Db2v7 Commands
Db2v7 Commands
Command Reference
Version 7
SC26-9934-01
DB2 Universal Database for OS/390 and z/OS
Command Reference
Version 7
SC26-9934-01
Note
Before using this information and the product it supports, be sure to read the
general information under “Notices” on page 357.
Chapter 2. Commands . . . . . . . . . . . . . . . . . . . . . . 3
DB2 command parsing . . . . . . . . . . . . . . . . . . . . . . 3
Parts of a DB2 command . . . . . . . . . . . . . . . . . . . . 3
Characters with special meanings . . . . . . . . . . . . . . . . . 4
Examples of Keyword Entry . . . . . . . . . . . . . . . . . . . 5
Scope of commands . . . . . . . . . . . . . . . . . . . . . . . 5
Output from DB2 commands . . . . . . . . . . . . . . . . . . . . 6
Issuing commands from IFI . . . . . . . . . . . . . . . . . . . . . 6
DSN subcommand parsing . . . . . . . . . . . . . . . . . . . . . 7
Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . 7
Description of commands . . . . . . . . . . . . . . . . . . . . . 7
The DSN command and its subcommands . . . . . . . . . . . . . . 7
DB2 commands . . . . . . . . . . . . . . . . . . . . . . . . 8
IMS commands. . . . . . . . . . . . . . . . . . . . . . . . 10
CICS attachment facility commands . . . . . . . . . . . . . . . . 10
MVS IRLM commands . . . . . . . . . . . . . . . . . . . . . 11
TSO CLISTs . . . . . . . . . . . . . . . . . . . . . . . . . 11
-ALTER BUFFERPOOL (DB2) . . . . . . . . . . . . . . . . . . . 12
Environment . . . . . . . . . . . . . . . . . . . . . . . . . 12
Authorization. . . . . . . . . . . . . . . . . . . . . . . . . 12
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 12
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 16
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 18
-ALTER GROUPBUFFERPOOL (DB2) . . . . . . . . . . . . . . . . 19
Environment . . . . . . . . . . . . . . . . . . . . . . . . . 19
Authorization. . . . . . . . . . . . . . . . . . . . . . . . . 19
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 19
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 21
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 22
-ALTER UTILITY (DB2) . . . . . . . . . . . . . . . . . . . . . . 23
Environment . . . . . . . . . . . . . . . . . . . . . . . . . 23
Authorization. . . . . . . . . . . . . . . . . . . . . . . . . 23
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 23
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 25
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 25
iv Command Reference
Authorization. . . . . . . . . . . . . . . . . . . . . . . . . 97
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 97
Output . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 103
-DISPLAY DATABASE (DB2) . . . . . . . . . . . . . . . . . . . 106
Environment . . . . . . . . . . . . . . . . . . . . . . . . 106
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 106
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 108
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 112
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 115
| -DISPLAY DDF (DB2) . . . . . . . . . . . . . . . . . . . . . . 119
| Environment . . . . . . . . . . . . . . . . . . . . . . . . 119
| Authorization . . . . . . . . . . . . . . . . . . . . . . . . 119
| Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 119
| Option descriptions . . . . . . . . . . . . . . . . . . . . . . 119
| Output . . . . . . . . . . . . . . . . . . . . . . . . . . 119
| Examples . . . . . . . . . . . . . . . . . . . . . . . . . 120
-DISPLAY FUNCTION SPECIFIC (DB2) . . . . . . . . . . . . . . . 121
Environment . . . . . . . . . . . . . . . . . . . . . . . . 121
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 121
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 121
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 122
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 123
-DISPLAY GROUP (DB2) . . . . . . . . . . . . . . . . . . . . 125
Environment . . . . . . . . . . . . . . . . . . . . . . . . 125
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 125
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 125
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 125
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 127
-DISPLAY GROUPBUFFERPOOL (DB2) . . . . . . . . . . . . . . . 129
Environment . . . . . . . . . . . . . . . . . . . . . . . . 129
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 129
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 130
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 136
-DISPLAY LOCATION (DB2) . . . . . . . . . . . . . . . . . . . 143
Environment . . . . . . . . . . . . . . . . . . . . . . . . 143
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 143
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 143
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 144
-DISPLAY LOG (DB2) . . . . . . . . . . . . . . . . . . . . . . 146
Environment . . . . . . . . . . . . . . . . . . . . . . . . 146
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 146
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 146
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 146
Contents v
-DISPLAY PROCEDURE (DB2) . . . . . . . . . . . . . . . . . . 148
Environment . . . . . . . . . . . . . . . . . . . . . . . . 148
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 148
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 148
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 150
-DISPLAY RLIMIT (DB2) . . . . . . . . . . . . . . . . . . . . . 152
Environment . . . . . . . . . . . . . . . . . . . . . . . . 152
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 152
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 152
-DISPLAY THREAD (DB2) . . . . . . . . . . . . . . . . . . . . 153
Environment . . . . . . . . . . . . . . . . . . . . . . . . 153
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 153
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 154
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 157
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 160
-DISPLAY TRACE (DB2) . . . . . . . . . . . . . . . . . . . . . 165
Environment . . . . . . . . . . . . . . . . . . . . . . . . 165
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 165
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 166
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 169
-DISPLAY UTILITY (DB2) . . . . . . . . . . . . . . . . . . . . 171
Environment . . . . . . . . . . . . . . . . . . . . . . . . 171
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 171
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 171
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 172
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 173
DSN (TSO) . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Environment . . . . . . . . . . . . . . . . . . . . . . . . 175
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 175
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 175
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 176
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 177
DSNC (CICS attachment facility) . . . . . . . . . . . . . . . . . . 178
Environment . . . . . . . . . . . . . . . . . . . . . . . . 178
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 178
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 178
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 178
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 178
DSNC DISCONNECT (CICS attachment facility) . . . . . . . . . . . . 179
Environment . . . . . . . . . . . . . . . . . . . . . . . . 179
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 179
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Option description . . . . . . . . . . . . . . . . . . . . . . 179
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 179
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 179
DSNC DISPLAY (CICS attachment facility) . . . . . . . . . . . . . . 180
vi Command Reference
Environment . . . . . . . . . . . . . . . . . . . . . . . . 180
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 180
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 180
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 181
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 182
DSNC MODIFY (CICS attachment facility) . . . . . . . . . . . . . . 184
Environment . . . . . . . . . . . . . . . . . . . . . . . . 184
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 184
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 184
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 185
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 185
DSNC STOP (CICS attachment facility) . . . . . . . . . . . . . . . 186
Environment . . . . . . . . . . . . . . . . . . . . . . . . 186
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 186
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 186
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 186
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 186
DSNC STRT (CICS attachment facility) . . . . . . . . . . . . . . . 187
Environment . . . . . . . . . . . . . . . . . . . . . . . . 187
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 187
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 187
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 187
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 187
DSNH (TSO CLIST) . . . . . . . . . . . . . . . . . . . . . . 189
Environment . . . . . . . . . . . . . . . . . . . . . . . . 189
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 189
