attachment are sent.
Msgqueue3
returns the name of the third transient data destination to which unsolicited messages from the CICS DB2 attachment are sent.
Nontermrel
returns a value showing whether non-terminal transactions are to release threads for reuse at intermediate syncpoints. CVDA values are:
Release
non-terminal transactions release threads for reuse at intermediate syncpoints.
Norelease
non-terminal transactions do not release threads for reuse at intermediate syncpoints.
Plan
returns the name of the plan used for the pool. If a plan name is returned, PLANEXITNAME is blank,
Planexitname
returns the name of the dynamic plan exit used for pool threads. If a PLANEXITNAME is returned, PLAN is blank,
Priority
returns the priority of the pool thread TCBs relative to the CICS main TCB (QR TCB). If CICS is connected to DB2 Version 6 or later, the thread TCBs are CICS open L8 TCBs. If CICS is connected to DB2 Version 5 or earlier, the thread TCBs are private TCBs created by the CICS-DB2 Attachment Facility. CVDA values are:
HIGH
Thread TCBs have a higher priority than the CICS QR TCB.
EQUAL
Thread TCBs have equal priority with the CICS QR TCB.
LOW
Thread TCBs have a lower priority than the CICS QR TCB.
Purgecyclem
returns in minutes the length of the protected thread purge cycle. The range for PURGECYCLEM is 0-59.

A protected thread is not terminated immediately when it is released. It is terminated only after two completed purge cycles, if it has not been reused in the meantime. Hence if the purge cycle is set to 30 seconds after it is released, a protected thread will be purged 30 - 60 seconds after it is released. An unprotected thread is terminated when it is released (at syncpoint or end of task) if there are no other transactions waiting for a thread on that DB2ENTRY.

Purgecycles
returns in seconds the length of the protected thread purge cycle. The range for PUrgecycles is 30-59.

A protected thread is not terminated immediately when it is released. It is terminated only after two completed purge cycles, if it has not been reused in the meantime. Hence if the purge cycle is set to 30 seconds after it is released, a protected thread will be purged 30 - 60 seconds after it is released. An unprotected thread is terminated when it is released (at syncpoint or end of task) if there are no other transactions waiting for a thread on that DB2ENTRY.

Resyncmember
This applies only if you are using group attach (with a DB2 groupid specified), and returns the strategy that CICS adopts if outstanding units of work are being held for the last DB2 data sharing group member to which CICS was connected. (Units of work which are shunted indoubt are not included in this process, because CICS itself is unable to resolve those units of work at this time. Resynchronization for those UOWs will occur when CICS has resynchronized with its remote coordinator.) If you are not using group attach, a blank field is returned. CVDA values are:
Resync
CICS connects to the same DB2 data sharing group member.
Noresync
CICS makes one attempt to connect to the same DB2 data sharing group member, and if that attempt fails, CICS connects to any member of the DB2 data sharing group and issues a warning about the outstanding units of work.
Signid
returns the authorization ID to be used by the CICS DB2 attachment when signing on to DB2 for pool and DB2 entry threads specifying AUTHTYPE(SIGNID) and command threads specifying COMAUTHTYPE(CSIGN).
Security
has no meaning for INQUIRE. It is supplied to allow overtyping with the REBUILD option, to initiate a CEMT SET DB2CONN. See SECURITY in topicPURGECYCLES.
Standbymode
returns the action to be taken by the CICS DB2 attachment if DB2 is not active when an attempt is made to start the connection from CICS to DB2. The values are:
Noconnect
The CICS DB2 attachment terminates.
Connect
The CICS DB2 attachment goes into 'standby mode' to wait for DB2.
Reconnect
The CICS DB2 attachment goes into 'standby mode' and waits for DB2. Having connected to DB2, if DB2 subsequently fails the CICS DB2 attachment reverts again to standby mode and subsequently reconnects to DB2 when it comes up again.
Statsqueue
returns the transient data destination for CICS DB2 attachment statistics produced when the CICS DB2 attachment is shutdown.
Tcbs
returns a number indicating the TCBs currently used by the CICS DB2 attachment facility. The number returned is the number of TCBs that are associated with DB2 connections (command, pool or DB2ENTRY threads), so the interpretation of the number depends on the release of DB2 to which CICS is connected, as follows:
Connected to DB2 Version 5 or earlier (so not using the open transaction environment)
Subtask TCBs are created and managed by the CICS DB2 attachment facility to service DB2 requests, and remain permanently associated with DB2 connections (command, pool or DB2ENTRY threads). In this case, the Tcbs option returns the high-water mark of TCBs created to access DB2.
Connected to DB2 Version 6 or later (so using the open transaction environment)
The TCBs used by the CICS DB2 attachment facility are allocated by CICS from the pool of L8 mode TCBs. A DB2 connection is not permanently assigned to the same L8 TCB, and between CICS tasks, it can move from one L8 mode TCB to another. In this environment, the Tcbs option returns the number of L8 mode TCBs that are using a DB2 connection at the time of the inquiry, and this value varies depending on workload.
Tcblimit
returns the maximum number of TCBs that can be used to process DB2 requests. When connected to DB2 Version 5 or earlier, the CICS DB2 attachment facility creates the TCBs in the form of subtasks up to the limit specified by TCBLIMIT. Each of these subtasks identifies to DB2 and creates a connection into DB2. When connected to DB2 Version 6 or later, CICS creates open TCBs (up to the limit specified in the system initialization parameter MAXOPENTCBS). The TCBLIMIT attribute of the DB2CONN definition governs how many of the open TCBs can be used to access DB2 -- that is, how many of them can identify to DB2 and create a connection into DB2.
Threaderror
returns the processing that is to occur following a create thread error. The values are:
Abend
For a second or subsequent SQL error, the transaction abends with abend code AD2S, AD2T or AD2U, dependent on the type of error that occurred. The transaction must be terminated and reinitialized before it is allowed to issue another SQL request.
N906d
A transaction dump is taken and the DSNCSQL RMI associated with the transaction is not to be disabled. The transaction receives a -906 SQLCODE if another SQL is issued, unless the transaction issues SYNCPOINT ROLLBACK. SYNCPOINT without the ROLLBACK option results in an ASP3 or ASP7 abend. The transaction dump records an abend of AD2S, AD2T or AD2U.
N906
The DSNCSQL RMI associated with the transaction is not to be disabled. The transaction receives a -906 SQLCODE if another SQL request is issued, unless the transaction issues a SYNCPOINT ROLLBACK. SYNCPOINT without the ROLLBACK option results in an ASP3 or ASP7 abend.
Threadlimit
returns the current maximum number of pool threads the CICS DB2 attachment allows active before requests are made to wait or are rejected (see THREADWait).
Threads
returns the current number of active pool threads.
Threadwait
returns a value showing whether transactions should wait for a pool thread or be abended if the number of active pool threads reaches the threadlimit number. The values are;
Twait
If all threads are busy, a transaction waits until one becomes available.
Notwait
If all threads are busy, a transaction is terminated with an abend code AD3T.

CEMT INQUIRE DB2ENTRY

Function

Returns the attributes of the DB2ENTRY that defines resources to be used by a specific transaction or by a group of transactions when accessing DB2.

Description

The entry is identified by the name with which it was defined in CEDA.

Input

For RCTs migrated to the CSD, the name is the name of the first transaction on the DSNCRCT TYPE=ENTRY statement unless the RDONAME parameter has been specified.

Sample screen

Figure 82. CEMT INQUIRE DB2ENTRY screen
  inquire db2entry
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Db2e(DB2ENT1 )     Use Ena Poo Hig Pro( 0000 ) Pth(0000)
      Threadl( 0000 ) Threads(0000) Tpo                  Plane( DSNCUEXT
   Db2e(DB2ENT2 )     Use Ena Poo Hig Pro( 0000 ) Pth(0000)
      Threadl( 0000 ) Threads(0000) Tpo                  Plane( DSNCUEXT
 

If you place the cursor against the result and press ENTER, an expanded format is displayed as shown in Figure 83.

Figure 83. The expanded display of an individual entry
  inquire db2entry
  RESULT - OVERTYPE TO MODIFY
    Db2entry(DB2ENT1)
    Accountrec( None )
    Authtype( Userid )
    Enablestatus( Enabled )
    Disabledact( Pool )
    Priority( High )
    Protectnum( 0000 )
    Pthreads(0000)
    Threadlimit( 0000 )
    Threads(0000)
    Threadwait( Tpool )
    Plan(          )
    Planexitname( DSNCUEXT )
    Authid(          )
    Drollback(Rollback)
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DB2ENTRY
 
>>-CEMT Inquire DB2Entry(data-area)--+------+--+--------+------->
                                     +-Uow--+  +-Group--+
                                     +-Task-+  +-Sign---+
                                     +-Txid-+  +-TErm---+
                                     '-None-'  +-Tx-----+
                                               +-Opid---+
                                               '-Userid-'
 
>--+-----------+--+---------+--+-------+------------------------>
   +-Enabled---+  +-Pool----+  +-High--+
   +-Disabled--+  +-Abend---+  +-Equal-+
   '-Disabling-'  '-Sqlcode-'  '-Low---'
 
>--+-----------------------+--+---------------------+----------->
   '-Protectnum(data-area)-'  '-Pthreads(data-area)-'
 
>--+------------------------+--+--------------------+----------->
   '-Threadlimit(data-area)-'  '-Threads(data-area)-'
 
>--+---------+--+-----------------+----------------------------->
   +-Twait---+  '-Plan(data-area)-'
   +-Notwait-+
   '-Tpool---'
 
>--+-------------------------+--+-------------------+----------->
   '-Planexitname(data-area)-'  '-Authid(data-area)-'
 
>--+------------+----------------------------------------------><
   +-Rollback---+
   '-Norollback-'
 

Displayed fields

Accountrec
returns the minimum amount of DB2 accounting record required for transactions using this DB2ENTRY. The specified minimum may be exceeded, as described in the following options. The values are:
Uow
The CICS DB2 attachment facility causes an accounting record to be produced for each UOW, assuming that the thread is released at the end of the UOW.
Task
The CICS DB2 attachment facility causes a minimum of one accounting record for each CICS task to be produced.

A transaction containing multiple UOWs may use a different thread for each of its UOWs (assuming the thread is released at syncpoint). The result may be an accounting record produced for each UOW.

Txid
The CICS DB2 attachment facility causes an accounting record to be produced when the transid using the thread changes.

This option applies to DB2ENTRYs that are used by more than one transaction ID. As threads are typically released at syncpoint, a transaction containing multiple UOWs may use a different thread for each UOW. The result may be that an accounting record is produced for each UOW.

None
No accounting records are required for transactions using threads from this DB2ENTRY.

DB2 does, however, produce at least one accounting record for each thread when the thread is terminated. Additionally, authorization changes cause accounting records to be produced.

Authid
returns an ID to be used for security checking when using pool threads. If an AUTHId is returned, AUTHType is not applicable.
Authtype
returns the type of ID to be used for security checking for threads on this DB2ENTRY. If an AUTHType is returned, AUTHid is blank. The values are:
Group
The 8-character userid and the connected group name are used as the authorization ID. The following table shows how these two values are interpreted by DB2.

IDs passed to DB2 How DB2 interprets values
CICS sign-on user ID (USERID) Represents the primary DB2 authorization ID.
RACF connected group name If the RACF list of group options is not active, then DB2 uses the connected group name supplied by the CICS attachment facility as the secondary DB2 authorization ID. If the RACF list of group options is active, DB2 ignores the connected group name supplied by the CICS attachment facility, but the value appears in the DB2 list of secondary DB2 authorization IDs.

If no RACF group ID is available for this USERID, then an 8-character field of blanks is passed to DB2 as the group ID.

Sign
The SIGNID parameter of the DB2CONN is used as the resource authorization ID.
Term
The terminal identification (four characters padded to eight) is used as an authorization ID. An authorization ID cannot be obtained in this manner if a terminal is not connected with the transaction.

If a transaction is started (using a CICS command) and has no terminal associated with it, AUTHTYPE(TERM) should not be used.

Tx
The transaction identification (four characters padded to eight) is used as the authorization ID.
Opid
The operator identification associated with the userid that is associated with the CICS transaction is used as the authorization ID (three characters padded to eight).
Userid
The 8-character USERID associated with the CICS transaction is used as the authorization ID.

When the DB2 sample sign-on exit DSN3@SGN is used with AUTHTYPE(USERID), the exit sends the USERID to DB2 as the primary authorization ID and the RACF group ID to DB2 as the secondary ID. When the sample sign-on exit is used, there is no difference between AUTHTYPE(USERID) and AUTHTYPE(GROUP).

Disabledact
returns a value showing what CICS is to do with new transactions accessing DB2ENTRY when it has been disabled or is disabling. If DISABLEDACT is not specified, and DB2ENTRY is disabled, new requests are routed to the pool by default. The values are:
Pool
The CICS DB2 attachment facility routes the request to the pool. Message DFHDB2072 is sent to the transient data destination specified by MSGQUEUEn on the DB2CONN for each transaction routed to the pool.
Abend
The CICS DB2 attachment facility abends the transaction.The abend code is AD26.
Sqlcode
An SQLCODE is returned to the application indicating that the DB2ENTRY is disabled.
Drollback
returns returns a value showing whether the CICS DB2 attachment should initiate a SYNCPOINT rollback if a transaction is selected as victim of a deadlock resolution. The values are:
Rollback
The attachment facility issues a sync point rollback before returning control to the application. An SQL return code of -911 is returned to the program.
Norollback
The attachment facility does not initiate a rollback for this transaction. An SQL return code of -913 is returned to the application.
Enablestatus
returns a cvda indicating whether the DB2ENTRY can be accessed by applications. The values are:
Enabled
The DB2ENTRY can be accessed by applications. DB2ENTRY is installed in an ENABLED state.
Disabled
The DB2ENTRY cannot be accessed by applications.
Disabling
The DB2ENTRY is in the process of being disabled. New transactions cannot access the DB2ENTRY. Existing transactions using the DB2ENTRY will be allowed to complete unless the DB2ENTRY is being disabled with the FORCE option.
Plan
returns the name of the plan to be used for this DB2ENTRY. If PLAN is returned, PLANEXITNAME is blank.
Planexitname
returns the name of the dynamic plan exit (if any) to be used for this DB2ENTRY. If PLANEXITname is returned, PLAN is blank.
Priority
returns the priority of the pool thread TCBs relative to the CICS main TCB (QR TCB). If CICS is connected to DB2 Version 6 or later, the thread TCBs are CICS open L8 TCBs. If CICS is connected to DB2 Version 5 or earlier, the thread TCBs are private TCBs created by the CICS-DB2 Attachment Facility. CVDA values are:
HIGH
Thread TCBs have a higher priority than the CICS QR TCB.
EQUAL
Thread TCBs have equal priority with the CICS QR TCB.
LOW
Thread TCBs have a lower priority than the CICS QR TCB.
Protectnum
returns the maximum number of protected threads allowed for this DB2ENTRY.
Pthreads
returns the current number of protected threads for this DB2ENTRY. A protected thread is an inactive thread available for reuse by a new transaction. If no transaction has reused the thread by the time it has been processed by 2 purge cycles, the thread is terminated.
Threadlimit
returns the current maximum number of threads for this DB2ENTRY that the CICS DB2 attachment allows active before requests are made to wait, overflow to the pool, or are rejected (see Threadwait).
Threads
returns the current number of threads active for this DB2ENTRY.
Threadwait
returns whether or not transactions should wait for a DB2ENTRY thread be abended, or overflow to the pool if the number of active DB2ENTRY threads reach the Threadlimit number. The values are:
Twait
If all threads are busy, a transaction waits until one becomes available.
Notwait
If any threads are busy, a transaction is terminated with an abend code AD2P.
Tpool
If all threads are busy, a transaction is diverted to use a pool thread. If the pool is also busy, and NOTWAIT has been specified for the THREADWAIT parameter on the DB2CONN, the transaction is terminated with an abend code AD3T.

CEMT INQUIRE DB2TRAN

Function

Returns attributes of a particular DB2TRAN that associates a transaction or group of transactions with a DB2ENTRY.

Description

The DB2TRAN is identified by the name it was defined with in CEDA. For RCTs migrated to the CSD, the name is the same as the transaction for which the DB2TRAN is being created.

Input

If a TRANSID is specified on a DB2ENTRY when the DB2ENTRY is installed, CICS installs a DB2TRAN named DFHtttt, where tttt is the TRANSID.

Sample screen

Figure 84. CEMT INQUIRE DB2TRAN screen
 inquire db2tran
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Db2t(DFHTXN* ) Db2e( DB2ENT2  ) Tra( TXN* ) Plane(DSNCUEXT)
  Db2t(DFHTXN2 ) Db2e( DB2ENT1  ) Tra( TXN2 ) Plane(DSNCUEXT)
  Db2t(TXN1    ) Db2e( DB2ENT1  ) Tra( TXN1 ) Plane(DSNCUEXT)
 

If you place the cursor against the result and press ENTER, an expanded format is displayed as shown in Figure 85.

Figure 85. The expanded display of an individual entry
  inquire db2tran
  RESULT - OVERTYPE TO MODIFY
    Db2tran(DFHTXN*)
    Db2entry( DB2ENT2  )
    Transid( TXN* )
    Plan()
    Planexitname(DSNCUEXT)
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DB2TRAN
 
>>-CEMT Inquire Db2tran--+-------------+------------------------>
                         '-(data-area)-'
 
>--+---------------------+--+-----------------+----------------->
   '-Db2entry(data-area)-'  '-Plan(data-area)-'
 
>--+-------------------------+--+--------------------+---------><
   '-Planexitname(data-area)-'  '-Transid(data-area)-'
 

Displayed fields

Db2entry
returns the name of the DB2ENTRY to which this DB2TRAN refers. This is the DB2ENTRY with which this additional transaction should be associated.
Plan
returns the name of the plan retrieved from the associated DB2ENTRY if it exists. If there is no DB2ENTRY, or the DB2ENTRY is disabled with DISABLEDACT(POOL), then the pool plan name is returned if it exists. If PLAN is returned, PLANEXITNAME is blank.
Planexitname
returns the name of the dynamic plan exit to be used (if any) from the associated DB2ENTRY if it exists. If there is no associated DB2ENTRY, or the DB2ENTRY is disabled with DISABLEDACT(POOL), then the pool plan exit name is returned if it exists. If PLANEXITNAME is returned, PLAN is blank.
Transid
specifies the transaction ID to be associated with the entry. The transaction id can include wildcard characters (see the CICS Resource Definition Guide for information about use of wildcard characters).

CEMT INQUIRE DELETSHIPPED

Function

Display system settings that control the CICS timeout delete mechanism.

Description

The CICS timeout delete mechanism is invoked at user-specified intervals to remove any shipped terminal definitions that have not been used for longer than a user-specified time.

INQUIRE DELETSHIPPED displays the current settings of the parameters that control the mechanism.

Input

Press the Clear key and type CEMT INQUIRE DELETSHIPPED (the minimum abbreviation is CEMT I DE). You will get a display screen.

To change attributes, you can:

Sample screen

Figure 86. CEMT INQUIRE DELETSHIPPED screen
  IN DELE
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Del Int( 120000 ) Idl( 020000 )






 

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 87.

Figure 87. The expanded display
  IN DELE
  RESULT - OVERTYPE TO MODIFY
    Deletshipped
    Interval( 120000 )
    Idle( 020000 )



 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DELETSHIPPED
 
>>-CEMT Inquire DEletshipped--+-------------+------------------->
                              '-Idle(value)-'
 
>--+-----------------+-----------------------------------------><
   '-Interval(value)-'
 

Displayed fields

Del
identifies this panel as relating to CICS timeout delete information.
Idle(value)
displays, in the form "0hhmmss+", the minimum time that an inactive shipped terminal definition must remain installed in this region. When the CICS timeout delete mechanism is invoked, only those shipped definitions that have been inactive for longer than this time are deleted.

The time interval can be in the range 00-99 hours; 00-59 minutes; and 00-59 seconds.

Note:
You can reset this value by overtyping it with a different value.
Interval(value)
displays, in the form "0hhmmss+", the interval between invocations of the CICS timeout delete mechanism. The timeout delete mechanism removes any shipped terminal definitions that have not been used for longer than the time displayed by the IDLE option.

The time interval can be in the range 00-99 hours; 00-59 minutes; and 00-59 seconds.

Note:
You can reset this value by overtyping it with a different value.

CEMT INQUIRE DISPATCHER

Function

Retrieve system information used by the CICS dispatcher.

Note:
Except for Start of changeACTxxxxTCBS and MAXxxxxTCBS,End of change you can also inquire on these dispatcher system values using the CEMT INQUIRE SYSTEM command.

Syntax

Press the Clear key and type CEMT INQUIRE DISPATCHER (the minimum abbreviation is CEMT I DI). You will get a display screen.

To change attributes, you can:

Sample screen

Figure 88. CEMT INQUIRE DISPATCHER screen
 inq dispatcher
  STATUS:  RESULTS - OVERTYPE TO MODIFY  
Actjvmtcbs(000)   
Actopentcbs(000)  
Start of changeActssltcbs(000)End of change
Start of changeActxptcbs(000)  End of change
Aging( 32768 )    
Maxjvmtcbs( 005 ) 
Maxopentcbs( 005 )
Start of changeMaxssltcbs(008)End of change
Start of changeMaxxptcbs(005)  End of change
Mrobatch( 001 )   
Runaway( 0005000 )
Scandelay( 0500 ) 
Subtasks(000)     
Time( 0001000 )   
                                             SYSID=HT61 APPLID=CICSHT61
   RESPONSE: NORMAL                       TIME:  12.39.18  DATE: 07.30.01
 PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF
                     
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DISPATCHER
 
>>-CEMT Inquire DIspatcher-------------------------------------><
 

Options

ACTJvmtcbs(value)
displays the total number of J8 and J9 mode open TCBs that are currently active (that is, allocated to a user task).
ACTOpentcbs(value)
displays the number of L8 Start of change and L9 End of change mode open TCBs that are currently active (that is, allocated to a user task).
Start of changeACTSsltcbs(value)End of change
Start of changedisplays the number of S8 mode open TCBS that are currently active (that is, allocated to a user task).End of change
Start of changeACTXptcbs(value) End of change
Start of changedisplays the number of X8 and X9 mode open TCBs that are currently active (that is, allocated to a user task).End of change
AGing(value)
displays the time factor for CICS to use in the priority aging algorithm for incrementing the priority of a task. The value is expressed as "milliseconds per unit of priority", and is in the range 0-65535.

The priority aging factor is defined initially by the PRTYAGE system initialization parameter, in which the value represents the number of milliseconds that must elapse before the priority of a waiting task can be adjusted upward by 1. See the CICS System Definition Guide for information about the PRTYAGE parameter.

Note:
You can reset this value by overtyping it with a different value.
MAXJvmtcbs(value)
displays the maximum number of J8 Start of changeand J9 End of change mode open TCBs that CICS is allowed to attach. The value can be in the range 1-999.
Note:
You can reset this value by overtyping it with a different value.
MAXOpentcbs(value)
displays the maximum number of L8 Start of change and L9 End of change mode open TCBs that can exist concurrently in the CICS region. The value can be in the range 1-Start of change2000End of change.
Note:
You can reset this value by overtyping it with a different value.
Start of changeMAXSsltcbs(value)End of change
Start of changedisplays the maximum number of S8 mode open TCBs that can exist concurrently in the CICS region. The value can be in the range 1-1024.
Note:
You can reset this value by overtyping it with a different value.
End of change
Start of changeMAXXptcbs(value) End of change
Start of changedisplays the maximum number of X8 and X9 mode open TCBs that can exist concurrently in the CICS region. The value can be in the range 1-999.
Note:
You can reset this value by overtyping it with a different value.
End of change
MRobatch(value)
displays the number of MRO requests from connected regions that are to be batched before this region is posted. It is a value in the range 1-255.
Note:
You can reset this value by overtyping it with a different value.
Runaway(value)
displays the interval, in milliseconds, for which a task can have control before it is assumed to be looping.
Note:
You can reset this value by overtyping it with a different value.

If you are resetting this value, you can specify 0, or a value in the range 500-2700000. The value you specify is rounded down to a multiple of 500.

CICS purges a task if the task has not given up control after this interval (that is, CICS assumes that the task is looping). If you specify zero, runaway task control is inoperative (that is, tasks are not purged if they appear to be looping). The value is independent of, and can be less than, the value in the TIME operand.

CICS runaway-task detection is based upon task time (that is, the interval is reset each time a task receives control of the processor, and is then decremented while the task is in control). You do not, therefore, need to allow for the effect of other jobs when setting the runaway value.

SCandelay(value)
displays the maximum number of milliseconds between the receipt of a VTAM request, and the time when CICS begins to process the request. The number is in the range 0-5000, and is less than or equal to the TIME value.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. In the summary report of the dispatcher statistics, SCANDELAY is referred to as ICVTSD.
SUbtasks(value)
displays the value set by the SUBTSKS system initialization parameter, which can be either 0 or 1.
Time(value)
displays the interval, in milliseconds, for which CICS releases control to the operating system if no transactions are ready to resume processing. This interval is known as the ‘region exit interval’.
Notes:
  1. You can reset this value by overtyping it with a different value. It can have a value in the range 100-3600000, and must be greater than or equal to the SCANDELAY value.
  2. In the summary report of the dispatcher statistics, TIME is referred to as ICV.

CEMT INQUIRE DJAR

Function

Retrieves information about a DJAR definition.

Description

INQUIRE DJAR returns information about any currently installed DJAR definition.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE DJAR (the minimum abbreviation is CEMT I DJ). You get a display that lists the names and status of any deployed JAR archive files. Note that you cannot change any of the displayed information.

Sample screen

Figure 89. CEMT INQUIRE DJAR screen
inq djar
STATUS:  RESULTS
 Djar(BJAR                              ) Corba(CORB) Inser
    Dates(20010221) Times(11:29:41) Hfsfi(/u/ivanh/ivanejbd.jar     )
 Djar(IJAR                              ) Corba(CORA) Inser
    Dates(20010222) Times(14:33:52) Hfsfi(/u/ivanh/ivanejbd.jar     )


                                               SYSID=HA61 APPLID=CICSHA61
  RESPONSE: NORMAL                        TIME:  15.54.22  DATE: 09.03.98
PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format.

Figure 90. The expanded display of an individual entry
 inq djar
 RESULT
   Djar(BJAR)
   Corbaserver(CORB)
   State(Inservice)
   Datestamp(20010923)
   Timestamp(17:39:48)
   Hfsfile(/u/ivanh/ivanejbd.jar)                                        

Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DJAR
 
                      .-All-----.
>>-CEMT Inquire DJar--+---------+--+--------------------+------->
                      '-(value)-'  '-Corbaserver(value)-'
 
>--+------------------+--+----------------+--+-------------+---->
   '-Datestamp(value)-'  '-Hfsfile(value)-'  +-Pendinit----+
                                             +-Initing-----+
                                             +-Unusable----+
                                             +-Pendresolve-+
                                             +-Resolving---+
                                             +-Unresolved--+
                                             +-Inservice---+
                                             '-Discarding--'
 
>--+------------------+----------------------------------------><
   '-Timestamp(value)-'
 

(value)
is a 1-32 character deployed JAR file name.
All
is the default.

Displayed fields

Corbaserver(value)
displays a 4-character CorbaServer name.
Datestamp(value)
displays the date, in yyyymmdd format, of the deployed JAR file on HFS. This is a readonly value that CICS updates when the DJAR resource is installed or updated. You can use the DATESTAMP and TIMESTAMP values to determine whether CICS has refreshed itself after you’ve made an update to a JAR in the deployed JAR file (pickup) directory.

For dynamically-installed DJARs (those installed by the CICS scanning mechanism), the value of DATESTAMP is the date of the HFS file pointed to by the DJAR definition, at the time the DJAR definition was last installed or updated.

For statically-installed DJARs (those installed from a CSD or by CREATE DJAR), the value of DATESTAMP is the date of the HFS file pointed to by the DJAR definition, at the time the DJAR was installed.

If the INQUIRE DJAR command is executed before the DJAR resource has fully initialized, this field displays blanks.

Hfsfile(value)
displays a 255-character, fully-qualified HFS file name.
State(value)
The values are:
Pendinit
The DJar has just been created and is awaiting Stage 1 Resolution.
Initing
The DJar is undergoing Stage 1 Resolution Processing (or has got stuck in this phase), see EJIO which involves copying the DJar to the Shelf.
Unusable
The DJar has failed Stage 1 Resolution and is not available for use.
Pendresolve
The DJar has undergone Stage 1 Resolution correctly (or was recovered on a Warm start after resolving correctly in a prior region run) and is awaiting Stage 2 Resolution processing (Bean loading).
Resolving
The DJar is undergoing Stage 2 Resolution Processing (or has got stuck in this state, see EJJO) and so its Beans are being loaded by CEJR.
Unresolved
The DJar has failed Stage 2 Resolution, or some other processing, and is not available for use; Beans were not correctly loaded).
Inservice
The DJar has undergone both Stage 1 and Stage 2 Resolution and is available for use; its Beans are all correctly loaded as well.
Discarding
The DJar is being deleted.
Timestamp(value)
displays the time, in hh:mm:ss format, of the deployed JAR file on HFS. This is a readonly value that CICS updates when the DJAR resource is installed or updated. You can use the DATESTAMP and TIMESTAMP values to determine whether CICS has refreshed itself after you’ve made an update to a JAR in the deployed JAR file (pickup) directory.

For dynamically-installed DJARs (those installed by the CICS scanning mechanism), the value of TIMESTAMP is the time of the HFS file pointed to by the DJAR definition, at the time the DJAR definition was last installed or updated.

For statically-installed DJARs (those installed from a CSD or by CREATE DJAR), the value of TIMESTAMP is the time of the HFS file pointed to by the DJAR definition, at the time the DJAR was installed.

If the INQUIRE DJAR command is executed before the DJAR resource has fully initialized, this field displays blanks.

CEMT INQUIRE DOCTEMPLATE

Function

Retrieves information about a DOCTEMPLATE

Description

INQUIRE DOCTEMPLATE returns information about any currently installed document template names.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE DOCTEMPLATE (the minimum abbreviation is CEMT I DO). You get a display that lists the names and status of any document templates. Note that you cannot change any of the displayed information.

Sample screen

Figure 91. CEMT INQUIRE DOCTEMPLATE screen
I DOC
STATUS:  RESULTS - OVERTYPE TO MODIFY
 Doc(test1   ) Tsq Nam(test1           ) App Ebc
    Tem(test1                        )
 Doc(FORMAPI2) Mem Nam(FORMAPI2        ) App Ebc                              
       Tem(FORMAPI2                  ) Ddn(WEBTESTD)                          
 Doc(SKINNER ) Hfs Nam(index.html      ) App Ebc                              
       Tem(SKINNER                   )              

 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format.

Figure 92. The expanded display of an individual entry
  i doc
  RESULT - OVERTYPE TO MODIFY
    Doctemplate(SKINNER)
    Templatetype(Hfs)
    Name(index.html)
    Appendcrlf(Append)
    Type(Ebcdic)
    Templatename(SKINNER)
    Ddname()
    Dsname()
    Hfsfile(/u/coultha/website/index.html)
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DOCTEMPLATE
 
>>-CEMT Inquire DOctemplate--+---------+--+-------------+------->
                             +-Exitpgm-+  '-Name(value)-'
                             +-File----+
                             +-Hfs-----+
                             +-Member--+
                             +-Program-+
                             +-Tdqueue-+
                             '-Tsqueue-'
 
>--+----------+--+--------+--+-------------+-------------------->
   +-Append---+  +-Binary-+  '-Type(value)-'
   '-Noappend-'  '-Ebcdic-'
 
>--+---------------------+--+---------------+------------------->
   '-Templatename(value)-'  '-Ddname(value)-'
 
>--+---------------+--+----------------+-----------------------><
   '-Dsname(value)-'  '-Hfsfile(value)-'
 

Displayed fields

Appendcrlf
returns whether CICS is to delete trailing blanks from, and append carriage-return line-feed to, each logical record of the template.
Append
append carriage-return and line-feed.
Noappend
do not append carriage-return and line-feed.
DDname
returns the DD name of the PDS containing the template. The DDName applies only to a template of type PDS. If a membername is supplied without a value for DDNAME, the default value DFHHTML is used.
DOctemplate
returns the name of this DOCTEMPLATE definition.
DSname
returns the DS name of the PDS containing the template.
Start of changeHfsfileEnd of change
Start of changeEnd of change
Start of changereturns the fully-qualified name of the z/OS UNIX System Services HFS file in which the template resides. The Hfsfile attribute applies only to a template of type HFS. It can be up to 255 characters in length.End of change
Name
returns the name of the location defined in TEMPLATETYPE.
Templatename
returns the extended template name by which the doctemplate is known outside the resource definition function.
Templatetype
returns the type of resource whose name is returned in NAME.
Exitpgm
an exit program.
File
a CICS file name for a data set.
Start of changeHfsEnd of change
Start of changea z/OS UNIX System Services HFS file.End of change
Member
a name of the member in the PDS described in DDNAME.
Program
a name of a program.
Tdqueue
a name of a TD queue.
Tsqueue
a name of a TS queue.
Type
returns the format of the template contents.
Binary
When the template is loaded from the template library, no parsing of the template's contents is done.
Ebcdic
When the template is loaded from the template library, the contents are parsed as EBCDIC text.

CEMT INQUIRE DSAS

Function

Retrieve information about the local CICS dynamic storage areas (DSAs).

Description

CEMT INQUIRE DSAS returns the value of various DSA sizes and limits.

Input

Press the Clear key and type CEMT INQUIRE DSAS (the minimum abbreviation is CEMT I DSA).

To change various attributes, you can:

Sample screen

Figure 93. CEMT INQUIRE DSAS screen
  IN DSAS
  STATUS:  RESULTS - OVERTYPE TO MODIFY
     Sosstatus(Notsos)

    Dsalimit( 04194304 )
     Cdsasize( 00524288 )
     Rdsasize( 00262144 )
     SDsasize( 00262144 )
     Udsasize( 00000000 )

    EDsalimit( 0020971520 )
     ECdsasize( 0002097152 )
     ERdsasize( 0003145728 )
     ESdsasize( 0000000000 )
     EUdsasize( 0001048576 )
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DSAS
 
>>-CEMT Inquire DSAs-------------------------------------------><
 

Displayed fields

Cdsasize(value)
displays the size, in bytes, of the CICS dynamic storage area (CDSA). The size of this storage area is calculated and managed by CICS automatically, within the overall limits specified for all the DSAs that reside below the 16MB boundary.
Dsalimit(value)
displays the maximum amount of storage, as a total number of bytes, within which CICS can dynamically allocate storage for the four individual DSAs that reside below the 16MB boundary. (See the CICS System Definition Guide for a description of the DSALIM system initialization parameter.)
Note:
You can reset this value by overtyping it with a different value.

If DSALIMIT specifies a value lower than the current limit, CICS may not be able to implement the new limit immediately, but will attempt to do so over time as dynamic storage is freed in the individual DSAs.

Ecdsasize(value)
displays the size, in bytes, of the extended CICS dynamic storage area (ECDSA) above the 16MB boundary. The size of this storage area is calculated and managed by CICS automatically, within the overall limits specified for all the DSAs that reside above the 16MB boundary.
Edsalimit(value)
displays the maximum amount of storage, as a total number of bytes, within which CICS can dynamically allocate storage for the four individual DSAs that reside above the 16MB boundary. (See the CICS System Definition Guide for a description of the EDSALIM system initialization parameter.)
Note:
You can reset this value by overtyping it with a different value.

If EDSALIMIT specifies a value lower than the current limit, CICS may not be able to implement the new limit immediately, but will attempt to do so over time as dynamic storage is freed in the individual DSAs.

Erdsasize(value)
displays the size, in bytes, of the extended read-only dynamic storage area (ERDSA) above the 16MB boundary. The size of this storage area is calculated and managed by CICS automatically, within the overall limits specified for all the DSAs that reside above the 16MB boundary.
Esdsasize(value)
displays the current size of the extended shared dynamic storage area (ESDSA). The size of this storage area is calculated and managed by CICS automatically, within the overall limits specified for all the DSAs that reside above the 16MB boundary.
Eudsasize(value)
displays the size, in bytes, of the extended user dynamic storage area (EUDSA) above the 16MB boundary. The size of this storage area is calculated and managed by CICS automatically, within the overall limits specified for all the DSAs that reside above the 16MB boundary.
Rdsasize(value)
displays the current size of the read-only dynamic storage area (RDSA). The size of this storage area is calculated and managed by CICS automatically, within the overall limits specified for all the DSAs that reside below the 16MB boundary.
Sdsasize(value)
displays the current size of the shared dynamic storage area (SDSA). The size of this storage area is calculated and managed by CICS automatically, within the overall limits specified for all the DSAs that reside below the 16MB boundary.
Sosstatus
displays whether CICS is short on storage in any of the dynamic storage areas. The values are:
Notsos
CICS is not short on storage in any of the dynamic storage areas.
Sos
CICS is short on storage in dynamic storage areas above and below 16MB.
Sosabove
CICS is short on storage in at least one of the dynamic storage areas above 16MB.
Sosbelow
CICS is short on storage in at least one of the dynamic storage areas below 16MB.
Udsasize(value)
displays the size, in bytes, of the user dynamic storage area (UDSA) below the 16MB boundary.

CEMT INQUIRE DSNAME

Function

Retrieve information about an external data set.

Description

INQUIRE DSNAME returns information about the status of a data set managed by CICS file control. The data set name is either the name specified on the DSN parameter of the data set’s DD statement, or the DSNAME parameter of the data set’s file resource definition. Its main purpose is to allow you to monitor failing VSAM data sets. Many of the attributes cannot be determined until a file that references the data set has been opened. If this has not happened, blank values are returned for most attributes.

Note:
CEMT has to retrieve QUIESCESTATE information from the ICF catalog. This can slow down processing of this command. QUIESCESTATE is not supplied by default but is retrieved and displayed if requested.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You can then tab to the highlighted or blank fields and overtype them with the required values.

ALl
is the default.
(value)
specifies one or more names (1-44 characters) of an external data set.

Sample screen

Figure 94. CEMT INQUIRE DSNAME screen
 IN DSN
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Dsn(CICSTS31.CICS.CICSH###.DFHCSD                     ) Vsa
     Fil(0001) Val Bas     Sta         Ava
  Dsn(CICSTS31.CICS.CICSHT61.FILEA                      ) Vsa
     Fil(0001) Val Bas     Sta         Ava
 
 
 
 
Note:
There are blank fields on the screen. With the exception of QUIESCESTATE, these show where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

Because of the large number of keywords supported for this command, only two lines of information for each result are displayed. The full set of keywords can be displayed by moving the cursor to the beginning of a displayed item (in front of the Dsn field) and pressing the ENTER key. You get a display of all the keyword information for the displayed item, as follows:

Figure 95. The expanded display of an individual entry
IN DSN
RESULT - OVERTYPE TO MODIFY
  Dsname(CICSTS31.CICS.CICSH###.DFHCSD)
  Accessmethod(Vsam)
  Action(              )
  Filecount(0001)
  Validity(Valid)
  Object(Base)
  Recovstatus(Notrecovable)
  Backuptype(Static)
  Frlog()
  Availability( Available )
  Lostlocks()
  Retlocks(Noretained)
  Uowaction(              )
  Basedsname(CICSTS31.CICS.CICSH###.DFHCSD)
  Quiescestate( Unquiesced )
  Fwdrecovlsn()

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DSNAME
 
                        .-ALl----------------.
>>-CEMT Inquire DSName--+--------------------+-----------------><
                        +-(value)------------+
                        +-+-Vsam-+-----------+
                        | '-Bdam-'           |
                        +-+-Remove-----+-----+
                        | +-Recovered--+     |
                        | +-Resetlocks-+     |
                        | '-Retry------'     |
                        +-Filecount(value)---+
                        +-+-Valid---+--------+
                        | '-Invalid-'        |
                        +-+-Path-+-----------+
                        | '-Base-'           |
                        +-+-Fwdrecovable-+---+
                        | +-Notrecovable-+   |
                        | +-Recoverable--+   |
                        | '-Undetermined-'   |
                        +-+-Static-------+---+
                        | +-Dynamic------+   |
                        | '-Undetermined-'   |
                        +-Frlog(value)-------+
                        +-+-Available---+----+
                        | '-Unavailable-'    |
                        +-+-Nolostlocks--+---+
                        | +-Remlostlocks-+   |
                        | '-Recoverlocks-'   |
                        +-+-Retained---+-----+
                        | '-Noretained-'     |
                        +-+-Backout-+--------+
                        | '-Commit--'        |
                        +-Basedsname(value)--+
                        +-+-Quiescestate-+---+
                        | +-Unquiesced---+   |
                        | '-Immquiesced--'   |
                        '-Fwdrecovlsn(value)-'
 

Displayed fields

Accessmethod
displays the access method of the data set. The values are:
Vsam
Virtual storage access method (VSAM).
Bdam
Basic direct access method (BDAM).
Action (input only field)
specifies the action to be taken on this data set. The values are:
Remove
This option is used when a data set is no longer required on the local system. It deletes the data set name block for the named data set. The REMOVE option can be used only when there are no file control resource definition entries that refer to the specified data set. If any file definitions refer to the data set name when you enter SET DSNAME REMOVE, you receive an error message indicating that the use count of the data set name block is not zero. To ensure that no file definitions refer to the data set name:
  • Close all files that refer to the data set. These files can be found using the command:
      CEMT INQUIRE FILE(*) DSNAME(dsname)
  • Either remove the data set name from each file entry (by over-typing the data set name with blanks on the CEMT display), or discard the file definition entirely.
If you have a base data set with one or more alternate indexes, you are unable to remove the data set name block for the base until you have removed all references to the base data set and all references to paths.
Recovered
The data set has been restored from a backup version and forward recovery has run and completed successfully. CICS normally updates the backup-while-open (BWO) attributes for the base cluster data set BASEDSNAME, using MVS/DFP™ 3.2 Callable Services.

If the BWO attributes are not updated after the restore of a backup copy of a data set that was taken using BWO, CICS fails a subsequent file open because the data set is marked as down-level.

Resetlocks (vsam only)
Purges shunted UOW log records for backout-failed and commit-failed UOWs that hold locks on this data set, and releases the retained locks:
  • Backout-failed UOWs are those that failed during backout processing.
  • Commit-failed UOWs are those that have updated RLS data sets, and have failed to release locks during the second phase of 2-phase commit syncpoint processing.

If you specify this option, you are accepting backout failure and some loss of data integrity rather than retaining locks and delaying transactions, and therefore it should be used only as a last resort.

For backout-failed and commit-failed UOWs that hold locks on the data set, all records relating to this data set are removed from the system log and all retained record locks held by this CICS for the data set are released. Diagnostic messages are written to the CSFL transient data queue for each backout-failed log record that is removed as a result of the RESETLOCKS operation.

RESETLOCKS applies only to shunted UOW log records that are classed as backout-failed and commit-failed. Therefore it cannot be issued for a BDAM data set. Backout-failed and commit-failed log records are not shunted for BDAM data sets.

You might use RESETLOCKS if backout-failed or commit-failed log records are holding up lost locks recovery for the data set, and there is no other way of resolving them.

Notes:
  1. This option does not apply to shunted in-doubt UOWs. Try to resolve the shunted in-doubt UOWs that hold locks on the data set in other ways before issuing RESETLOCKS; for example, by using COMMIT, BACKOUT, or FORCE (see the CEMT SET DSNAME command for information about these options).
  2. RESETLOCKS can fail during the commit phase (for example, if an error occurs while CICS is trying to release the RLS locks), in which case the UOWs revert to being shunted as commit-failed UOWs.
Retry
Specifies that shunted UOW log records, caused by failed backout and commit processing as a result of the failure of this data set, should be retried. This is similar in operation to the EXEC CICS RESYNC command, but applies to backout-failed and commit-failed UOWs only, and not to in-doubt UOWs.

You should use RETRY when the data set has shunted backout- or commit-failed UOWs associated with it, and you believe that some or all of the data set problems are either transient or have been resolved.

Messages, issued at the time of a data set failure that causes UOWs to be shunted, recommend the actions that are required to recover from the failure.

RETRY does not affect data integrity, and can be used safely at any time to enable some failed recovery work to complete.

Availability
displays information indicating whether the data set is currently flagged, in this CICS region, as available or unavailable for use. The availability indicator is a local flag that a CICS region maintains in a data set name block (DSNB) for each data set. If the file is a BDAM data set, no information is returned. The values are:
Available
The data set is available for use according to the CICS data set name block. CICS can issue either RLS or non-RLS open requests for this data set.
Note:
Although a data set is available according to information held by CICS, an open request could still fail if the ICF catalog indicates otherwise. This can occur, for example, if data set recovery is pending or actually in progress.
Unavailable
The data set is marked by CICS as not available for use. The CICS region is unable to open the data set in either RLS or non-RLS mode.

AVAILABILITY can be reset by specifying AVAILABLE.

Backuptype
displays the backup type of the data set. The values are:
Static
The data set is accessed in non-RLS mode and is not eligible for BWO processing. All the files in this data set must be closed and the data set serialized by a backup manager such as DFSMS/MVS® before a data set backup copy can be made.
Dynamic
The data set is accessed in RLS mode and is eligible for BWO processing. Data set backup is allowed while it is open for output, using a data set backup manager such as DFSMShsm™ or DFSMSdss™. 2
Undetermined
The data set has not been opened by the CICS region in which the command is issued, or the data set is BDAM or a VSAM PATH. NOTAPPLIC is also returned if the dataset has been opened in RLS mode. The VSAM catalog should be referred to get the BWO status.
Basedsname (value) (VSAM only)
When PATH is displayed as well, this is the name of the base data set with which this path is associated.

When BASE is displayed as well, this is the same as the name shown in the Dsn(value) field.

Dsname (value)
indicates that this panel relates to an external data set inquiry and displays the 44-character name of an external data set.
Filecount (value)
displays information on how many different files are currently associated with this data set. You can associate a file with a data set by a job control DD statement, or dynamically by a DSNAME parameter on the file definition. If a file has been associated by a job control DD statement, the file name cannot be changed by a CEDA command or by a CEMT or EXEC CICS SET FILE DSNAME command.

FILECOUNT does not show how many files are open against the data set; it only shows how many files are associated with the data set. If a file is associated with a data set and is then closed and associated with a different data set, the FILECOUNT of the first data set decreases by 1, and the FILECOUNT of the second data set increases by 1.

Frlog (value)
displays the numeric journal identifier of the journal being used to log the updates for forward recovery if this data set is forward recoverable (FWDRECOVABLE). The FRLOG value is undefined if the data set is not forward recoverable. You can define a data set as forward recoverable either in the ICF catalog or, if it is accessed in non-RLS mode, in the file resource definition. This option is meaningful only for data sets accessed in LSR or NSR mode, and for which the forward recovery attributes are obtained from the CICS file resource definition.

For data sets accessed in RLS mode (if DFSMS™ 1.3 is installed), or non-RLS mode data sets for which CICS obtains the recovery attributes from the ICF catalog, CICS displays a value of zero.

Fwdrecovlsn (value)
displays the name of the log stream that is used to log the updates if this data set is defined as forward recoverable. CICS returns nulls if the data set is not forward recoverable.

The log stream name returned is either:

  • The log stream name specified directly in the ICF catalog, or
  • For a non-RLS access mode data set that does not have forward recovery attributes in the ICF catalog, it is a log stream name identified by CICS through a journal name generated from the FWDRECOVLOG value.
Lostlocks
displays whether there are any lost locks for this data set. The possible values displayed are:
Nolostlocks
The data set has no lost locks.
Remlostlocks
The data set has lost locks, hence is unavailable, but no recovery is required on this CICS. (The lost locks belong to a another (remote) CICS region.)
Recoverlocks
The data set has lost locks and therefore is unavailable. This CICS system is performing lost-locks recovery.
Object
displays the type of the data set. The values are:
Path (VSAM only)
This data set is a path leading to another data set.
Base
The named data set is a base data set, as opposed to a path data set.
Quiescestate
displays the RLS quiesce state of the data set. The information is obtained from the ICF catalog entry for the data set. The values displayed are:
Quiesced
A data set has been quiesced. It means that RLS ACBs cannot open against the data set and no CICS region has an RLS ACB currently open against this data set. However, the data set can be opened in non-RLS mode.
Unquiesced
This is the normal value for a data set that is not quiescing or has not been quiesced. It indicates that RLS or non-RLS ACBs can be opened against the data set, the mode being established by the first open. After an ACB is opened in one mode, other ACBs can be opened only in the same mode.

If a data set is quiescing because a SET DSNAME QUIESCE command was issued in the same region as the CEMT I DSN command, the words "BEING QUIESCED" are displayed.

If a data set is quiescing, the words "BEING QUIESCED" are displayed for the CICS region in which the command was issued.

If quiesce does not apply (for example, for a BDAM data set), nothing is displayed.

Quiescestate can be reset by specifying Quiesced|Unquiesced or:

Immquiesced
Causes all existing CICS open RLS ACBs throughout the sysplex to be closed and the data set to be marked as quiesced in the ICF catalog. Each CICS in the sysplex abends all in-flight UOWs that are accessing the data set before closing ACBs, causing in-flight UOWs to back out. Any OUWs that fail backout are shunted. No RLS ACBs can open against this data set, but non-RLS open requests are permitted.
Recovstatus
displays the recovery status of the data set. The values are:
Fwdrecovable
All updates to the data set are logged for both backout and forward recovery.
Notrecovable
Updates to the data set are not logged.

This response may also be returned as the result of use of the XFCNREC global user exit. A program enabled at XFCNREC may indicate that file opens should proceed even if there is a mismatch in the backout recovery requirements for different files associated with same data set. In these circumstances, the data set is marked as NOTRECOVABLE to indicate that its data integrity can no longer be guaranteed.

The condition remains until cleared by a CEMT or EXEC CICS SET DSNAME REMOVE command, or by an initial or cold start of CICS (if the associated data set is not in backout-failed state). While the data set is in this state, backout logging is performed for a particular request based on the specification in the file definition. Therefore backout logging may occur for requests via one file and not via another.

Recoverable
All updates to the data set are logged for backout.
Undetermined
The recovery status of the data set is not known because files accessing the data set have not been opened for output.
Retlocks
displays whether there are any retained record locks, as a result of deferred recovery work by this CICS region, for the specified data set.
Retained
This CICS region has deferred recovery work causing retained locks for the data set. One effect of this is that, if the data set was last opened in RLS mode, the locks are RLS locks and therefore the data set cannot be opened in non-RLS mode.

Another effect is that any FILE definitions that specify this data set cannot be changed to specify a different data set.

If the data set is a BDAM data set, or a VSAM data set accessed in non-RLS mode, the locks are CICS record locks, otherwise they are RLS record locks.

Noretained
This CICS region has no deferred recovery work for the base data set, and therefore no retained locks.
Note:
Noretained can also mean that the CICS region is currently processing deferred recovery work. When the recovery work is successfully completed, the value remains as NORETAINED until more deferred work is created. If the recovery work is not successfully completed, the value reverts to RETAINED.
Uowaction (input only field)
specifies the action to be taken for all shunted units of work that reference this data set. The values are:
Backout
Specifies that all shunted in-doubt units of work that hold locks on the data set should be backed out.
Commit
Specifies that all shunted in-doubt units of work that hold locks on the data set should be committed. Specifies that all shunted in-doubt units of work that hold locks on the data set should be forced to BACKOUT or COMMIT, as specified by the ACTION attribute on the transaction resource definition.
Validity
displays the validity of the data-set name. The values are:
Valid
The data-set name has been validated against the VSAM catalog by opening a file against that data set.
Invalid
The data-set name has not been validated against the VSAM catalog by opening a file against that data set.

CEMT INQUIRE DUMPDS

Function

Retrieve information about the CICS dump data sets.

Description

INQUIRE DUMPDS tells you which dump data set (A or B) is currently open.

Instead of using the SET command, you can overtype your changes on the INQUIRE screen after tabbing to the appropriate field. See Overtyping a display.

For information on using dumps, see the CICS Problem Determination Guide.

Input

Press the Clear key and type CEMT INQUIRE DUMPDS (the minimum abbreviation is CEMT I DU).

You will get a display screen, a sample of which is shown below. If you want to change any of the values shown, you can then tab to the highlighted or blank fields and overtype them as required.

Sample screen

Figure 96. CEMT INQUIRE DUMPDS screen
  IN DUMPDS
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Dum Cur(A) Ope

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 97.

Figure 97. The expanded display
 IN DUMPD
 RESULT - OVERTYPE TO MODIFY
   Dumpds
   Currentdds(A)
   Openstatus( Open )
   Switchstatus( Noautoswitch )

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE DUMPDS
 
>>-CEMT Inquire DUmpds--+-------------------+--+--------+------->
                        '-Currentdds(value)-'  +-Open---+
                                               +-Closed-+
                                               '-Switch-'
 
>--+--------------+--------------------------------------------><
   +-Autoswitch---+
   '-Noautoswitch-'
 

Displayed fields

Currentdds (value)
displays a 1-character indicator as to which of the two dump data sets is active. This can be A or B.
DUmpds
indicates that this panel relates to a dump data set inquiry.
Openstatus
displays the status of the active CICS dump data set. The values are:
Open
The active CICS dump data set is open.
Closed
The active CICS dump data set is closed.
Switch
The currently active dump data set is to become inactive, and the currently inactive data set is to become active.
Note:
You can reset this value by overtyping it with a different value.
Switchstatus
displays whether there is to be an automatic switch to the inactive dump data set when the active dump data set is full. The values are:
Autoswitch
The switch occurs only when the active dump data set is full, but not subsequently.
Noautoswitch
When the active dump data set is full, there is not to be an automatic switch to the inactive dump data set.
Note:
Because this is a ‘negative’ attribute, the field appears blank. You can, however, tab to this field and overtype it with a different value.
Note:
You can reset this value by overtyping it with a different value.

CEMT INQUIRE ENQ

Function

-Retrieve information about enqueues held or waited on by a UOW, or about UOWs holding or waiting on a specified enqueue.

Description

INQUIRE ENQ returns information about the enqueues held by a UOW. Enqueues are used by CICS to lock recoverable resources such as file records or queues to the UOW that is updating them. User enqueues obtained by the EXEC CICS ENQ command are also returned.

You can use INQUIRE ENQ to indicate which records and queues would be affected if the UOW were forced.

The transaction also returns information about UOWs that are waiting on the enqueues. This enables you to diagnose enqueue deadlocks between tasks wanting to update the same resources.

Enqueues are typically held in active state, which means that other tasks are allowed to wait for the enqueue. However, if the UOW that owns the enqueue suffers an in-doubt failure, the enqueue is usually converted to the retained state until the in-doubt failure can be resolved. INQUIRE ENQ also retrieves information about these enqueues and can be used to identify which records and queues would be affected if the UOW were forced.

Notes:
  1. Both UOW-lifetime and task-lifetime enqueues are returned by INQUIRE ENQ. (For an explanation of UOW- and task-lifetime enqueues, see the MAXLIFETIME option of the EXEC CICS ENQ command in the CICS System Programming Reference).
  2. On an in-doubt failure, user enqueues are released, unless the EXEC CICS ENQ command specified MAXLIFETIME(TASK) and it is not the end-of-task syncpoint that suffers the failure.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

Sample screen

Figure 98. CEMT INQUIRE ENQ screen
 INQ ENQ
 STATUS:  RESULTS
  Enq(AC143001D4A72601) Tra(CECI) Tas(0000038) Act Exe Own
     Res(ACCOUNTS.DBASE1           ) Rle(015) Enq(00000000)
  Enq(AC143001D4A72601) Tra(CECI) Tas(0000038) Act Add Own
     Res(g...                      ) Rle(004) Enq(00000000)

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 99.

Figure 99. The expanded display of an individual entry
 INQ ENQ
 RESULT
   Enq
   Enq(AC143001D4A72601)
   Transid(CECI)
   Taskid(0000038)
   State(Active)
   Type(Execenq)
   Relation(Owner)
   Duration()
   Resource(ACCOUNTS.DBASE1)
   Rlen(015)
   Enqfails(00000000)
   Netuowid(..GBIBMIYA.IYA2T5C2...Mx...)
   Qualifier()
   Qlen(000)

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE ENQ
 
>>-CEMT Inquire Enq--+------------+--+----------------+--------->
                     '-Uow(value)-'  '-Transid(value)-'
 
>--+---------------+--+----------+--+-------------+------------->
   '-Taskid(value)-'  +-Active---+  +-Dataset-----+
                      '-Retained-'  +-File--------+
                                    +-Execenq-----+
                                    +-Addrexecenq-+
                                    +-Tdq---------+
                                    '-Tsq---------'
 
>--+--------+--+-----------------+--+-----------------+--------->
   +-Owner--+  '-Duration(value)-'  '-Resource(value)-'
   '-Waiter-'
 
>--+-------------+--+-----------------+--+-----------------+---->
   '-Rlen(value)-'  '-Enqfails(value)-'  '-Netuowid(value)-'
 
>--+------------------+--+-------------+-----------------------><
   '-Qualifier(value)-'  '-Qlen(value)-'
 

Displayed fields

Duration (value)
displays the elapsed time (in seconds) since the enqueue ntered its current state of OWNER, WAITER or RETAINED.
Enqfails (value)
displays, for enqueues held in retained state, the number of failed enqueue attempts for this resource since the enqueue was last acquired. This indicates how many UOWs have received LOCKED responses due to this enqueue. The ENQFAILS option helps you identify which UOWs are causing "bottlenecks".

For enqueues held in action state, ENQFAILS displays zero.

Enqscope (value)
If the enqueue has sysplex scope, ENQSCOPE displays the 4-character name which was used to qualify the sysplex-wide ENQUEUE request issued by this CICS region. If it has region scope, ENQSCOPE displays blanks.

All CICS systems with the same ENQSCOPE value share the same sysplex Enqueue name space.

Netuowid (value)
displays a 27-character string containing the network-wide LU6.2 name of the UOW that owns or is waiting for the enqueue.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel: to see the value in hexadecimal.
Qualifier (value)
displays a 1- through 255-character qualifier (for example, record id) that further identifies the resource associated with the enqueue lock. The data displayed depends on the type of enqueue, as shown in Table 3. If no QUALIFIER data applies (that is for EXECENQ, ADDREXECENQ, or TSQ), a value of zero is displayed.
Qlen (value)
displays the length of the data, in the range 0 through 255, displayed in the QUALIFIER field.
Relation
displays whether the data is associated with the owner of the enqueue or with a task waiting for the enqueue. The values are:
Owner
The (value), NETUOWID, TASKID, and TRANSID are those of the owner of the enqueue.
Waiter
The (value), NETUOWID, TASKID, and TRANSID are those of a waiter for the enqueue.
Resource (value)
displays a 1- through 255-character string containing the name of the resource associated with the enqueue lock. The data displayed depends on the type of enqueue, as shown in Table 3.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel: to see the value in hexadecimal.
Rlen (value)
displays the length of the data, in the range 0 through 255, displayed in the RESOURCE field.
State
displays the state that the enqueue is held in. The values are:
Active
The enqueue is held in active state.
Retained
The enqueue is held in retained state. Its owning UOW has been shunted, or is in the process of being shunted.
Taskid (value)
displays the number of the task associated with the UOW. If the UOW is shunted, it is the task number associated with the UOW before it was shunted.
Transid (value)
displays the 4-character identifier of the transaction associated with the UOW. If the UOW is shunted, it is the identifier of the transaction associated with the UOW before it was shunted.
Type
displays the type of resource being enqueued upon. The values are:
Dataset
The resource is a record in a VSAM data set (or a CICS-maintained data table). RESOURCE contains the name of the data set and QUALIFIER contains the record identifier.
File
The resource is a record in either a BDAM file or a user-maintained data table. RESOURCE contains the name of the file and QUALIFIER contains the record identifier.

When the file is a BDAM file then the record identifier is prefixed by the BDAM block identifier. Note that truncation occurs if this combination exceeds 255 characters.

Execenq
The resource is associated with an EXEC CICS ENQ request. RESOURCE contains the enqueue argument passed on the request.
Addrexecenq
The resource is associated with an EXEC CICS ENQ request. RESOURCE contains the address enqueue argument passed on the request (that is, the LENGTH parameter was omitted on the request)
Tdq
The resource is a logically-recoverable transient data queue. RESOURCE contains the name of the queue. QUALIFIER contains either the string "FROMQ" or "TOQ", indicating whether a read or write lock is held for the queue.

A READQ TD request acquires the "FROMQ" lock, whereas a WRITEQ TD request acquires the "TOQ" lock associated with the queue. A DELETEQ TD request acquires both the "TOQ" and the "FROMQ" locks.

Tsq
The resource is a recoverable temporary storage queue. RESOURCE contains the name of the queue.

The data displayed in the RESOURCE and QUALIFIER fields depends on the resource type, as shown in Table 3.

Table 3. Data displayed in RESOURCE and QUALIFIER
Type Resource Qualifier
DATASET Dataset name Record identifier
EXECENQ EXEC enqueue argument None
ADDREXECENQ Address of EXEC enqueue argument None
FILE File name Record identifier
TDQ TD queue name FROMQ or TOQ
TSQ TS queue name None
Uow (value)
displays the 16-character local identifier of the associated unit of work.

CEMT INQUIRE ENQMODEL

Function

Retrieve information about enqmodel definitions on the local system.

Input

Press the Clear key and type CEMT INQUIRE ENQMODEL (the minimum abbreviation is CEMT I ENQM).

You get a display screen, a sample of which is shown below. If you want to change any of the values shown, you can then tab to the highlighted or blank fields and overtype them as required.

Sample screen

Figure 100. CEMT INQUIRE ENQMODEL screen
 INQ ENQMODEL
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Enqm(*       )                                              NOT FOUND





 
Figure 101. CEMT INQUIRE ENQMODEL expanded display screen
i enqm all
STATUS:  RESULTS - OVERTYPE TO MODIFY
 Enqm(fred    ) Enqs(TEST) Ena
    Enqn(HURSLEY                   )
 Enqm(norman  ) Enqs(SYSP) Ena
    Enqn(NORMAN                    )















                                             SYSID=HT61 APPLID=CICSHT61
 RESPONSE: NORMAL                      TIME:  13.23.25  DATE: 02.21.01
PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE ENQMODEL
 
                          .-All---.
>>-CEMT Inquire ENQModel--+-------+--+-----------------+-------->
                          '-value-'  '-Enqscope(value)-'
 
>--+----------+--+----------------+----------------------------><
   +-Disabled-+  '-Enqname(value)-'
   +-Enabled--+
   '-Waiting--'
 

Displayed fields

All
is sthe default.
ENQModel
The 8-character identifier of the resource definition
Enqname
The 1 - 255 character resource or generic name.

EXEC ENQ requests issued by this CICS region are checked against this resource or generic name. If a match is found, and enqscope was specified, the enqueue is to be sysplex-wide, qualified by the 4-character enqscope.

Enqscope
Returns the 4-character name used to qualify SYSPLEX ENQUEUE requests issued by this CICS region. Four blanks indicates that the ENQ is LOCAL.
Status
displays the treatment of matching ENQ requests. The values are:
Disabled
Matching ENQ requests are rejected, and the issuing task abended abcode ENQ_DISABLED. Matching INSTALL/CREATE/DISCARD requests are processed.
Enabled
Matching ENQ requests are processed in the normal way.
Waiting
Matching ENQ requests are rejected, and the issuing task abended abcode ENQ_DISABLED. There are INSTALL/CREATE/DISCARD requests waiting to be processed.

CEMT INQUIRE EXCI

Function

Retrieve information about jobs using the external CICS interface.

Description

INQUIRE EXCI identifies the names of batch jobs currently connected to CICS through the interregion communication (IRC) facility. These jobs are using the external CICS interface (EXCI) to link to a server program running in CICS.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

Sample screen

Figure 102. CEMT INQUIRE EXCI screen
  INQ EXCI
  STATUS:  RESULTS
   Exc(HADBS1..CICSWK1 - MV29             ) Tas(0000121)
   Exc(AHCLN2..TRNSL 1 - MV29             ) Tas(0000125)
      Uri(B 67B1F77EB7D       21 1 1      )
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 103.

Figure 103. The expanded display of an individual entry
 INQ EXCI
 RESULT
     Exc(HADBS1..CICSWK1 - MV29            ) Tas(0000121)
     Task(0000121)

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE EXCI
 
>>-CEMT Inquire EXci--+--------------+-------------------------><
                      +-Task(number)-+
                      '-Urid(value)--'
 

Displayed fields

EXci (value)
indicates that this panel relates to an EXCI inquiry.

The value consists of:

  jobname.stepname.procname - mvsid

One or both of the stepname and procname may not be present, indicated by the periods (.) being adjacent to one another.

The mvsid identifies the MVS system on which the job is running. If XCF/MRO is in use, the job can reside on a different MVS image from that on which CICS is running.

Task (value)
displays the task number of the mirror transaction running on behalf of a specific batch job.

Information about jobs using the external CICS interface is available only after that job has issued at least one DPL request. A nonzero task number indicates that a DPL request is currently active. A zero task number indicates that an external CICS interface session is still open (connected) for that job, although no DPL request is currently active.

Urid (value)
displays, when the job is using RRMS to coordinate updates, and when there is an active DPL request for the session, a 32-character string containing the hexadecimal representation of the RRMS Unit of Recovery Identifier.

CEMT INQUIRE FEPI

Comments

For information on CEMT INQUIRE FECONNECTION, CEMT INQUIRE FEPOOL, CEMT INQUIRE FEPROPSET, and CEMT INQUIRE FETARGET, see the CICS Front End Programming Interface User’s Guide.

CEMT INQUIRE FILE

Function

Retrieve information about VSAM, BDAM, and remote files, and files that refer to data tables.

Description

The values that are returned to you can vary according to when the command is issued. For example, if the file is closed when you issue the command, much of the information you receive tells you the state of the file when it is next opened. If the file has never been opened, you receive default or null values for some of the options, which could change when the file is opened.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You can then tab to the highlighted or blank fields and overtype them with the required values.

(value)
specifies one or more names (1-8 characters) of files defined to CICS.
ALl
is the default. Information about all files is given, unless you specify a selection of files to be queried.

Sample screen

Figure 104. CEMT INQUIRE FILE screen
  IN FILE
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Fil(DFHCMACD) Vsa Ope Ena Rea                     Sha
          Dsn( CICSTS31.CICS.DFHCMACD                             )
   Fil(DFHCSD  ) Vsa Clo Une Rea Upd Add Bro Del     Sha
          Dsn( CICSTS31.CICS.CICSH.DFHCSD                         )
   Fil(DFHDBFK ) Vsa Clo Ena Rea Upd Add Bro Del     Sha
   Fil(DFHLRQ  ) Vsa Ope Ena Rea Upd Add Bro Del     Sha
          Dsn( CICSTS31.CICS.CICSH.DFHLRQ                         )
   Fil(FILEA   ) Vsa Clo Ena Rea Upd Add Bro Del     Sha
          Dsn( CICSTS31.CICS.CICSH.FILEA                          ) Cft Loa

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 105.

Figure 105. The expanded display of an individual entry
  INQ FILE
  RESULT - OVERTYPE TO MODIFY
    File(DFHCSD)
    Accessmethod(Vsam)
    Openstatus( Closed )
    Enablestatus( Unenabled )
    Readstatus( Read )
    Updatestatus( Update )
    Addstatus( Addable )
    Browsestatus( Browse )
    Deletestatus( Delete )
    Exclstatus(              )
    Disposition( Share )
    Rlsaccess( Notrls )
    Emptystatus( Noemptyreq )
    Dsname( CICSTS31.CICS.CICSH.DFHCSD                        )
    Table( Nottable )
    Loadtype( Noload )
    Cfdtpool(          )
 +  Tablename(          )
    Updatemodel(         )
    Maxnumrecs( 00000000 )
    Keylength( 000 )
    Recordsize( 00000 )

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE FILE
 
                      .-ALl-----.
>>-CEMT Inquire FIle--+---------+--+--------+--+--------+------->
                      '-(value)-'  +-Vsam---+  +-OPen---+
                                   +-BDam---+  '-CLosed-'
                                   '-REMote-'
 
>--+-----------+--+--------+--+----------+--+-----------+------->
   +-ENabled---+  +-REAd---+  +-UPdate---+  +-ADdable---+
   +-UNenabled-+  '-NORead-'  '-NOUpdate-'  '-NOAddable-'
   '-DIsabled--'
 
>--+----------+--+----------+--+-------------+--+-------+------->
   +-BRowse---+  +-DElete---+  +-EXclusive---+  +-OLd---+
   '-NOBrowse-'  '-NODelete-'  '-NOEXclusive-'  '-Share-'
 
>--+--------+--+------------+--+---------------+---------------->
   +-RLs----+  +-EMptyreq---+  '-DSname(value)-'
   '-NOTRls-'  '-NOEMptyreq-'
 
>--+-----------+--+--------+--+-----------------+--------------->
   +-NOTTable--+  +-LOAd---+  '-CFDtpool(value)-'
   +-CIcstable-+  '-NOLoad-'
   +-USertable-+
   '-CFTable---'
 
>--+------------------+--+------------+------------------------->
   '-Tablename(value)-'  +-LOCKING----+
                         '-COntention-'
 
>--+-------------------+--+------------------+------------------>
   '-Maxnumrecs(value)-'  '-Keylength(value)-'
 
>--+-------------------+---------------------------------------><
   '-RECordsize(value)-'
 

Displayed fields

Accessmethod
displays the access method of the file. The values are:
Vsam
Virtual storage access method (VSAM).
Bdam
Basic direct access method (BDAM).
Remote
The file is defined as remote.
Addstatus
displays whether new records can be added to the file. The values are:
Addable
New records can be added to the file.
Noaddable
New records cannot be added to the file.
Note:
You can reset this value by overtyping it with a different value.
Browsestatus
displays whether you can browse the file. The values are:
Browse
You can browse records in the file.
Nobrowse
You cannot browse records in the file.
Note:
You can reset this value by overtyping it with a different value.
Cfdtpool (name)
displays, for a file that refers to a coupling facility data table, the 8-character name of the coupling facility data table pool in which the CFDT resides.

If the pool name is not defined, the name is displayed as 8 blanks. If the pool name is specified, it is always displayed even if the file definition does not refer to a coupling facility data table.

Deletestatus
displays whether you can delete records from the file. The values are:
Delete
You can delete records from the file.
Nodelete
You cannot delete records from the file.
Note:
You can reset this value by overtyping it with a different value.
Disposition
displays the disposition of this file. The values are:
Old
The disposition of the data set associated with the file is defined as unshared for dynamic allocation.
Share
The disposition of the data set associated with the file is defined as shared for dynamic allocation.
Note:
You can reset this value by overtyping it with a different value.
Dsname (value)
displays the name (1-44 characters) of the VSAM or BDAM data set with which this file is associated.

For a coupling facility data table, CICS displays the name of the source data set if the file specifies that the table is initially loaded from a data set, otherwise CICS displays blanks.

CICS also displays blanks for files that have their DSNAME specified on a DD statement in the CICS JCL if the file has not been opened since the last cold or initial start.

Note:
If the file is disabled, you can change this name by overtyping it with a different value.
Emptystatus (VSAM only)
displays whether the data set is to be made empty when a file that references it is next opened. This is valid only for data sets that have been defined as reusable and are accessed in non-RLS mode. The values are:
Emptyreq
Applies only to a VSAM file that has been defined to VSAM as a cluster with the REUSE parameter. It indicates that when a file is next opened, its data is erased.
Noemptyreq
Applies only to VSAM files. It indicates that when a file is next opened, its data is not erased.
Note:
You can reset this value by overtyping it with a different value.
Enablestatus
displays whether transactions can access the file. The values are:
Enabled
The file is available for use by transactions and, if closed, it is opened on the first request.
Unenabled
The file is not available for use by transactions except for those that are currently using it. If there are any such users, ‘BEING CLOSED’ is also displayed.

This status is the same as DISABLED except that it occurs implicitly when a SET FILE CLOSE is requested. The file is enabled implicitly by a SET FILE OPEN command.