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Summary of DSNH CLIST parameters . . . . . . . . . . . . . . . 190
General parameter descriptions . . . . . . . . . . . . . . . . . 193
DSNH/DSN subcommand summary . . . . . . . . . . . . . . . . 207
DSNH CLIST/BIND PLAN subcommand comparison . . . . . . . . . 207
DSNH CLIST/BIND PACKAGE subcommand comparison . . . . . . . . 210
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 213
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 214
END (DSN). . . . . . . . . . . . . . . . . . . . . . . . . . 217
Environment . . . . . . . . . . . . . . . . . . . . . . . . 217
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 217
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 217
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 217
FREE PACKAGE (DSN) . . . . . . . . . . . . . . . . . . . . . 218
Environment . . . . . . . . . . . . . . . . . . . . . . . . 218
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 218
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 219
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 219
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 220
FREE PLAN (DSN) . . . . . . . . . . . . . . . . . . . . . . . 221
Environment . . . . . . . . . . . . . . . . . . . . . . . . 221
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 221
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Contents vii
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 221
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 222
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 222
MODIFY irlmproc,ABEND (MVS IRLM) . . . . . . . . . . . . . . . 223
Environment . . . . . . . . . . . . . . . . . . . . . . . . 223
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 223
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 223
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 223
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 223
| MODIFY irlmproc,DIAG (MVS IRLM) . . . . . . . . . . . . . . . . 225
Environment . . . . . . . . . . . . . . . . . . . . . . . . 225
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 225
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 225
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 226
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 226
| MODIFY irlmproc,PURGE (MVS IRLM) . . . . . . . . . . . . . . . 227
| Environment . . . . . . . . . . . . . . . . . . . . . . . . 227
| Authorization . . . . . . . . . . . . . . . . . . . . . . . . 227
| Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 227
| Option descriptions . . . . . . . . . . . . . . . . . . . . . . 227
| Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 227
| Example . . . . . . . . . . . . . . . . . . . . . . . . . . 227
MODIFY irlmproc,SET (MVS IRLM) . . . . . . . . . . . . . . . . . 228
Environment . . . . . . . . . . . . . . . . . . . . . . . . 228
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 228
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 228
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 229
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 230
MODIFY irlmproc,STATUS (MVS IRLM) . . . . . . . . . . . . . . . 232
Environment . . . . . . . . . . . . . . . . . . . . . . . . 232
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 232
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 232
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 233
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 233
-MODIFY TRACE (DB2) . . . . . . . . . . . . . . . . . . . . . 238
Environment . . . . . . . . . . . . . . . . . . . . . . . . 238
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 238
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 238
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 239
REBIND PACKAGE (DSN) . . . . . . . . . . . . . . . . . . . . 240
Environment . . . . . . . . . . . . . . . . . . . . . . . . 240
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 240
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 243
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 243
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 243
REBIND PLAN (DSN) . . . . . . . . . . . . . . . . . . . . . . 244
Environment . . . . . . . . . . . . . . . . . . . . . . . . 244
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 244
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 247
Contents ix
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 265
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 266
Output . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 266
| -SET SYSPARM (DB2) . . . . . . . . . . . . . . . . . . . . . 268
| Environment . . . . . . . . . . . . . . . . . . . . . . . . 268
| Authorization . . . . . . . . . . . . . . . . . . . . . . . . 268
| Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 268
| Option descriptions . . . . . . . . . . . . . . . . . . . . . . 268
| Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 268
| Examples . . . . . . . . . . . . . . . . . . . . . . . . . 268
-SET LOG (DB2). . . . . . . . . . . . . . . . . . . . . . . . 270
Environment . . . . . . . . . . . . . . . . . . . . . . . . 270
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 270
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 270
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 271
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 271
SPUFI (DSN) . . . . . . . . . . . . . . . . . . . . . . . . . 273
Environment . . . . . . . . . . . . . . . . . . . . . . . . 273
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 273
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 273
/SSR (IMS) . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Environment . . . . . . . . . . . . . . . . . . . . . . . . 274
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 274
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Option description . . . . . . . . . . . . . . . . . . . . . . 274
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 274
/START (IMS) . . . . . . . . . . . . . . . . . . . . . . . . . 275
Environment . . . . . . . . . . . . . . . . . . . . . . . . 275
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 275
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 275
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 275
-START DATABASE (DB2) . . . . . . . . . . . . . . . . . . . . 276
Environment . . . . . . . . . . . . . . . . . . . . . . . . 276
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 276
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 277
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 280
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 282
-START DB2 (DB2) . . . . . . . . . . . . . . . . . . . . . . . 283
Environment . . . . . . . . . . . . . . . . . . . . . . . . 283
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 283
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 283
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 284
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 285
-START DDF (DB2). . . . . . . . . . . . . . . . . . . . . . . 286
Environment . . . . . . . . . . . . . . . . . . . . . . . . 286
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 286
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 286
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 286
-START FUNCTION SPECIFIC (DB2) . . . . . . . . . . . . . . . . 287
x Command Reference
Environment . . . . . . . . . . . . . . . . . . . . . . . . 287
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 287
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 288
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 288
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 289
START irlmproc (MVS IRLM) . . . . . . . . . . . . . . . . . . . 290
Environment . . . . . . . . . . . . . . . . . . . . . . . . 290
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 290
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 290
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 293
-START PROCEDURE (DB2) . . . . . . . . . . . . . . . . . . . 294
Environment . . . . . . . . . . . . . . . . . . . . . . . . 294
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 294
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 295
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 295
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 296
-START RLIMIT (DB2). . . . . . . . . . . . . . . . . . . . . . 297
Environment . . . . . . . . . . . . . . . . . . . . . . . . 297
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 297
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Option description . . . . . . . . . . . . . . . . . . . . . . 297
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 298
-START TRACE (DB2) . . . . . . . . . . . . . . . . . . . . . 299
Environment . . . . . . . . . . . . . . . . . . . . . . . . 299
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 299
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 300
The destination block . . . . . . . . . . . . . . . . . . . . . 301
The constraint block . . . . . . . . . . . . . . . . . . . . . 302
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 307
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 308
/STOP (IMS) . . . . . . . . . . . . . . . . . . . . . . . . . 309
Environment . . . . . . . . . . . . . . . . . . . . . . . . 309
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 309
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 309
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 309