Disabled
The file is not available for use by transactions except for those that are currently using it. If there are any such users, ‘BEING DISABLED’ is also displayed.

The file can be reenabled by a SET FILE ENABLED command. (See also UNENABLED.)

It is not possible to disable a remote file.

Note:
You can reset this value by overtyping it with Enabled or Disabled.
Exclstatus (BDAM only)
displays whether records on this file are to be placed under exclusive control when a read for update is issued. The values are:
Exclusive
Records on the file are protected from simultaneous update.
Noexclusive
Records on the file are not protected from simultaneous update.
File (value)
indicates that this panel relates to a file inquiry and displays an 8-character file name.
Keylength (value)
displays the length of the record key for a file associated with a VSAM KSDS or a file associated with a coupling facility data table. If the file is associated with a BDAM data set, the value is the length of the logical key used for deblocking.
Notes:
  1. If the file is closed and the key length is not defined in the file definition, CICS displays a zero value.
  2. If the file is closed and a key length is defined on the file definition, CICS displays the value from the file definition.
  3. Generally, if a file is open, CICS obtains the key length from the associated data set, in which case CICS displays the value from the data set. However, files that refer to coupling facility data tables defined with LOAD(NO) must get their keylength from the file definition, in which case CICS returns the defined value when the file is open. This value must also match that of the coupling facility data table if it has already been created.
Loadtype
displays the load type for a coupling facility data table. The values are:
Load
The coupling facility data table is, or is to be, preloaded from a source data set.
Noload
The coupling facility data table is not preloaded from a source data set.
Maxnumrecs (value)
displays the maximum number of records that the data table for this file can hold.
Notes:
  1. If the file resource definition specifies a MAXNUMRECS numeric value, even though the object is not a table (NOTTABLE is displayed on the TABLE option), CICS displays the specified value. The value can be in the range 1 through 99 999 999.
  2. If the file resource definition is specified with MAXNUMRECS(NOLIMIT), meaning the number of records is unlimited, CICS displays a value of zero. (Internally, CICS holds NOLIMIT as the maximum positive fullword value (+2147483647 or X'7FFFFFFF').
  3. If the file is remote, CICS displays a value of minus 1 (-1).
  4. If the object is a coupling facility data table:
    • The maximum number of records can be altered by a coupling facility data table server command, leaving the file definition MAXNUMRECS value unchanged. CICS displays the value in the file definition until the file is opened, after which CICS displays the actual MAXNUMRECS value defined to the server.
    • If the value is changed again by a coupling facility data table server command, CICS obtains and displays the new value only after a file control operation on the table. Until then, CICS continues to display the old value.
    • You can use the server DISPLAY TABLE console command to obtain the current value for a coupling facility data table.
Note:
You can reset this value by overtyping it with a different value. The new value takes effect only when a new data table is created (which happens on each file open for a CICS-maintained or user-maintained data table, but only when the table does not already exist for a CF data table).
Openstatus
displays the open status of the file. The values are:
Open
The file is open. If the file is OPEN ENABLED, it is available for data accesses by CICS transactions. If it is OPEN DISABLED, it must first be enabled before it is available.
Closed
The file is closed; the access method does not allow accesses to the data until the file is opened. The file can be opened either explicitly by the user or, if the file has the ENABLED attribute, implicitly by CICS on the next reference to the file.

A file with the DISABLED attribute can be enabled only by a SET FILE ENABLED command. A file with the UNENABLED attribute can be enabled by a SET FILE ENABLED command or SET FILE OPEN command.

The CLOSED status may be a temporary status for a file that has just come out of LOADMODE status.

Note:
You can reset this value by overtyping it with one of the above Openstatus values, or with:
Forceclose
Specifies that the file is to be closed, and the tasks of any existing users of the file are to be abended.
Readstatus
displays whether you can read records from the file. The values are:
Read
You can read records in the file.
Noread
You cannot read records in the file.
Note:
You can reset this value by overtyping it with a different value.
Recordsize (value)
displays the actual size of fixed-length records, or the maximum size of variable-length records.

If the file is not open, CICS displays the value specified in the installed file definition. If the file definition does not specify a record size, CICS displays a zero value.

Generally, if a file is open, CICS obtains the record size from the associated data set, in which case CICS displays the value from the data set. However, files that refer to coupling facility data tables defined with LOAD(NO) must get their record size from the file definition, in which case CICS returns the defined value when the file is open. This value must also match that of the coupling facility data table if it has already been created.

Rlsaccess (VSAM only)
displays whether the file is defined to be accessed in RLS mode. The values are:
Rls
The file is defined to be accessed in RLS mode.
Notrls
The file is defined to be accessed in a non-RLS mode (LSR or NSR)
Note:
You can reset this value by overtyping it with a different value.
Table
displays whether the file name specified on the FILE parameter represents a data table. The values are:
Nottable
The file name does not represent a data table.
Cftable
The file name represents a coupling facility data table.
Cicstable
The file name represents a CICS-maintained data table.
Usertable
The file name represents a user-maintained data table.
Note:
You can reset this value by overtyping it with a different value.
Tablename (value)
displays the table name specified for the coupling facility data table on the file resource definition, if one is specified, or displays the file name if no table name was specified on the file resource definition.

CICS displays blanks if the file does not refer to a coupling facility data table

Updatemodel (CFDT only)
displays the update model specified for the coupling facility data table in the installed file definition. The values are:
Contention
The coupling facility data table is updated using the contention model.
Locking
The coupling facility data table is updated using the locking model.
Updatestatus
displays whether the file is updatable. The values are:
Update
You can update records in the file.
Noupdate
You cannot update records in the file.
Note:
You can reset this value by overtyping it with a different value.

CEMT INQUIRE GTFTRACE

Function

Show the GTF status.

Description

CEMT INQUIRE GTFTRACE tells you whether CICS tracing to the MVS Generalized Tracing Facility (GTF) is started or stopped.

This command is intended for use at terminals that do not support the CETR full-screen tracing transaction.

For background information about GTF tracing, see the CICS Problem Determination Guide.

Input

Press the Clear key and type CEMT INQUIRE GTFTRACE (the minimum abbreviation is CEMT I G).

You will get a display screen, a sample of which is shown below. If you want to change the displayed value, you can then tab to the highlighted field and overtype it as required.

Sample screen

Figure 106. CEMT INQUIRE GTFTRACE screen
  IN GTFTRA
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Gtf Sto




 

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 107.

Figure 107. The expanded display
 IN GTFT
 RESULT - OVERTYPE TO MODIFY
   Gtftrace
   Status( Stop )


 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE GTFTRACE
 
>>-CEMT Inquire Gtftrace--+-Start-+----------------------------><
                          '-Stop--'
 

Displayed fields

Gtftrace
indicates that this panel relates to a GTFTRACE inquiry.
Status
displays the status of CICS tracing to the MVS Generalized Tracing Facility (GTF). The values are:
Start
CICS tracing to the MVS Generalized Tracing Facility (GTF) is in progress.
Stop
CICS tracing to the MVS Generalized Tracing Facility (GTF) is not in progress.
Note:
You can reset this value by overtyping it with a different value.
Start of change

CEMT INQUIRE HOST

Function

Inquire on the status of a virtual host.

Description

CEMT INQUIRE HOST allows you to retrieve information about a particular virtual host in the local CICS region.

Virtual hosts are based on the URIMAP resource definition object. CICS automatically creates virtual hosts for you, by grouping together into a single data structure all the URIMAP definitions in a CICS region that specify the same host name and the same TCPIPSERVICE. URIMAP definitions that specify no TCPIPSERVICE, and therefore apply to all of them, are added to all the data structures that specify a matching host name, so these URIMAP definitions might be part of more than one data structure.

Syntax

Press the Clear key and type CEMT INQUIRE HOST (the minimum abbreviation is CEMT I H).

You will get a display screen, a sample of which is shown below. If you want to change the displayed value, you can then tab to the highlighted field and overtype it as required.

Sample screen

Figure 108. CEMT INQUIRE HOST screen
  IN HOST
  STATUS:  RESULTS - OVERTYPE TO MODIFY
    Hos(www.hursleytest.ibm.com   )               Ena                            
    Hos(www.hursleytest2.ibm.com  )               Ena                            
                                                              

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 109.

Figure 109. The expanded display
 IN HOST
 RESULT - OVERTYPE TO MODIFY
     Host(www.hursleytest.ibm.com)                                               
     Tcpipservice(TEST2)                                                         
     Enablestatus( Enabled ) 	 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE HOST
 
>>-CEMT Inquire Host--+-(value)-+--Tcpipservice(value)---------->
                      '-ALl-----'
 
>--+-Enabled--+------------------------------------------------><
   '-Disabled-'
 

Options

(value)
specifies the name of a virtual host. The name of each virtual host is taken from the host name specified in the URIMAP definitions that make up the virtual host. For example, if your CICS region contained URIMAP definitions that specified a host name of www.research.ibm.com, CICS would create a virtual host with the name www.research.ibm.com. A host name in a URIMAP definition can be up to 120 characters.
Tcpipservice (value)
displays the name of the TCPIPSERVICE definition that specifies the inbound port to which this virtual host relates. If this definition is not given, the virtual host relates to all TCPIPSERVICE definitions.
Enablestatus
displays the status of the virtual host. The possible values are:
Enabled
The URIMAP definitions that make up the virtual host can be accessed.
Disabled
The URIMAP definitions that make up the virtual host cannot be accessed.
End of change

CEMT INQUIRE INTTRACE

Function

Show the status of CICS internal tracing.

Description

INQUIRE INTTRACE tells you whether CICS internal tracing is in progress.

This command is intended for use at terminals that do not support the full-screen tracing transaction CETR.

Input

Press the Clear key and type CEMT INQUIRE INTTRACE (the minimum abbreviation is CEMT I IN).

You will get a display screen, a sample of which is shown below. If you want to change the displayed value, you can then tab to the highlighted field and overtype it as required.

Sample screen

Figure 110. CEMT INQUIRE INTTRACE screen
  IN INTTRA
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Int Sta




 

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 111.

Figure 111. The expanded display
 IN INTT
 RESULT - OVERTYPE TO MODIFY
   Inttrace
   Status( Start )

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE INTTRACE
 
>>-CEMT Inquire INttrace--+-Start-+----------------------------><
                          '-Stop--'
 

Displayed fields

Inttrace
indicates that this panel relates to an INTTRACE inquiry.
Status
displays the status of CICS tracing to the MVS Generalized Tracing Facility (GTF). The values are:
Start
CICS internal tracing is in progress.
Stop
CICS internal tracing is not in progress.
Note:
You can reset this value by overtyping it with a different value.

CEMT INQUIRE IRBATCH

Function

Retrieve information about jobs using the external CICS interface.

Description

CEMT INQUIRE IRBATCH is retained for compatibility. You should use CEMT INQUIRE EXCI.

CEMT INQUIRE IRC

Function

Show the IRC status.

Description

INQUIRE IRC tells you whether the interregion communication (IRC) facility is open or closed.

Input

Press the Clear key and type CEMT INQUIRE IRC (the minimum abbreviation is CEMT I IRC).

You will get a display screen, a sample of which is shown below.

Sample screen

Figure 112. CEMT INQUIRE IRC screen
  IN IRC
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Irc Clo




 

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 113.

Figure 113. The expanded display
 IN IRC
 RESULT - OVERTYPE TO MODIFY
   Irc
   Openstatus( Closed )
   Return(00000000)
   Reason(00000000)



 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE IRC
 
>>-CEMT Inquire IRc--+-Closed-+--------------------------------><
                     '-Open---'
 

Displayed fields

IRc
indicates that this panel relates to an IRC inquiry.
Openstatus (value)
displays whether the interregion communication (IRC) facility is open or closed. The values are:
Closed
Interregion communication for this CICS system is terminated after tasks using the session have terminated normally.
Open
Interregion communication for this CICS system is initialized. This allows connections to be established between this system and other systems. You can control the availability of individual connections with the INSERVICE or OUTSERVICE settings on the connection names, using CEMT INQUIRE CONNECTION or CEMT SET CONNECTION.

The DFHIR3780 message is issued to the console log if the region made an unsuccessful attempt to start IRC.

Notes:
  1. You can reset this value by overtyping it with a different value, or with:
    Immclose
    All tasks using IRC sessions are to be abended when they next try to use the session. Interregion communication is terminated when all tasks that were using IRC have been abended or have terminated normally.
  2. The values of Return and Reason will be nonzero only after certain SET (or overtype) failures. These are accompanied by a message number, which you should refer to in the CICS Messages and Codes manual.

CEMT INQUIRE JMODEL

Function

Retrieve information about journal models and log stream names.

Description

The INQUIRE JMODEL command enables you to inquire on installed journal models to obtain corresponding log stream names.

Input

Press the CLEAR key to clear the screen. There are two ways of commencing this transaction:

(value)
specifies one or more journal models.
All
is the default.

Sample screen

  IN JMODE
  STATUS:  RESULTS
   Jmo(DFHJ02  ) Jou(DFHJ02  ) Mvs
      Str(BELL.TESTLOG.FWDRECOV     )
   Jmo(DFHLOG  ) Jou(DFHLOG  ) Mvs
      Str(&USERID..&APPLID..&JNAME. )
   Jmo(DFHSHUNT) Jou(DFHSHUNT) Mvs
      Str(&USERID..&APPLID..&JNAME. )


 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 114.

Figure 114. The expanded display of an individual entry
  IN JMODE
  RESULT
    Jmodel(DFHJ02)
    Journalname(DFHJ02)
    Type(Mvs)
    Streamname(BELL.TESTLOG.FWDRECOV)




 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE JMODEL
 
                        .-All-----.
>>-CEMT Inquire JModel--+---------+--+--------------------+----->
                        '-(value)-'  '-Journalname(value)-'
 
>--+-------+--+-------------------+----------------------------><
   +-Mvs---+  '-Streamname(value)-'
   +-Smf---+
   '-Dummy-'
 

Displayed fields

Jmodel (value)
indicates that this panel relates to a journal model inquiry and displays the 8-character name of an installed journal model.
Journalname
displays the 8-character journal name, which can be a specific or a generic name, for which this journal model can be used.
Streamname
displays the MVS log stream name (LSN) associated with this journal model. The name can be a specific LSN, or a template using any 3 of the 4 symbols &USERID, &APPLID, &JNAME and &SYSID.

An LSN or template can be up to 26 characters in length.

Type
displays the log stream type. The possible types are:
Mvs
Records for journals defined with this journal model are written to an MVS log stream.
Smf
Records for journals defined with this journal model are written to the MVS SMF data set.
Dummy
Records for journals defined with this journal model are not written to any log stream.

For information on changing JMODEL definitions, see CICS Resource Definition Guide.

CEMT INQUIRE JOURNALNAME

Function

Show the status of the CICS system log and general logs.

Description

The INQUIRE JOURNALNAME command enables you to inquire on the status of the CICS system log and general logs. It replaces the INQUIRE JOURNALNUM command.

Input

Press the CLEAR key to clear the screen. There are two ways of commencing this transaction:

(value)
specifies one or more journal names.

To inquire on journals defined with a numeric identifier in the range 1-99, specify journal name DFHJnn, where nn is the journal number.

To inquire on the system log, specify DFHLOG.

To inquire on the log-of-logs, specify DFHLGLOG.

All
is the default.

Sample screen

Figure 115. CEMT INQUIRE JOURNALNAME screen
  IN JOUR
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Journaln(DFHJ02  ) Smf Ena
   Journaln(DFHLGLOG) Mvs Ena
      Str(CICSHT##.CICSHTA1.DFHLGLOG  )
   Journaln(DFHLOG  ) Mvs Ena
      Str(CICSHT##.CICSHTA1.DFHLOG    )
   Journaln(DFHSHUNT) Mvs Ena
      Str(CICSHT##.CICSHTA1.DFHSHUNT  )


 
Note:
Blank fields on the screen indicate that a value does not apply or is ‘negative’; that is, it begins with ‘No’.

If you place the cursor against a specific entry in the list, CICS displays an expanded format as shown in Figure 116.

Figure 116. The expanded display
  IN JOUR
  RESULT - OVERTYPE TO MODIFY
    Journalname(DFHLOG)
    Type(Smf)
    Status( Enabled )
    Action(              )
    Streamname(CICSHT##.CICSHTA1.DFHLOG)


 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE JOURNALNAME
 
                             .-All-----.
>>-CEMT Inquire JOurnalname--+---------+--+-------+------------->
                             '-(value)-'  +-Mvs---+
                                          +-Smf---+
                                          '-Dummy-'
 
>--+----------+--+-------+--+-------------------+--------------><
   +-Enabaled-+  +-Flush-+  '-Streamname(value)-'
   +-Disabled-+  '-Reset-'
   '-Failed---'
 

Displayed fields

Action (value)
specifies the action you want CICS to take for the specified journal name. The values are:
Flush
The log buffers are written out to the log stream but the journal is not closed.

You can use this option to ensure that all current records are written out to the log stream before the stream is processed using a batch utility.

Reset
The journal is disabled but can be reenabled by the SET JOURNALNAME RESET command.
Journalname (value)
indicates that this panel relates to a journal name inquiry and displays a 1- to 8-character journal name.
Status
displays the status of the journal. The possible values are:
Enabled
The journal is installed and available for use.
Disabled
The journal has been disabled by a CEMT, or EXEC CICS, SET JOURNALNAME(...) command. It cannot be used until it is re-enabled by the STATUS(ENABLED) or ACTION(RESET) options on a SET JOURNALNAME command.
Failed
The journal has experienced a log stream failure. It cannot be used until it is re-enabled by the STATUS(ENABLED) or ACTION(RESET) options on a a SET JOURNALNAME command, or until following the next CICS restart. The log stream should be deleted from the MVS system logger inventory before being used again.
Note:
You can reset STATUS with ENABLED or DISABLED.
Streamname (value)
displays the MVS log stream name associated with the journal. CICS displays 8 blanks (X'40') if the journal is defined with a type of DUMMY or SMF.
Type
displays the type of log stream. The possible types are:
Mvs
Records for journals defined with this journal model are written to an MVS log stream.
Smf
Records for journals defined with this journal model are written to the MVS SMF data set.
Dummy
Records for journals defined with this journal model are not written to any log stream.

CEMT INQUIRE JVM

Function

Identify the JVMs in a CICS region and report their status.

Input

Enter CEMT INQUIRE JVM (or CEMT I JVM) to display all the JVMs in the CICS region. You cannot change the displayed values. You can also enter CEMT INQUIRE JVM with one of the values listed below, to display all the JVMs in the CICS region with a particular status. For example, you could enter CEMT INQUIRE JVM UEXECKEY to display all the JVMs that execute in user key, or CEMT INQUIRE JVM PROFILE(DFHJVMPC) to display all the JVMs that were created with the JVM profile DFHJVMPC.

The INQUIRE JVM command does not find the master JVM that initializes the shared class cache. It only finds JVMs that are, or could be, allocated to tasks.

Sample screen

Figure 117. CEMT INQUIRE JVM screen
 i jvm
 STATUS:  RESULTS - OVERTYPE TO MODIFY
 Jvm(0050463184) Age(0000001810) Allo(0000000000) Cla Res 
    Uex     Pro(DFHJVMPC) Tas(0000000)                    
 Jvm(0050463485) Age(0000001804) Allo(0000000000)     Reu 
    Uex     Pro(DFHJVMPR) Tas(0000000)                    
 Jvm(0067240142) Age(0000001711) Allo(0000000000)     Reu 
    Uex     Pro(DFHJVMPR) Tas(0000000)                    
 Jvm(0084017268) Age(0000001668) Allo(0000000000) Cla Res 
    Uex     Pro(DFHJVMPC) Tas(0000000)                    
Figure 118. The expanded display
 INQ JVM
 RESULT - OVERTYPE TO MODIFY
   Jvm(0050463184)
   Age(00000001811)
   Allocage(0000000000)
   Classcachest(Classcache)
   Reusest(Reset)
   Execkey(Uexeckey)
   Phasingoutst(Nophaseout)
   Profile(DFHJVMPC)
   Task(0000000)

Read syntax diagramSkip visual syntax diagramCEMT INQUIRE JVM
 
                     .-All-----.
>>-CEMT Inquire JVM--+---------+--+------------+---------------->
                     '-(value)-'  '-Age(value)-'
 
>--+-----------------+--+--------------+--+----------+---------->
   '-Allocage(value)-'  +-Classcache---+  +-Cexeckey-+
                        '-Noclasscache-'  '-Uexeckey-'
 
>--+------------+--+----------------+--+---------+-------------->
   +-Phaseout---+  '-Profile(value)-'  +-Reset---+
   '-Nophaseout-'                      +-Reuse---+
                                       '-Noreuse-'
 
>--+-------------+---------------------------------------------><
   '-Task(value)-'
 

Displayed fields

(value)
is the JVM token, a numeric value that identifies the JVM. Start of changeThe JVM token used in CICS is the same number that is used to identify the JVM in the z/OS UNIX environment, where it is known as the process id (PID) for the JVM.End of change
Age(value)
displays the number of seconds since the JVM was initialized.
Allocage(value)
displays the number of seconds for which the JVM has been allocated to its task, or zero if the JVM is not currently allocated to a task.
Classcachest
shows whether the JVM is a worker JVM dependent on the shared class cache. The values are:
Classcache
The JVM profile for this JVM specified the use of the shared class cache.
Noclasscache
The JVM profile for this JVM did not specify the use of the shared class cache.
Execkey
shows the execution key of the JVM. The values are:
Cexeckey
The JVM executes in CICS key.
Uexeckey
The JVM executes in user key.
Phasingoutst
shows whether the JVM is being phased out as a result of a CEMT SET JVMPOOL Phaseout, Purge or Forcepurge or CEMT PERFORM CLASSCACHE Phaseout, Purge or Forcepurge command (or the equivalent EXEC CICS commands). The values are:
Phaseout
The JVM is being phased out.
Nophaseout
The JVM is not being phased out. It is available for allocation, or will be available for allocation when the current allocation is ended.
Profile(value)
displays the 8-character name of the JVM profile used to initialize this JVM.
Reusest
shows the level of reusability for this JVM. The values are:
Reset
The JVM profile for this JVM specified that it is resettable (or in the case of a worker JVM, the JVM profile for the master JVM specified that the master and worker JVMs are resettable).
Reuse
The JVM profile for this JVM specified that it is continuous (or in the case of a worker JVM, the JVM profile for the master JVM specified that the master and worker JVMs are continuous).
Noreuse
The JVM profile for this JVM specified that it is single-use.
Task(value)
displays the task to which the JVM is allocated, or zero if the JVM is not currently allocated to a task.

CEMT INQUIRE JVMPOOL

Function

Retrieve information about the JVM pool, if any JVMs exist, in the CICS region.

Input

Press the Clear key to clear the screen then enter CEMT INQUIRE JVMPOOL (or CEMT I JVMP) to obtain information about the JVM pool. Note that there is no identifier on this command--a CICS region supports only one pool of JVMs.

Sample screen

Figure 119. CEMT INQUIRE JVMPOOL screen
  i jvmp
STATUS:  RESULTS - OVERTYPE TO MODIFY
 Jvm Ena Tot(0004) Phasi(0000)
Figure 120. The expanded display
 INQ JVMPOOL
 RESULT - OVERTYPE TO MODIFY
  Jvmpool
  Status( Enabled )
  Total(0004)
  Phasingout(0000)
  Terminate(              )
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE JVMPOOL
 
>>-CEMT Inquire JVMPool--+----------+--+---------------+-------->
                         +-Enabled--+  '-Total(number)-'
                         '-Disabled-'
 
>--+--------------------+--------------------------------------><
   '-Phasingout(number)-'
 

Displayed fields

Phasingout( number)
displays the number of JVMs that are marked for removal from the JVM pool. These JVMs are still allocated to a task that is currently executing, or has executed, a Java program in the JVM.

JVMs are marked for removal as a result of a CEMT SET JVMPOOL Phaseout, Purge or Forcepurge or CEMT PERFORM CLASSCACHE Phaseout, Purge or Forcepurge command (or the equivalent EXEC CICS commands).

Status( value)
displays the overall status of the JVM pool. The possible values are:
Enabled
The pool is enabled for use and Java programs can execute using JVMs from the pool. This is the normal status.
Disabled
The pool is disabled, and new requests cannot be serviced from the pool. Programs can still be executing if they were started before the JVM pool became disabled.
Total (number)
displays the number of JVMs that have been initialized and are available for use or allocated to tasks. This total includes JVMs that are in the process of being terminated and removed from the region and included in the PHASINGOUT count.

CEMT INQUIRE LINE

Function

Retrieve information about lines connected to terminals. This request is valid only for non-VTAM terminals.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You can specify a list of identifiers (see List of resource identifiers), but you cannot use the symbols * and + to specify a family of identifiers. You can then tab to the highlighted or blank fields and overtype them with the required values.

Sample screen

Figure 121. CEMT INQUIRE LINE screen
  INQ LINE(TTT1)
  STATUS:  RESULTS
   Lin(TTT1)         Neg( 00080 ) Ins

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list, CICS displays an expanded format as shown in Figure 122.

Figure 122. The expanded display
 INQ LINE(TTT1)
 RESULT
   Line(TTT1)
   Number()
   Negpoll( 00080 )
   Servstatus( Inservice )
   Purgetype(            )

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE LINE
 
>>-CEMT Inquire Line--(value)--+---------------+---------------->
                               '-Number(value)-'
 
>--+----------------+--+------------+--------------------------><
   '-Negpoll(value)-'  +-Inservice--+
                       '-Outservice-'
 

Displayed fields

Line (value)
indicates that this panel relates to a LINE inquiry and displays the identifier of a terminal on the line. This request is valid only for non-VTAM terminals.
Number (value)
displays the relative line number of a pooled line. For information about pooled lines, see the CICS Resource Definition Guide.
Servstatus
The possible values are:
Inservice
The line is available for use. Changing the status of the line does not affect the equivalent status of the terminals on it.
Outservice
The line is not available for use. Changing the status of the line does not affect the equivalent status of the terminals on it.

CEMT INQUIRE MODENAME

Function

Retrieve information about connection sessions.

Description

INQUIRE MODENAME returns information about the named group of sessions that has been defined for a connection to a remote system or to another CICS region.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

Mode names need not be unique. You cannot specify a list of names, but you can use the symbols * and + to specify a family of mode names.

A mode name consisting of eight blanks is valid. To specify this name, enclose the string of blanks within single quotation marks:

MODENAME('   ')

You can then tab to the highlighted or blank fields and overtype them with the required values.

(value)
specifies one or more names (1-8 characters) of a group of sessions.
ALl
is the default.

Sample screen

Figure 123. CEMT INQUIRE MODENAME screen
  I MODE
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Mod(SNASVCMG) Con(C   ) Max(002) Ava( 000 ) Act(000)
   Mod(MODE1   ) Con(C   ) Max(001) Ava( 000 ) Act(000)
 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list, CICS displays an expanded format as shown in Figure 124.

Figure 124. The expanded display
  I MODE
  RESULT - OVERTYPE TO MODIFY
    Modename(MODE1)
    Connection( C    )
    Maximum(001)
    Available( 000 )
      Active(000)
      Acqstatus(              )
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE MODENAME
 
                         .-All-----.
>>-CEMT Inquire MODename-+---------+--+-------------------+----->
                         '-(value)-'  '-Connection(value)-'
 
>--+----------------+--+------------------+--------------------->
   '-Maximum(value)-'  '-Available(value)-'
 
>--+---------------+--+----------+-----------------------------><
   '-Active(value)-'  +-Acquired-+
                      '-Closed---'
 

Displayed fields

Acqstatus (input only field)
specifies the acquisition status of sessions. The values are:
Acquired
CICS should acquire (or "bind") all the negotiated contention-winner sessions within the group.
Closed
CICS releases all sessions within the group. The sessions are quiesced and unbound. No further sessions can be acquired by another CICS system. No further activity is possible on the sessions within the group until the group is reacquired by the same CICS system in which it has been closed.
Active (value)
displays the number of sessions within the group (or "modename") that are currently in use ("bound").
Available (value)
displays the currently negotiated number of sessions within the group that can be allocated for use at one time.
Note:
You can reset this value by overtyping it with a different value.
Connection (value)
displays the 4-character identifier of the remote system with which this group of IRC or ISC sessions is connected.
Maximum (value)
displays the maximum number of sessions that are supported at one time within this group of sessions, in the range 0-999.
Modename (value)
indicates that this panel relates to a MODENAME inquiry and displays one or more names (1-8 characters) of a group of sessions.

CEMT INQUIRE MONITOR

Function

Retrieve information about the status of CICS monitoring.

Description

INQUIRE MONITOR tells you whether monitoring is switched on or off, which classes of monitoring data are to be collected, and the current settings of the monitoring options.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE MONITOR (the minimum abbreviation is CEMT I MON). You get a display that lists the current status.

Sample screen

Figure 125. CEMT INQUIRE MONITOR screen
IN MONITOR                                                
STATUS:  RESULTS - OVERTYPE TO MODIFY                     
 Mon On  Per Exc Res         Fre( 000000 ) Fil(16) Tsq(08)
    App     Loc Sub(IYK2)                                 



 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 126.

Figure 126. The expanded display
 INQ MON                     
 RESULT - OVERTYPE TO MODIFY 
   Monitor                   
   Status( On )              
   Perfclass( Perf )         
   Exceptclass( Except )     
   Resrceclass( Resrce )
   Conversest( Noconverse )  
   Syncpointst( Nosyncpoint )
   Frequency( 000000 )       
   Filelimit(16)             
   Tsqueuelimit(08)          
   Applnamest(Applname)      
   Rmist(Normi)              
   Time(Local)               
   Subsystemid(IYK2)          
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE MONITOR
 
>>-CEMT Inquire MONitor--+-----+--+--------+--+----------+------>
                         +-On--+  +-Perf---+  +-Except---+
                         '-Off-'  '-NOPerf-'  '-NOExcept-'
 
>--+----------+--+------------+--+-------------+---------------->
   +-Resrce---+  +-Converse---+  +-Syncpoint---+
   '-NOResrce-'  '-NOConverse-'  '-NOSyncpoint-'
 
>--+------------------+--+------------------+------------------->
   '-Frequency(value)-'  '-Filelimit(value)-'
 
>--+---------------------+--+------------+--+-------+----------->
   '-Tsqueuelimit(value)-'  +-Applname---+  +-Rmi---+
                            '-NOApplname-'  '-NORmi-'
 
>--+-------+--+--------------------+---------------------------><
   +-Gmt---+  '-Subsystemid(value)-'
   '-Local-'
 

Displayed fields

Applnamest
displays whether CICS application naming support is enabled. The values are:
Applname
CICS application naming support is enabled.
Noapplname
CICS application naming support is not enabled.
Conversest
displays whether conversational tasks are to have separate performance class records produced for each pair of terminal control I/O requests (Converse or Send/Receive pair). The values are:
Converse
Separate performance class records are produced.
Noconverse
Separate performance class records are not produced.
Note:
You can reset this value by overtyping it with a different value.
Exceptclass
displays whether the exception class of monitoring data is being collected. The values are:
Except
Exception-class monitoring data is being collected.
Noexcept
Exception-class monitoring data is not being collected.
Note:
You can reset this value by overtyping it with a different value.
Filelimit
displays the maximum number of files for which transaction resource class monitoring data is being collected.
Frequency (value)
displays the interval for which monitoring automatically produces a transaction performance class record for any long-running transaction that has been in the system for a greater time than the interval. FREQUENCY values can be either 000000 (meaning that FREQUENCY monitoring is inactive), or in the range 000100-240000.
Note:
You can reset this value by overtyping it with a different value.
MONitor
indicates that this panel relates to a MONITOR inquiry.
Perfclass
displays whether the performance class of monitoring data is being collected. The values are:
Perf
Performance-class monitoring data is being collected.
Noperf
Performance-class monitoring data is not being collected.
Note:
You can reset this value by overtyping it with a different value.
Resrceclass
displays whether the transaction resource class of monitoring data is being collected. The values are:
Resrce
Transaction resource class monitoring data is being collected.
Noresrce
Transaction resource class monitoring data is not being collected.
Note:
You can reset this value by overtyping it with a different value.
Rmist
displays whether additional performance class monitoring data is to be collected for the resource managers used by your transactions. The values are:
Rmi
Additional performance class monitoring data is being collected for the resource managers used by your transactions.
Normi
Performance class monitoring data is not being collected for the resource managers used by your transactions.
Status
displays whether monitoring is active. The values are:
On
Monitoring data is accumulated continuously, and is collected (written out to an SMF data set) for each of the classes of monitoring data that is active.
Off
No monitoring data is accumulated or collected, irrespective of the settings of the monitoring data classes.
Note:
You can reset this value by overtyping it with a different value.
Subsystemid (value)
displays a 4-character name used as the subsystem identification in the MVS workload activity reports. The subsystem identification defaults to the first 4 characters of the VTAM generic APPLID.

For information on the MVS workload activity reports, see the CICS Performance Guide.

Syncpointst
displays whether a transaction performance class record is produced when a transaction takes an explicit or implicit syncpoint (unit-of-work), except when the syncpoint is part of task termination or a syncpoint rollback. The values are:
Syncpoint
A transaction performance class record will be produced.
Nosyncpoint
A transaction performance class record will not be produced.
Note:
You can reset this value by overtyping it with a different value.
Time
displays whether the time stamp fields in the performance class monitoring data are returned in GMT or local time to an application using the EXEC CICS COLLECT STATISTICS MONITORING(taskno) command. The values are:
Gmt
The time stamp fields in the performance class data are Greenwich mean time (GMT).
Local
The time stamp fields in the performance class data are local time.

For programming information on the EXEC CICS COLLECT STATISTICS command, see the CICS System Programming Reference.

TSqueuelimit
displays the maximum number of temporary storage queues for which transaction resource class monitoring data is being collected.

CEMT INQUIRE NETNAME

Function

Retrieve information about a network.

Description

If you are familiar with network names, you may prefer to use this command as an alternative to CEMT INQUIRE TERMINAL.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You can then tab to the highlighted or blank fields and overtype them with the required values.

(value)
specifies an 8-character network name.
ALl
is the default.

Sample screen

Figure 127. CEMT INQUIRE NETNAME screen
  IN NETNAME
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Net(IGKS205 ) Tra(CEMT) Pri( 000 ) Pag Ins Ati Tti
           Ter(TC03) Acq     Tas(0000198)           Nqn(GBIBMIYA.IYCQTC03)



 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 128.

Figure 128. The expanded display of an individual entry
IN NET
RESULT - OVERTYPE TO MODIFY
  Netname(IYCQTC03)
  Transaction(CEMT)
  Priority( 000 )
  Pagestatus( Pageable )
  Servstatus( Inservice )
  Atistatus( Ati )
  Ttistatus( Tti )
  Nature(Local)
  Purgetype(              )
  Terminal(944D)
  Termstatus( Acquired )
  Createsess( Nocreate )
  Task(00033)
  Remotesystem()
  Nqname(GBIBMIYA.IYCQTC03)
  Rname()
  Rnetname()
  Cid()
  Userid()
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE NETNAME
 
                         .-ALl-----.
>>-CEMT Inquire Netname--+---------+--+--------------------+---->
                         '-(value)-'  '-Transaction(value)-'
 
>--+-----------------+--+--------------+--+------------+-------->
   '-Priority(value)-'  +-Pageable-----+  +-Inservice--+
                        '-Autopageable-'  '-Outservice-'
 
>--+-------+--+-------+--+-----------+--+------------+---------->
   +-Ati---+  +-Tti---+  +-Rterminal-+  +-Purge------+
   '-Noati-'  '-Notti-'  +-Rsession--+  '-Forcepurge-'
                         +-Session---+
                         '-Local-----'
 
>--+-----------------+--+----------+--+----------+-------------->
   '-Terminal(value)-'  +-Acquired-+  +-Create---+
                        +-Released-+  '-Nocreate-'
                        '-Coldacq--'
 
>--+-------------+--+---------------+--------------------------->
   '-Task(value)-'  '-Nqname(value)-'
 
>--+---------------------+--+--------------+-------------------->
   '-Remotesystem(value)-'  '-Rname(value)-'
 
>--+-----------------+--+------------+--+--------+-------------><
   '-Rnetname(value)-'  '-Cid(value)-'  '-Userid-'
 

Displayed fields

Atistatus
displays whether the terminal is available for use by transactions that are automatically initiated from within CICS or, if the terminal is an ISC session, by transactions that are using this session as an alternate facility to communicate with another system. The values are:
Ati
The terminal is available for use.
Noati
The terminal is not available for use.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. A terminal cannot be defined with both NOATI and NOTTI.
Cid (value)
displays an 8-character correlation-identifier that is set only for sessions, and only after a session has been acquired. (The value relates to the previously acquired session if there was one, if the session is not acquired). CID is set as follows:
  • For LU6.2 sessions, it is an 8-character hexadecimal token which is common to the two end sessions that are connected together.
  • For MRO sessions, it is set to the termid of the session on the system to which this session is connected.
  • For LU6.1 sessions to IMS, it is set to the value of NETNAMEQ as defined or negotiated.
  • For other LU6.1 sessions, it is set to the value supplied by the other end of the 6.1 session.
Using CID, you can relate the two parts of an LU6.2, MRO, or LU61 conversation together:
  • For LU6.2, you can inquire on the same CID.
  • For MRO, you can locate the session with the terminal name.
  • For LU6.1 to IMS, you can inquire on the netname.
  • For other LU6.1, you can use the name to inquire on the connected system.
Createsess (vtam only)
displays whether the terminal can be acquired automatically by ATI transactions. This cannot be specified for IRC sessions. The values are:
Create
If the terminal is not in session, CICS acquires it if it is needed to satisfy an ATI request.
Nocreate
If the terminal is not in session, CICS does not acquire it to satisfy an ATI request. A session must be started by, for example, a logon request or a CEMT SET TERMINAL ACQUIRED command before the ATI request can be satisfied.

If NOCREATE is set for an LU6.1 ISC session and there are no allocatable sessions left, the connection is placed OUTSERVICE.

Note:
You can reset this value by overtyping it with a different value.
Nature
displays the nature of the terminal--that is, whether it is a physical device or a session, and whether it is local or remote. The values are:
Rterminal
The terminal is owned by another CICS region.
Rsession
The terminal is a session of a connection that is owned by another CICS region.
Session
The terminal is an ISC or IRC session.
Local
The terminal is directly attached to this system and is a physical device or a function of a cluster controller.
Netname (value)
indicates that this panel relates to a NETNAME inquiry and displays an 8-character network name.
  • For a physical terminal, the Netname is the name by which this terminal is known to VTAM.
  • For ISC sessions, the Netname is the name by which the session (or group of sessions) is known to VTAM.
  • For IRC sessions, the Netname is the name used by the connected region to logon to the interregion communication program (DFHIRP).
  • For EXCI sessions, the Netname is DFHGEN for generic sessions and, for specific sessions, it is the value of the user_name parameter used in the EXCI INITIALISE_USER call.

    When an inquiry is made on DFHGEN, the name is an 8-character field with a leading and trailing blank (' DFHGEN '). The name must be enclosed in quotes and include the blanks, so you enter the command on the screen as follows:

    CEMT INQ NETNAME(' DFHGEN ')
  • For remote devices, the Netname is the name by which the device is known to the VTAM in the terminal-owning region.
Note:
If the netname is a VTAM LU alias, it is different from the netname component of the NQNAME, which always contains the real netname.
Nqname
displays the VTAM 17-character network-qualified name.

Remote terminals do not have an NQNAME value.

If the status (Termstatus) is RELEASED, NQNAME displays the netname.

Pagestatus
displays whether pages after the first in a series are written to the terminal on request from the operator or automatically. The values are:
Pageable
Pages are written on request.
Autopageable
Pages are written automatically.
Note:
You can reset this value by overtyping it with a different value.
Priority (value)
displays a 3-character string indicating the priority of this terminal relative to other terminals. The priority of a task is the sum of the transaction priority, the terminal priority, and the operator priority. Priority has no meaning for terminals that are ISC sessions being used as alternative facilities. The value is in the range 0-255, where 255 is the highest priority.
Note:
You can reset this value by overtyping it with a different value.
Purgetype (input only field)
specifies whether the transactions running with the named terminal are to be purged. The values are:
Purge
Transactions are to be terminated only if system and data integrity can be maintained. A transaction is to be purged if its definition specifies SPURGE=NO.
Forcepurge
Transactions are to be purged immediately. This can lead to unpredictable results and should be used only in exceptional circumstances.
Remotesystem (value)
displays the 4-character name of a connection, if the subject of the inquiry is a remote terminal. The named connection can be either a connection entry that links towards the terminal-owning region (TOR), or an indirect connection that provides the netname of the TOR.

Otherwise this field is blank.

Rname (value)
displays the 4-character name by which this terminal is known in the system in which it is defined (the TOR). RNAME applies only to terminals defined as remote; for others, blanks are displayed.
Rnetname (value)
displays the 8-character netname of the owning TOR, if the subject of the inquiry is a remote terminal. If this field is blank and the terminal is remote, the system named in the REMOTESYSTEM field has not been installed, and no value was specified for the REMOTESYSNET option when the terminal was defined.
Servstatus
displays whether the terminal is available for use. The values are:
Inservice
The terminal is available for use. For VTAM, INSERVICE means that the terminal can be ACQUIRED. For IRC sessions, INSERVICE means that the connection to the MRO partner is INSERVICE.
Outservice
The terminal is not available for use. Setting a terminal OUTSERVICE means that the terminal can no longer be used by transactions. If PURGE or FORCEPURGE is also specified, any transaction using the terminal is terminated abnormally. If PURGE or FORCEPURGE is not specified, the transaction is allowed to terminate normally, but no further transactions are allowed to use the terminal. For VTAM, setting a terminal OUTSERVICE also causes it to be released and the operator to be signed off, either immediately or when the current transaction has terminated.

For IRC sessions, OUTSERVICE means that the connection to the MRO partner is OUTSERVICE.

In an LU6.1 ISC session, the connection is set OUTSERVICE if there are no allocatable sessions left.

Note:
For physical terminals and LU6.1 sessions, you can reset this value by overtyping it with a different value.
Task (value)
displays the task number of the transaction that is running on this terminal.
Terminal (value)
displays a 4-character terminal identifier (1-4 characters) as specified in an installed terminal definition.
Termstatus (vtam only)
displays whether CICS is in session with the logical unit represented by this terminal. The values are:
Acquired
CICS is in session with the logical unit represented by the terminal.
Released
CICS is not in session with the logical unit represented by the terminal. If you set this option to RELEASED, a session is terminated immediately if you also specify the PURGE option, otherwise the session is terminated when the current active transaction finishes.
Note:
For physical terminals and LU6.1 sessions, you can reset this value by overtyping it with a different value or with:
Coldacq
This is a special form of ACQUIRED, where no resynchronization is required. If the previous session abended, the use of COLDACQ overrides CICS integrity control. This could lead to integrity problems. Also, you should check the CSMT log for an activity keypoint after the restart of a session following a CICS failure. If there is no activity keypoint, you should issue COLDACQ again after the next emergency restart.
Transaction (value)
displays a 4-character string indicating the name of the transaction currently being processed with this terminal as its principal facility or as a secondary facility.
Ttistatus
displays whether the terminal can be used by the transactions that are initiated from this terminal. The values are:
Tti
This terminal can be used by transactions.
Notti
This terminal cannot be used by transactions.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. A terminal cannot be defined with both NOATI and NOTTI.
Userid (data-area)
returns the 8-character identifier of the user signed on at this terminal or session.

If there is no signed-on user, the default userid--as specified in the DFLTUSER system initialization parameter--is returned.

CEMT INQUIRE PARTNER

Function

Retrieve information about the partner table.

Description

INQUIRE PARTNER returns information from the partner table (side information table) installed in your system. There is no SET PARTNER function. However the INQUIRE PARTNER screen does allow you to type a D in the left-hand margin by the partnername to be discarded (the CEMT DISCARD PARTNER function).

For information on partners, see the CICS Resource Definition Guide.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

(value)
specifies the 8-character partner name as specified in the installed partner definition.
All
is the default.

Sample screen

Figure 129. CEMT INQUIRE PARTNER screen
  I PART
  STATUS:  RESULTS
    Par(IST1ISC2)                Netn(IYMVM2  ) Pro(DFHCICSA)
       Ltp(04) Tpn(IST1                      )
    Par(IST2ISC2)                Netn(IYMVM2  ) Pro(DFHCICSA)
      Ltp(04) Tpn(IST2                      )
 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 130.

Figure 130. The expanded display of an individual entry
  I PART
  RESULT
    Partner(IST1ISC2)
    Network()
    Netname(IYMVM2)
    Profile(DFHCICSA)
    Ltpname(04)
    Tpname(IST1)

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE PARTNER
 
                         .-All-----.
>>-CEMT Inquire PArtner--+---------+--+----------------+-------->
                         '-(value)-'  '-Network(value)-'
 
>--+----------------+--+----------------+--+----------------+--->
   '-Netname(value)-'  '-Profile(value)-'  '-Ltpname(value)-'
 
>--+---------------+-------------------------------------------><
   '-Tpname(value)-'
 

Displayed fields

Ltpname(value)
displays the length of the name of the remote transaction program (TPNAME), in bytes.
Netname(value)
displays the 8-character name of the node at which the partner is located.
Network(value)
displays the 8-character name of the network in which the partner is located.
Partner(value)
indicates that this panel relates to a PARTNER inquiry and displays the 8-character partner name as specified in the installed partner definition.
Profile(value)
displays the 8-character name of the CICS profile associated with the partner.
Tpname(value)
displays the 64-character name of the remote transaction program.
Note:
Nondisplayable characters appear as periods. You can use the PF2 key on the expanded panel to see the hexadecimal value.
Start of change

CEMT INQUIRE PIPELINE

Function

Retrieve information about an installed PIPELINE.

Description

Use the INQUIRE PIPELINE command to retrieve information about an installed PIPELINE.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

ALl
is the default. Information about all PIPELINEs is displayed, unless you specify a selection of PIPELINEs to be queried.
(value)
is the name (1-8 characters) of an installed PIPELINE definition.

Sample screen

Figure 131. CEMT INQUIRE PIPELINE screen
  I PIPELINE                                                                    
  STATUS:  RESULTS - OVERTYPE TO MODIFY                                         
   Pip(LID852  ) Ena Con(/u/dbeard1/pipeline/testru)                            
      She(/u/dbeard1/shelf/         ) Wsd(/u/dbeard1/               )           
   Pip(SAMPLE  ) Ena Con(/u/dbeard1/pipeline/testru)                            
      She(/u/dbeard1/sampbind/      )                                           
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                      SYSID=CIAP APPLID=IYK2ZAF1
   RESPONSE: NORMAL                             TIME:  09.13.28  DATE: 09.02.05 
 PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF         
Read syntax diagramSkip visual syntax diagramINQUIRE PIPELINE
 
                          .-ALl-----.
>>-CEMT INQUIRE PIPELINE--+---------+--+-------------------+---->
                          '-(value)-'  '-Configfile(value)-'
 
>--+------------+--+--------------+--+--------------+----------><
   +-Enabled----+  '-Wsdir(value)-'  '-Shelf(value)-'
   +-Disabled---+
   +-Enabling---+
   +-Disabling--+
   '-Discarding-'
 

Conditions: NOTAUTH, NOTFND

Displayed fields

Configfile(value)
Displays the name of the pipeline configuration file associated with the PIPELINE resource. The name can be up to 255 characters long.
Enablestatus
Displays the status of the PIPELINE:
Enabled
The PIPELINE is ready for use.
Disabled
The PIPELINE is not processing requests, and is unable to accept new work. It may have failed to initialize, or may have been explicitly disabled.
Enabling
The PIPELINE is being initialized; it is not yet ready to accept work.
Disabling
The PIPELINE is quiescing before entering DISABLED state. It is not accepting new work, but is allowing currently-executing work to complete.
Discarding
A DISCARD command has been issued for the PIPELINE. The PIPELINE is quiescing before being discarded. It is not accepting new work, but is allowing currently-executing work to complete.
Wsdir(value)
Displays the name of the Web service binding directory (also known as the pickup directory). The name can be up to 255 characters long.
Shelf(value)
Displays the name of the shelf directory. The name can be up to 255 characters long.
End of change

CEMT INQUIRE PROCESSTYPE

Function

Retrieve information about a CICS business transaction services process-type.

Description

INQUIRE PROCESSTYPE returns information about the BTS PROCESSTYPE definitions installed on this CICS region. In particular, it shows the current state of audit logging for each displayed process-type.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

ALl
is the default. Information about all process-types is displayed, unless you specify a selection of process-types to be queried.
(value)
is the name (1-8 characters) of one or more PROCESSTYPE definitions installed in the process-type table (PTT).

Sample screen

Figure 132. CEMT INQUIRE PROCESSTYPE screen
I PROC
STATUS:   RESULTS - OVERTYPE TO MODIFY
 Pro(PROCESSTYPE12  ) Fil(FILE12  ) Aud(ADTLOG12) Pro Ena
 Pro(PROCESSTYPE13  ) Fil(FILE13  ) Aud(ADTLOG12) Off Ena
 Pro(PTYPE2B        ) Fil(FILE2B  ) Aud(DFHJ2B  ) Ful Ena
 Pro(PTYPE39        ) Fil(FILE39  ) Aud(DFHJ39  ) Off Ena
 Pro(SALESTYPE1     ) Fil(SALESF1 ) Aud(PLOG51  ) Off Dis
 Pro(SALESTYPE4     ) Fil(SALESF4 ) Aud(PLOG51  ) Act Ena
 Pro(SALESTYPE6     ) Fil(SALESF6 ) Aud(PLOG51  ) Off Ena

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 133.

Figure 133. The expanded display of an individual entry
 I PROC
 STATUS:   RESULTS - OVERTYPE TO MODIFY
   Processtype(SALESTYPE4     )
   File(SALESF4 )
   Enablestatus( Enabled )
   Auditlog(PLOG51  )
   Auditlevel(Activity )
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE PROCESSTYPE
 
                             .-ALl-----.
>>-CEMT Inquire PROCesstype--+---------+--+--------------+------>
                             '-(value)-'  '-FIle-(value)-'
 
>--+----------+--+----------+----------------------------------><
   +-Activity-+  +-Disabled-+
   +-Full-----+  '-Enabled--'
   '-Off------'
 

Displayed fields

Auditlevel
displays the level of audit logging currently active for processes of this type. The values are:
Activity
Activity-level auditing. Audit records are written from:
  1. The process audit points
  2. The activity primary audit points.
Full
Full auditing. Audit records are written from:
  1. The process audit points
  2. The activity primary and secondary audit points.
Off
No audit trail records are written.
Process
Process-level auditing. Audit records are written from the process audit points only.

For details of the records that are written from the process, activity primary, and activity secondary audit points, see the CICS Business Transaction Services manual.

Auditlog(value)
displays the 8-character name of the CICS journal used as the audit log for processes of this type.
Enablestatus
displays whether new processes of this type can be created. The values are:
Disabled
The installed definition of the process-type is disabled. New processes of this type cannot be defined.
Enabled
The installed definition of the process-type is enabled. New processes of this type can be defined.
File(value)
displays the 8-character name of the CICS repository file on which the process and activity records for processes of this type are stored.
PROCesstype(value)
indicates that this panel relates to a PROCESSTYPE inquiry and displays the 8-character name of a process-type.

CEMT INQUIRE PROFILE

Function

Retrieve information about a transaction profile.

Description

INQUIRE PROFILE returns information about the profiles installed in your system. There is no SET PROFILE function. However, the INQUIRE PROFILE screen does allow you to type a "D". in the left-hand margin by the name of the profile to be discarded (the DISCARD PROFILE function).

Input

Press the Clear key and type CEMT INQUIRE PROFILE (the minimum abbreviation is CEMT I PROF).

You will get a display screen, a sample of which is shown below.

(value)
is the name of a specific profile.
All
is the default.

Sample screen

Figure 134. CEMT INQUIRE PROFILE screen
  IN PROFILE
  STATUS:  RESULTS
   Prof(DFHCICSA)
   Prof(DFHCICSE)
   Prof(DFHCICSF)
   Prof(DFHCICSR)
   Prof(DFHCICSS)
   Prof(DFHCICST)
   Prof(DFHCICSV)

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE PROFILE
 
                         .-All-----.
>>-CEMT Inquire PROFile--+---------+---------------------------><
                         '-(value)-'
 

Displayed fields

PROFile(value)
indicates that this panel relates to a PROFILE inquiry and displays the 8-character name of a profile installed in your system.

CEMT INQUIRE PROGRAM

Function

Retrieve information about programs, maps, or partition sets.

Description

INQUIRE PROGRAM returns information about the programs, map sets, and partition sets that are defined to your system.

Note:
JVM programs return a subset of values.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You can then tab to the highlighted or blank fields and overtype them with the required values.

(value)
is a program identifier (1-8 characters), which is the name of a specific program entry in the table of installed program definitions. If you omit the program name, the ALL option is assumed by default.

You cannot specify the CLASS option and a program name.

ALl
is the default.
CLass(value)
is the 2-character suffix of a program list table (PLT). Use this option to inquire on those programs defined in the specified PLT. Note that, unlike a shutdown PLT, it is not mandatory to define a program definition for a startup PLT. However, if you want to use the CLASS option, you must define and install a program resource definition for the PLT specified by "clasid".

If the clasid specified is the suffix of a PLT that does not have a program definition, the INQUIRE PROGRAM CLASS(clasid) command returns a ‘CLASS NOT FOUND’ message.

Sample screen

Figure 135. CEMT INQUIRE PROGRAM screen
 IN PROG
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Prog(CNCLTASK) Len(0000000000) Cob Pro Ena Pri    Ced
     Res(000) Use(0000000) Bel Uex Ful
  Prog(DFH$AALL) Len(0000002936) Ass Pro Ena Pri Ced
     Res(000) Use(0000000) Bel Uex Ful
  Prog(DFH$ABRW) Len(0000002520) Ass Pro Ena Pri     Ced
   Res(000) Use(0000000008) Bel Uex Ful Qua           Nat
  Prog(DFH$ABRW) Len(0000002520) Ass Pro Ena Pri Ced
     Res(000) Use(0000001) Bel Uex Ful
  Prog(DFH$ACOM) Len(0000001128) Ass Pro Ena Pri Ced
     Res(000) Use(0000000) Bel Uex Ful
  Prog(DFH$AGA ) Len(0000000520) Map Ena Pri
     Res(000) Use(0000002)
  Prog(DFH$AGB ) Len(0000000448) Map Ena Pri
     Res(000) Use(0000000)
  Prog(DFH$AGC ) Len(0000000512) Map Ena Pri
     Res(000) Use(0000000)
  Prog(DFH$AGD ) Len(0000000576) Map Ena Pri
     Res(000) Use(0000000)
+ Prog(DFH$AGK ) Len(0000000392) Map Ena Pri
     Res(000) Use(0000000)
 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 136 and Figure 137.

Figure 136. The expanded display of an individual entry (first panel)
IN PROG
RESULT - OVERTYPE TO MODIFY
  Program(DFH$AALL)
  Length(0000002936)
  Language(Assembler)
  Progtype(Program)
  Status( Enabled )
  Sharestatus( Private )
  Copystatus( Notrequired )
  Cedfstatus( Cedf )
  Dynamstatus(Notdynamic)
  Rescount(000)
  Usecount(0000000)
  Dataloc(Below)
  Execkey(Uexeckey)
  Executionset( Fullapi )
  Concurrency(Threadsafe)
Start of change  Apist(Cicsapi)End of change
  Remotesystem()
  Runtime( Jvm )
Figure 137. The expanded display of an individual entry (second panel)
IN PROG
RESULT - OVERTYPE TO MODIFY
  Program(DFH$AALL)
  Runtime( Jvm )
  Jvmclass( JavaApplClassFile                                              )
  Jvmclass(                                                                )
  Jvmclass(                                                                )
  Jvmclass(                                                                )
  Jvmclass(         )
  Jvmprofile(DFHJVMPR)
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE PROGRAM
 
                         .-ALl----------.
>>-CEMT Inquire PROGram--+--------------+--+---------------+---->
                         +-(value)------+  '-LENgth(value)-'
                         '-CLass(value)-'
 
>--+------------+--+--------------+--+----------+--------------->
   +-PLi--------+  +-Program------+  +-Enabled--+
   +-Cobol------+  +-Mapset-------+  '-Disabled-'
   +-C----------+  '-Partitionset-'
   +-Le370------+
   +-Assembler--+
   +-Java-------+
   +-Notapplic--+
   '-Notdefined-'
 
>--+---------+--+-------------+--+--------+--+------------+----->
   +-Shared--+  +-Notrequired-+  +-Cedf---+  +-Dynamic----+
   '-Private-'  +-Required----+  '-Nocedf-'  '-Notdynamic-'
                +-Newcopy-----+
                '-Phasein-----'
 
>--+-----------------+--+-----------------+--+------------+----->
   '-Rescount(value)-'  '-Usecount(value)-'  +-PLi--------+
                                             +-Cobol------+
                                             +-C----------+
                                             +-Le370------+
                                             +-Assembler--+
                                             +-Java-------+
                                             +-Notapplic--+
                                             '-Notdefined-'
 
>--+--------------+--+----------+--+---------+------------------>
   +-Program------+  +-Enabled--+  +-Shared--+
   +-Mapset-------+  '-Disabled-'  '-Private-'
   '-Partitionset-'
 
>--+-------------+--+--------+--+-------+--+----------+--------->
   +-Notrequired-+  +-Cedf---+  +-Any---+  +-Cexeckey-+
   +-Required----+  '-Nocedf-'  '-Below-'  '-Uexeckey-'
   +-Newcopy-----+
   '-Phasein-----'
 
>--+-----------+--+------------+--+---------+------------------->
   +-Dplsubset-+  +-Quasirent--+  +-Cicsapi-+
   '-Fullapi---'  '-Threadsafe-'  '-Openapi-'
 
>--+---------------------+--+---------+--+-----------------+---->
   '-Remotesystem(value)-'  +-Jvm-----+  '-JvmClass(value)-'
                            +-Lenv----+
                            +-Native--+
                            +-Unknown-+
                            '-Xplink--'
 
>--+-------------------+---------------------------------------><
   '-Jvmprofile(value)-'
 

Displayed fields

Start of changeApistEnd of change
Start of changedisplays the API attribute of the installed program definition. The values are:
CIcsapi
The program is restricted to use of the CICS permitted application programming interfaces only. Dependent upon the program's CONCURRENCY setting, the application will either always run on the quasi-reentrant (QR) TCB, or if it is defined as threadsafe it might run on whichever of the TCBs in use by CICS at the time is determined to be suitable.
Openapi
The program is not restricted to the CICS permitted application program interfaces. CICS executes the program on its own L8 or L9 mode open TCB dependent upon the EXECKEY setting. If, when executing a CICS command, CICS requires a switch to QR TCB, it will return to the open TCB before handing control back to the application program. OPENAPI requires the program to be coded to threadsafe standards and defined with CONCURRENCY(THREADSAFE).
End of change
Cedfstatus
displays what action the execution diagnostic facility (EDF) is to take for this program when the program runs under EDF. The values are:
Cedf
When EDF is active, CEDF initiation and termination screens are shown by CEDF while this program is running. Other screens are also shown unless the program was translated using the NOEDF translator option.
Nocedf
All CEDF activities, including initiation and termination screens, stop while this program is being processed.
Concurrency
Displays the concurrency attribute of the specified program. The values are:
Threadsafe
The program is defined as being threadsafe, using appropriate serialization techniques to access shared resources. It does not need the automatic serialization provided by the CICS QR TCB, and can safely run on an open TCB.
Quasirent
The program is defined as not threadsafe, and requires the automatic serialization provided by QR TCB.
Copystatus
displays the load status of the specified program.

The values are:

Notrequired
The program status is such that you do not have to specify CEMT SET PROGRAM NEWCOPY or CEMT SET PROGRAM PHASEIN to make the program available. (If the program is already available for use and if you have put a new version in the DFHRPL concatenation, you need to issue a NEWCOPY or PHASEIN to replace the current version.)
Required
A search for the program failed during a load operation, and the program has been marked as not loadable to avoid the overhead of further load attempts.

You need to specify CEMT SET PROGRAM NEWCOPY or CEMT SET PROGRAM PHASEIN to enable the program to be loaded. However, before doing this, you should ensure that there is a copy of the program in the DFHRPL library concatenation.

You can reset this value by overtyping it. The values are:

Newcopy
CICS uses a new copy of the program when all the transactions currently using the program have finished (RESCOUNT equal to zero). CICS loads the new version either from the DFHRPL library concatenation or uses an LPA-resident version, depending on the PRIVATE or SHARED options. PRIVATE is the default setting.
Note:
NEWCOPY cannot be specified for a program specified with the HOLD option or for a JVM program.
Phasein
CICS uses a new copy of the program now for all new transaction requests. CICS continues to use the old copy for all currently running transactions until they have finished (RESCOUNT equal to zero). CICS loads the new version either from the DFHRPL library concatenation or uses an LPA-resident version, depending on the PRIVATE or SHARED options. PRIVATE is the default setting.
Note:
PHASEIN cannot be specified for a program specified with the HOLD option.

PHASEIN performs a REFRESH PROGRAM function to inform the loader domain that a new version of the program has been cataloged and that this version of the named program should be used in all future ACQUIRE requests.

Until the program goes to a zero RESCOUNT and a subsequent ACQUIRE PROGRAM has been performed, CEMT INQUIRE PROGRAM ( ) will return information on the first copy of the program.

Dataloc
displays whether the program is able to accept data addresses higher than 16MB. The values are:
Any
The program can handle 31-bit addresses. The address of the data can be above or below the 16MB boundary. CICS returns an address above the 16MB boundary if possible.
Below
The program can handle only 24-bit addresses and must therefore be given addresses of data located below the 16MB boundary. If necessary, CICS copies data below the 16MB boundary before passing its address to the application program.
Dynamstatus
displays whether, if the program is the subject of a program link request, the request can be dynamically routed. The values are:
Dynamic
If the program is the subject of a program-link request, the CICS dynamic routing program is invoked. Providing that a remote server region is not named explicitly on the SYSID option of the EXEC CICS LINK command, the routing program can route the request to the region on which the program is to execute.
Notdynamic
If the program is the subject of a program-link request, the dynamic routing program is not invoked.

For a distributed program link (DPL) request, the server region on which the program is to execute must be specified explicitly on the REMOTESYSTEM option of the PROGRAM definition or on the SYSID option of the EXEC CICS LINK command; otherwise it defaults to the local region.

For information about the dynamic routing of DPL requests, see the CICS Intercommunication Guide.

Execkey
displays which access key the program is executing in. The values are:
Cexeckey
The program is executing in CICS access key, and has read and write access to both CICS-key and user-key storage.
Uexeckey
The program is executing in user access key, and has write access to user-key storage, but read-only access to CICS-key storage.
Executionset
displays whether the program is restricted to the API subset as for a distributed program link request. The values are:
Dplsubset
The program is restricted to the DPL API subset, as for a distributed program link request, when it runs in the local CICS region.

A program is always restricted to the DPL subset when it is invoked in a remote region via a DPL request, even if this option is not specified.

Fullapi
The program is not restricted to the DPL subset of the CICS API when it runs in the local CICS region, and can use the full API.

A program is always restricted to the DPL subset when it is invoked in a remote region via a DPL request, regardless of this option.

Note:
You can reset this value by overtyping it with a different value.
Jvmclass
displays the name of the class specified on the program definition, up to a maximun of 255 characters.
Jvmprofile
displays the name of the JVM profile associated with this program.
Language
displays the language in which the program is written. The values are:
Pli, Cobol, C, Le370, or Assembler
Supported languages. In the case of LE370, the program exploits multi-language support, or has been compiled by the SAA Language Environment/370 (LE/370)-enabled compiler.
Java
The program is written in JAVA. .
Notapplic
The language was not specified in the resource definition, and has not been loaded.
Notdefined
The language in which the program has been written is not defined.
Length(value)
displays the size of the program in bytes. The value returned is 0000000000 if the program has not been loaded during this CICS run. No value is returned if the module is a remote program or a JVM program.
Program(value)
indicates that this panel relates to a PROGRAM inquiry and displays an 8-character program identifier (1-8 characters), which is the name of a specific program entry in the table of installed program definitions.
Progtype
displays the type of program. The values are:
Program
The entry is defined in the CICS system definition as a program.
Mapset
The entry is defined in the CICS system definition as a map set.
Partitionset
The entry is defined in the CICS system definition as a partition set.
Remotesystem(value)
displays the 4-character name of the remote system in which the program is to execute.
Rescount(value)
displays a 3-character string identifying the number of separate invocations of this program that are taking place at the time of this inquiry. No value is returned if the module is a remote program or a JVM program.
Note:
This is not necessarily the same as the number of times the module has been loaded from the CICS load library (DFHRPL).
Runtime
displays information about the runtime environment of the program. The values are:
Jvm
The program is a JAVA program running under the control of a JVM.
Start of changeLenvEnd of change
The program is running with Language Environment runtime support.
Native
The program is running with its native language runtime support (not Language Environment).
Notknown
The runtime environment in not known because the program has not been loaded by CICS, therefore the source language cannot be deduced, which dictates the runtime environment to be used.
Start of changeXPLinkEnd of change
Start of changeThe program is a C or C++ program which has been compiled using the XPLINK option.End of change
Sharestatus
displays, when the next NEWCOPY or PHASEIN request is received, where the next new copy of the program is to be loaded from.

The values are:

Shared
CICS is using, or will use, a shared copy of the program from the link pack area (LPA). If no LPA version is available, the program is loaded from DFHRPL.
Private
The next new copy of the program is to be loaded from the DFHRPL library.
Note:
You can reset this value by overtyping it with a different value.
Status
displays whether the program is available for use. The values are:
Enabled
The program is available for use.
Disabled
The program is not available for use.
Note:
Programs beginning with "DFH" cannot be disabled because these characters are reserved for use by CICS.
Note:
You can reset this value by overtyping it with a different value.
Usecount(value)
displays a 10-character string identifying the total number of times the program has been executed since the start of the current CICS session. No value is returned if the module is a remote program, or a JVM program.

CEMT INQUIRE REQUESTMODEL

Function

Retrieves information about a REQUESTMODEL definition.

Description

INQUIRE REQUESTMODEL returns information about any currently installed request models.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE REQUESTMODEL (the minimum abbreviation is CEMT I RE). You get a display that lists the names and status of any request models.

(value)
displays the 4-character field containing the (possibly generic) name of the destination CORBAServer for this REQUESTMODEL.
ALl
is the default.

Sample screen

Figure 138. CEMT INQUIRE REQUESTMODEL screen
 I RE
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Req(CFAC    ) Corbas(IIOP) Tra(CICF) Cor    Con Ign
  Req(III     ) Corbas(IIII) Tra(CIRP) Cor    Con Res
     Mod(*                         ) Int(*                        )


                                               SYSID=HA61 APPLID=CICSHA61
  RESPONSE: NORMAL                        TIME:  15.54.22  DATE: 09.03.98
PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format.

Figure 139. The expanded display of an individual entry
 I RE
 RESULT - OVERTYPE TO MODIFY
   All
   Requestmodel(DFHGFACT)
   Corbaserver
   Transid
   Type
   Intfacetype
   Module
   Interface
   Operation
   Beanname
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE REQUESTMODEL
 
                              .-ALl-----.
>>-CEMT Inquire REquestmodel--+---------+----------------------->
                              '-(value)-'
 
>--+------------------------+--+---------------+--+---------+--->
   '-Corbaserver(data-area)-'  '-Transid(name)-'  +-Ejb-----+
                                                  +-Corba---+
                                                  '-Generic-'
 
>--+-----------+--+-------------------+------------------------->
   +-Home------+  '-Module(data-area)-'
   +-Remote----+
   +-Both------+
   '-Notapplic-'
 
>--+----------------------+--+----------------------+----------->
   '-Interface(data-area)-'  '-Operation(data-area)-'
 
>--+---------------------+-------------------------------------><
   '-Beanname(data-area)-'
 

Displayed fields

(value)
displays the 4-character field containing the (possibly generic) name of the destination CORBAServer for this REQUESTMODEL.
Beanname(data-area)
displays the 240-character field containing the (possibly generic) bean name that matches the name of an enterprise bean in an XML deployment descriptor. This field is blank if the TYPE attribute is CORBA.
Corbaserver(data-area)
displays the 4-character field containing the (possibly generic) name of the destination CORBAServer for this REQUESTMODEL.
Interface(data-area)
displays the 255-character field containing the (possibly generic) pattern matching the interface name for this REQUESTMODEL. This field is blank if the TYPE attribute is EJB.
Intfacetype
displays a value indicating the Java interface type for this REQUESTMODEL. The values are:
Home
specifies that this is the home interface for the bean.
Remote
specifies that this is the component interface for the bean.
Both
matches both the home and component interfaces for the bean.
Notapplic
returned if the TYPE attribute is CORBA.
MODULE(data-area)
displays the 255-character field containing the (possibly generic) pattern defining the name scope of the interface and operation values for this REQUESTMODEL. This field is blank if the TYPE attribute is EJB.
Operation(data-area)
displays the 31-character field containing the pattern matching the IDL operation name for this REQUESTMODEL.
REquestmodel (value)
displays the 8-character request model name.
Transid (name)
displays the 4-character name of the CICS transaction to be executed when a request matching the specification of the REQUESTMODEL is received.
Type
displays a value indicating the type of the REQUESTMODEL. The values are:
Ejb
matches enterprise bean requests as specified by the EJB parameters.
Corba
matches CORBA requests as specified by the CORBA parameters.
Generic
matches both enterprise bean and CORBA requests.

CEMT INQUIRE RRMS

Function

Retrieve RRMS information.

Description

INQUIRE RRMS tells you if CICS does or does not accept inbound transactional EXCI work.

Input

Press the Clear key and type CEMT INQUIRE RRMS (the minimum abbreviation is CEMT I R).

You will get a display screen, a sample of which is shown below.

Sample screen

Figure 140. CEMT INQUIRE RRMS screen
  IN RRMS
  STATUS:  RESULTS
   Rrm Ope


 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE RRMS
 
>>-CEMT Inquire RRms--+--------+-------------------------------><
                      +-Closed-+
                      '-Open---'
 

Displayed fields

Openstatus
displays a value indicating the the status of inbound transactional EXCI work. The values are:
Closed
indicates that CICS will not accept inbound transactional EXCI work.
Open
indicates that CICS will accept inbound transactional EXCI work.

CEMT INQUIRE STATISTICS

Function

Retrieve statistics information.

Description

INQUIRE STATISTICS tells you the interval during which statistics are accumulated, the end-of-day time for shutdown (or logical end-of-day) statistics, the time at which statistics are next recorded (that is, written to an SMF data set), and whether statistics recording is currently on or off.

For details of how to print statistics using the CICS-supplied utility program DFHSTUP, see the CICS Operations and Utilities Guide.

Input

Press the Clear key and type CEMT INQUIRE STATISTICS (the minimum abbreviation is CEMT I ST).

You will get a display screen, a sample of which is shown below. If you want to change any of the values shown, you can then tab to the highlighted or blank fields and overtype them as required.

Sample screen

Figure 141. CEMT INQUIRE STATISTICS screen
  IN STATI
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Sta On          Int( 030000 ) End( 000000 ) Nex(150000)



 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 142.

Figure 142. The expanded display
IN STAT
RESULT - OVERTYPE TO MODIFY
  Statistics
  Recording( Off )
  Record(              )
  Reset(              )
  Interval( 030000 )
  Endofday( 000000 )
  Nexttime(000000)


 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE STATISTICS
 
>>-CEMT Inquire STAtistics-------------------------------------><
 

Displayed fields

Endofday (hhmmss)
displays the end-of-day time for recording statistics. At end-of-day, the current values of the CICS statistics counters are written out to an SMF data set and the statistics counters are reset.

End-of-day times must be in the range 000000-235959. The default end-of-day time is 12 midnight (000000).