-STOP DATABASE (DB2) . . . . . . . . . . . . . . . . . . . . 310
Environment . . . . . . . . . . . . . . . . . . . . . . . . 310
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 310
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 311
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 313
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 315
-STOP DB2 (DB2) . . . . . . . . . . . . . . . . . . . . . . . 316
Environment . . . . . . . . . . . . . . . . . . . . . . . . 316
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 316
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 316
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 317
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 317
-STOP DDF (DB2) . . . . . . . . . . . . . . . . . . . . . . . 318
Environment . . . . . . . . . . . . . . . . . . . . . . . . 318
Contents xi
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 318
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 318
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 319
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 320
-STOP FUNCTION SPECIFIC . . . . . . . . . . . . . . . . . . . 321
Environment . . . . . . . . . . . . . . . . . . . . . . . . 321
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 321
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 322
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 322
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 323
STOP irlmproc (MVS IRLM). . . . . . . . . . . . . . . . . . . . 324
Environment . . . . . . . . . . . . . . . . . . . . . . . . 324
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 324
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Option description . . . . . . . . . . . . . . . . . . . . . . 324
Usage note . . . . . . . . . . . . . . . . . . . . . . . . . 324
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 324
-STOP PROCEDURE (DB2) . . . . . . . . . . . . . . . . . . . 326
Environment . . . . . . . . . . . . . . . . . . . . . . . . 326
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 326
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 327
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 328
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 328
-STOP RLIMIT (DB2) . . . . . . . . . . . . . . . . . . . . . . 329
Environment . . . . . . . . . . . . . . . . . . . . . . . . 329
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 329
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Example . . . . . . . . . . . . . . . . . . . . . . . . . . 329
-STOP TRACE (DB2) . . . . . . . . . . . . . . . . . . . . . . 330
Environment . . . . . . . . . . . . . . . . . . . . . . . . 330
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 330
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 331
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 334
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 334
-TERM UTILITY (DB2) . . . . . . . . . . . . . . . . . . . . . 335
Environment . . . . . . . . . . . . . . . . . . . . . . . . 335
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 335
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 335
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . 336
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 337
/TRACE (IMS). . . . . . . . . . . . . . . . . . . . . . . . . 338
Environment . . . . . . . . . . . . . . . . . . . . . . . . 338
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 338
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 338
Examples . . . . . . . . . . . . . . . . . . . . . . . . . 338
TRACE CT (MVS IRLM) . . . . . . . . . . . . . . . . . . . . . 340
Environment . . . . . . . . . . . . . . . . . . . . . . . . 340
Authorization . . . . . . . . . . . . . . . . . . . . . . . . 340
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Option descriptions . . . . . . . . . . . . . . . . . . . . . . 340
Appendix D. Summary of changes to DB2 for OS/390 and z/OS Version 7 353
Enhancements for managing data . . . . . . . . . . . . . . . . . 353
Enhancements for reliability, scalability, and availability. . . . . . . . . . 353
Easier development and integration of e-business applications . . . . . . . 354
Improved connectivity . . . . . . . . . . . . . . . . . . . . . . 355
Features of DB2 for OS/390 and z/OS . . . . . . . . . . . . . . . . 356
Migration considerations . . . . . . . . . . . . . . . . . . . . . 356
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Programming interface information . . . . . . . . . . . . . . . . . 358
Trademarks. . . . . . . . . . . . . . . . . . . . . . . . . . 359
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . 379
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Contents xiii
xiv Command Reference
About this book
This is a reference book that lists numerous commands that system administrators,
database administrators, and application programmers use. The commands are in
alphabetical order for quick retrieval.
Important
In this version of DB2® for OS/390® and z/OS, some utility functions are
available as optional products. You must separately order and purchase a
license to such utilities, and discussion of those utility functions in this
publication is not intended to otherwise imply that you have a license to them.
Naming conventions
When a parameter refers to an object created by SQL statements (for example,
tables, table spaces, and indexes), SQL syntactical naming conventions are
followed.
See Part 4 (Volume 1) of DB2 Administration Guide for more information about
connection names.
correlation-id
An identifier of 1 to 12 characters that identifies a process within an address
space connection. A correlation ID must begin with a letter.
A correlation ID can be one of the following:
v For DSN processes running in TSO foreground, the correlation ID is the TSO
logon identifier.
v For DSN processes running in TSO batch, the correlation ID is the job name.
v For CAF processes, the correlation ID is the TSO logon identifier.
v For RRSAF processes, the correlation ID is the value specified during
signon.
v For IMS processes, the correlation ID is pst#.psbname.
v For CICS processes, the correlation ID is
identifier.thread_number.transaction_identifier.
See Part 4 (Volume 1) of DB2 Administration Guide for more information about
correlation IDs.
data-set-name
An identifier of 1 to 44 characters that identifies a data set.
dbrm-member-name
An identifier of 1 to 8 letters or digits that identifies a member of a partitioned
data set. (MVS requires this naming convention.)
A DBRM member name should not begin with DSN; this can sometimes conflict
with DB2-provided DBRM member names. If a DBRM member name beginning
with DSN is specified, DB2 issues a warning message.
dbrm-pds-name
An identifier of 1 to 44 characters that identifies a partitioned data set.
ddname
An identifier of 1 to 8 characters that designates the name of a DD statement.
hexadecimal-constant
A sequence of digits or any of the letters from A to F (uppercase or lowercase).
When referring to a DB2 product other than DB2 for OS/390 and z/OS, this book
uses the product’s full name to avoid ambiguity.
required_item
required_item
optional_item
If an optional item appears above the main path, that item has no effect on the
execution of the statement and is used only for readability.
optional_item
required_item
v If you can choose from two or more items, they appear vertically, in a stack.
If you must choose one of the items, one item of the stack appears on the main
path.
required_item required_choice1
required_choice2
If choosing one of the items is optional, the entire stack appears below the main
path.
required_item
optional_choice1
optional_choice2
If one of the items is the default, it appears above the main path and the
remaining choices are shown below.
v An arrow returning to the left, above the main line, indicates an item that can be
repeated.
required_item repeatable_item
If the repeat arrow contains a comma, you must separate repeated items with a
comma.
required_item repeatable_item
A repeat arrow above a stack indicates that you can repeat the items in the
stack.
v Keywords appear in uppercase (for example, FROM). They must be spelled exactly
as shown. Variables appear in all lowercase letters (for example, column-name).
They represent user-supplied names or values.
v If punctuation marks, parentheses, arithmetic operators, or other such symbols
are shown, you must enter them as part of the syntax.
xx Command Reference
How to send your comments
Your feedback helps IBM to provide quality information. Please send any comments
that you have about this book or other DB2 for OS/390 and z/OS documentation.
You can use any of the following methods to provide comments:
v Send your comments by e-mail to [email protected] and include the name
of the product, the version number of the product, and the number of the book. If
you are commenting on specific text, please list the location of the text (for
example, a chapter and section title, page number, or a help topic title).
v Send your comments from the Web. Visit the Web site at:
http://www.ibm.com/software/db2os390
The Web site has a feedback page that you can use to send comments.
v Complete the readers’ comment form at the back of the book and return it by
mail, by fax (800-426-7773 for the United States and Canada), or by giving it to
an IBM representative.
| For information about the changes to the Version 7 product, see “Appendix D.
| Summary of changes to DB2 for OS/390 and z/OS Version 7” on page 353.