Interval (hhmmss)
displays the length of time during which the statistics counters are incremented. At the end of each interval, the accumulated statistics are recorded and the statistics counters are reset.
Note:
You can reset this value by overtyping it with a different value.

Interval times must be in the range 000100-240000. The default interval value is 030000. The interval value can be adjusted, but will have no effect unless the statistics recording status is set ON. You can set the statistics recording status ON or OFF using the RECORDING option on this command or by using the STATRCD system initialization parameter.

The arrival of the ENDOFDAY time always causes the current interval to be ended (possibly prematurely) and a new interval to be started. Only end-of-day statistics are recorded at the end-of-day time, even if it coincides exactly with the expiry of an interval.

Changing the ENDOFDAY value has an immediate effect on the times at which INTERVAL statistics are recorded. New interval expiry times are recalibrated in accordance with the new end-of-day time.

When you change the INTERVAL value or the ENDOFDAY value (and also when CICS is initialized), the length of the current (or first) interval is adjusted so that it expires after an integral number of intervals from the end-of-day time.

These rules are illustrated by the following example, where I indicates an interval recording, INTERVAL is set at 3-hourly intervals, CICS is initialized at 0815 hours, and E indicates the ENDOFDAY setting at 1700 hours.

Note:
In this example, there would have been an interval at 0800 hours if CICS had been initialized earlier.

If you want your end-of-day recordings to cover 24 hours, set INTERVAL to 240000.

Nexttime (hhmmss)
displays the time at which statistics are next recorded and reset. This is the expiry time of the current interval or the end-of-day time, whichever is earlier.
Record (input only field)
specifies whether existing statistics are to be written to an SMF data set. The value is:
Record
Existing statistics are to be written to an SMF data set. The statistics are those collected since the last ENDOFDAY or INTERVAL collection, or since the last time the RESETNOW function was used in this or the PERFORM STATISTICS command.
Notes:
  1. When both Rec(ord) and Res(et) are specified, statistics counters are written to the SMF data set and reset. The statistics that you are given are those collected since the last ENDOFDAY or INTERVAL collection, or since the last time the RESETNOW function was used in this or the PERFORM STATISTICS command.
  2. RECORD RESET take effect only when the recording status is changed.
Recording
displays whether the recording of interval statistics is switched on or off. End-of-day statistics, requested statistics, and unsolicited statistics are always recorded, irrespective of the setting of the ON or OFF option. (Requested statistics are those called for by a CEMT PERFORM STATISTICS command or by an EXEC CICS PERFORM STATISTICS RECORD command.) The values are:
On
Interval statistics are being recorded. Counters are incremented as usual, and are reset at the expiry of each interval and at end-of-day.
Off
Interval statistics are not being recorded. Counters are still incremented as usual, and the recording of end-of-day, requested, and unsolicited statistics is still made.
Note:
You can reset this value by overtyping it with a different value.
Reset (input only field)
specifies whether the statistics counters are to be reset. The value is:
Reset
The statistics counters are to be reset. The reset takes effect only if the recording option is changed from OFF to ON or from ON to OFF. For information about the effect of reset on each individual counter, see the description of the CICS statistics tables in the CICS Performance Guide.

The action, for each counter, is one of the following:

  • Not reset
  • Reset to zero
  • Reset to 1
  • Reset to current value (this applies to peak values)
  • An exception to the above.
STAtistics
indicates that this panel relates to a STATISTICS inquiry.

CEMT INQUIRE STREAMNAME

Function

Retrieve information about currently connected MVS log streams.

Description

The INQUIRE STREAMNAME command allows you to inquire on the currently connected MVS log streams.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You can then tab to the highlighted or blank fields and overtype them with the required values.

(value)
specifies an MVS system logger log stream name. The name can be a specific LSN of up to 26 characters in length.
ALl
is the default.

Sample screen

Figure 144. CEMT INQUIRE STREAMNAME screen
 IN STRE
 STATUS:  RESULTS
  Str(BELL.CICSHT61.DFHLOG      ) Use(0000001) Ok  Sys



 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 145.

Figure 145. The expanded display of an individual entry
IN STRE
RESULT
  Streamname(BELL.CICSHT61.DFHLOG)
  Usecount(0000001)
  Status(Ok)
  Systemlog(Syslog)

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE STREAMNAME
 
                            .-ALl-----.
>>-CEMT Inquire STReamname--+---------+--+-----------------+---->
                            '-(value)-'  '-Usecount(value)-'
 
>--+--------+--+----------+------------------------------------><
   +-Ok-----+  +-Syslog---+
   '-Failed-'  '-Nosyslog-'
 

Displayed fields

Status
displays the status of the log stream. The values are:
Ok
No errors have been detected
Failed
The MVS system logger has detected a problem with the specified log stream.
Streamname (value)
indicates that this panel relates to a STREAMNAME inquiry and displays an MVS system logger log stream name.
Systemlog
displays whether this log stream is the system log. The values are:
Syslog
The log stream is the system log.
Nosyslog
The log stream is not the system log.
Usecount (value)
displays the number of CICS journal names and forward recovery logs that are currently using the log stream.

The use count is always at least 1, because CICS does not maintain any information about a log stream that no longer has any users, in which case an INQUIRE STREAMNAME command returns an ERROR condition.

If the log stream name refers to the CICS system log, the use count is always 1. This is so even when user application programs write recovery records to the CICS system log.

CEMT INQUIRE SYDUMPCODE

Function

Retrieve information about the system dump code table.

Description

INQUIRE SYDUMPCODE allows you to see the current settings of the entries in the system dump table. ‘NO’ settings (NOSYSDUMP, for example) are shown as blank.

The INQUIRE command tells you:

A system dump code is the CICS message number with the DFH prefix removed. Typically this leaves a 6-character code comprising 2 alphabetic characters and 4 numeric characters, for example AP0001. The command syntax permits up to 8 characters for the dump code and the dump codes you specify are padded with trailing spaces.

Each message has its own system default actions that you cannot necessarily override with the SET command. For example, when a serious error occurs, CICS shuts down even if you have asked for no shut down. See the CICS Messages and Codes manual for information about the system action for each message.

There are other system parameters that take priority over your dump table entries. For example, EXEC CICS SET SYSTEM DUMPING NOSYSDUMP, or a DUMP=NO system initialization parameter inhibits system dumping. For information on using dumps, see the CICS Problem Determination Guide.

Start of changeThe INQUIRE SYDUMPCODE command returns entries that were added to the dump table by a user application program or CEMT command, and also entries that CICS added to the dump table through dump requests. Be aware that the entries that CICS added to the dump table are temporary, and they are not restored during a warm start, or during a cold or initial start. Entries added by a user application program or CEMT command are restored during a warm start, but not during a cold or initial start.End of change

The transaction dump command SET TRDUMPCODE can also cause CICS to produce system dumps for the specified transaction dump code.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You can then tab to the highlighted or blank fields and overtype them with the required values.

(value)
is an 8-character system dump code. See the CICS Messages and Codes manual for details of the codes.
ALl
is the default.

Sample screen

Figure 146. CEMT INQUIRE SYDUMPCODE screen
  I SYD
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Syd(AP0001  ) Sys Loc     Max( 010 ) Cur(0000)     Dae
   Syd(AP0002  ) Sys Loc     Max( 999 ) Cur(0000)

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 147.

Figure 147. The expanded display
  I SYD
  RESULT - OVERTYPE TO MODIFY
    Sydumpcode(AP0001)
    Sysdumping( Sysdump )
    Dumpscope( Local )
    Shutoption( Noshutdown )
    Maximum( 010 )
    Current(0000)
    Action(              )
    Daeoption( Dae )

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE SYDUMPCODE
 
                            .-ALl-----.
>>-CEMT Inquire SYDumpcode--+---------+--+--------+------------->
                            '-(value)-'  +-Reset--+
                                         +-Remove-+
                                         '-Add----'
 
>--+-----------+--+---------+--+------------+--+-------+-------->
   +-Sysdump---+  +-Related-+  +-Shutdown---+  +-Dae---+
   '-Nosysdump-'  '-Local---'  '-Noshutdown-'  '-Nodae-'
 
>--+----------------+--+----------------+----------------------><
   '-Maximum(value)-'  '-Current(value)-'
 

Displayed fields

Action (input only field)
specifies the action to be taken with this system dump code. The values are:
Reset
The current number of calls for this dump code is reset to zero.
Remove
This system dump code is removed from the system dump code table.
Add
This system dump code is added to the system dump code table.
Current (value)
displays the number of dump calls that have been made for this dump code since it was last reset.
Daeoption
displays whether a dump taken for CICS is eligible for suppression by the MVS dump analysis and elimination (DAE) component. The values are:
Dae
A system dump is eligible for suppression by the DAE component.
Nodae
A system dump will not be suppressed by the DAE component. (However, be aware of the SUPPRESS and SUPPRESSALL options in the ADYSETxx parmlib member. These are controlled by the VRADAE and VRANODAE keys in the SDWA. They may lead to dump suppression even though NODAE is set here. For information about DAE, SUPPRESS, and SUPPRESSALL, see the OS/390 MVS Diagnosis: Tools and Service Aids manual.
Note:
You can reset this value by overtyping it with a different value.
Dumpscope (value)
displays whether a system dump request is to be sent to MVS images in the sysplex which are running XCF/MRO connected CICS regions related to the CICS region on which the dump is initiated.
Note:
A related CICS region is one in which the unit of work identifiers, in the form of APPC tokens, of one or more tasks match those in the CICS region that issued the dump request.
Related
A system dump request is to be sent for this system dump code.
Local
A system dump request is not to be sent to other MVS images in the sysplex for this system dump code.
Note:
You can reset this value by overtyping it with a different value.
Maximum (value)
displays the maximum number of dump calls for this system dump code which result in system dumps being taken. The value is in the range 0-999 and can be specified by using SYDUMAX in the SIT parameter. A value of 999 means the default, ‘no limit’.
Note:
You can reset this value by overtyping it with a different value.
Shutoption
displays whether CICS is to be shut down after the occurrence of an error corresponding to this dump code.
Shutdown
CICS is to be shut down.
Noshutdown
CICS is not to be shut down.
Note:
You can reset this value by overtyping it with a different value.
Sydumpcode (value)
indicates that this panel relates to a SYDUMPCODE inquiry and displays an 8-character system dump code. See the CICS Messages and Codes manual for details of the codes.
Sysdumping
displays whether a system dump is taken for this system dump code. The values are:
Sysdump
A system dump is taken for this system dump code.
Nosysdump
A system dump is not taken for this system dump code.
Note:
You can reset this value by overtyping it with a different value.

CEMT INQUIRE SYSTEM

Function

Retrieve information about CICS.

Description

INQUIRE SYSTEM returns information about the CICS system.

Input

Press the Clear key to clear the screen, and type CEMT INQUIRE SYSTEM (the minimum abbreviation is CEMT I SYS). You get a display that lists the current status. You can then tab to the highlighted or blank fields and overtype them with the required values.

To change various attributes, you can:

Sample screen

Figure 148. CEMT INQUIRE SYSTEM screen
  inq system                                                                   
 STATUS:  RESULTS - OVERTYPE TO MODIFY                                         
   Aging( 32768 )                 Progautoexit( DFHPGADX )                     
   Akp( 04000 )                   Progautoinst( Autoactive )                   
   Cicstslevel(030100)            Reentprotect(Reentprot)                      
   Cmdprotect(Nocmdprot)          Release(0640)                                
   Db2conn()                      Runaway( 0005000 )                           
   Debugtool( Nodebug )           Scandelay( 0500 )                            
   Dfltuser(WALSH)                Sdtran(CESD)                                 
   Dsalimit( 07340032 )           Sosstatus(Notsos)                            
   Dsrtprogram( NONE     )        Storeprotect(Active)                         
   Dtrprogram( DFHDYP   )         Time( 0001000 )                              
   Dumping( Sysdump )             Tranisolate(Active)                          
   Edsalimit( 0268435456 )                                                     
   Forceqr( Noforce )                                                          
   Logdefer( 00030 )                                                           
   Maxtasks( 075 )                                                             
   Mrobatch( 001 )                                                             
   Oslevel(010400)                                                             
   Progautoctlg( Ctlgmodify )                                                  
                                                                               
                                                     SYSID=HT63 APPLID=CICSHT63
  RESPONSE: NORMAL                             TIME:  16.00.11  DATE: 10.03.01 
PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF         
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE SYSTEM
 
>>-CEMT Inquire SYStem-----------------------------------------><
 

Displayed fields

Aging (value)
displays the time factor for CICS to use in the priority aging algorithm for incrementing the priority of a task. The value is expressed as "milliseconds per unit of priority", and is in the range 0-65535.

The priority aging factor is defined initially by the PRTYAGE system initialization parameter, in which the value represents the number of milliseconds that must elapse before the priority of a waiting task can be adjusted upward by 1. See the CICS System Definition Guide for information about the PRTYAGE parameter.

Note:
You can reset this value by overtyping it with a different value.
Akp (value)
displays the activity keypoint trigger value, which is the number of logging operations between the taking of keypoints. It is in the range 200-65535. A value of zero indicates that there is no activity keypointing.
Note:
You can reset this value by overtyping it with a different value.
Cicstslevel (value)
displays a 6-character value identifying the version, release and modification level of the CICS Transaction Server for OS/390® product under which the CICS region is running. The value is of the form vvrrmm, and CICS TS Version 3 Release 1 returns 030100.
Cmdprotect (value)
displays whether command protection, which validates start addresses passed on in CICS commands, is active or not (that is, whether the CMDPROT system initialization parameter specifies YES or NO). The values are:
Cmdprot
Command protection is active. CICS checks to ensure that the task itself has write access to the storage referenced on the command before writing to the storage on the task’s behalf.
Nocmdprot
Command protection is not active. CICS does not check to ensure that the task itself has write access to the storage referenced on the command before writing to the storage on the task’s behalf.
Db2conn (value)
displays the name of the currently installed DB2CONN.
Debugtool(value)
displays whether you can use debugging profiles to select the programs that will run under the control of a debugging tool. The following debugging tools use debugging profiles:
  • Debug Tool, for compiled language application programs (programs written in COBOL, PL/I, C, C++ and Assembler)
  • Remote debugging tools (for compiled language application programs and Java programs)
Other debugging mechanisms, such as the CICS Execution Diagnostic Facility (CEDF) do not use debugging profiles.

The values are:

Debug
You can use CICS debugging profiles to select the programs that will run under the control of a debugging tool.
Nodebug
You cannot use CICS debugging profiles to select the programs that will run under the control of a debugging tool.
For more information about debugging profiles, see the CICS Application Programming Guide.
Dfltuser (value)
displays the userid of the default user for this instance of the CICS region.
Dsalimit (value)
displays the maximum amount of storage, as a total number of bytes, within which CICS can dynamically allocate storage for the four individual DSAs that reside below the 16MB boundary. (See the CICS System Definition Guide for a description of the DSALIM system initialization parameter.)
Note:
You can reset this value by overtyping it with a different value.

If DSALIMIT specifies a value lower than the current limit, CICS may not be able to implement the new limit immediately, but will attempt to do so over time as dynamic storage is freed in the individual DSAs.

Dsrtprogram (pgrmid)
displays the name of the distributed routing program.
Note:
You can reset this value by overtyping it with a different value.
Dtrprogram (pgrmid)
displays the name of the dynamic routing program.
Note:
You can reset this value by overtyping it with a different value.
DUMPING(value)
displays whether CICS system dumps are suppressed. The values are:
NOSYSDUMP
System dumps are suppressed.
SYSDUMP
System dumps are not suppressed.

These values are set by the SIT parameter DUMP=YES or NO.

Edsalimit (value)
displays the maximum amount of storage, as a total number of bytes, within which CICS can dynamically allocate storage for the four individual DSAs that reside above the 16MB boundary. (See the CICS System Definition Guide for a description of the EDSALIM system initialization parameter.)
Note:
You can reset this value by overtyping it with a different value.

If EDSALIMIT specifies a value lower than the current limit, CICS may not be able to implement the new limit immediately, but will attempt to do so over time as dynamic storage is freed in the individual DSAs.

Forceqr (value)
displays whether CICS is to Start of change CICSAPI End of change force user application programs that are defined as threadsafe to run on the quasi-reentrant (QR) TCB. The values are:
Force
CICS forces all user application programs specified with the CONCURRENCY(THREADSAFE) attribute to run under the QR TCB, as if they were specified with CONCURRENCY(QUASIRENT). Start of change Force does not apply to OPENAPI programs or C/C++ programs compiled with XPLINK.End of change
Nforce
CICS is to honor the CONCURRENCY(THREADSAFE) attribute on Start of change CICSAPI End of change user application programs, and allow user programs to run on an open TCB to avoid unnecessary TCB switching.
Logdefer (value)
displays the log deferral interval in milliseconds, which is the period of time used by CICS Log Manager when determining how long to delay a forced journal write request before invoking the MVS system logger. It is in the range 0-65535. See the CICS System Definition Guide for information about the Logdefer parameter and associated SIT parameter LGDFINT.
Note:
You can reset this value by overtyping it with a different value.
Maxtasks (value)
displays the maximum number of tasks, both active and suspended, allowed at any one time in the CICS system. It must have a value in the range 1-999.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. The value assigned to MAXTASKS might be less than the requested value, because of CICS storage constraints. If this occurs, the message CEILING REACHED is displayed when the request is made.
Mrobatch (value)
displays the number of MRO requests from connected regions which are to be batched before this region is posted. It is a value in the range 1-255.
Note:
You can reset this value by overtyping it with a different value.
Oslevel (value)
displays the version, release, and modification level of the OS/390 product on which CICS is running. For example, OS/390 Version 2 Release 4 Modification 0 is shown as 020400.

z/OS Version 1 Release 4 Modification 0 appears as 010400

Progautoctlg
displays whether autoinstalled program definitions are to be cataloged. The values are:
Ctlgall
All autoinstalled program definitions are to be cataloged and restored on a warm or emergency start.
Ctlgmodify
Autoinstalled program definitions are to be cataloged only if they are modified (for example, by a CEMT SET PROGRAM command), so that the modified definitions are restored on a warm or emergency restart.
Ctlgnone
No autoinstalled program definitions are to be cataloged. They are autoinstalled again after a warm or emergency start.
Note:
You can reset this value by overtyping it with a different value.
Progautoexit (value)
displays the name of the user-provided program that is called by the program autoinstall code to select or modify a model definition.
Note:
You can reset this value by overtyping it with a different value.
Progautoinst
displays whether autoinstall for programs is active or inactive. The values are:
Autoactive
Autoinstall for programs is active. On first use, if a program, mapset, or partitionset is not defined, the definition is created dynamically.
Autoinactive
Autoinstall is not active. If a program is not defined, a PGMIDERR or transaction abend occurs when it is referenced.
Note:
You can reset this value by overtyping it with a different value.
Reentprotect (value)
displays whether read-only storage is in use for reentrant programs (that is, whether the RENTPGM system initialization parameter specifies PROTECT or NOPROTECT). The values are:
Noreentprotect
CICS allocates storage for the read-only DSAs (RDSA and ERDSA) from CICS-key storage. Reentrant programs do not have the protection of residing in read-only storage, and can be modified by programs executing in CICS key.
Reentprotect
CICS allocates storage for the RDSA and ERDSA from key-0, non-fetch protected, storage. CICS loads reentrant programs into this storage, and the programs are protected by residing in read-only storage.
Release (value) (supported for compatibility only)
displays a 4-digit number (value 0640 for this release of CICS TS) representing the level of the CICS code running this region.

This field is maintained for compatibility with previous releases of CICS only. As an exclusive element of CICS Transaction Server for OS/390, CICS does not have a product version and release number of its own. To determine the release number of the product, see the value displayed for CICSTSLEVEL.

Runaway (value)
displays the interval, in milliseconds, for which a task can have control before it is assumed to be looping.
Note:
You can reset this value by overtyping it with a different value.

If you are resetting this value, you can specify 0, or a value in the range 500-2700000. The value you specify is rounded down to a multiple of 500.

CICS purges a task if the task has not given up control after this interval (that is, CICS assumes that the task is looping). If you specify zero, runaway task control is inoperative (that is, tasks do not get purged if they appear to be looping). The value is independent of, and can be less than, the value in the TIME operand.

CICS runaway-task detection is based upon task time (that is, the interval is reset each time a task receives control of the processor, and is then decremented while the task is in control). You do not, therefore, need to allow for the effect of other jobs when setting the runaway value.

Scandelay (value)
displays the maximum number of milliseconds between the receipt of a VTAM request, and the time when CICS begins to process the request. The number is in the range 0-5000, and is less than or equal to the TIME value.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. In the summary report of the dispatcher statistics, SCANDELAY is referred to as ICVTSD.
Sdtran (value)
displays the 4-character name of the transaction to be run at the beginning of normal or immediate shutdown. This may be the name of a user-supplied transaction, or the CICS-supplied default transaction, CESD.
Sosstatus (value)
displays whether CICS is short on storage in any of the dynamic storage areas. The values returned are:
Notsos
CICS is not short on storage in any of the dynamic storage areas.
Sosabove
CICS is short of storage in at least one of the dynamic storage areas above 16MB.
Sosbelow
CICS is not short on storage in any of the dynamic storage areas below 16MB.
Sos
CICS is short of storage in at least one of the dynamic storage areas.
Storeprotect (value)
displays whether storage protection is active in the CICS region. The values returned are:
Active
CICS is operating with the CICS storage protection facility.
Inactive
CICS is operating without the CICS storage protection facility.

See the description of the STGPROT system initialization parameter in the CICS System Definition Guide for background information about CICS storage protection.

Time (value)
displays the interval, in milliseconds, for which CICS releases control to the operating system if no transactions are ready to resume processing. This interval is known as the ‘region exit interval’.
Notes:
  1. You can reset this value by overtyping it with a different value. It can have a value in the range 100-3600000, and must be greater than or equal to the SCANDELAY value.
  2. In the summary report of the dispatcher statistics, TIME is referred to as ICV.
Tranisolate
displays the status of transaction isolation. The values returned are:
Active
Transaction isolation is active in the CICS region.
Inactive
CICS is running without transaction isolation, either because the support is not available, or it was not requested at CICS initialization.

CEMT INQUIRE TASK

Function

Retrieve information about a user task.

Description

INQUIRE TASK returns information about user tasks. Only information about user tasks can be displayed or changed; information about CICS-generated system tasks or subtasks cannot be displayed or changed. System tasks are those tasks started (and used internally) by CICS, and not as a result of a user transaction.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

(value)
is the CICS-generated task number, in the range 1-99999.
ALl
is the default. The maximum number of tasks displayed is 32000.
TClass (value)
is the 8-character transaction class name to which the transaction belongs. The maximum number of tasks displayed is 32000.

You cannot specify a list of identifiers, nor can you use the symbols * and + to specify a family of tasks.

Sample screen

Figure 149. CEMT INQUIRE TASK screen
IN TASK
STATUS:  RESULTS - OVERTYPE TO MODIFY
 Tas(0000026) Tra(CEMT) Fac(S262) Sus Ter Pri( 255 )
    Sta(TO) Use(CICSUSER) Uow(B0C9D8D111440007) Hty(ZCIOWAIT)
 Tas(0000030) Tra(CEMT) Fac(S263) Run Ter Pri( 255 )
    Sta(TO) Use(CICSUSER) Uow(B0C9D8E9C3B1FBO9)


 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 150.

Figure 150. The expanded display of an individual entry
  I TASK
  RESULT - OVERTYPE TO MODIFY
    Task(0000026)
    Tranid(CEMT)
    Facility(S262)
    Runstatus(Suspended)
    Ftype(Term)
    Priority( 255 )
    Purgetype(              )
    Startcode(TO)
    Userid(CICSUSER)
    Uow(B0C9D8D111440007)
    Htype(ZCIOWAIT)
    Hvalue(DFHZARQ1)
    Htime(000159)
    Indoubt(Backout)
    Indoubtwait(Wait)
    Bridge()
    Identifier()
    Indoubtmins(000000)
    Db2plan()
    Activityid()
    Activity()
    Process()
    Processtype()
    Tcb(QR)
    Brfacility(0000000000000000)

                                                      SYSID=JOHN APPLID=I
                                                TIME:  11.26.40  DATE: 08
 PF 1 HELP 2 HEX 3 END       5 VAR        7 SBH 8 SFH       10 SB 11 SF
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TASK
 
                      .-ALl-----------.
>>-CEMT Inquire TAsk--+---------------+--+---------------+------>
                      +-(value)-------+  '-Tranid(value)-'
                      '-TClass(value)-'
 
>--+-----------------+--+------------+--+--------------+-------->
   '-Facility(value)-'  +-Purge------+  +-Running------+
                        '-Forcepurge-'  +-Dispatchable-+
                                        '-Suspended----'
 
>--+------+--+-----------------+--+----+--+---------------+----->
   +-Task-+  '-Priority(value)-'  +-D--+  '-Userid(value)-'
   +-Term-+                       +-Ds-+
   '-Dest-'                       +-Qd-+
                                  +-S--+
                                  +-Sd-+
                                  +-To-+
                                  +-Tp-+
                                  '-U--'
 
>--+------------+--+--------------+--+---------------+---------->
   '-Uow(value)-'  '-Htype(value)-'  '-Hvalue(value)-'
 
>--+--------------+--+---------+--+---------------+------------->
   '-Htime(value)-'  +-Backout-+  '-Bridge(value)-'
                     '-Commit--'
 
>--+-------------------+--+--------------------+--+--------+---->
   '-Identifier(value)-'  '-Indoubtmins(value)-'  +-Nowait-+
                                                  '-Wait---'
 
>--+----------------+--+-------------------+-------------------->
   '-Db2plan(value)-'  '-Activityid(value)-'
 
>--+-----------------+--+----------------+---------------------->
   '-Activity(value)-'  '-Process(value)-'
 
>--+--------------------+--+----------+------------------------->
   '-Processtype(value)-'  +-Ckopen---+
                           +-Internal-+
                           +-Qr-------+
                           '-Ukopen---'
 
>--+-------------------+---------------------------------------><
   '-Brfacility(value)-'
 

Displayed fields

Activity (value)
displays the 16-character, user-assigned, name of the CICS business transaction services activity that this task is executing on behalf of.
Activityid (value)
displays the 52-character, CICS-assigned, identifier of the CICS business transaction services activity that this task is executing on behalf of.
Brfacility(value)
displays the 8-byte facility token representing the virtual terminal used by the current task if it is used by the 3270 bridge mechanism. If the task is not currently running in the 3270 bridge environment, zeroes are returned.
Bridge (value)
Displays the 4-character name of the bridge monitor transaction if the current task is running in a 3270 bridge environment, and was started by a bridge monitor transaction with a START BREXIT TRANSID command. Otherwise, blanks are returned.
Db2plan (value)
displays the 1- to 8- character name of the DB2 plan being used by this task, or blanks if no DB2 plan is being used.
Facility (value)
displays a 4-character string identifying the name of the terminal or queue that initiated the task. If no FACILITY value is displayed, the task was started without a facility.
Ftype
displays the type of facility that initiated this task. The values are:
Task
The task was initiated from another task.
Term
The task was initiated from a terminal.
Dest
The task was initiated by a destination trigger level as defined in the Start of changeTDQUEUE resource definition.End of change
Htime (value)
displays the time (in seconds) that the task has been in the current suspended state.
Htype (value)
displays the reason why the task is suspended. A null value indicates that there is no hold-up, except for the necessity of reaching the head of the queue.
Hvalue (value)
displays a 16-character resource name, such as a file name, or a value such as a TCLASS value.

For information on the values that can appear in the HTYPE and HVALUE options, and how they can be used as an aid in problem determination, see the "resource type" and "resource name" details in the CICS Problem Determination Guide.

Indoubtmins (value)
displays the length of time, in minutes, after a failure during the in-doubt period, before the task is to take the action returned in the Indoubt field. The returned value is valid only if the unit of work is in-doubt and Indoubtwait returns WAIT.

See also Indoubt and Indoubtwait.

Indoubt (value)
displays the action (based on the ACTION attribute of the TRANSACTION resource definition) to be taken if the CICS region fails or loses connectivity with its coordinator while a unit of work is in the in-doubt period.

The action is dependent on the values returned in Indoubtwait and Indoubtmins; if Indoubtwait returns WAIT, the action is not taken until the time returned in Indoubtwait expires.

The values are:

Backout
All changes made to recoverable resources are to be backed out.
Commit
All changes made to recoverable resources are to be committed, and the unit of work marked as completed.
Indoubtwait (value)
displays how (based on the WAIT attribute of the TRANSACTION definition) a unit of work (UOW) is to respond if a failure occurs while it is in an in-doubt state. The values are:
Nowait
The UOW is not to wait, pending recovery from the failure. CICS is to take immediately whatever action is specified on the ACTION attribute of the TRANSACTION definition.
Wait
The UOW is to wait, pending recovery from the failure, to determine whether recoverable resources are to be backed out or committed.

For further information about the meaning of the ACTION and WAIT attributes of the TRANSACTION definition, see the CICS Resource Definition Guide.

Identifier (value)
returns a 48-character field containing user data provided by the bridge exit, if the task was initiated in the 3270 bridge environment, or blanks, otherwise. This field is intended to assist in online problem resolution.

For example, it could contain the MQ™ correlator for the MQ bridge, or a Web token.

Priority (value)
displays the priority of the task, in the range 0-255 where 255 is the highest priority.
Note:
You can reset this value by overtyping it with a different value.
Process (value)
displays the 36-character name of the CICS business transaction services process that this task is executing on behalf of.
Processtype (value)
displays the 8-character process-type of the CICS business transaction services process that this task is executing on behalf of.
Purgetype (input only field)
specifies whether a task is to be purged or forcepurged. The values are:
Purge
The task is to be terminated. Termination occurs only when system and data integrity can be maintained.
Forcepurge
The task is to be terminated immediately. System integrity is not guaranteed. In some extreme cases, for example if a task is forcepurged during backout processing, CICS terminates abnormally. If you want to terminate a task but do not want to terminate CICS, you should use PURGE instead of FORCEPURGE.
Runstatus
displays the status of this task. The values are:
Running
The task is running.
Dispatchable
The task is dispatchable.
Suspended
The task is suspended.
Startcode (value)
displays how this task was started. The values are:
D
A distributed program link (DPL) request. The program cannot issue I/O requests against its principal facility or any syncpoint requests.
Ds
A distributed program link (DPL) request, as for code D, with the exception that the program can issue syncpoint requests.
Qd
A transient data trigger level was reached.
S
Start command (no data)
Sd
Start command (with data)
To
The operator typed a transaction code at the terminal.
Tp
The transaction was started by presetting the transaction ID for the terminal.
U
User-attached task.
Note:
Start of change
When the IIOP request processor is run locally the startcode for an ASSIGN command or an INQUIRE TASK is U. When the IIOP request processor is run remotely, over an MRO link, the startcode for these commands is TO. (If you attempt to run the IIOP request processor remotely over any other type of connection, the routing request is not accepted, so startcodes for these commands are not relevant in this situation).
End of change
Task (value)
indicates that this panel relates to a TASK inquiry and displays a CICS-generated task number in the range 1-99999.
Tcb (value)
displays the type of TCB under which the task is running. The values are:
Ckopen
The task is running under a CICS key open TCB (for example, a J8 mode TCB, used for JVMs in CICS key).
Internal
The task is running under one of the CICS internal TCBs. An internal TCB can be one of the following:
  • The concurrent mode (CO) TCB
  • The file-owning mode (FO) TCB
  • The master JVM (JM) TCB
  • The resource-owning mode (RO) TCB
  • The ONC/RPC mode (RP) TCB
  • The sockets listener mode (SL) TCB
  • The secure sockets layer mode (SO) TCB
  • A sockets mode (S8) TCB
  • The FEPI mode (SZ) TCB.
Qr
The task is running under the CICS QR TCB.
Ukopen
The task is running under a user key open TCB (for example, a J9 mode TCB, used for JVMs in user key).
Tranid (value)
displays a 4-character string identifying the transaction name associated with the task.
Uow (value)
displays the 16-character local identifier of the unit of work associated with this task.
Userid (value)
displays the user currently associated with the task.

CEMT INQUIRE TCLASS

Function

Retrieve information about tasks within a task class.

Description

INQUIRE TCLASS returns information about the current and maximum number of tasks, the purge threshold, and the status of a user-defined task class.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, use the CEMT SET TCLASS command.

(value)
is the 8-character transaction class name.
ALl
is the default.

Sample screen

Figure 151. CEMT INQUIRE TASK screen
 IN TCLASS
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Tcl(DFHTCIND) Max( 010 ) Act(000) Pur( 0000000 )
     Que(000000)
  Tcl(DFHTCL01) Max( 001 ) Act(000) Pur( 0000000 )
     Que(000000)
  Tcl(DFHTCL02) Max( 001 ) Act(000) Pur( 0000000 )
     Que(000000)
  Tcl(DFHTCL03) Max( 001 ) Act(000) Pur( 0000000 )
     Que(000000)
  Tcl(DFHTCL04) Max( 001 ) Act(000) Pur( 0000000 )
     Que(000000)
  Tcl(DFHTCL05) Max( 001 ) Act(000) Pur( 0000000 )
     Que(000000)
  Tcl(DFHTCL06) Max( 001 ) Act(000) Pur( 0000000 )
     Que(000000)
  Tcl(DFHTCL07) Max( 001 ) Act(000) Pur( 0000000 )
     Que(000000)
+ Tcl(DFHTCL08) Max( 001 ) Act(000) Pur( 0000000 )
     Que(000000)
 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 152.

Figure 152. The expanded display of an individual entry
 IN TCLASS
 RESULT - OVERTYPE TO MODIFY
   Tclass(DFHTCIND)
   Maxactive( 010 )

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TCLASS
 
                        .-ALl-----.
>>-CEMT Inquire TClass--+---------+--+------------------+------->
                        '-(value)-'  '-Maxactive(value)-'
 
>--+---------------+--+--------------------+-------------------->
   '-Active(value)-'  '-Purgethresh(value)-'
 
>--+---------------+-------------------------------------------><
   '-Queued(value)-'
 

Displayed fields

Active (value)
displays the total number of transactions that are currently active in a user-defined transaction class.
Maxactive (value)
displays the largest number of transactions in the transaction class which are allowed to run concurrently. The value can be in the range 0-999.
Note:
You can reset this value by overtyping it with a different value.
Purgethresh (value)
displays the limit at which the queuing transactions are purged for the transaction class. It can have a value in the range 0000000-1000000. Zero means that the transactions are not purged. A nonzero number "n" means that the first (n-1) transactions to arrive are queued and the nth is purged.
Note:
You can reset this value by overtyping it with a different value.
Queued (value)
displays the total number of current tasks that are suspended because the class maximum has been reached.
TClass (value)
indicates that this panel relates to a TCLASS inquiry and displays an 8-character transaction class name.

CEMT INQUIRE TCPIP

Function

Inquire about CICS internal TCP/IP support status.

Description

INQUIRE TCPIP returns information about the current status of CICS internal TCP/IP support.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

Displayed fields

Actsockets(value)
displays the current number of active IP sockets managed by the CICS sockets domain.
Start of changeCrlprofile(value)End of change
Start of changeDisplays the name of the profile that is used to authorize CICS to access the certificate revocation lists that are stored in an LDAP server.End of change
Maxsockets (value)
Displays the maximum number of IP sockets that can be managed by the CICS sockets domain.
Openstatus
Displays the status of CICS internal TCP/IP support. The values are:
Open
CICS internal sockets support is open.
Closed
CICS internal sockets support has not yet been activated, or has been terminated.
Closing
CICS internal sockets support is in the process of closing.
Immclosing
CICS internal sockets support is in the process of immediate termination.
Start of changeSslcache(value)End of change
Start of changeDisplays whether CICS is configured to use local or sysplex caching of session IDs. The values are:
CICS
CICS is configured to cache session IDs in the local CICS region.
SYSPLEX
CICS is configured to cache session IDs in the coupling facility.
End of change

CEMT INQUIRE TCPIPSERVICE

Function

Retrieve information about TCP/IP ports on which CICS internal TCP/IP support is currently listening on behalf of other CICS services.

Description

INQUIRE TCPIPSERVICE returns information about the state of a service using CICS internal TCP/IP support.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

Sample screen

Figure 153. CEMT INQUIRE TCPIPSERVICE screen
 inq tcpipservice
 RESULT - OVERTYPE TO MODIFY
   Tcpipservice(HTTPNSSL)
   Backlog( 00005 )
   Connections(00000)
   Port(20130)
   Maxdatalen( 000032 )
   Protocol(Http)
   Ssltype(Ssl)
   Authenticate(Noauthentic)
   Privacy(Supported)
   Start of changeCiphers(0504352F0A0903060201)End of change
   Openstatus( Open )
   Transid(CWXN)
   Urm( DFHWBADX )
   Ipaddress(9.20.101.6)
   Socketclose(Timeout)
   Closetimeout(000005)
   Dnsgroup()
   Dnsstatus(              )
   Grpcritical(Noncritical)
   Certificate()
   Tsqprefix()

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TCPIPSERVICE
 
>>-INQUIRE TCPIPService(value)--+----------------+-------------->
                                '-Backlog(value)-'
 
>--+--------------------+--+-------------+---------------------->
   '-Connections(value)-'  '-Port(value)-'
 
>--+-------------------+--+------+--+------------+-------------->
   '-Maxdatalen(value)-'  +-Http-+  +-Ssl--------+
                          +-User-+  +-Nossl------+
                          +-Eci--+  '-Clientauth-'
                          '-Iiop-'
 
>--+-------------+--+--------------+--+----------------+-------->
   +-Asserted----+  +-Required-----+  '-Ciphers(value)-'
   +-Noauthentic-+  +-Supported----+
   +-Basic-------+  '-Notsupported-'
   +-Certificate-+
   +-Register----+
   '-Automatic---'
 
>--+------------+--+----------------+--+------------+----------->
   +-Open-------+  '-Transid(value)-'  '-Urm(value)-'
   +-Closed-----+
   +-Closing----+
   '-Immclosing-'
 
>--+------------------+--+---------+--+---------------------+--->
   '-Ipaddress(value)-'  +-Wait----+  '-Closetimeout(value)-'
                         '-Timeout-'
 
>--+----------------+--+--------------+--+-------------+-------->
   '-Dnsgroup(name)-'  +-Notapplic----+  +-Critical----+
                       +-Unavailable--+  '-Noncritical-'
                       +-Unregistered-+
                       +-Registered---+
                       +-Regerror-----+
                       +-Deregistered-+
                       '-Deregerror---'
 
>--+--------------------+--+------------------+----------------><
   '-Certificate(value)-'  '-Tsqprefix(value)-'
 

Displayed fields

Authenticate
indicates the scheme used to authenticate clients. Values are:
Asserted
Asserted identity authentication is used.

This value is returned only when PROTOCOL has a value of IIOP.

Basic
HTTP basic authentication is used to obtain a user ID and password from the client.

This value is returned only when PROTOCOL has a value of HTTP.

Certificate
SSL client certificate authentication is used to authenticate and identify the client.

This value is returned only when PROTOCOL has a value of HTTP or IIOP.

Noauthentic
The client is not required to send authentication or identification information. However, if the client sends a valid certificate that is already registered to the security manager, and associated with a user ID, then that user ID identifies the client.

This value is returned only when PROTOCOL has a value of HTTP or IIOP.

Register
SSL client certificate authentication is used to authenticate the client. If the client's certificate is not associated with a user ID, then HTTP basic authentication is used to obtain the client's user ID, and associate it with the certificate.

This value is returned only when PROTOCOL has a value of HTTP.

Automatic
If the client does not send a certificate, then HTTP basic authentication is used to obtain a user ID and password from the client. Otherwise, SSL client certificate authentication is used to authenticate the client. If the client's certificate is not associated with a user ID, then HTTP basic authentication is used to obtain the client's user ID, and associate it with the certificate.

This value is returned only when PROTOCOL has a value of HTTP.

For more information, see the CICS RACF® Security Guide.
Backlog (value)
Change the maximum number of requests which can be queued in TCP/IP waiting to be processed by the service.
Certificate (value)
specifies the label of an X.509 certificate that is to be used in the SSL handshake for the TCP/IP service. Certificate labels can be up to 32 bytes, and are specified for the CICS region's userid within a key ring defined in the external security manager's database (for example, as defined by the RACDCERT command). If this attribute is omitted, the default certificate defined in the key ring for the CICS region userid is used.
Start of changeCiphers(value)End of change
Start of changereturns a 56-character area containing the list of cipher suites that is used to negotiate with clients during the SSL handshake. The list is set by the ENCRYPTION system initialization parameter, but you can edit the list to remove or change the order of cipher suites.End of change
Closetimeout (value)
Start of changereturns a fullword value containing the number of seconds specified for the timeout period. This can be 0 through 86400 (24 hours). For the HTTP protocol, 0 should not be specified, because this setting means that persistent connections cannot be maintained.End of change
Connection (value)
The number of current sockets connections for this service
Dnsgroup(name)
returns the 18-character Domain Name System (DNS) group name that this TCPIPSERVICE registers with OS/390 Workload Manager (WLM).
Dnsstatus
returns the current state of WLM/DNS registration of this TCPIPSERVICE. The CVDA values are:
Notapplic
This service is not using DNS connection optimization. No DNSGROUP attribute was specified when the resource was installed.
Unavailable
Registration is not supported by OS/390.
Unregistered
Registration has not yet occurred (this is the initial state of any service).
Registered
Registration has completed successfully.
Regerror
Registration has failed with an error.
Deregistered
Deregistration has completed successfully.
Deregerror
Deregistration has failed with an error.
Grpcritical
returns a CVDA value specifying whether or not this TCPIPSERVICE is a critical member of the DNS group. The CVDA values are:
Critical
If this TCPIPSERVICE is closed, or abnormally stops listening for any reason, the group name specified in the DNSGROUP attribute is deregistered from WLM.
Noncritical
If this TCPIPSERVICE is closed, or abnormally stops listening for any reason, the group name specified in the DNSGROUP attribute is not deregistered from WLM, unless this is the last service in a set with the same group name.
Ipaddress (value)
returns an IP address. If you specify an IP address in the TCPIPSERVICE definition, that address is returned, otherwise the default IP address is returned. If there is more than one IP address on an OS/390 system, only the default is returned.
Start of changeMaxdatalen (value) End of change
Start of changereturns a fullword value containing the maximum length of data that may be received by CICS as an HTTP server. This can be 3K through 524288K. The default is 32K.End of change
Openstatus
returns the state of the service. Values are:
Open
CICS internal sockets support is open.
Closed
CICS internal sockets support has not yet been activated, or has been terminated.
Closing
CICS internal sockets support is in the process of closing.
Immclosing
CICS internal sockets support is in the process of immediate termination.
Port (value)
returns the number of the port on which CICS is listening on behalf of this service.
Privacy
returns the level of SSL encryption required for inbound connections to this service. Values are:
Required
Encryption must be used. During the SSL handshake, CICS advertises only supported cipher suites that provide encryption.
Supported
Encryption is used if both client and server support it. During the SSL handshake, CICS advertises all supported cipher suites.
Notsupported
Encryption must not be used. During the SSL handshake, CICS advertises only supported cipher suites that do not provide encryption.
Protocol
identifies to CICS the type of service to be provided on the TCP/IP port. Values are:
Eci
Connections are handled by CICS ECI over TCP/IP support.
Http
Connections are handled by CICS Web support.
Start of changeUser End of change
Start of changeThe user-defined protocol is used. Requests are passed to the analyzer program for the TCPIPSERVICE, and handled using CICS Web support facilities, but the HTTP specifications are not used to check the messages.End of change
Iiop
Connections are handled by CICS IIOP support. IIOP is required for TCPIPSERVICEs that are to accept inbound requests for enterprise beans.
Socketclose
returns a CVDA value indicating whether a timeout value is in effect for the TCPIPSERVICE. CVDA values are:
Wait
NO was specified on the definition. Socket receives will wait for data indefinitely.
Timeout
A value was specified for the SOCKETCLOSE parameter on the definition.
Ssltype
returns a CVDA value indicating the status of SSL support for this service. CVDA values are
Ssl
Non client authentication SSL flows are processed on this port
Nossl
Non SSL flows are processed on this port
Clientauth
SSL client authentication flows are processed on this port
TCPIPService (value)
8-character name identifying this service.
Transid (value)
4-character transaction id used on the attach for the task started to process a new request.
Tsqprefix (value)
returns the 6-character prefix used when the service generates TS queue names.
Urm (value)
8 character name of Service URM invoked by attached task.

CEMT INQUIRE TDQUEUE

Function

Retrieve information about transient data queues.

Description

INQUIRE TDQUEUE returns information about a named transient data queue that is defined in Start of changea TDQUEUE resource definition.End of change

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

(value)
is the identifier (1-4 characters) of a transient data queue.
All
is the default.

Sample screen

Figure 154. Example CEMT INQUIRE TDQUEUE screen
 IN TDQ
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Tdq(CADL)              Ind Nam(CSSL)
  Tdq(CAIL)              Ind Nam(CSSL)
  Tdq(CCPI)              Ind Nam(CSSL)
  Tdq(CCSE)              Ind Nam(CCSO)
  Tdq(CCSO)              Ext           Ena Ope
                             Mod Out Dat(001) Ddn(COUT    )
  Tdq(CDBC)              Ind Nam(CSSL)
  Tdq(CDUL)              Ind Nam(CSSL)
  Tdq(CESE)              Ext           Ena Ope
                             Shr Out Dat(001) Ddn(CEEMSG  )
  Tdq(CESO)              Ext           Ena Ope
                             Shr Out Dat(001) Ddn(CEEOUT  )
  Start of changeTdq(CMIG)              Ind Nam(CSSL)End of change  Tdq(CPLI)              Ext           Ena Ope
                             Mod Out Dat(001) Ddn(PLIMSG  )
  Tdq(CRDI)              Ind Nam(CSSL)
+ Tdq(CSCS)              Ind Nam(CSSL)
 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 155.

Figure 155. The expanded display of an individual entry
IN TDQ
RESULT - OVERTYPE TO MODIFY
  Tdqueue(CCSO)
  Type(Extra)
  Nameind()
  Triggerlevel(       )
  Enablestatus( Enabled )
  Openstatus( Open )
  Termid()
  Tranid()
  Userid()
  Disposition(Mod)
  Iotype(Output)
  Indoubt()
  Indoubtwait()
  Databuffers(001)
  Ddname(COUT)
  Dsname(BELL.CICSHT61.JOB04382.D0000105.?)
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TDQUEUE
 
                         .-All-----.
>>-CEMT Inquire TDqueue--+---------+--+---------------------+--->
                         '-(value)-'  '-Triggerlevel(value)-'
 
>--+----------+--+----------------+--+----------+--+--------+--->
   +-Indirect-+  '-Nameind(value)-'  +-Enabled--+  +-Open---+
   +-Extra----+                      '-Disabled-'  '-Closed-'
   +-Intra----+
   '-Remote---'
 
>--+---------------+--+---------------+--+---------------+------>
   '-Termid(value)-'  '-Tranid(value)-'  '-Userid(value)-'
 
>--+-----+--+--------+--+-------+--+--------+--+--------+------->
   +-Shr-+  +-Input--+  '-Queue-'  '-Reject-'  +-Nowait-+
   +-Old-+  +-Output-+                         '-Wait---'
   '-Mod-'  '-Rdback-'
 
>--+----------------+--+--------------------+------------------->
   '-Indoubt(value)-'  '-Databuffers(value)-'
 
>--+---------------+--+---------------+--+--------+------------><
   '-Ddname(value)-'  '-Dsname(value)-'  '-Member-'
 

Displayed fields

Databuffers (value) (extrapartition queues only)
displays the number of buffers that can be used by the associated QSAM data set in the range 1 through 255.
Note:
An extrapartition queue can be input or output, but not both.
Ddname (value) (extrapar tition queues only)
displays a 1-8 character value that may refer to a data set defined in the startup JCL.
Disposition (extrapartition queues only)
displays the status of the associated data set:
Shr
The data set existed before this job step and can be read by other concurrent jobs.
Old
The data set existed before this job step.
Mod
The system first assumes that the data set exists. For an existing sequential data set, MOD causes the read/write mechanism to be positioned after the last record in the data set. The read/write mechanism is positioned after the last record each time the data set is opened for output.

If the system cannot find volume information for the data set on the DD statement, in the catalog, or passed with the data set from a previous step, the system assumes that the data set is being created in this job step. For a new data set, MOD causes the read/write mechanism to be positioned at the beginning of the data set.

Dsname (value) (extrapartition queues only)
displays the name of the associated QSAM data set (1-44 characters in length), or a dummy data set (or dummy data set name) that indicates whether the data set will be used by this transient data queue. This option is applicable for output resources only.
Enablestatus (all except indirect and remote queues)
displays a value indicating whether the queue can be accessed by applications. The values are:
Enabled
The queue can be accessed by applications.
Disabled
The queue cannot be accessed by applications, although it can still be open. Queues with names beginning with "C" cannot be disabled because they are usually reserved for use by CICS.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. A queue can be disabled only if there are no current users. If units of work (UOWs) are currently using the queue, the queue enters a "disable pending" state. The last UOW to complete its operation on the queue fully disables the queue.
  3. When a queue is in a "disable pending" state, the value of the ENABLESTATUS option cannot be altered.
Indoubt (value) (intrapartition queues only)
indicates the action CICS is to take for an in-doubt unit of work (UOW) if the definition for this queue specifies WAIT(YES).
Indoubtwait (intrapartition queues only)
specifies whether an in-doubt unit of work (UOW) (which has modified a logically recoverable queue) should wait for resynchronization with its coordinator to determine whether to commit or back out the changes. Thevalues are:
Nowait
The UOW is not to wait. Any changes made to recoverable resources are to be backed out or committed, as specified by the ACTION attribute on the transaction resource definition.
Wait
The UOW is to wait, and any action required while waiting is determined by the WAITACTION attribute.

This attribute overrides the WAIT parameter defined on the UOW’s transaction definition. See the CICS Messages and Codes manual for an explanation of the interactions of in-doubt attributes on the TDQUEUE and TRANSACTION definitions.

Iotype (extrapartition queues only)
displays the type of data set to be used:
Input
An input data set.
Output
An output data set.
Rdback
An input data set that is to be read backward.
Member (extrapartition queues only)
returns a 1- to 8-character name that indicates the member name of a partitioned data set. This is blank if the QSAM data set is not a partitioned data set.
Openstatus (extrapartition queues only)
displays whether the extrapartition queue is open or closed. The values are:
OPen
The queue is open.
Closed
The queue is closed.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. Queues no longer have to be enabled before they can be opened or closed. It is advisable for a queue to be disabled before it is opened or closed.
Nameind (value) (indirect queues only)
displays a 4-character string identifying the name of the queue pointed to by the indirect queue.
Queue
The UOW is in-doubt and waiting; any locks held by the UOW for this queue remain active until the final state of the UOW is known. This means that tasks are suspended rather than receiving the LOCKED response. When the final state of the UOW is known, any changes that it has made are committed or backed out. Until then, any further requests of the following types that need one of the active locks must wait:
  • READQ, if the indoubt UOW has issued READQ or DELETEQ requests
  • WRITEQ, if the indoubt UOW has issued WRITEQ or DELETEQ requests
  • DELETEQ, if the indoubt UOW has issued READQ, WRITEQ or DELETEQ requests.
Reject
The UOW is in-doubt and is waiting. Any locks held by the UOW for this queue are retained until the final state of the UOW is known. When the final state is known, any changes the UOW has made are committed or backed out. Until then, any further requests that need one of the retained locks are rejected, and a LOCKED response is returned. INDOUBT=REJECT causes a LOCKED response to be raised in exactly the same circumstances as those in which INDOUBT=QUEUE causes a transaction to wait.
Tdqueue (value)
indicates that this panel relates to a TDQUEUE inquiry and displays the 4-character identifier of a transient data queue. Queue names beginning with "C" are normally reserved for use by CICS.
Termid (value)
displays the 4-character name of the terminal or session to be associated with this queue when automatic transaction initiation (ATI) occurs. See also Tranid and Triggerlevel.
Tranid (value)
displays the 4-character identifier of the transaction that is to be initiated automatically when the queue trigger level is reached.
Triggerlevel (value) (intrapartition queues only)
displays the number of requests for output to a queue that must accrue before automatic transaction initiation (ATI) occurs.
Note:
You can reset this value by overtyping it with a different value.
The number can be between 0 and 32767.
Type
displays the type of this transient data queue. The values are:
Indirect
The queue type is indirect. The name of the final target queue is shown in the next field.
Extra
The queue type is extrapartition.
Intra
The queue type is intrapartition.
Remote
The queue type is remote.
Userid
displays the 8-byte identifier associated with the intrapartition queue intended for ATI.

CEMT INQUIRE TERMINAL

Function

Retrieve information about terminals.

Description

INQUIRE TERMINAL returns information about a named terminal defined in the terminal control table (TCT).

In an SNA environment, a terminal is the CICS representation of an SNA logical unit with which CICS can be in communication. (SNA environment means that CICS is using VTAM as the access method for communication with SNA logical units.)

This logical unit can be:

If you are familiar with network names, you may prefer to use the command that uses these names. See CEMT INQUIRE NETNAME.

The terminal entry displayed can also be an MVS console.

The message "TEMP OUT SERVICE" can be displayed if recovery is in progress for the terminal. The "TEMP OUT SERVICE" indicator is reset by simply refreshing the screen, or by overtyping the "INS" field with "INS" or "OUT". If "TEMP OUT SERVICE" continues to be displayed, the cause of the indicator should be investigated.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

(value)
is a terminal identifier (1-4 characters) as specified in an installed terminal definition.

If the terminal name is, for example, S201, this option is coded thus:

CEMT INQUIRE TERMINAL(S201)
ALl
is the default. For example, if you inquire about terminals, you receive information about all terminals, unless you specify a terminal identifier, a terminal class identifier, or a system identifier.
CLass (value)
is the 1- or 2-character suffix of a terminal list table (TLT).

If you do not specify a termid or class identifier, by default you receive information about all the terminals.

Sample screen

Figure 156. CEMT INQUIRE TERMINAL screen
 IN TERM
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Ter(CBRF)           Pri( 000 ) Pag Ins Ati Tti Rte
     Net(CBRF    )                      Rem(CBR ) Rna(CBRF)
  Ter(CERR)           Pri( 000 ) Pag Ins     Tti Loc
     Con(*ERRCON*    )
  Ter(CTSO)           Pri( 000 ) Pag Ins     Tti Loc
     Con(PKING       )
  Ter(KING)           Pri( 000 ) Pag Ins     Tti Loc
     Con(PRUEKING    )
  Ter(RNAL)           Pri( 000 ) Pag Ins     Tti Loc
     Con(INTERNAL    )
  Ter(S225) Tra(CEMT) Pri( 000 ) Pag Ins Ati Tti Loc
     Net(IGCS225 ) Acq     Tas(0000068)           Nqn(GBIBMIYA.IGCS225 )
  Ter(S280) Tra(CEMT) Pri( 000 ) Pag Ins Ati Tti Loc
     Net(IGCS280 ) Acq     Tas(0000063)           Nqn(GBIBMIYA.IGCS280 )
  Ter(TC12) Tra(CEMT) Pri( 000 ) Pag Ins Ati Tti Loc
     Net(IYCWTC12) Acq     Tas(0000072)           Nqn(GBIBMIYA.IYCWTC12)
  Ter(-AAZ)           Pri( 000 ) Aut Ins Ati Tti Ses
     Net(TMPLATE1) Rel                  Rem(CBPS)
  Ter(-AA0)           Pri( 000 ) Aut Ins Ati Tti Ses
     Net(TMPLATE1) Rel Cre              Rem(CBPS)
+ Ter(-AA1)           Pri( 000 ) Aut Out Ati Tti Ses
     Net(TMPLATE1) Rel Cre              Rem(CBPS)

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 157.

Figure 157. The expanded display of an individual entry
 IN TERM
 RESULT - OVERTYPE TO MODIFY
   Terminal(bell)
   Transaction()
   Priority( 000 )
   Pagestatus( Pageable )
   Servstatus( Inservice )
   Atistatus( Noati )
   Ttistatus( Tti )
   Nature(Local)
   Purgetype(              )
   Netname()
   Console(BELL)
   Termstatus(              )
   Createsess(              )
   Task(00000)
   Remotesystem()
   Nqn(GBIBMIYA.IYCQTC03)
   Rname()
   Rnetname()
+  Cid()
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TERMINAL
 
                          .-ALl----------.
>>-CEMT Inquire TErminal--+--------------+---------------------->
                          +-(value)------+
                          '-CLass(value)-'
 
>--+--------------------+--+----------------+------------------->
   '-Transaction(value)-'  '-Console(value)-'
 
>--+-----------------+--+--------------+--+------------+-------->
   '-Priority(value)-'  +-Pageable-----+  +-Inservice--+
                        '-Autopageable-'  '-Outservice-'
 
>--+-------+--+-------+--+-----------+--+----------+------------>
   +-Ati---+  +-Tti---+  +-Rterminal-+  +-Acquired-+
   '-Noati-'  '-Notti-'  +-Rsession--+  +-Released-+
                         +-Session---+  '-Coldacq--'
                         '-Local-----'
 
>--+----------+--+------------+--+----------------+------------->
   +-Create---+  +-Purge------+  '-Netname(value)-'
   '-Nocreate-'  '-Forcepurge-'
 
>--+-------------+--+---------------------+--------------------->
   '-Task(value)-'  '-Remotesystem(value)-'
 
>--+---------------+--+--------------+--+-----------------+----->
   '-Nqname(value)-'  '-Rname(value)-'  '-Rnetname(value)-'
 
>--+---------------+--+------------+---------------------------><
   '-Userid(value)-'  '-Cid(value)-'
 

Displayed fields

Atistatus
displays whether the terminal is available for use by transactions that are automatically initiated from within CICS or, if the terminal is an ISC session, by transactions that are using this session as an alternate facility to communicate with another system. The values are:
Ati
The terminal is available for use.
Noati
The terminal is not available for use.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. A terminal cannot be defined with both NOATI and NOTTI.
Cid (value)
displays an 8-character correlation-identifier that is set only for sessions, and only after a session has been acquired. (The value relates to the previously acquired session if there was one, if the session is not acquired). CID is set as follows:
  • For LU6.2 sessions, it is an 8-character token that is common to the two end sessions that are connected together.
  • For MRO sessions, it is set to the termid of the session on the system to which this session is connected.
  • For LU6.1 sessions to IMS, it is set to the value of NETNAMEQ as defined or negotiated.
  • For other LU6.1 sessions, it is set to the value supplied by the other end of the 6.1 session.

Using CID, you can relate the two parts of an LU6.2, MRO, or LU61 conversation together:

  • For LU6.2, you can inquire on the same CID.
  • For MRO, you can locate the session with the terminal name.
  • For LU6.1 to IMS, you can inquire on the netname.
  • For other LU6.1, you can use the name to inquire on the connected system.
Console (value)
displays, for an MVS console only, a 12-byte string that contains the identifier of the console, in two parts. If the device is not a console, CICS returns 12 blanks.

If the console is autoinstalled, or is defined explicitly with a console name, the name is returned in the first 8 bytes, and the last 4 bytes are blank.

If the console is defined by a numeric identifier, the string is divided into two parts, separated by a period (.) in the ninth byte position. The 12-byte string contains the following information:

  • The first 8 bytes contain the MVS console name, if it is known, or the string ‘*UNKNOWN’ if it isn't.
  • A period separating the name from the numeric ID.
  • The last 3 bytes contain the numeric console ID.
Createsess (vtam only)
displays whether the terminal can be acquired automatically by ATI transactions. This cannot be specified for IRC sessions. The values are:
Create
If the terminal is not in session, CICS acquires it if it is needed to satisfy an ATI request.
Nocreate
If the terminal is not in session, CICS does not acquire it to satisfy an ATI request. A session must be started by, for example, a logon request or a CEMT SET TERMINAL ACQUIRED command before the ATI request can be satisfied.

If NOCREATE is set for an LU6.1 ISC session and there are no allocatable sessions left, the connection is placed OUTSERVICE.

You can rest this value by overtyping it with a different value.

Nature
displays the nature of the terminal--that is, whether it is a physical device or a session; and whether it is local or remote. The values are:
Rterminal
The terminal is a remote device.
Rsession
The terminal is a session of a remote connection.
Session
The terminal is an ISC or IRC session.
Local
The terminal is directly attached to this system and is a physical device or a function of a cluster controller.
Netname (value)
displays an 8-character network name.

For a physical terminal, the Netname is the name by which this terminal is known to VTAM.

For ISC sessions, it is the name by which the session (or group of sessions) is known to VTAM.

For IRC sessions, it is the name used by the connected region to log on to the interregion communication program (DFHIRP).

For a remote terminal, it is the name by which the terminal is known to the VTAM in the remote region. (For a remote terminal routed from a pre-CICS Transaction Server for z/OS region, Netname is blank.)

Note:
If the netname is a VTAM LU alias, it is different from the netname component of the NQNAME, which always contains the real netname.
Nqname (value)
displays the 17-character network-qualified name.

Remote terminals do not have an NQNAME value.

If the status (Termstatus) is RELEASED, NQNAME displays the netname.

Pagestatus
displays whether pages after the first in a series are written to the terminal on request from the operator or automatically. The values are:
Pageable
Pages are written on request.
Autopageable
Pages are written automatically.
Note:
You can reset this value by overtyping it with a different value.
Priority (value)
displays a 3-character string identifying the priority of a terminal relative to other terminals. The priority of a task is the sum of the transaction priority, the terminal priority, and the operator priority. Priority has no meaning for terminals that are ISC sessions being used as alternative facilities.
Note:
You can reset this value by overtyping it with a different value.

The value is in the range 0-255, where 255 is the highest priority.

Purgetype (input only field)
specifies whether transactions running with the named terminal are to be purged. The values are:
Purge
Transactions will be terminated only if system and data integrity can be maintained. A transaction is purged if its definition specifies SPURGE=NO.
Forcepurge
Transactions are to be purged immediately. This can lead to unpredictable results and should be used only in exceptional circumstances.
Remotesystem (value)
displays the 4-character name of a connection, if the subject of the inquiry is a remote terminal. The named connection can be either a connection entry that links toward the terminal-owning region (TOR), or an indirect connection that provides the netname of the TOR.

Otherwise this field is blank.

Rname (value)
displays the 4-character name by which this terminal is known in the system in which it is defined (the TOR). RNAME applies only to terminals defined as remote; for others, blanks are displayed.
Rnetname (value)
displays the 8-character netname of the owning TOR, if the subject of the inquiry is a remote terminal. If this field is blank and the terminal is remote, the indirect connection, displayed in REMOTESYSTEM, contains the netname of the TOR.
Servstatus
displays whether the terminal is available for use. The values are:
Inservice
The terminal is available for use. For VTAM, Ins(ervice) means that the terminal can be ACQUIRED. For IRC sessions, Ins(service) means that the connection to the MRO partner is INSERVICE.
Outservice
The terminal is not available for use. Setting a terminal Out(service) means that the terminal can no longer be used by transactions. If PURGE or FORCEPURGE is also specified, any transaction using the terminal is terminated abnormally. If PURGE or FORCEPURGE is not specified, the transaction is allowed to terminate normally, but no further transactions are allowed to use the terminal. For VTAM, setting a terminal Out(service) also causes it to be released and the operator to be signed off, either immediately or when the current transaction has terminated. For IRC sessions, Out(service) means that the connection to the MRO partner is OUTSERVICE.

In an LU6.1 ISC session, the connection is set Out(service) if there are no allocatable sessions left.

Note:
For physical terminals and LU6.1 sessions, you can reset this value by overtyping it with a different value.
Task (value)
displays the task number of the transaction that is running on this terminal.
Terminal (value)
indicates that this panel relates to a TERMINAL inquiry and displays a 4-character terminal identifier as defined in an installed terminal definition. This includes all terminals and sessions, but not logical device codes (LDCs), model TCTTEs, mode groups, or system entries. See also Netname.
Termstatus (vtam only)
displays whether CICS is in session with the logical unit represented by this terminal. The values are:
Acquired
CICS is in session with the logical unit represented by the terminal.
Released
CICS is not in session with the logical unit represented by the terminal. If you set this option to RELEASED, a session is terminated immediately if you also specify the PURGE option, otherwise the session is terminated when the current active transaction finishes.

For physical terminals and LU6.1 sessions, you can reset this value by overtyping it with a different value or with:

Coldacq
CICS is in session with the logical unit represented by the terminal, where no resynchronization is required.
Transaction (value)
displays a 4-character string identifying the name of the transaction currently being processed with this terminal as its principal facility or as a secondary facility.
Ttistatus
displays whether the terminal can be used by the transactions that are initiated from this terminal. The values are:
Tti
This terminal can be used by transactions.
Notti
This terminal cannot be used by transactions.
Notes:
  1. You can reset this value by overtyping it with a different value.
  2. A terminal cannot be defined with both NOATI and NOTTI.
Userid (data-area)
returns the 8-character identifier of the user signed on at this terminal or session.

If there is no signed-on user, the default userid--as specified in the DFLTUSER system initialization parameter--is returned.

CEMT INQUIRE TRANSACTION

Function

Retrieve information about transactions.

Description

INQUIRE TRANSACTION returns information about transaction definitions.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

(value)
is a 1-4 character transaction identifier. Only transactions that have been defined in the CICS system definition (CSD) file and installed on the running CICS system are accessible through CEMT.
ALl
is the default.
CLass(value)
is the 2-character suffix of a transaction list table (XLT).

Sample screen

Figure 158. CEMT INQUIRE TRANSACTION screen
 IN TRAN
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Tra(AADD) Pri( 001 ) Pro(DFH$AALL) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso
  Tra(ABRW) Pri( 001 ) Pro(DFH$ABRW) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso
  Tra(ADYN) Pri( 001 ) Pro(DFH99   ) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso
  Tra(AINQ) Pri( 001 ) Pro(DFH$AALL) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso
  Tra(AMNU) Pri( 001 ) Pro(DFH$AMNU) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso
  Tra(AORD) Pri( 001 ) Pro(DFH$AREN) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso
  Tra(AORQ) Pri( 001 ) Pro(DFH$ACOM) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso
  Tra(AREP) Pri( 001 ) Pro(DFH$AREP) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso
+ Tra(AUPD) Pri( 001 ) Pro(DFH$AALL) Tcl( DFHTCL00 ) Ena Pur
     Prf(DFHCICST) Uda Bel Iso

 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 159.

Figure 159. The expanded display of an individual entry
 IN TRAN
 RESULT - OVERTYPE TO MODIFY
   Transaction(AADD)
   Priority( 001 )
   Program(DFH$AALL)
   Tclass( DFHTCL00 )
   Status( Enabled )
   Routing(Dynamic)
   Routestatus(Notroutable)
   Purgeability( Purgeable )
   Prfile(DFHCICST)
   Taskdatakey(Udatakey)
   Taskdataloc(Below)
   Isolatest(Isolate)
   Trprof()
   Indoubt
   INdoubtwait
   Brexit
   Facilitylike
   Otstimeout(12000)
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TRANSACTION
 
                             .-ALl----------.
>>-CEMT Inquire TRAnsaction--+--------------+------------------->
                             +-(value)------+
                             '-CLass(value)-'
 
>--+-------------------+--+-----------------+------------------->
   '-Otstimeout(value)-'  '-Priority(value)-'
 
>--+----------------+--+---------------+--+----------+---------->
   '-Program(value)-'  '-Tclass(value)-'  +-Enabled--+
                                          '-Disabled-'
 
>--+--------------+--+----------+--+-------+--+-----------+----->
   +-Purgeable----+  +-Cdatakey-+  +-Any---+  +-Isolate---+
   '-Notpurgeable-'  '-Udatakey-'  '-Below-'  '-Noisolate-'
 
>--+---------+--+--------+--+-------------+--------------------->
   +-Backout-+  +-Nowait-+  +-Notroutable-+
   '-Commit--'  '-Wait---'  '-Routable----'
 
>--+---------------+--+---------------+--+---------------+------>
   '-Prfile(value)-'  '-Trprof(value)-'  '-Brexit(value)-'
 
>--+---------------------+--+--------------------+-------------><
   '-Facilitylike(value)-'  '-Indoubtmins(value)-'
 

Displayed fields

Brexit(value)
returns the 8-character name of the bridge exit defined by the BREXIT parameter of the named transaction resource definition.

If BREXIT is not defined, blanks are returned.

Facilitylike(value)
returns the 4-character name of the terminal defined by the FACILITYLIKE parameter of the PROFILE associated with the named transaction resource definition.
Indoubt
displays the action (based on the ACTION attribute of the TRANSACTION resource definition) to be taken if the CICS region fails or loses connectivity with its coordinator while a unit of work is in the in-doubt period.

The action is dependent on the values returned in Indoubtwait and Indoubtmins; if Indoubtwait returns WAIT, the action is not normally taken until the time returned in Indoubtmins expires. (For exceptions to this rule, see Indoubtwait.)

The values are:

Backout
All changes made to recoverable resources are to be backed out.
Commit
All changes made to recoverable resources are to be committed, and the unit of work marked as completed.
Indoubtmins(value)
displays the length of time, in minutes, after a failure during the in-doubt period, before the transaction is to take the action returned in the Indoubt field. The returned value is valid only if the unit of work is in-doubt and Indoubtwait returns WAIT.

See also Indoubt and Indoubtwait.

Indoubtwait
displays (based on the WAIT attribute of the TRANSACTION definition) how CICS is to respond if a failure occurs while a unit of work (UOW) is in an in-doubt state. The values are:
Nowait
The UOW is not to wait, pending recovery from the failure. CICS is to take immediately whatever action is specified on the ACTION attribute of the TRANSACTION definition.
Wait
The UOW is to wait, pending recovery from the failure, to determine whether recoverable resources are to be backed out or committed.
Note:
Even if Indoubtwait returns WAIT, there may be aspects of the UOW that force CICS to take an immediate decision--that is, to take immediately the action specified on the ACTION attribute of the transaction definition. This can happen if, for example, the UOW contains:
  • Subordinate LU6.1 sessions
  • Subordinate MRO sessions to pre-CICS Transaction Server for z/OS systems.

For further information about the meaning of the ACTION and WAIT attributes of the TRANSACTION definition, see the CICS Resource Definition Guide.

Isolatest
displays whether the transaction’s user-key task-lifetime storage is isolated from the user-key programs of other transactions. The values are:
Isolate
The transaction’s user-key task-lifetime storage is accessible only by the user-key programs of its own task. The transaction’s user-key task-lifetime storage is isolated from all the user-key programs of all other tasks.
Noisolate
The transaction’s user-key task-lifetime storage is accessible by its own programs, and also by user-key programs of other transactions defined with the ISOLATE(NO) option.
Otstimeout(value)
displays a fullword data-area containing the default period in seconds that an OTS transaction created in an EJB environment executing under this CICS transaction, will be allowed to execute prior to syncpoint.
Prfile(value)
displays the name of the profile definition that defines additional options associated with this transaction.
Priority(value)
displays a value indicating the priority of a transaction relative to other transactions. When a transaction is running as a CICS task, the priority of a task is the sum of the transaction priority, the terminal priority, and the operator priority.
Note:
You can reset this value by overtyping it with a different value.
The value is in the range 0-255, where 255 is the highest priority.
Program(value)
displays an 8-character string identifying the name of the first program to be executed when this transaction is started.
Purgeability
displays whether the transaction is purgeable in system stall conditions. The values are:
Purgeable
The transaction is system-purgeable. This value relates to the SPURGE parameter on the transaction resource definition and indicates that CICS can purge the transaction in a deadlock time-out situation. See the CICS Resource Definition Guide for information about the SPURGE and DTIMEOUT parameters on a transaction resource definition.
Notpurgeable
The transaction cannot be purged.
Note:
You can reset this value by overtyping it with a different value.
Routstatus
displays whether, if the transaction is the subject of an eligible EXEC CICS START command, it will be routed using the enhanced routing method. The values are:
Notroutable
If the transaction is the subject of a START command, it will be routed using the "traditional" method.
Routable
If the transaction is the subject of an eligible START command, it will be routed using the enhanced method.