A process is represented to DB2 by a set of identifiers (IDs). What the process can
do with DB2 is determined by privileges and authorities that can be held by its
identifiers. We use “the privilege set of a process” to mean the entire set of
privileges and authorities that can be used by the process in a specific situation.
During the precompilation process, the DB2 precompiler produces both modified
source code and a database request module (DBRM) for each application program.
When determining the maximum size of a plan, you must consider several physical
limitations, including the time required to bind the plan, the size of the EDM pool,
and fragmentation. There are no restrictions to the number of DBRMs that can be
included in a plan. However, packages provide a more flexible method for handling
large numbers of DBRMs within a plan. As a general rule, it is suggested that the
EDM pool be at least 10 times the size of the largest DBD or plan, whichever is
greater. For further information, see Part 2 of DB2 Installation Guide.
The BIND PACKAGE subcommand allows you to bind DBRMs individually. It gives
you the ability to test different versions of an application without extensive
rebinding. Package binding is also the only method for binding applications at
remote sites.
Even when they are bound into packages, all programs must be designated in an
application plan. BIND PLAN establishes the relationship between DB2 and all
DBRMs or packages in that plan. Plans can specify explicitly named DBRMs,
packages, collections of packages, or a combination of these elements. The plan
contains information about the designated DBRMs or packages and about the data
the application program intends to use. It is stored in the DB2 catalog.
BIND PLAN and BIND PACKAGE can be accomplished using DB2I panels, the
DSNH CLIST, or the DSN subcommands BIND PLAN and BIND PACKAGE. For a
detailed explanation of binding with DSNH CLIST, see Chapter 2. Commands. A
complete description of the bind process can be found in Part 5 of DB2 Application
Programming and SQL Guide. Further information on BIND can be found in “BIND
PACKAGE (DSN)” on page 32 and in “BIND PLAN (DSN)” on page 38. Information
about specific options for BIND PLAN and BIND PACKAGE can be found in
“Options of BIND and REBIND for PLAN, PACKAGE, and TRIGGER PACKAGE” on
page 44.
2 Command Reference
Chapter 2. Commands
This chapter contains syntax diagrams, semantic descriptions, rules, and usage
examples of commands, organized alphabetically by command name.
The tables at the beginning of this chapter summarize the commands that follow.
Each table lists commands of one type, describes their functions, and refers to the
page on which a complete description begins.
Recognition character
Command
Primary keyword
Value
-DISPLAY DATABASE(J64DBASE),SPACENAM(PROJ32)
Value
Keyword
Separators
The command prefix can be defined at installation time. For more information,
see Part 2 of DB2 Installation Guide.
– If the command is issued from an IMS terminal, the recognition character
must be the command recognition character (CRC). The command recognition
character is defined in the IMS SSM PROCLIB member. For more information,
see IMS Customization Guide.
– If the command is issued from a CICS terminal or under the DSN command
processor, the recognition character must be a hyphen.
v Command name. Command names have abbreviations, which are provided in
the command descriptions in this chapter.
4 Command Reference
* A single asterisk as a keyword_value indicates all. For example:
-DISPLAY UTILITY (*)
*keyword_value
An asterisk as the first character of a keyword_value indicates that
a match for the value will be satisfied when all characters following
the * are the same. For example: (*BCD)
keyword*value
An intermediate asterisk indicates that a match for the value will be
satisfied when all characters preceding and all characters following
the asterisk are the same. For example: (ABC*EFG)
keyword_value*
An asterisk as the final character of a keyword_value indicates that
a match will for the value will be satisfied when all characters
preceding the asterisk are the same. For example: (ABC*)
*keyword*_value*
Asterisks used as the first, intermediate and final characters in a
string are also valid. For example: (*BCD*FGH*)
For example, DISPLAY UTILITY (*) displays the status of all utilities;
DISPLAY UTILITY (R2*) displays the status of all utilities whose identifiers
begin with R2.
Do not use more than one parameter after an equal sign, or an error condition will
occur.
Scope of commands
In a data sharing environment, the scope of a command is the breadth of its impact:
Member
Many commands used in a data sharing environment have member scope
because they affect only the DB2 for which they are issued. For example, a
Chapter 2. Commands 5
DISPLAY THREAD command displays only those threads that exist for the
member identified by the command prefix.
Group Other commands have group scope because they affect an object in such a
way that affects all members of the group. For example, a STOP
DATABASE command issued from any member of the group stops that
database for all members of the group.
These commands have either group or member scope, depending on what option
you specify with them:
ARCHIVE LOG (DB2)
All other commands have member scope. The description of each command
includes its scope. For more details on data sharing, see DB2 Data Sharing:
Planning and Administration.
6 Command Reference
For more information about submitting DB2 commands through IFI, see Appendix E
(Volume 2) of DB2 Administration Guide.
To continue a subcommand on the next line while using the DSN processor, type
either a hyphen (-) or a plus sign (+) at the end of the current line. If you use a plus
sign, precede it by at least one blank character to prevent the concatenation of
character strings from line to line. Using a plus sign causes TSO/E to delete leading
delimiters (blanks, commas, tabs, and comments) on the continuation line, and will
reduce the overall size of the command.
Abbreviations
The names of the DSN command and its subcommands cannot be abbreviated. For
compatibility with prior releases of DB2, abbreviations for some keywords are
allowed. Recommendation: To avoid potential problems, avoid abbreviating
keywords.
Description of commands
The commands are divided into these categories:
v The DSN command and its subcommands
v DB2 commands
v IMS commands
v CICS attachment facility commands
v MVS IRLM commands
v TSO CLISTs
Chapter 2. Commands 7
Table 1. DSN command and subcommands (continued)
DSN command
or Refer
Subcommand Function to page
REBIND Updates an application trigger package 248
TRIGGER
PACKAGE
RUN Executes an application program 262
SPUFI Executes the SQL Processor Using File Input 273
* A comment 175
DB2 commands
Environment: The command START DB2 can be issued only from an MVS
console. All other DB2 commands can be issued from:
v An MVS console or MVS application program
v A DSN session
v A DB2I panel
v An IMS terminal
v A CICS terminal
v An application program, using the DB2 instrumentation facility interface (IFI)
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Extended MCS Consoles: The extended MCS console feature of MVS lets an
MVS system have more than 99 consoles. Because DB2 supports extended MCS
consoles, messages returned from a DB2 command are routed to the extended
MCS console that issued the command. For more information on extended MCS
consoles, see Part 4 (Volume 1) of DB2 Administration Guide, and OS/390 MVS
Planning: Operations.
Table 2. DB2 commands
Refer
DB2 command Function to page
-ALTER BUFFERPOOL Alters attributes for the buffer pools 12
-ALTER Alters attributes for the group buffer pools 19
GROUPBUFFERPOOL
-ALTER UTILITY Alters parameter values of the REORG utility 23
-ARCHIVE LOG Enables a site to close a current active log and 26
open the next available log data set
-CANCEL THREAD Cancels processing for specific local or distributed 77
threads
-DISPLAY ARCHIVE Displays information about archive log processing 95
-DISPLAY BUFFERPOOL Displays information about the buffer pools 97
-DISPLAY DATABASE Displays status information about DB2 databases 106
-DISPLAY FUNCTION Displays statistics about external user-defined 121
SPECIFIC functions
-DISPLAY GROUP Displays information about the data sharing group 125
to which a DB2 subsystem belongs
8 Command Reference
Table 2. DB2 commands (continued)
Refer
DB2 command Function to page
-DISPLAY Displays status information about DB2 group buffer 129
GROUPBUFFERPOOL pools
-DISPLAY LOCATION Displays status information about distributed 143
threads
-DISPLAY LOG Displays log information and status of the offload 146
task
-DISPLAY Displays status information about stored 148
PROCEDURE procedures
-DISPLAY RLIMIT Displays status information about the resource limit 152
facility (governor)
-DISPLAY THREAD Displays information about DB2 threads 153
-DISPLAY TRACE Displays information about DB2 traces 165
-DISPLAY UTILITY Displays status information about a DB2 utility 171
-MODIFY TRACE Changes the IFCIDs (trace events) associated with 238
a particular active trace
-RECOVER BSDS Reestablishes dual bootstrap data sets 251
-RECOVER INDOUBT Recovers threads left indoubt 252
-RECOVER Completes back-out processing for units of 255
POSTPONED recovery left incomplete during an earlier restart
-RESET GENERICLU Purges information stored by VTAM in the coupling 257
facility
-RESET INDOUBT Purges information displayed in the indoubt thread 259
report generated by the -DISPLAY THREAD
command
-SET ARCHIVE Controls the allocation of tape units and the 265
deallocation time of the tape units for archive log
processing
-SET LOG Modifies the checkpoint frequency 270
| -SET SYSPARM Changes subsystem parameters online 268
-START DATABASE Makes the specified database available for use 276
-START DB2 Initializes the DB2 subsystem (can be issued only 283
from an MVS console)
-START DDF Starts the distributed data facility 286
-START FUNCTION Activates an external function that is stopped 287
SPECIFIC
-START PROCEDURE Activates the definition of stopped or cached stored 294
procedures
-START RLIMIT Starts the resource limit facility (governor) 297
-START TRACE Initiates DB2 trace activity 299
-STOP DATABASE Makes specified databases unavailable for 310
applications
-STOP DB2 Stops the DB2 subsystem 316
-STOP DDF Stops the distributed data facility 318
Chapter 2. Commands 9
Table 2. DB2 commands (continued)
Refer
DB2 command Function to page
-STOP FUNCTION Stops the acceptance of SQL statements for 321
SPECIFIC specified functions
-STOP PROCEDURE Stops the acceptance of SQL CALL statements for 326
stored procedures
-STOP RLIMIT Stops the resource limit facility (governor) 329
-STOP TRACE Stops trace activity 330
-TERM UTILITY Terminates execution of a utility 335
IMS commands
Environment: Each IMS command can be issued from an IMS terminal.
Table 3. IMS commands
Refer
IMS command Function to page
/CHANGE Resets an indoubt recovery unit 82
/DISPLAY Displays the status of the connection between IMS 92
and the specified subsystem (DB2), or displays the
outstanding recovery units associated with the
specified subsystem (DB2)
/SSR Allows the IMS operator to enter an external 274
subsystem (DB2) command
/START Makes available the connection between IMS and 275
the specified external subsystem (DB2)
/STOP Prevents application programs from accessing the 309
external subsystem’s (DB2’s) resources
/TRACE Allows users to direct and control IMS tracing 338
activities
10 Command Reference
Table 4. CICS attachment facility commands (continued)
CICS
attachment Refer
facility commands Function to page
DSNC MODIFY Modifies the ERRDEST entry in the resource 184
control table (RCT), or modifies the maximum
active thread value associated with a given
transaction or group name
DSNC STOP Stops the CICS attachment facility 186
DSNC STRT Starts the CICS attachment facility 187
TSO CLISTs
Table 6. TSO CLISTs
Refer
CLIST Function to page
DSNH Prepares a program for execution, and executes it 189
if it runs under TSO. Runs under TSO in
foreground or background.
DSNU Generates JCL to execute DB2 utility jobs. Can be
executed directly or by using DB2I. For details on
this command procedure, see DB2 Utility Guide
and Reference.
Chapter 2. Commands 11
-ALTER BUFFERPOOL (DB2)
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS® terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
HPSIZE(integer) VPSEQT(integer) VPPSEQT(integer) VPXPSEQT(integer)
HPSEQT(integer) DWQT(integer) VDWQT(integer1,integer2) CASTOUT( YES )
NO
PGSTEAL ( LRU )
FIFO
Option descriptions
(bpname)
Names the buffer pool to alter.
v 4-KB page buffer pools are named BP0, BP1, ..., BP49.
v 8-KB page buffer pools are named BP8K0, BP8K1, ..., BP8K9.
v 16-KB page buffer pools are named BP16K0, BP16K1, ..., BP16K9.
v 32-KB page buffer pools are named BP32K, BP32K1, ..., BP32K9.
VPSIZE (integer)
Changes the virtual buffer pool size.
12 Command Reference
-ALTER BUFFERPOOL (DB2)
integer specifies the number of buffers to allocate to the active virtual buffer
pool.
integer can range from 0 to 400000 for 4-KB page buffer pools other than BP0.
For BP0, the minimum value is 56. For 8-KB page buffer pools, the range is
from 0 to 200000. For 16-KB page buffer pools, the range is from 0 to 100000.
For 32-KB page buffer pools, the range is from 0 to 50000.
DB2 limits the total VPSIZE for all buffer pools to 1.6 GB. However, the amount
of available real and virtual storage can further limit the amount of buffer pool
storage DB2 can acquire.
If you specify VPSIZE as 0 for an active buffer pool (other than BP0), DB2
quiesces all current database access and update activities for that buffer pool
and then deletes the buffer pool. Subsequent attempts to use table spaces or
indexes that are assigned to that buffer pool fail.
VPTYPE
Specifies the type of virtual buffer pool to be allocated. Changes to the VPTYPE
value apply after DB2 reallocates the buffer pools.
If the specified virtual pool is currently allocated, VPTYPE and VPSIZE are
mutually exclusive. In order to change both the type and size specifications,
follow the procedure in 16.
When DB2 is installed, the default is VPTYPE (PRIMARY). However, when you
issue the ALTER BUFFERPOOL command, you must explicitly specify either
PRIMARY or DATASPACE when the VPTYPE option is used.