For details of the enhanced and "traditional" methods of routing transactions invoked by EXEC CICS START commands, see the CICS Intercommunication Guide.

Status
displays whether the transaction is available for use. The values are:
Enabled
The transaction is available for use.
Disabled
The transaction is not available for use.
Note:
If a transaction is disabled, this does not prevent a START command that names this transaction from being shipped to a remote region. When a task is attached for the requested transaction, CICS checks that the transaction is enabled in the remote region.
Note:
You can reset this value by overtyping it with a different value.
Taskdatakey
displays the storage key in which CICS obtains all storage for use by the transaction. This includes the task life-time storage--the transaction work area (TWA) and the EXEC interface block (EIB)--and the storage that CICS obtains on behalf of programs that run under the transaction.

The values are:

Cdatakey
CICS obtains storage for the transaction from CICS-key storage. Application programs that execute in CICS key have read-write access to this storage, but user-key programs have read-only access.
Udatakey
CICS obtains storage for the transaction from user-key storage. Application programs that execute in any key have read-write access to this storage.

See the description of the TASKDATAKEY parameter on the transaction resource definition in the CICS Resource Definition Guide.

Taskdataloc
displays whether certain CICS control blocks (including EIB and TWA) for a transaction are acquired above or below the 16MB line. The values are:
Any
The transaction accepts task-related data anywhere.
Below
The transaction requires any task-related data (TWA and EIB plus any internal control blocks) to be located below the 16MB line.
Tclass(value)
displays an 8-character string identifying the name of the transaction class to which the transaction belongs. If the transaction does not belong to a class, DFHTCL00 is returned.
Note:
You can reset this value by overtyping it with a different value.

To remove a transaction from its TCLASS, set this field to DFHTCL00. An added or changed TCLASS must be one that has already been defined.

Transaction(value)
indicates that this panel relates to a TRANSACTION inquiry and displays a 4-character transaction identifier. Only transactions that have been defined in the CICS system definition (CSD) file and installed on the running CICS system are accessible through CEMT.
Trprof(value)
displays the name of the transaction routing profile that defines additional options associated with this transaction if it is defined as a remote transaction.

CEMT INQUIRE TRDUMPCODE

Function

Retrieve information about transaction dump codes.

Description

The INQUIRE function allows you to see the current settings of the entries in the transaction dump table. See the CICS Problem Determination Guide for information on using dumps.

Note:
SHUTDOWN and MAXIMUM must not be used in the same command.

Start of changeThis command returns entries that were added to the dump table by a user application program or CEMT command, and also entries that CICS added to the dump table through dump requests. Be aware that the entries that CICS added to the dump table are temporary, and they are not restored during a warm start, or during a cold or initial start. Entries added by a user application program or CEMT command are restored during a warm start, but not during a cold or initial start.End of change

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

(value)
is a 4-byte transaction dump code. See the CICS Messages and Codes manual for information on transaction dump codes.
ALl
is the default.

Sample screen

Figure 160. CEMT INQUIRE TRDUMPCODE screen
 IN TRDU
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Trd(ATNI) Tra         Loc Max( 999 ) Cur(0002)
  Trd(ERRS) Tra         Loc Max( 999 ) Cur(0001)

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 161.

Figure 161. The expanded display of an individual entry
 IN TRDU
 RESULT - OVERTYPE TO MODIFY
   Trdumpcode(ATNI)
   Trandumping( Trandump )
   Sysdumping( Nosysdump )
   Shutoption( Noshutdown )
   Dumpscope( Local )
   Maximum( 999 )
   Current(0002)
   Action(              )
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TRDUMPCODE
 
                            .-ALl-----.
>>-CEMT Inquire TRDumpcode--+---------+--+-------+-------------->
                            '-(value)-'  +-Reset-+
                                         +-Rmove-+
                                         '-Add---'
 
>--+------------+--+-----------+--+------------+---------------->
   +-Trandump---+  +-Sysdump---+  +-Shutdown---+
   '-Notrandump-'  '-Nosysdump-'  '-Noshutdown-'
 
>--+-----------+--+---------+--+----------------+--------------->
   '-Dumpscope-'  +-Related-+  '-Maximum(value)-'
                  '-Local---'
 
>--+----------------+------------------------------------------><
   '-Current(value)-'
 

Displayed fields

Action (input only field)
displays whether the specified transaction dump code is to be reset, removed from the dump code table, or added to the dump code table. The values are:
Reset
The current count of dump calls for this dump code is to be reset to zero.
Remove
This code is to be removed from the dump code table.
Add
The specified transaction dump code is to be added to the dump code table.
Current(value)
displays the number of dump calls that have been made for this transaction dump code since the number was last reset to zero. The CURRENT value can be reset explicitly (using a SET SYDUMPCODE RESET command), or automatically whenever CICS shuts down.
Note:
You can reset this value by overtyping it with a different value.
Dumpscope
displays whether a system dump request is to be sent to MVS images in the sysplex which are running XCF/MRO connected CICS regions related to the CICS region on which the dump is initiated.
Note:
A related CICS region is one in which the unit of work identifiers, in the form of APPC tokens, of one or more tasks match those in the CICS region that issued the dump request.
Related
A system dump request is to be sent for this system dump code.
Local
A system dump request is not to be sent to other MVS images in the sysplex for this system dump code.
Note:
You can reset this value by overtyping it with a different value.
Maximum(value)
displays the largest number of dump calls for this dump code that result in dumps being taken. The value is in the range 0-999 and can be specified by using TRDUMAX in the SIT parameter. A value of 999 means the default, ‘no limit’.
Shutoption
displays whether the CICS system is to shut down after the occurrence of an error corresponding to this dump code. The values are:
Shutdown
The CICS system is to shut down.
Noshutdown
The CICS system is not to shut down.
Note:
You can reset this value by overtyping it with a different value.
Sysdumping
displays whether a system dump is to be taken for this transaction dump code. The values are:
Sysdump
A system dump is to be taken.
Nosysdump
A system dump is not to be taken.
Note:
You can reset this value by overtyping it with a different value.
Trandumping
displays whether a transaction dump is to be taken for this transaction dump code. The values are:
Trandump
A transaction dump is to be taken.
Notrandump
A transaction dump is not to be taken.
Note:
You can reset this value by overtyping it with a different value.
Trdumpcode(value)
indicates that this panel relates to a TRDUMPCODE inquiry and displays a 4-character transaction dump code. See the CICS Messages and Codes manual for information on transaction dump codes.

CEMT INQUIRE TSMODEL

Function

Retrieve information about TS models.

Description

The INQUIRE TSMODEL command returns information about temporary storage models (TS models).

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, overtype your changes on the INQUIRE screen after tabbing to the appropriate field (see Overtyping a display).

ALl
is the default.
(value)
is the name of the temporary storage model for which information is requested.

Sample screen

Figure 162. CEMT INQUIRE TSMODEL screen
 I TSM
 STATUS:  RESULTS
  Tsm(DFHWEB  ) Pre(DFHWEB          ) Mai







 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 163.

Figure 163. The expanded display of an individual entry
  I TSM
  RESULT
    Tsmodel(DFHWEB)
    Prefix(DFHWEB)
    Location(Main)
    Recovstatus(Notrecovable)
    Securityst(Nosecurity)
    Poolname()
    Remotesystem()
    Remoteprefix()


 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TSMODEL
 
                         .-ALl-----.
>>-CEMT Inquire TSModel--+---------+--+-Auxiliary-+------------->
                         '-(value)-'  '-Main------'
 
>--+-Recoverable--+--+-Security---+--Poolname(data-area)-------->
   '-Notrecovable-'  '-Nosecurity-'
 
>--Prefix(data-area)--Remoteprefix(data-area)------------------->
 
>--Remotesystem(data-area)-------------------------------------><
 

Displayed fields

Location
displays the location where temporary storage queues associated with this TS model reside. The values are:
Auxiliary
TS queues associated with this TS model are held on the CICS temporary storage VSAM data set DFHTEMP, or in temporary storage pools in the coupling facility.
Main
TS queues associated with this TS model are held in main storage.
Poolname(value)
displays an 8-character shared pool name.
Prefix(value)
displays the prefix for this model as a 16-character string.
Recovstatus
displays the recovery status of the temporary storage queue. The values are:
Recoverable
The temporary storage queue is recoverable.
Notrecovable
The temporary storage queue is not recoverable.
Remoteprefix(value)
displays the remoteprefix for this model as a 16-character string.
Remotesystem(value)
displays the remotesystem name for this model as a 4-character string.
Securityst
displays the security status for this model. The values are:
Security
security checking will be performed for queue names matching this model.
Nosecurity
security checking will not be performed for queue names matching this model.
Tsmodel(value)
indicates that this panel relates to a TSMODEL inquiry and displays the 8-character name of a temporary storage model.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel to see the value in hexadecimal.

CEMT INQUIRE TSPOOL

Function

Retrieve information about a TS pool.

Description

The INQUIRE TSPOOL command returns information about a temporary storage pool (TS pool).

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, overtype your changes on the INQUIRE screen after tabbing to the appropriate field (see Overtyping a display).

ALl
is the default.
(value)
is the name of the temporary storage pool for which information is requested.

Sample screen

Figure 164. CEMT INQUIRE TSPOOL screen
  I TSP
  STATUS:  RESULTS
   Tsp(DFHWEB  ) Unc


 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 165.

Figure 165. The expanded display of an individual entry
  I TSP
  RESULT
    Tspool(DFHWEB)
    Connstatus(Unconnected)


 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TSPOOL
 
                        .-ALl-----.
>>-CEMT Inquire TSPool--+---------+--+-------------+-----------><
                        '-(value)-'  +-Connected---+
                                     '-Unconnected-'
 

Displayed fields

Connstatus
displays the connection status of this TS pool. The values are:
Connected
This TS pool is connected.
Unconnected
This TS pool is not connected.
Tspool(value)
indicates that this panel relates to a TSPOOL inquiry and displays the 8-character name of a temporary storage pool.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel to see the value in hexadecimal.

CEMT INQUIRE TSQUEUE / TSQNAME

Function

Retrieve information about temporary storage queues.

This section applies also to the alternative command, CEMT INQUIRE TSQNAME. Use either to Inquire about names up to 8 characters long, use INQUIRE TSQNAME to Inquire about names up to 16 characters long.

Description

The INQUIRE TSQUEUE command returns information about temporary storage queues (TS queues). The INQUIRE TSQUEUE command operates on all the temporary storage queues that exist in the CICS region, including those created internally by CICS for use by CICS itself (for example, queues used by BMS). You can identify the temporary storage queues created by CICS for its own use by queue names that begin with the following character strings:

**
BMS paging
$$
BMS route
X'fa' to X'ff'
CICS
CEBR
Default CEBR queue name
DF
CICS
DFHM
Message cache for message-protected tasks
DFxxxx
CICS REQIDS (where x is hexadecimal)

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, overtype your changes on the INQUIRE screen after tabbing to the appropriate field (see Overtyping a display).

ALl
is the default.
(value)
is the name of the temporary storage queue for which information is requested.
Sysid(value)
specifies the system name that corresponds to the temporary storage pool name if the request is to be sent to a TS server.

This is an input-only value, and must be specific--you cannot specify generic names for SYSID. If the SYSID is not found in a TST TYPE=SHARED entry, CICS returns a SYSID NOT FOUND error.

Poolname(value)
specifies the 8-character POOLNAME of a temporary storage pool if the request is to be sent to a TS server. Specify Poolname to view shared temporary storage queues.

If the POOLNAME is not found, CICS returns a POOLERR.

Sample screen

Figure 166. CEMT INQUIRE TSQUEUE screen
  INQ TSQ
  STATUS:  RESULTS - OVERTYPE TO MODIFY
   Tsq(AXBYQUEUENAME1  ) Num(00003) Len(0000000192) Mai
      Tra(CECI)     Max(00064) Min(00064) Las( 00001267 )
   Tsq(RDOQUEUENAME4   ) Num(00001) Len(0000000064) Aux
      Tra(CECI) Rec Max(00064) Min(00064) Las( 00000097 )
   Tsq(RDOQUEUENAME5   ) Num(00002) Len(0000000128) Aux
      Tra(CECI) Rec Max(00064) Min(00064) Las( 00000086 )
   Tsq(RDQUEUENAME5    ) Num(00003) Len(0000000192) Mai
      Tra(CECI)     Max(00064) Min(00064) Las( 00000076 )

 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 167.

Figure 167. The expanded display of an individual entry
  INQ TSQ
  RESULT - OVERTYPE TO MODIFY
    Tsqueue(AXBYQUEUENAME1)
    Numitems(00003)
    Length(0000000192)
    Location(Main)
    Action(              )
    Transid(CECI)
    Recovstatus(Notrecovable)
    Maxitemlen(00064)
    Minitemlen(00064)
    Lastusedint(00001357)

 

If you place the cursor against a specific entry in the list and type a ‘B’ (upper or lower case), CICS invokes a direct link to the program DFHEDFBR used by the CEBR transaction to enable you to browse the contents of this TS queue, (see CEBR--temporary storage browse for details).

Security warning::
Take care to avoid a security exposure, because in this situation, access to the browse function is not ruled by transaction attach security checking using the XTRAN parameter in DFHSIT, as it is for the CEBR transaction, but instead, access is ruled by application program security checking using the XPPT parameter in DFHSIT.

Not all TS queues visible on the CEMT INQUIRE TSQUEUE results panel are necessarily browsable via CEBR. Specifically, this applies to queues resident in a shared TS POOL when the POOLNAME is specified on the INQUIRE TSQUEUE request.

Such queues are browsable if there is a tsmodel or TST entry mapping the queue name to the TSPOOL.

Note:
For this release only you can also browse queues in a shared pool by specifying a SYSID which maps to the shared pool via an entry in the SYSID table. However, the SYSID required for the mapping is not available to CEMT, so entering ‘B’ next to the queue at first gives a NOT FOUND response from CEBR. If an appropriate SYSID is then provided by the user, the reference to the shared pool can be resolved.

If there is no suitable entry in the SYSID table and no TSMODEL mapping the queue name to the shared pool, the queue cannot be browsed and CEBR will indicate that the requested queue does not exist.

Read syntax diagramSkip visual syntax diagramCEMT INQUIRE TSQUEUE/TSQNAME
 
                         .-ALl-----.
>>-CEMT Inquire TSQueue--+---------+--+-----------------+------->
                         '-(value)-'  +-Sysid(value)----+
                                      '-Poolname(value)-'
 
>--+-----------------+--+--------------------+------------------>
   '-Numitems(value)-'  '-Lastusedint(value)-'
 
>--+---------------+--+-----------+--+--------------+----------->
   '-Length(value)-'  +-Auxiliary-+  +-Recoverable--+
                      '-Main------'  '-Notrecovable-'
 
>--+-------------------+--+-------------------+----------------->
   '-Maxitemlen(value)-'  '-Minitemlen(value)-'
 
>--+----------------+------------------------------------------><
   '-Transid(value)-'
 

Displayed fields

Lastusedint(value)
displays the elapsed time interval in binary seconds since the queue was last referenced.
Length(value)
displays the total length in bytes of all the items in the temporary storage queue. For information about how CICS calculates the length of items, see the CICS System Programming Reference.
Location
displays where the temporary storage queue resides. The values are:
Auxiliary
The temporary storage queue is held on the CICS temporary storage VSAM data set DFHTEMP, or in temporary storage pools in the coupling facility.
Main
The temporary storage queue is held in main storage.
Maxitemlen(value)
displays the length in bytes of the largest item in the temporary storage queue. For information about how CICS calculates the length of items, see the CICS System Programming Reference.
Minitemlen(value)
displays the length in bytes of the smallest item in the temporary storage queue. For information about how CICS calculates the length of items, see the CICS System Programming Reference.
Numitems(value)
displays the number of items in the temporary storage queue.
Recovstatus
displays the recovery status of the temporary storage queue. The values are:
Recoverable
The temporary storage queue is recoverable.
Notrecovable
The temporary storage queue is not recoverable.
Transid(value)
displays the 4 character id of the transaction that created the TS queue.
TSQueue(value)
indicates that this panel relates to a TSQUEUE inquiry and displays the 16-character name of a temporary storage queue.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel to see the value in hexadecimal.

CEMT INQUIRE UOW

Function

Retrieve information about units of work (UOWs).

Description

INQUIRE UOW returns information about a named unit of work, or about all the UOWs currently in the system. It displays the state of the UOW (for example, INDOUBT) and whether it is active, waiting, or shunted.

If you suspect a problem with either a recoverable data set or a connection, you can use INQUIRE UOW to display UOWs that have been shunted due to a connection or data set failure. The command, in some cases, displays the name of the resource that caused the UOW to be shunted, plus the transaction, user, and terminal that started it.

Important:
In an intercommunication environment, a unit of work can include actions that are to be taken by two or more connected systems. Such a unit of work is known as a distributed unit of work, because the resources to be updated are distributed across more than one system. A distributed unit of work is made up of two or more local units of work, each of which represents the work to be done on one of the participating systems.

Note that INQUIRE UOW always returns information about local UOWs--that is, for a distributed UOW it returns information only about the work required on the system on which the command is issued. You can assemble information about a distributed UOW by matching the network-wide UOW identifier returned in the NETUOWID field against the network-wide identifiers of local UOWs on other systems.

For further information about local and distributed UOWs, see the CICS Intercommunication Guide.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

(value)
is a 16-character local identifier of a UOW.
ALl
is the default. If you do not specify a UOW identifier, you receive information about all UOWs in the system.

Sample screen

Figure 168. CEMT INQUIRE UOW screen
IN UOW
STATUS:  RESULTS - OVERTYPE TO MODIFY
 Uow(AB8FFF37584B6601) Inf Act Tra(CSSY) Tas(0000005)
    Age(00004090)                          Use(BELL    )
 Uow(AB8FFF3758786C01) Inf Act Tra(CSSY) Tas(0000006)
    Age(00004090)                          Use(BELL    )
 Uow(AB8FFF376D9B6601) Inf Act Tra(CSTP) Tas(0000008)
    Age(00004090)                          Use(BELL    )
 Uow(AB900BD865417C04) Inf Act Tra(CSNE) Tas(0000018)
    Age(00000700)                          Use(BELL    )
 Uow(AB900BE2010AC401) Inf Act Tra(CEMT) Tas(0000043)
    Age(00000689) Ter(S21D) Netn(IGBS21D ) Use(BELL    )

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 169.

Figure 169. The expanded display of an individual entry
 IN UOW
 RESULT - OVERTYPE TO MODIFY
   Uow(AB8FFF37584B6601)
   Uowstate( Inflight )
   Waitstate(Active)
   Transid(CSSY)
   Taskid(0000005)
   Age(00004233)
   Termid()
   Netname()
   Userid(BELL)
   Waitcause()
   Link()
   Sysid()
   Netuowid(..GBIBMIYA.CICSHT61........)
   Otstid()
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE UOW
 
                     .-ALl-----.
>>-CEMT Inquire UOW--+---------+--+----------+--+---------+----->
                     '-(value)-'  +-Backout--+  +-Active--+
                                  +-Commit---+  +-Waiting-+
                                  +-Indoubt--+  '-Shunted-'
                                  +-Inflight-+
                                  +-Hbackout-+
                                  +-Hcommit--+
                                  '-Force----'
 
>--+------------+--+----------------+--+---------------+-------->
   +-Connection-+  '-Transid(value)-'  '-Taskid(value)-'
   +-Dataset----+
   +-Otscoord---+
   +-Rlsserver--+
   +-Rrms-------+
   +-Waitcommit-+
   +-Waitforget-+
   '-Waitrmi----'
 
>--+------------+--+---------------+--+----------------+-------->
   '-Age(value)-'  '-Termid(value)-'  '-Netname(value)-'
 
>--+---------------+--+-------------+--+--------------+--------->
   '-Userid(value)-'  '-Link(value)-'  '-Sysid(value)-'
 
>--+-----------------+--+---------------+----------------------><
   '-Netuowid(value)-'  '-Otstid(value)-'
 

Displayed fields

Age (value)
displays the age of the UOW in seconds. This is the number of seconds since the UOW entered its current state, or since the start of the UOW.
Link(value)
displays the 8-character value that, for a WAITCAUSE value of CONNECTION, is the netname of the remote system that caused the UOW to wait or be shunted. For other WAITCAUSE values (including OTSCOORD), LINK displays blanks.
Netname (value)
displays the 8-character network name of the terminal from which the UOW was started.

If the UOW was started from an ISC or MRO session, NETNAME displays the network name of the remote region.

If the UOW was not started from a terminal, nor from an ISC or MRO session, NETNAME displays blanks.

Netuowid (value)
displays a 27-character string containing the LU6.2 name for the UOW within this network--that is, the network-wide identifier of the UOW.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel: to see the value in hexadecimal.

You can assemble information about a distributed UOW by matching the network-wide UOW identifier against the network-wide identifiers of local UOWs on other systems.

Otstid(value)
displays the first 128 bytes of the transaction identifier (TID) of the OTS transaction of which the UOW is a part. If the OTS name has fewer than 128 bytes, it is padded on the right with binary zeros.
Sysid (value)
displays the 4-character sysid that, for a WAITCAUSE value of CONNECTION, is the sysid of the connection that caused the UOW to wait ir be shunted. If the connection has been discarded, and for other WAITCAUSE values (including OTSCOORD), SYSID returns blanks.
Taskid (value)
displays the task number originally associated with this UOW. If the UOW is shunted, the task terminates. In this case, the number may have been reused by another task.
Termid (value)
displays the 4-character ID of the terminal or session from which this UOW was started. This is the principal facility for the task. If the transaction is the mirror transaction, CSMI, it is the session. For OUWs that are part of an OTS transaction, it will be the session used by the request stream that attached the task.
Transid (value)
displays the 4-character ID of the transaction that started this UOW.
UOW(value)
indicates that this panel relates to a UOW inquiry and displays a 16-character UOW local identifier.
Uowstate
displays the state of the UOW. The values are:
Backout
This UOW is being backed out, or has failed to back out one or more of the recoverable resources involved in the UOW.
Commit
A decision to commit the UOW has been made, but the UOW is waiting or has been shunted. This may be because the decision has not yet been communicated to all participants in the syncpoint, or because a failure has occurred during commit processing.
Indoubt
This UOW is in the in-doubt state.
Inflight
The UOW is running normally.
Hbackout
The UOW has been forcibly backed out. A forced decision is taken when a UOW is unable to wait for in-doubt resolution--for example, the transaction may have been defined as WAIT(NO), or have been backed out with a CEMT SET UOW command.
Hcommit
The UOW has been forcibly committed.
Note:
You can reset this value by overtyping it with:
Commit
Attempt to force syncpoint commit processing, as specified for this UOW.
Backout
Attempt to force syncpoint backout processing, as specified for this UOW.
Force
Attempt to force the UOW to backout or commit, as specified on the ACTION option of the TRANSACTION resource definition.

All these values are valid only for UOWs that have been shunted in-doubt. For information about the in-doubt attributes of TRANSACTION resource definition, see the CICS Resource Definition Guide.

Userid(value)
displays the 8-character user ID with which this transaction was started.
Waitcause
displays, if the UOW is waiting or shunted, the type of resource that caused it to be so.
Note:
In the case of a wait, it is the UOW that is waiting, not the task.

The values are:

Connection
This UOW is waiting or was shunted due to the failure of a session to the coordinator of the UOW during the in-doubt period. NETNAME and SYSID contain the netname and system name of the failed link.
Dataset
This UOW is waiting or was shunted due to the failure of one or more data sets. Use the INQUIRE UOWDSNFAIL command to identify the data sets involved and the reasons why they have caused the UOW to fail.
Otscoord
This UOW is waiting or was shunted due to the failure of the OTS coordinator.
Rlsserver
This UOW is waiting or was shunted for the OTS coordinator due to the failure of an RLS server.
Rrms
This UOW is waiting or has been shunted because communication has been lost with RRS/MVS.
Waitcommit
This UOW is waiting or was shunted because a failure occurred during commit processing.
Waitforget
This UOW is waiting for FORGET from participants in the syncpoint. Use the INQUIRE UOWLINK command to obtain the netnames and sysids of the participants.
Waitrmi
This UOW is waiting for FORGET from the RMI. Use the INQUIRE UOWLINK command to obtain the entry name and qualifier of the task-related user exit.
Waitstate
displays whether syncpoint processing of the UOW has been deferred. The values are:
Active
The UOW is running normally, or is being unshunted.
Waiting
Syncpoint processing has completed on this system, but not on all systems involved in the distributed UOW. Values of WAITFORGET or WAITRMI, and BACKOUT or COMMIT indicate how the UOW was resolved on this system.
Shunted
Syncpoint processing of the UOW has been deferred. SHUNTED further indicates that the task, terminal and program storage have been released, and locks have been retained.

CEMT INQUIRE UOWDSNFAIL

Function

Obtain information about failed units of work that have updated CICS file-control-managed data sets.

Description

INQUIRE UOWDSNFAIL returns information about UOW failures that are associated with specific data sets. If you enter the basic command (CEMT INQUIRE UOWDSNFAIL) without any attributes to act as a filter, CICS displays all failed UOWs for all data sets.

Because this command returns information about UOW failures, if a UOW that had suffered a failure is in the process of being retried when the command is issued, the UOW will not be displayed by INQUIRE UOWDSNFAIL (it is not currently shunted or failed). If the retry is successful, the UOW no longer has a failure with respect to that particular data set. If the retry is not successful, the UOW will be shunted again, and INQUIRE UOWDSNFAIL will display it as failed with respect to the data set.

Alternatively, if you are interested only in those failed UOWs for specific data sets, you can use the DSNAME parameter as a filter by specifying either a specific or generic data set name. You can also use other attributes as filters, such as CONNECTION for UOWs that failed indoubt, or DATASET for UOWs that failed during backout for some reason. See the list of reasons for UOW failures, and the associated causes, which you can use for filtering the results of INQUIRE UOWDSNFAIL commands.

Input

Press the Clear key to clear the screen and enter the basic command as CEMT INQUIRE UOWDSNFAIL. (The minimum abbreviation is CEMT I UOWD.) You get a display of all the failed UOWs, if any. Otherwise, CICS returns the NOT FOUND error condition

Alternatively, enter the command with one or more valid attributes to filter the results of the inquiry. For example, if you enter cemt i uowd ds(applb.*), the resulting display will show you the details of only those failed UOWs that are associated with data sets with a high-level qualifier of APPLB.

Sample screen

Figure 170. CEMT INQUIRE UOWDSNFAIL screen
  INQ UOWDSN
  STATUS:  RESULTS
   Dsn(RLS.ACCOUNTS.ESDS.DBASE1                    ) Dat Del
      Uow(AA6DB080C40CEE01)                         Rls
   Dsn(RLS.ACCOUNTS.ESDS.DBASE1                    ) Dat Ind
      Uow(AA6DB08AC66B4000)                         Rls


 

Sample screen

Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 171.

Figure 171. The expanded display of an individual entry
 INQ UOWDSN
 RESULT
   Uowdsnfail
   Dsname(RLS.ACCOUNTS.ESDS.DBASE1)
   Cause(Dataset)
   Reason(Delexiterror)
   Uow(AA6DB080C40CEE01)
   Sysid()
   Netname()
   Rlsaccess(Rls)

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE UOWDSNFAIL
 
>>-CEMT Inquire UOWDsnfail--Uow(value)--Dsname(value)----------->
 
>--+--------+--+------------+--+--------------+----------------->
   +-Rls----+  +-Cache------+  +-Backupnonbwo-+
   '-Notrls-'  +-Connection-+  +-Commitfail---+
               +-Dataset----+  +-Datasetfull--+
               +-Rlsserver--+  +-Deadlock-----+
               '-Undefined--'  +-Delexiterror-+
                               +-Failedbkout--+
                               +-Indexrecfull-+
                               +-Indoubt------+
                               +-Ioerror------+
                               +-lckstrucfull-+
                               +-notapplic----+
                               +-Openerror----+
                               +-Rlsgone------+
                               +-Rrcommitfail-+
                               '-Rrindoubt----'
 
>--+--------------+--+----------------+------------------------><
   '-Sysid(value)-'  '-Netname(value)-'
 

Displayed fields

Cause
displays which failed component has caused the UOW to have retained locks for this data set. The values are:
Cache
A cache structure, or connection to it, has failed.
Connection
There is an intersystem connection error, which has caused the UOW to fail while in-doubt. The name of the system to which connectivity was lost is returned on the SYSID parameter and its netname is returned on the NETNAME parameter. CICS returns additional information in the REASON parameter about the CONNECTION failure.
Dataset
The backout of a UOW has failed for this data set. The reason for the data set failure is returned in the REASON parameter.
Rlsserver
The SMSVSAM server has failed. The reason for the data set failure is returned in the REASON parameter.
Undefined
The UOW is probably in-flight following an emergency restart.
Dsname (value)
displays the 44-character data set name of a data set that has retained locks for this UOW.
Netname (value)
displays the 8-character netname (when the cause is CONNECTION) of the remote system to which connectivity has been lost.
Reason
displays, when the cause is RLSSERVER, CONNECTION, or DATASET, the specific reason for the error against this data set. The values are:
Backupnonbwo
A non-BWO backup was in progress while the UOW was being backed out. When the backup completes, CICS automatically retries the UOW.
Commitfail
An error occurred at some point when the locks were in the process of being released. This is an error that can normally be resolved by recycling the server (which should happen automatically). The locks were acquired as a result of recoverable requests having been issued against the data set.
Datasetfull
No space is available on the direct access device for adding records to a data set. You need to reallocate the data set with more space. You can then retry the backout using SET DSNAME RETRY.

See the section on moving data sets in the CICS Recovery and Restart Guide.

Deadlock (non-rls data sets only)
A deadlock was detected. This may go away if the UOW is retried.
Delexiterror
Backout of a write to an ESDS failed because a logical delete global user exit program was not enabled, or a logical delete global user exit program decided not to execute the logical delete.
Failedbkout
This occurs as a result of a severe error being identified, and is possibly an error in either CICS or VSAM. The problem may go away if the UOW is retried. Note that CICS performs some first-failure data capture (FFDC) at the point where the error is first detected.
Indexrecfull
A larger alternate index record size needs to be defined for the data set. See the section on moving data sets in the CICS Recovery and Restart Guide .

This error can also occur when a unique alternate index key, for a non-RLS data set, has been reused and CICS is now backing out the request which had removed that key value.

Indoubt
The unit of work had issued recoverable requests against the data set, and has now failed in-doubt. The connection to the coordinating system needs to be reestablished.
Ioerror
A hard I/O error occurred. To correct this error, restore a full backup copy of the data set and perform forward recovery. If you use CICSVR as your forward recovery utility, the backout is automatically retried for an RLS data set. For a non-RLS data set, use the RETRY option of the SET DSNAME command to drive the backout retry.
Lckstrucfull
An attempt to acquire a lock during backout of an update to this data set failed because the RLS lock structure was full. You must allocate a larger lock structure in an available coupling facility and rebuild the existing lock structure into it, then use the SET DSNAME (...) RETRY command to drive the backout retry.
Notapplic
The value for CAUSE is not CONNECTION, RLSSERVER, or DATASET.
Openerror
Error on opening the file for backout. A console message notifies you of the reason for the open error. One likely reason could be that the data set was quiesced.
Rlsgone
An error occurred when backing out the UOW because the RLS server is down. This may also be the reason why the UOW went into backout originally. This is an error that can be resolved by recycling the server (which should happen automatically). Generally, when the server recovers, the UOWs are retried automatically. In very exceptional circumstances, it may be necessary to issue a SET DSNAME(...) RETRY command to retry UOWs that were not retried when the server returned.
Rrcommitfail
An error occurred whilst RLS locks for the unit of work were being released. For this data set, the locks being released were all repeatable read locks so, if the failure was due to the RLS server being unavailable, the locks will have been released. If the failure was due to some other error from the SMSVSAM server, the locks may still be held.
Rrindoubt
The unit of work had issued repeatable read requests against the data set, and has now failed indoubt. The locks will have been released, so this failure does not prevent you from running a batch job against the data set. However, if you want to open the data set in non-RLS mode from CICS, you need to resolve the in-doubt failure before you can define the file as having RLSACCESS(NO). If the unit of work has updated any other data sets, or any other resources, you should try to resolve the in-doubt correctly. If the unit of work has only performed repeatable reads against VSAM data sets and has made no updates to other resources, it is safe to force the unit of work using the SET DSNAME or SET UOW commands.

Each Reason corresponds to only one Cause value, as shown in the following table:

Cause Reason
CACHE NOTAPPLIC
CONNECTION INDOUBT
CONNECTION RRINDOUBT
DATASET BACKUPNONBWO
DATASET DELEXITERROR
DATASET DATASETFULL
DATASET DEADLOCK
DATASET FAILEDBKOUT
DATASET INDEXRECFULL
DATASET IOERROR
DATASET LCKSTRUCFULL
DATASET OPENERROR
RLSSERVER COMMITFAIL
RLSSERVER RLSGONE
RLSSERVER RRCOMMITFAIL
UNDEFINED Not applicable
Rlsaccess
displays whether the data set was last opened in this CICS region in RLS or non-RLS mode. The values are:
Rls
The last open in this CICS region was in RLS mode.
Notrls
The last open in this CICS region was in non-RLS mode.
Sysid(value)
displays the 4-character sysid (when the cause is CONNECTION) of the remote system to which connectivity has been lost.
Uow (value)
displays the 16-character local identifier of the associated unit of work.
UOWDsnfail
indicates that this panel relates to an inquiry about the cause of a UOW failure.

CEMT INQUIRE UOWENQ

Function

Retrieve information about enqueues held or waited on by a UOW, or about UOWs holding or waiting on a specified enqueue.

Description

INQUIRE UOWENQ returns information about the enqueues held by a UOW. Enqueues are used by CICS to lock recoverable resources such as file records or queues to the UOW that is updating them. User enqueues obtained by the EXEC CICS ENQ command are also returned.

You can use INQUIRE UOWENQ to indicate which records and queues would be affected if the UOW were forced.

The transaction also returns information about UOWs that are waiting on the enqueues. This enables you to diagnose enqueue deadlocks between tasks wanting to update the same resources.

Enqueues are typically held in active state, which means that other tasks are allowed to wait for the enqueue. However, if the UOW that owns the enqueue suffers an in-doubt failure, the enqueue is usually converted to the retained state until the in-doubt failure can be resolved. INQUIRE UOWENQ also retrieves information about these enqueues and can be used to identify which records and queues would be affected if the UOW were forced.

Notes:
  1. Both UOW-lifetime and task-lifetime enqueues are returned by INQUIRE UOWENQ. (For an explanation of UOW- and task-lifetime enqueues, see the MAXLIFETIME option of the EXEC CICS ENQ command in the CICS System Programming Reference manual.)
  2. On an in-doubt failure, user enqueues are released, unless the EXEC CICS ENQ command specified MAXLIFETIME(TASK) and it is not the end-of-task syncpoint that suffers the failure.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

Sample screen

Figure 172. CEMT INQUIRE UOWENQ screen
 INQ UOWE
 STATUS:  RESULTS
  Uow(AC143001D4A72601) Tra(CECI) Tas(0000038) Act Exe Own
     Res(ACCOUNTS.DBASE1           ) Rle(015) Enq(00000000)
  Uow(AC143001D4A72601) Tra(CECI) Tas(0000038) Act Add Own
     Res(g...                      ) Rle(004) Enq(00000000)

 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 173.