# (PRIMARY)
The virtual buffer pool is to be allocated in the DB2 database services
address space.
# (DATASPACE)
The virtual buffer pool is to be allocated in one or more DB2-associated
data spaces.
HPSIZE (integer)
Changes the hiperpool size. If the buffer pool is active at the time the command
is issued, the hiperpool is created, expanded, contracted, or deleted depending
on the new HPSIZE value.
integer specifies the number of buffers for a hiperpool. For 4-KB-page
hiperpools, the acceptable values range from 0 to 2097152. For 8-KB-page
hiperpools, the range is from 0 to 1048576. For 16-KB-page hiperpools, the
range is from 0 to 524288. For 32-KB-page hiperpools, the range is from 0 to
262144.
DB2 limits the total HPSIZE for all buffer pools to 8 GB. However, the amount
of available expanded or real storage can further limit the amount of buffer pool
storage DB2 can acquire. A value of 0 can be specified for all buffer pools.
VPSEQT (integer)
Changes the sequential steal threshold for the virtual buffer pool.
integer specifies the sequential steal threshold for the virtual buffer pool. It is
expressed as a percentage of the total virtual buffer pool size, and valid values
range from 0 to 100. This threshold affects the allocation of buffers in the virtual
buffer pool to page read requests that are part of a sequential access pattern.
This includes pages being prefetched. If the number of buffers containing
sequentially accessed pages exceeds the threshold, a sequential request
Chapter 2. Commands 13
-ALTER BUFFERPOOL (DB2)
attempts to reuse one of those buffers rather than a buffer containing a
non-sequentially accessed page. The initial default value is 80.
When VPSEQT=0, sequentially accessed pages are not kept in the virtual
buffer pool after being released by the accessing agent. Also, prefetch is
disabled.
When VPSEQT=100, DB2 does not prefer reusing sequential buffers over using
non-sequential buffers.
VPPSEQT (integer)
Changes the parallel sequential threshold for the virtual buffer pool. This
threshold determines how much of the virtual buffer pool is used for parallel
processing operations.
integer specifies the parallel sequential threshold for the virtual buffer pool. It is
expressed as a percentage of the sequential steal threshold, and valid values
range from 0 to 100. The initial default value is 50.
When VPPSEQT=0, parallel processing operations are disabled.
VPXPSEQT (integer)
Changes the assisting parallel sequential threshold for the virtual buffer pool.
This threshold determines the portion of the virtual buffer pool that is used for
processing queries that originate on other members of the data sharing group. It
is valid and effective only when DB2 is on a data sharing mode; it is ignored
when DB2 is not on a data sharing mode.
integer specifies the assisting parallel sequential threshold for the virtual buffer
pool. It is expressed as a percentage of the parallel sequential threshold
(VPPSEQT). Whenever the sequential steal threshold or the parallel sequential
threshold is altered, it directly affects the portion of buffer resources dedicated
to “assistant” parallel operations. The valid values range from 0 to 100. The
initial default value is 0.
When VPXPSEQT=0, this bufferpool cannot be used to assist another DB2 with
parallel processing.
HPSEQT (integer)
Changes the hiperpool sequential steal threshold.
integer specifies the sequential steal threshold for the hiperpool. It is expressed
as a percentage of the total hiperpool size, and valid values range from 0 to
100. This threshold affects the allocation of hiperpool buffers when casting out
sequentially accessed pages from the virtual pool. If the number of buffers in
the hiperpool containing sequentially accessed pages exceeds the threshold,
the buffer allocation for a sequentially accessed page attempts to reuse one of
these buffers rather than a buffer containing a non-sequentially accessed page.
The initial default is 80.
When HPSEQT=0, sequentially accessed pages are not cast out to the
hiperpool.
When HPSEQT=100, DB2 does not prefer reusing sequential buffers over using
non-sequential buffers.
DWQT (integer)
Changes the buffer pool’s deferred write threshold.
integer specifies the deferred write threshold for the virtual buffer pool. It is
expressed as a percentage of the total virtual buffer pool size, and valid values
range from 0 to 90. This threshold determines when deferred writes begin,
14 Command Reference
-ALTER BUFFERPOOL (DB2)
based on the number of unavailable (non-stealable) buffers. When the count of
non-stealable buffers exceeds the threshold, deferred writes begin. The initial
default value is 50.
VDWQT (integer1,integer2)
integer1 specifies the vertical deferred write threshold for the virtual buffer pool.
It is expressed as a percentage of the total virtual buffer pool size, and valid
values range from 0 to 90.
This threshold determines when deferred writes begin, based on the number of
updated pages for a given data set. Deferred writes begin for that data set
when the count of updated buffers for a data set exceeds the threshold. This
threshold can be overridden for page sets accessed by DB2 utilities and must
be less than or equal to the value specified for the DWQT option.
The default value is 10. A value of 0 indicates that the deferred write of 32
pages begins when the updated buffer count for the data set reaches 40.
integer2 specifies the vertical deferred write threshold for the virtual buffer pool.
It is expressed as an absolute number of buffers. You can use integer2 when
you want a relatively low threshold value for a large virtual pool, but integer1
cannot provide a fine enough granularity between integer1 values of 0 and 1.
integer2 only applies when integer1 is 0; DB2 ignores a value specified for
integer2 if the value specified for integer1 is non-zero. integer2 can range from
0 to 9999. The default value is 0.
If integer1 is 0 and integer2 is a non-zero value, DB2 uses the value specified
for integer2 to determine the threshold. If both values are 0, then the integer1
value of 0 is used as the threshold.
CASTOUT
Changes the CASTOUT attribute of the hiperspaces used to back the hiperpool.
When DB2 is installed, the default is CASTOUT (YES) for all hiperpools.
However, when you issue the ALTER BUFFERPOOL command, you must
explicitly specify either YES or NO when the CASTOUT option is used.
(YES)
Allows MVS to discard data cached in the hiperpool when a shortage of
expanded storage arises. When data is discarded, hiperspace backing
expanded storage pages is released.
(NO)
Directs MVS to assign a high priority to keeping the data cached in the
hiperpool. Because this could severely limit the availability of expanded
storage to other processes on the system, specify CASTOUT(NO) only for
buffer pools associated with databases for which response time is critical.
PGSTEAL
Specifies the page stealing algorithm DB2 uses for the virtual buffer pool.
When DB2 is installed, the default is PGSTEAL (LRU). However, when you
issue the ALTER BUFFERPOOL command, you must explicitly specify either
LRU or FIFO when the PGSTEAL option is used.
# (LRU)
Specifies the virtual buffer pool buffers should be managed using the least
recently used (LRU) algorithm.
# (FIFO)
Specifies the virtual buffer pool buffers should be managed using the first in
first out (FIFO) algorithm.
Chapter 2. Commands 15
-ALTER BUFFERPOOL (DB2)
Usage notes
The following sections contain additional information about how to use the ALTER
BUFFERPOOL command.
Changing several buffer pool attributes: A failure in modifying one buffer pool
attribute has no effect on other modifications requested in the same command.
When DB2 is restarted, if a hiperpool could not be created, DB2 issues a warning
message indicating the reason. Under this condition, DB2 comes up with only the
virtual bufferpool created. Use ALTER BUFFERPOOL to set the HPSIZE value to 0
to avoid any further messages.
Altering attributes stored in the BSDS: The virtual bufferpool and hiperpool
attributes that are stored in the BSDS cannot be changed off line.
Altering the VPTYPE for a virtual buffer pool: If the virtual pool is currently
allocated and you change the VPTYPE attribute, the VPTYPE specification
becomes effective only at the next allocation of the virtual buffer pool. To alter the
VPTYPE attribute for a buffer pool and have it take effect, use the following
procedure:
1. Issue the ALTER BUFFERPOOL command, specifying a new value for
VPTYPE. If the virtual pool is currently allocated, the new specification takes
effect the next time the buffer pool is allocated. If the buffer pool is currently
allocated, proceed to step 2.
2. If the target buffer pool is not BP0:
a. Issue the following command to deallocate the buffer pool:
-ALTER BUFFERPOOL(bpname) VPSIZE(0)
16 Command Reference
-ALTER BUFFERPOOL (DB2)
b. Issue the following command to redefine the buffer pool with the new type
and new size:
-ALTER BUFFERPOOL(bpname) VPSIZE(newsize) VPTYPE(newtype)
3. If the target buffer pool is BP0:
a. Issue the following command to specify the new type:
-ALTER BUFFERPOOL(0) VPTYPE(newtype)
b. Deallocate BP0 by either issuing the STOP DATABASE command to stop all
table spaces and indexes that are using BP0, or stop DB2.
c. Depending on the action taken in step 3b, issue START DATABASE
commands to start the stopped table spaces and indexes, or restart DB2.
d. Optionally, issue the following command to specify the new size.
-ALTER BUFFERPOOL(BP0) VPSIZE(newsize)
| Converting an active buffer pool to use a data space:When you convert buffer
| pool 0 (BP0) to use a data space, use either one of the following procedures.
| Procedure 1
| 1. Issue ALTER BUFFERPOOL(0) VPTYPE(DATASPACE)
| 2. Issue STOP DB2
| 3. Issue START DB2
| When you convert buffer pools other than BP0, use the following procedure.
| 1. Issue ALTER BUFFERPOOL(x) VPSIZE(0)
| 2. Let all datasets in the buffer pool stop
| 3. Issue ALTER BUFFERPOOL(x) VPTYPE(DATASPACE) VPSIZE(newsize)
Relating VPPSEQT and VPXSEQT: The Table 7 on page 18 explains how the two
parallel sequential thresholds, VPPSEQT for parallel sequential and VPXPSEQT for
assisting parallel sequential threshold, are related. VPXPSEQT is a percentage of
VPPSEQT, which is itself a portion of VPSEQT. Multiply VPXPSEQT by VPPSEQT
to obtain the total amount of the virtual buffer pool that can be used to assist
another DB2 with parallel processing. In addition, VPPSEQT is affected by changing
VPSIZE and VPSEQT; therefore, VPXPSEQT is also affected by VPSIZE and
VPSEQT. For more information on the relationships of the various thresholds and
possible configurations, see Chapter 6 of DB2 Data Sharing: Planning and
Administration.
Chapter 2. Commands 17
-ALTER BUFFERPOOL (DB2)
Table 7. Relationship between VPPSEQT and VPXPSEQT
the percentage of the
virtual buffer pool available
to assist Sysplex query
If VPPSEQT is ... and VPXPSEQT is ... parallelism is...
50 50 25
50 100 50
100 50 50
anything 0 0
0 anything 0
Examples
Example 1: Set the virtual buffer pool and hiperpool for BP0 to 1000 and 10000
buffers, respectively.
-ALTER BUFFERPOOL(BP0) VPSIZE(1000) HPSIZE(10000)
Example 2: Set the sequential steal threshold of the virtual buffer pool for BP0 to
75 percent of the virtual pool size, while disabling caching of sequentially accessed
pages in the hiperpool.
-ALTER BUFFERPOOL(BP0) VPSEQT(75) HPSEQT(0)
Example 3: Set the hiperpool size for BP4 to 10000 buffers and explicitly specify
that cached data in the hiperpool for BP4 can be discarded.
-ALTER BUFFERPOOL(BP4) HPSIZE(10000) CASTOUT(YES)
Example 4: Delete BP1. Be very careful when using this option because when you
specify a 0 size for an active buffer pool, DB2 quiesces all current database access
and fails all subsequent page set open requests.
-ALTER BUFFERPOOL(BP1) VPSIZE(0)
18 Command Reference
-ALTER GROUPBUFFERPOOL (DB2)
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
AUTOREC( YES ) RATIO(ratio) CLASST(integer) GBPOOLT(integer)
NO
GBPCHKPT(integer)
Option descriptions
(gbpname)
Names the DB2 group buffer pool.
v 4-KB group buffer pools are named GBP0, GBP1, ... , GBP49.
v 8-KB group buffer pools are named GBP8K0, GBP8K1, ... , GBP8K9.
v 16-KB group buffer pools are named GBP16K0, GBP16K1, ... , GBP16K9.
v 32-KB group buffer pools are named GBP32K, GBP32K1, ... , GBP32K9.
(structure-name)
Names the backing coupling facility structure for the group buffer pool. The
coupling facility structure name has the following format:
groupname_gbpname
Chapter 2. Commands 19
-ALTER GROUPBUFFERPOOL (DB2)
where groupname is the DB2 data sharing group name and the underscore (_)
separates groupname and gbpname.
GBPCACHE
Specifies whether gbpname is to be used for both caching data and
cross-invalidation, or just for cross-invalidation.
(YES)
gbpname is used for caching data and cross-invalidation.
Any “no data caching” attribute that is specified at either the page set or
group buffer pool level takes precedence over a caching specification. For
more information, see Table 8.
Table 8. Precedence of a no-data-caching specification
Group buffer pool Attribute that takes
specification Page set specification precedence
GBPCACHE(NO) GBPCACHE CHANGED GBPCACHE(NO)
GBPCACHE ALL
GBPCACHE(YES) GBPCACHE NONE GBPCACHE NONE
(NO)
Indicates that gbpname is used only for cross-invalidation. This group buffer
pool contains no data entries. The GBPCACHE option of table spaces or
index spaces that use this group buffer pool is ignored.
AUTOREC
Specifies whether automatic recovery by DB2 takes place when a structure
failure occurs or when the connectivity of all members of the group to the group
buffer pool is lost.
(YES)
Indicates that DB2 is to automatically recover page sets and partitions that
have a status of group buffer pool RECOVER pending (GRECP) and that
have pages on the logical page list.