Figure 173. The expanded display of an individual entry
 INQ UOWE
 RESULT
   Uowenq
   Uow(AC143001D4A72601)
   Transid(CECI)
   Taskid(0000038)
   State(Active)
   Type(Execenq)
   Relation(Owner)
   Resource(ACCOUNTS.DBASE1)
   Rlen(015)
   Enqfails(00000000)
   Netuowid(..GBIBMIYA.IYA2T5C2...Mx...)
   Qualifier()
   Qlen(000)

 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE UOWENQ
 
>>-CEMT Inquire UOWEnq--+------------+--+----------------+------>
                        '-Uow(value)-'  '-Transid(value)-'
 
>--+---------------+--+--------+--+----------+------------------>
   '-Taskid(value)-'  +-Owner--+  +-Active---+
                      '-Waiter-'  '-Retained-'
 
>--+-------------+--+-----------------+--+-----------------+---->
   +-Dataset-----+  '-Duration(value)-'  '-Netuowid(value)-'
   +-File--------+
   +-Execenq-----+
   +-Addrexecenq-+
   +-Tdq---------+
   '-Tsq---------'
 
>--+-----------------+--+-----------------+--+-------------+---->
   '-Enqfails(value)-'  '-Resource(value)-'  '-Rlen(value)-'
 
>--+------------------+--+-------------+-----------------------><
   '-Qualifier(value)-'  '-Qlen(value)-'
 

Displayed fields

Duration(value)
displays the elapsed time (in seconds) since the enqueue entered its current state of OWNER, WAITER or RETAINED.
Enqfails (value)
displays, for enqueues held in retained state, the number of failed enqueue attempts for this resource since the enqueue was last acquired. This indicates how many UOWs have received LOCKED responses due to this enqueue. The ENQFAILS option helps you identify which UOWs are causing "bottlenecks".

For enqueues held in action state, ENQFAILS displays zero.

Enqscope (value)
If the enqueue has sysplex scope, ENQSCOPE displays the 4-character name which was used to qualify the sysplex-wide ENQUEUE request issued by this CICS region. If it has region scope, ENQSCOPE displays blanks.

All CICS systems with the same ENQSCOPE value share the same sysplex Enqueue name space.

Netuowid(value)
displays a 27-character string containing the network-wide LU6.2 name of the UOW that owns or is waiting for the enqueue.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel: to see the value in hexadecimal.
Qlen (value)
displays the length of the data, in the range 0 through 255, displayed in the QUALIFIER field.
Qualifier (value)
displays a 1- through 255-character qualifier (for example, record id) that further identifies the resource associated with the enqueue lock. The data displayed depends on the type of enqueue, as shown in Table 4. If no QUALIFIER data applies (that is for EXECENQ, ADDREXECENQ, or TSQ), a value of zero is displayed.
Relation
displays whether the data is associated with the owner of the enqueue or with a task waiting for the enqueue. The values are:
Owner
The (value), NETUOWID, TASKID, and TRANSID are those of the owner of the enqueue.
Waiter
The (value), NETUOWID, TASKID, and TRANSID are those of a waiter for the enqueue.
Resource (value)
displays a 1- through 255-character string containing the name of the resource associated with the enqueue lock. The data displayed depends on the type of enqueue, as shown in Table 4.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel: to see the value in hexadecimal.
Rlen (value)
displays the length of the data, in the range 0 through 255, displayed in the RESOURCE field.
State
displays the state that the enqueue is held in. The values are:
Active
The enqueue is held in active state.
Retained
The enqueue is held in retained state. Its owning UOW has been shunted, or is in the process of being shunted.
Taskid (value)
displays the number of the task associated with the UOW. If the UOW is shunted, it is the task number associated with the UOW before it was shunted.
Transid (value)
displays the 4-character identifier of the transaction associated with the UOW. If the UOW is shunted, it is the identifier of the transaction associated with the UOW before it was shunted.
Type
displays the type of resource being enqueued upon. The values are:
Dataset
The resource is a record in a VSAM data set (or a CICS-maintained data table). RESOURCE contains the name of the data set and QUALIFIER contains the record identifier.
File
The resource is a record in either a BDAM file or a user-maintained data table. RESOURCE contains the name of the file and QUALIFIER contains the record identifier.

When the file is a BDAM file then the record identifier is prefixed by the BDAM block identifier. Note that truncation occurs if this combination exceeds 255 characters.

Execenq
The resource is associated with an EXEC CICS ENQ request. RESOURCE contains the enqueue argument passed on the request.
Addrexecenq
The resource is associated with an EXEC CICS ENQ request. RESOURCE contains the address enqueue argument passed on the request (that is, the LENGTH parameter was omitted on the request)
Tdq
The resource is a logically-recoverable transient data queue. RESOURCE contains the name of the queue. QUALIFIER contains either the string "FROMQ" or "TOQ", indicating whether a read or write lock is held for the queue.

A READQ TD request acquires the "FROMQ" lock, whereas a WRITEQ TD request acquires the "TOQ" lock associated with the queue. A DELETEQ TD request acquires both the "TOQ" and the "FROMQ" locks.

Tsq
The resource is a recoverable temporary storage queue. RESOURCE contains the name of the queue.

The data displayed in the RESOURCE and QUALIFIER fields depends on the resource type, as shown in Table 4.

Table 4. Data displayed in RESOURCE and QUALIFIER
Type Resource Qualifier
DATASET Dataset name Record identifier
EXECENQ EXEC enqueue argument None
ADDREXECENQ Address of EXEC enqueue argument None
FILE File name Record identifier
TDQ TD queue name FROMQ or TOQ
TSQ TS queue name None
Uow(value)
displays the 16-character local identifier of the associated unit of work.

CEMT INQUIRE UOWLINK

Function

Retrieve information about connections involved in units of work.

Description

INQUIRE UOWLINK returns information about a connection involved in a unit of work. The connection can be to a remote system, or to a task-related user exit. If it is to a remote system, INQUIRE UOWLINK displays the netname of the connection, its sysid, and whether it is the coordinator or subordinate. If it is to a task-related user exit, INQUIRE UOWLINK displays the exit’s entry name and qualifier.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

(value)
is an 8-byte token identifying the UOW-link for which data is to be returned.
ALl
is the default.

Sample screen

Figure 174. CEMT INQUIRE UOWLINK screen
 I UOWL
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Uowl(01840009) Uow(AC142A977E6F3204) Con Lin(IYLX1   )
     Coo Appc War Sys(ISC1)                Net(..GBIBMIYA.IYCWTC13..p...
  Uowl(01C40006) Uow(AC142A977E6F3204) Con Lin(IYLX3   )
     Sub Irc  War Sys(MRO3)                Net(..GBIBMIYA.IYCWTC13..p...
 
Note:
There are blank fields on the screen where a value does not apply or is ‘negative’; that is, the value begins with ‘No’. To modify these fields, locate them by tabbing (they appear in the same sequence as in the expanded format), and overtype with input valid for that field. You may find it more convenient to use the expanded format when setting one of these values, (negating is easier because you are overtyping a displayed field with its negative causing the result to become non-displayed).

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 175.

Figure 175. The expanded display of an individual entry
  I UOWL
  RESULT - OVERTYPE TO MODIFY
    Uowlink(01840009)
    Uow(AC142A977E6F3204)
    Type(Connection)
    Host( )
    Link(IYLX1)
    Action(              )
    Role(Coordinator)
    Protocol( )
    Resyncstatus( )
    Sysid( )
    Rmiqfy( )
    Netuowid( )
    Urid
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE UOWLINK
 
                         .-ALl-----.
>>-CEMT Inquire UOWLink--+---------+--+------------+------------>
                         '-(value)-'  '-Uow(value)-'
 
>--+------------+--+-------------+--+------+--+-------------+--->
   +-Cftable----+  +-Coordinator-+  +-Irc--+  +-Cold--------+
   +-Connection-+  +-Subordinate-+  +-Appc-+  +-Starting----+
   +-Iiop-------+  '-Unknown-----'  +-Lu61-+  +-Ok----------+
   '-Rmi--------'                   +-Ots--+  +-Unavailable-+
                                    '-Rrms-'  '-Unconnected-'
 
>--+-------------+--+-------------+--+--------------+----------->
   '-Host(value)-'  '-Link(value)-'  '-Sysid(value)-'
 
>--+---------------+--+-----------------+----------------------><
   '-Rmiqfy(value)-'  '-Netuowid(value)-'
 

Displayed fields

Host(value)
displays a 255-character area into which is returned, for TYPE of IIOP, the TCP/IP host name, or a string containing the dotted decimal TCP/IP address, used to refer tothe participant in the OTS transaction. Strings with fewer than 255 characters are padded with blanks. For TYPE of CONNECTION, CFTABLE, or RMI, HOST displays blanks. This is useful for identifying the participant especially when problems occur. Notes that the UOW and the participant may belong to the same CorbaServer.
Link (value)
displays, for a TYPE value of CONNECTION, the 8-character netname of the remote system. For a TYPE value of RMI, LINK displays the entry name of the task-related user exit. For a TYPE value of CFTABLE, LINK displays the 8-character name of the coupling facility data table pool. For a type value of IIOP, LINK displays blanks; the equivalent information for IIOP UOWLINKs is displayed by the HOST attribute.
Netuowid (value)
displays a 27-character string containing the network-wide LU6.2 name for the UOW.
Note:
Nondisplayable characters appear as periods. You can use PF2 on the expanded panel to see the value in hexadecimal.
Protocol
displays the communication protocol used by the connection. The values are:
Irc
Inter-Region Communication. This is an MRO connection.
Appc
Advanced Program to Program Communication.
Lu61
LUTYPE 6.1.
Ots
Object Transaction Services for Java programs.
Rrms
indicates that the UOW is coordinated by RRS/MVS.
Resyncstatus
displays the resynchronization status of the connection. The values are:
Cold
The connection has been cold started by the partner system. The partner can no longer coordinate any in-doubts for this system; nor can this system pass to the partner any decisions remembered for it.
Starting
The connection is being acquired, but the exchange lognames process has not yet completed.
Ok
The connection is operating normally. If there has been a failure of the partner system, the partner has been restarted and the connection able to resynchronize the associated UOW.
Unavailable
The connection is not currently acquired.
Unconnected
There is no associated connection.
Rmiqfy (value)
displays, for a connection type of RMI, the 8-character entry qualifier of the task-related user exit. For a connection type of CONNECTION, CFTABLE, or IIOP, RMIQFY displays blanks.
Role
displays the role of the connection. The values are:
Coordinator
This connection is to the syncpoint coordinator for the UOW.
Subordinate
This connection is to a syncpoint subordinate for the UOW.
Unknown
The syncpoint role of this connection cannot be determined.
Sysid (value)
displays, for a TYPE value of CONNECTION, the 4-character sysid of the connection. If the connection has been discarded, or the connection-type is RMI, CFTABLE or IIOP, or the PROTOCOL field is showing RRMS, SYSID displays blanks.
Type
displays the type of connection. The values are:
Cftable
A connection to a CFDT server.
Connection
A connection defined by a CONNECTION resource definition.
Iiop
An OTS link.
Rmi
A connection to an external resource manager using the resource manager interface (RMI).
UOWLink(value)
indicates that this panel relates to an inquiry about a UOW-link and displays the 8-character UOW-link identifier.
Uow (value)
displays the 16-character local identifier of the associated unit of work.
Urid (value)
If the PROTOCOL field displays RRMS, this field contains the 32-byte hexadecimal representation of the RRMS unit of recovery identifier. For other values of the PROTOCOL field (including OTS), URID displays blanks.
Start of change

CEMT INQUIRE URIMAP

Function

Retrieve information about URIMAP resource definitions.

Description

The USAGE attribute of a URIMAP definition determines which other attributes are specified in that URIMAP definition, and sometimes determines the meaning of a particular attribute.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, overtype your changes on the INQUIRE screen after tabbing to the appropriate field (see Overtyping a display).

ALl
is the default.
(value)
is the name of the URIMAP definition for which information is requested.

Sample screen

Figure 176. CEMT INQUIRE URIMAP screen
 I URIMAP
 STATUS:  RESULTS
  Uri(B13PASS ) Cli Ena     Http                                               
      Host(www.hursleytest.ibm.com:8080) Path(/INDEX.HTML                     )   
   Uri(B24PASS ) Ser Ena     Http                                               
      Host(www.hursleytest.ibm.com     ) Path(/                               )   
   Uri(B26PASS ) Ser Ena     Http                                               
      Host(*                           ) Path(/                               )   
 

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 177.

Figure 177. The expanded display of an individual entry
  I URIMAP
  RESULT
   Urimap(B13PASS)                                                             
    Usage(Client)                                                               
    Enablestatus( Enabled )                                                     
    Analyzerstat(Noanalyzer)                                                    
    Scheme(Http)                                                                
    Host(www.hursleytest.ibm.com:8080)                                          
    Path(/INDEX.HTML)                                                           
    Tcpipservice()                                                              
    Transaction()                                                               
    Converter()                                                                 
    Program()                                                                   
    Pipeline()                                                                  
    Webservice()                                                                
    Userid()                                                                    
    Certificate()                                                               
    Ciphers()                                                                   
    Templatename()                                                              
    Hfsfile()                                                                   
    Mediatype()                                                                 
    Characterset()                                                              
    Hostcodepage()                                                              
    Redirecttype(None)                                                          
    Location(                                                                )  
    Location(                                                                )  
    Location(                                                                )  
    Location(                                                                )  
    Location(         )
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE URIMAP
 
>>-CEMT Inquire URimap--+-(value)-+--+-Server---+--------------->
                        '-ALl-----'  +-Client---+
                                     '-Pipeline-'
 
>--+-Enabled---+--+-Analyzer---+--+-Http--+--Host(value)-------->
   +-Disabled--+  '-Noanalyzer-'  '-Https-'
   '-Hdisabled-'
 
>--Path(value)--Tcpipservice(value)--Transaction(value)--------->
 
>--Converter(value)--Program(value)--Pipeline(value)------------>
 
>--Webservice(value)--Userid(value)--Certificate(value)--------->
 
>--Ciphers(value)--Templatename(value)--Hfsfile(value)---------->
 
>--Mediatype(value)--Characterset(value)--Hostcodepage(value)--->
 
>--+-None------+--Location(value)------------------------------><
   +-Temporary-+
   '-Permanent-'
 

Displayed fields

Usage
displays the usage for the URIMAP definition. The possible values are:
Server
The URIMAP definition is for CICS as an HTTP server. It is used to map the URL of an incoming HTTP request from a Web client, to CICS application resources.
Client
The URIMAP definition is for CICS as an HTTP client. It is used when CICS makes a request for an HTTP resource on a remote server, so that you can avoid identifying the URL in your application program.
Pipeline
The URIMAP definition is for a Web service. It is used to specify the processing that is to be performed on a request by which a client invokes a Web service in CICS.
Enablestatus
displays the status of the URIMAP definition. The possible values are:
Enabled
The URIMAP definition can be accessed.
Disabled
The URIMAP definition cannot be accessed. A URIMAP definition with this status can be deleted.
Hdisabled
The URIMAP definition cannot be accessed because the virtual host of which it forms a part has been disabled. Use CEMT SET HOST to re-enable all the URIMAP definitions in the virtual host. A URIMAP definition with this status cannot be deleted.
Analyzerstat(value)
displays the analyzer program setting for the URIMAP definition. The possible values are:
Analyzer
The analyzer associated with the TCPIPSERVICE definition is to be used in processing the HTTP request.
Noanalyzer
The analyzer program is not to be used.
Scheme
displays the scheme component of the URL. The possible values are:
HTTP
HTTP without Secure Sockets Layer (SSL).
HTTPS
HTTP with Secure Sockets Layer (SSL).
Host(value)
displays the host component of the URL, which can be up to 116 characters.
Path(value)
displays the path component of the URL, which can be up to 256 characters.
Tcpipservice(value)
displays the 8-character name of the TCPIPSERVICE definition that specifies the inbound port to which this URIMAP definition relates. If this definition is not given, the URIMAP definition relates to all TCPIPSERVICE definitions.
Transaction(value)
displays the 4-character name of an alias transaction to run the user application that composes a response.
Converter(value)
displays the 8-character name of a converter program that performs conversion or other processing on the content of the request.
Program(value)
displays the 8-character name of the application program that composes a response.
Pipeline(value)
displays the 8-character name of the PIPELINE resource definition that provides information about the processing nodes which will act on the service request from the client.
Webservice(value)
displays the name of a Web service. This can be the 1-8 character name of a WEBSERVICE resource definition, or a name up to 32 characters representing a Web service generated by the CICS Web services assistant. It defines aspects of the run time environment for a CICS application program deployed in a Web services setting.
Userid(value)
displays the 8-character user ID under which the alias transaction will be attached.
Certificate(value)
displays the label of the certificate that is to be used as the SSL client certificate for the HTTP request by CICS as an HTTP client, which can be up to 32 characters.
Ciphers(value)
displays the cipher code that is to be used for the HTTP request by CICS as an HTTP client, which can be up to 48 characters.
Templatename(value)
displays the name of a CICS document template that is used to form the static response, which can be up to 40 characters.
Hfsfile(value)
displays the fully qualified name of a UNIX System Services HFS file that will form the static response, which can be up to 256 characters.
Mediatype(value)
displays a description of the data content of the static response, which can be up to 40 characters.
Characterset(value)
displays the name of the character set for the static response, which can be up to 40 characters.
Hostcodepage(value)
displays the IBM codepage (EBCDIC) in which the text document that will form the static response is encoded; this can be up to 10 characters.
Redirecttype
displays the type of redirection for requests that match this URIMAP definition. The URL for redirection is specified by the Location option. The possible values are:
None
Requests are not redirected. Any URL specified by the Location option is ignored.
Temporary
Requests are redirected on a temporary basis. The status code used for the response is 302 (Found).
Permanent
Requests are redirected permanently. The status code used for the response is 301 (Moved Permanently).
Location(value)
displays a URL to which matching HTTP requests from Web clients will be redirected, which can be up to 255 characters. Redirection is activated by the setting specified by the REDIRECTTYPE option.
End of change

CEMT INQUIRE VTAM

Function

Inquire on the state of the connection between CICS and VTAM.

Description

INQUIRE VTAM inquires on the state of the connection between CICS and VTAM, and also on the generic resource name (GRNAME) and the persistent session delay interval (PSDI).

Input

Press the Clear key and type CEMT INQUIRE VTAM (the minimum abbreviation is CEMT I V). You will get a display screen, a sample of which is shown below.

To change various attributes, you can:

Sample screen

Figure 178. CEMT INQUIRE VTAM screen
 IN VT
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Vta Ope Psd( 000000 )
 

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 179.

Figure 179. The expanded display
 IN VT
 RESULT - OVERTYPE TO MODIFY
   Vtam
   Openstatus( Open )
   Psdinterval( 000000 )
   Grstatus()
   Grname()
 
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE VTAM
 
>>-CEMT Inquire Vtam--+------------+--+--------------+---------->
                      +-Open-------+  +-Registered---+
                      +-Closed-----+  +-Deregistered-+
                      +-Immclose---+  +-Unregistered-+
                      '-Forceclose-'  '-Unavailable--'
 
>--+--------------------+--+---------------+-------------------><
   '-Psdinterval(value)-'  '-Grname(value)-'
 

Displayed fields

Grname(value)
displays the 8-character generic resource name under which this CICS region is registered to VTAM.
Grstatus
displays the status of generic resource registration. The values are:
Registered
CICS registered successfully as a member of the VTAM generic resource named by the GRNAME option.
Deregistered
CICS was registered as a member of the generic resource named by the GRNAME and has deregistered successfully.
Unregistered
A generic resource name (GRNAME) was specified, but CICS has not made any attempt to register.
Unavailable
A generic resource name (GRNAME) was specified, but the version of VTAM that CICS is connected to does not support generic resources.

If CICS makes an unsuccessful attempt to register, the status is shown as UNREGISTERED, and the words REGISTER ERROR appear alongside.

If CICS makes as unsuccessful attempt to deregister, the status is shown as REGISTERED, and the words DEREGISTER ERROR appear alongside.

Openstatus
displays the status of the connection between CICS and VTAM. The values are:
Open
There is a connection between CICS and VTAM.
Closed
The connection between CICS and VTAM has terminated.
Note:
You can reset this value by overtyping it with a different value, or with:
Immclose
The connection between CICS and VTAM is in the process of closing following an EXEC CICS SET VTAM IMMCLOSE or CEMT SET VTAM IMMCLOSE command.
Forceclose
The connection between CICS and VTAM is in the process of closing following an EXEC CICS SET VTAM FORCECLOSE or CEMT SET VTAM FORCECLOSE command.
Psdinterval(value)
displays the persistent session delay interval, expressed in the form hhmmss. It specifies if and for how long sessions are held in recovery-pending state after CICS fails.
Note:
You can reset this value by overtyping it with a different value.
The permitted range is 000000 to 235959 inclusive.
000000
If CICS fails, sessions are terminated.
Hhmmss
If CICS fails, sessions are held in recovery-pending state by VTAM for up to the interval specified.
Vtam
indicates that this panel relates to a VTAM inquiry.

CEMT INQUIRE WEB

Function

Retrieve information about CICS Web support.

Description

INQUIRE WEB returns information about the state of CICS Web support.

Input

Press the Clear key and type CEMT INQUIRE WEB (the minimum abbreviation is CEMT I WE). You will get a display screen, a sample of which is shown below.

To change various attributes, you can:

Sample screen

Figure 180. CEMT INQUIRE WEB screen
 IN WE
 STATUS:  RESULTS - OVERTYPE TO MODIFY
  Web Gar( 00060 ) Tim( 00005 ) Loc


 

If you place the cursor against the result and press ENTER, CICS displays an expanded format as shown in Figure 179.

Figure 181. The expanded display
 I WEB
 RESULT - OVERTYPE TO MODIFY
   Web
   Garbageint( 00060 )
   Timeoutint( 00005 )
    
Read syntax diagramSkip visual syntax diagramCEMT INQUIRE WEB
 
>>-INQUIRE WEB--+-------------------+--+-------------------+---><
                '-Garbageint(value)-'  '-Timeoutint(value)-'
 

Displayed fields

Garbageint (cvda)
is the interval at which the Web garbage collection task runs to clean up Web 3270 state data for which the terminal timeout interval has expired. The interval is measured in minutes.
Timeoutint (cvda)
is the period of time after which inactive Web 3270 sessions are eligible for garbage collection. The period is measured in minutes.
Start of change

CEMT INQUIRE WEBSERVICE

Function

Retrieve information about an installed WEBSERVICE.

Description

Use the INQUIRE WEBSERVICE command to retrieve information about an installed WEBSERVICE.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

To change various attributes, you can:

ALl
is the default. Information about all WEBSERVICEs is displayed, unless you specify a selection of WEBSERVICEs to be queried.
(value)
is the name (1-8 characters) of an installed WEBSERVICE definition.

Sample screen

Figure 182. CEMT INQUIRE WEBSERVICE screen
  I WEBSERVICE                                                                  
  STATUS:  RESULTS - OVERTYPE TO MODIFY                                         
   Webs(INQUIRE1                        ) Pip(SAMPLE  )                         
      Ins               Pro(DFH0XCMN) Com                       Dat(20050119)   
   Webs(INQUIRE2                        ) Pip(SAMPLE  )                         
      Ins               Pro(DFH0XCMN) Com                       Dat(20050119)   
   Webs(PLACE1                          ) Pip(SAMPLE  )                         
      Ins               Pro(DFH0XCMN) Com                       Dat(20050119)   
   Webs(WEBSERV2                        ) Pip(LID852  )                         
      Ins               Pro(WEBSERV2) Cha Con(DFHWS-DATA      ) Dat(20050120)   
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                


                                                                                
                                                      SYSID=CIAP APPLID=IYK2ZAF1
   RESPONSE: NORMAL                             TIME:  09.15.41  DATE: 09.02.05 
 PF 1 HELP       3 END       5 VAR        7 SBH 8 SFH 9 MSG 10 SB 11 SF         

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 183.

Figure 183. The expanded display of an individual entry
  I WEBSERVICE(INQUIRE1)                                                        
  RESULT - OVERTYPE TO MODIFY                                                   
    Webservice(INQUIRE1)                                                        
    Pipeline(SAMPLE)                                                            
    Validationst( Novalidation )                                                
    State(Inservice)                                                            
    Urimap()                                                                    
    Program(DFH0XCMN)                                                           
    Pgminterface(Commarea)                                                      
    Container()                                                                 
    Datestamp(20050119)                                                         
    Timestamp(10:47:42)                                                         
    Wsdlfile(/u/chrisb/wsdl/beta4/inquireSingle.wsdl)                           
    Wsbind(/u/dbeard1/sampbind/inquireSingle.wsbind)                            
    Endpoint(http://my-server:my-port/exampleApp/inquireSingle)                 
    Binding(DFH0XCMNHTTPSoapBinding)                                            
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                      SYSID=CIAP APPLID=IYK2ZAF1
                                                TIME:  09.16.38  DATE: 09.02.05 
 PF 1 HELP 2 HEX 3 END       5 VAR        7 SBH 8 SFH       10 SB 11 SF         
Read syntax diagramSkip visual syntax diagramINQUIRE WEBSERVICE
 
                            .-ALl-----.
>>-CEMT INQUIRE WEBSERVICE--+---------+--+-----------------+---->
                            '-(value)-'  '-WSDlfile(value)-'
 
>--+---------------+--+-------------------+--------------------->
   '-WSBind(value)-'  '-WEBSERVICE(value)-'
 
>--+---------------+--+----------------+--+-----------------+--->
   '-Urimap(value)-'  '-Binding(value)-'  '-Endpoint(value)-'
 
>--+----------------+--+----------+--+------------------+------->
   '-PRogram(value)-'  +-Channel--+  '-Container(value)-'
                       '-Commarea-'
 
>--+--------------+--+--------------------+--+------------+----><
   +-Validation---+  '-Lastmodtime(value)-'  +-Discarding-+
   '-Novalidation-'                          +-Initing----+
                                             +-Inservice--+
                                             '-Unusable---'
 

Conditions: NOTAUTH, NOTFND

Displayed fields

WSDlfile(value)
Displays the name of the Web service description file associated with the WEBSERVICE resource. The name can be up to 255 characters long.
WSBind(value)
Displays the name of the Web service binding file. The name can be up to 255 characters long.
Pipeline(value)
Displays the name of the PIPELINE in which the WEBSERVICE is installed; that is, the name of the PIPELINE resource that contains this WEBSERVICE resource. The name can be up to 8 characters long.
Urimap(value)
Displays the name of a dynamically installed URIMAP if there is one that is associated with this WEBSERVICE. If the WEBSERVICE was not installed by performing the SCAN function on a PIPELINE resource, or if the WEBSERVICE represents a remote Web service, then the URIMAP will be empty. The name can be up to 8 characters long.
Binding(value)
Displays the WSDL binding represented by the WEBSERVICE. This binding is one of (potentially) many that appear in the WEBSERVICE configuration file associated with the WEBSERVICE resource. The name can be up to 255 characters long.
Endpoint(value)
Displays the endpoint URI of a remote WEBSERVICE. This is the endpoint URI specified in the WSDL file for a remote Web service. If a CICS application program is the service provider, then the ENDPOINT will be empty. The URI can be up to 255 characters long.
Program(value)
Displays the name of a CICS program that implements the Web service. If this WEBSERVICE represents a remote Web service (that is, CICS is not the service provider), PROGRAM will be empty. The name can be up to 8 characters long.
Pgminterface
Displays an indication of whether the CICS program that implements the Web service expects input in a channel or in a commarea:
Channel
The program expects input in a channel
Commarea
The program expects input in a commarea
Container(value)
Displays the name of the container used if PGMINTERFACE returns a value of CHANNEL. The name can be up to 16 characters long.
Validationst
Indicates whether full validation of SOAP messages is currently enabled for this WEBSERVICE:
Validation
Full validation is enabled
Disabled
Full validation is disabled
Lastmodtime(value)
Displays the time that the deployed WSBind file on HFS was last updated. The last-modified-time can be used to determine whether CICS has refreshed itself after an update is made to a WSBind file in the pickup directory.

For dynamically-installed WEBSERVICESs (those installed by the CICS scanning mechanism), the value of LASTMODTIME is the timestamp of the HFS file pointed to by the WSBind definition, at the time the WEBSERVICE definition was last installed or updated. For statically-installed WEBSERVICESs (those installed from a CSD or by CREATE WEBSERVICE), the value of LASTMODTIME is the timestamp of the WSBind HFS file pointed to by the WEBSERVICE definition, at the time the WEBSERVICE was installed.

If you issue an INQUIRE WEBSERVICE command before a newly-installed or updated WEBSERVICE has fully initialized, the returned LASTMODTIME value will be zero.

End of change

CEMT INQUIRE WORKREQUEST

Function

Retrieve information about work requests in the local CICS region.

Description

INQUIRE WORKREQUEST returns information about the various EJB tasks that are started as a result of action by a request receiver. This allows you to track these tasks. In this topic we often refer to tasks of this sort as work requests.

Tracking EJB tasks is superficially not unlike tracking the various tasks of a distributed UOW, however, because it applies to the Enterprise bean and IIOP environment, you need different tools to manage it.

A listener region in CICS is an example of a RequestReceiver. A single RequestReceiver can start one RequestProcessor which in turn can start more RequestReceivers or RequestProcessors.

The RequestReceiver/RequestProcessor relationship is not the same as any other type of transaction relationship e.g. the web. A RequestReceiver need not remain in the system after it has initiated a RequestProcessor - if there are no more requests to be received it terminates. A RequestProcessor may create RequestReceivers during the course of its processing - outbound and loopback requests.

INQUIRE WORKREQUEST enables you to inquire about a single work request in the local region. You can

The INQUIRE WORKREQUEST command is based on the type of work being carried out. The only type supported in this release is IIOP.

Work Requests are identified by tokens. Each token is unique in the local system for the lifetime of the request, but subsequently, it can be reused.

Input

Press the Clear key to clear the screen. There are two ways of commencing this transaction:

You cannot change the attributes displayed. Use the CEMT SET WORKREQUEST command to specify PURGE or FORCEPURGE for a particular work request.

Read syntax diagramSkip visual syntax diagramCEMT INQUIRE WORKREQUEST
 
                             .-All-----.
>>-CEMT Inquire WOrkrequest--+---------+------------------------>
                             '-(value)-'
 
>--+---------------------+--+--------------------+-------------->
   '-CLientipaddr(value)-'  '-COrbaserver(value)-'
 
>--+---------------------+--+----------------+------------------>
   '-Listenerport(value)-'  '-OApplid(value)-'
 
>--+--------------+--+-----------------+------------------------>
   '-OTAsk(value)-'  '-OTRansid(value)-'
 
>--+------------------+--+--------------+--+-------------+------>
   '-Requestid(value)-'  '-Stack(value)-'  '-TAsk(value)-'
 
>--+----------------+--+----------------+----------------------->
   '-TRansid(value)-'  '-TSystem(value)-'
 
>--+-----------------+-----------------------------------------><
   '-Worktype(value)-'
 
(value)
An 8-character token to identify the work request. The valid characters for this token are the 16 hexadecimal digits, 0-9 and A-F. Start of changeThe token is generated by CICS. Normal usage begins with an INQUIRE WORKREQUEST BROWSE command, to identify the token which is of interest. Then the specific token can be used to issue INQUIRE and SET commands that relate to the task in question.End of change
All
is the default. As many work requests are displayed as are present in the system.

You cannot specify a list of identifiers, nor can you use the symbols * and + to specify a family of work requests.

Sample screen

Figure 184. CEMT INQUIRE WORKREQUEST screen
INQUIRE WORKREQUEST
STATUS:  RESULTS - OVERTYPE TO MODIFY
Wor(01A54E3B) Iio Tas(0000090) Tra(CIRP)                                  
   Cli(9.20.7.123     ) Lis(20142) Cor(CHN1) Oap(IYK2ZFV1) Ota(0000101)
Wor(15BED280) Iio Tas(0000090) Tra(CIRP)                                  
   Cli(9.20.7.123     ) Lis(20142) Cor(CHN1) Oap(IYK2ZFV1) Ota(0000101) 
Wor(15BED6E0) Iio Tas(0000176) Tra(CIRP)                                  
   Cli(9.20.7.123     ) Lis(20142) Cor(CHN1) Oap(IYK2ZFV1) Ota(0000251)
Wor(15BEDBC0) Iio Tas(0000176) Tra(CIRP)                                  
   Cli(9.20.7.123     ) Lis(20142) Cor(CHN1) Oap(IYK2ZFV1) Ota(0000251)


                                                      SYSID=JOHN APPLID=IYK2ZFV1
   RESPONSE:  NORMAL                            TIME:  11.26.40  DATE: 08.11.02
 PF 1 HELP        3 END       5 VAR       7 SBH 8 SFH 9 MSG 10 SB 11 SF

When the character P or F (Purge or Forcepurge) is entered in the action column CEMT initiates a SET WORKREQUEST command.

If you place the cursor against a specific entry in the list and press ENTER, CICS displays an expanded format as shown in Figure 185.

Figure 185. The expanded display of an individual entry
   INQUIRE WORKREQUEST (Expansion of one line from above)
   RESULT - OVERTYPE TO MODIFY
     Workrequest(01A54E3B)
     Worktype(Iiop)
     Task(0000013)
     Transid(CIRP)
     Purgetype(              )
     Clientipaddr(9.20.7.123)
     Listenerport(20142)
     Corbaserver(GMB1)
     Oapplid(IYK2ZFV1)
     Otask(0000101)
     Otransid(CIRR)
     Tsystem(9.20.101.720)
     Requestid(0000010032)
     Stack(0000002)
                                                      SYSID=JOHN APPLID=IYK2ZFV1
                                                TIME:  11.26.40  DATE: 08.11.02
 PF 1 HELP 2 HEX 3 END       5 VAR        7 SBH 8 SFH       10 SB 11 SF

Displayed fields

CLientipaddr(value)
displays the TCPIP address of the client that originated the request as a 15-character value.
COrbaserver(value)
displays the Name of the CorbaServer as a 4-character value.
Listenerport(value)
displays the Host port that received the request, as a 5-digit numeric value.
OApplid(value)
displays the applid of the originating task as an 8-character value.
OTAsk(value)
displays the the number of the task (RequestReceiver) that received the request, as a 7-digit numeric value.
OTRansid(value)
displays as a 4-character value, the transaction id that received the request.
Purgetype (input only field)
specifies whether a task is to be purged or forcepurged. The values are:
Forcepurge
The work request is terminated immediately. System integrity is not guaranteed. In some extreme cases, for example if a work request is is forcepurged during backout processing, CICS terminates abnormally. If you want to terminate a work request but do not want to terminate CICS, you should use PURGE instead of FORCEPURGE.
Purge
The work request is terminated, but termination occurs only when system and data integrity can be maintained.
Requestid(value)
displays the current request as a 7-digit numeric value. This value is sent by the client initiating the request and is used to associate the reply with the request. A client can be processing more than one request at any given moment.
Stack(value)
displays the stack level of this call as a 7-digit numeric value.

As each new request is received from the client the request receiver creates a stack and initialises it with a value of ‘1’. The stack is incremented by ‘1’ every time a new bean is invoked, and decremented each time a bean which has incremented it terminates. So the value of the stack gives the current level within the EJB transaction at which this workrequest is executing. If a request is sent to a non-CICS EJB server then this field is NOT incremented.

TAsk(value)
displays the Local task number, as a 7-character numeric value. It is translated to packed decimal, or in C to an unsigned char(4).
TRansid(value)
displays the Local transaction id - 4 character
TSystem(value)
displays the applid of the target CICS system as a 21-byte field. It may contain one of the following:
  • the dotted decimal TCPIP address and port number of the target system
  • up to eight characters followed by blanks. In this case these 8-characters, or less, are the VTAM applid of the target system
  • Another value. CICS does not know about any other possibilities. Any other value must be meaningful to other software at your installation which expects to work with the value obtained from this parameter of this CICS command
TSYSTEM is needed when going outbound over TCPIP. It is the only identification of the target system that is available.
WOrkrequest(value)
displays an 8-character token to identify the work request. The valid characters for this token are the 16 hexadecimal digits, 0-9 and A-F. Start of changeThe token is generated by CICS. Normal usage begins with an INQUIRE WORKREQUEST BROWSE command, to identify the token which is of interest. Then the specific token can be used to issue INQUIRE and SET commands that relate to the task in question.End of change
Worktype(value)
displays the type of work being performed.
Start of change
IIOP
Specifies that the work is being performed for an IIOP request.
SOAP
Specifies that the work is being performed for a Web service request.
End of change

2.
Hierarchical storage manager (DFSMShsm) and data set services (DFSMSdss), which perform data set backup and recovery operations, are components of IBM Data Facility Storage Management Subsystem (DFSMS/MVS) program product.

[[ Contents Previous Page | Next Page Index ]]