(NO)
Disables automatic recovery. Enter a START DATABASE command to
recover page sets and partitions that have a status of GRECP or that have
pages on the logical page list.
RATIO (ratio)
Changes the desired ratio in the group buffer pool of the number of directory
entries to the number of data pages; that is, how many directory entries there
are for each data page.
ratio can be a decimal number from 1.0 to 255, inclusive. Any digits after the
first decimal place are ignored; for example, 5.67 is treated as 5.6. In numbers
greater than 25, any digits after the decimal point are ignored; for example,
25.98 is treated as 25. The default is 5.
The actual number of directory entries and data pages that are allocated
depends on the size of the coupling facility structure, which is specified in the
coupling facility policy definitions.
CLASST (integer)
Changes the threshold at which class castout is started. It is expressed as a
percentage of the size of the number of data entries; integer can range from 0
to 90. The default is 10.
20 Command Reference
-ALTER GROUPBUFFERPOOL (DB2)
As an example, CLASST(5) starts class castout when the number of pages in
that class equals 5% of the group buffer pool page capacity.
GBPOOLT (integer)
Changes the threshold at which data in the group buffer pool is cast out to disk.
It is expressed as a percentage of the number of data entries; integer can
range from 0 to 90. The default is 50.
As an example, GBPOOLT(55) casts out data if the number of pages in the
group buffer pool equals 55% of the group buffer pool page capacity.
GBPCHKPT (integer)
Changes the time interval, in minutes, between successive checkpoints of the
group buffer pool. integer can range from 1 to 999999. Unless a value is
explicitly specified for the GBPCHKPT option, the default value is 8 minutes.
The more frequently checkpoints are taken, the less time it takes to recover the
group buffer pool if the coupling facility fails.
Usage notes
Defaults: Issuing the command does not change any option that is not explicitly
specified; the default is to leave the value unchanged. When the command is first
issued for a group buffer pool or a structure, the option defaults are as follows:
Option Value
GBPCACHE YES
RATIO 5
CLASST 10 (%)
GBPOOLT 50 (%)
GBPCHKPT 8 (minutes)
When new values take effect: When you issue the ALTER GROUPBUFFERPOOL
command, some option specifications become effective only at the next allocation of
the group buffer pool. Refer to Table 9 for more information.
Table 9. Changing group buffer pool attributes
Applicable if
Keyword New value takes effect GBPCACHE(NO)?
1
GBPCACHE at next allocation N/A
AUTOREC immediately No
2 3
RATIO at next allocation No
3
CLASST immediately No
3
GBPOOLT immediately No
3
GBPCHKPT immediately No
Chapter 2. Commands 21
-ALTER GROUPBUFFERPOOL (DB2)
Notes:
1. You can use the MVS command SETXCF START,REBUILD to have the change take
effect if the group buffer pool is not duplexed. If the group buffer pool is duplexed and
you want to change to GBPCACHE(NO), first go back to simplex mode and rebuild.
GBPCACHE(NO) is not allowed for duplexed group buffer pools.
2. You can use the MVS command SETXCF START,REBUILD to have the change take
effect if the group buffer pool is not duplexed. If the group buffer pool is duplexed, first go
back to simplex mode and rebuild; then optionally go back to duplex mode. If a group
buffer pool is duplexed, both instances of that duplexed group buffer pool use the same
RATIO value.
3. DB2 issues message DSNB761 when you specify this option for a GBPCACHE(NO)
group buffer pool. These settings only take effect after the GBPCACHE attribute has
been changed to YES.
Examples
Example 1: For group buffer pool 0, change the ratio of directory entries to data
pages to 1 directory entry for every data page. The RATIO specification becomes
effective at the next allocation of the group buffer pool.
-DB1G ALTER GROUPBUFFERPOOL (GBP0) RATIO(1)
Example 2: For group buffer pool 2, change the class castout threshold to 5% and
the group buffer pool castout threshold to 30%. The new values take effect
immediately.
-DB1G ALTER GROUPBUFFERPOOL (GBP2) CLASST(5) GBPOOLT(30)
Example 3: Assume that the DB2 group name is DSNCAT. For group buffer pool 3,
change the class castout threshold to 5%. The new value takes effect immediately.
Because the group name is DSNCAT, the coupling facility structure name is
DSNCAT_GBP3. Also, in the event of a structure failure, the AUTOREC(YES)
option enables DB2 to automatically recover the page sets and partitions that are in
a GRECP status or that have pages on the logical page list.
-DB1G ALTER GROUPBUFFERPOOL (DSNCAT_GBP3) CLASST(5) AUTOREC(YES)
Example 4: For group buffer pool 32K, change the GBP checkpoint frequency to 5
minutes. The new value takes effect immediately. Here, with AUTOREC(NO)
specified, you are in effect taking control of the recovery process rather than DB2 in
the event of a structure failure. You might choose to do this to determine what
pagesets or partitions are in a GRECP status or that have pages on the logical
page list and before entering the START DATABASE command to enable DB2 to
recover the data with the options you specify.
-DB1G ALTER GROUPBUFFERPOOL (GBP32K) GBPCHKPT(5) AUTOREC(NO)
22 Command Reference
-ALTER UTILITY (DB2)
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or a CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the primary or some secondary authorization ID of the
process must be the ID that originally submitted the utility job, or the privilege set of
the process must include one of the following authorities:
v DBMAINT, DBCTRL, or DBADM authority
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands that are issued from an MVS console are not associated with any
secondary authorization IDs.
For users with DBMAINT, DBCTRL, or DBADM authority, the command takes effect
only when a user has sufficient authority over each object that the utility job
accesses.
Syntax
MAXRO( integer ) LONGLOG( CONTINUE ) DELAY( integer )
DEFER TERM
DRAIN
Option descriptions
(utility-id)
Is the utility identifier, or the UID parameter, used when creating the utility job
step.
This job must execute REORG with SHRLEVEL CHANGE or SHRLEVEL
REFERENCE.
Chapter 2. Commands 23
-ALTER UTILITY (DB2)
If utility-id was created by the DSNU CLIST by default, it has the form
tso-userid.control-file-name. For the control file name that is associated with
each utility, see DB2 Utility Guide and Reference.
If utility-id was created by default by the EXEC statement that executed
DSNUTLIB, then this token has the form userid.jobname.
DEADLINE
Specifies the deadline by which the user wants the switch phase of
reorganization to start. If DB2 estimates that the switch phase will not start by
the deadline, DB2 terminates reorganization. The default is the most recently
specified value of DEADLINE.
The pre-switch processing might continue until after the deadline.
(NONE)
Specifies that there is no deadline for the read-only iteration of log
processing.
(timestamp)
Specifies the deadline by which the user wants the switch phase to start
processing. This deadline must not have been reached when ALTER
UTILITY executes. For more information on the format for specifying a
timestamp, see the discussion of data types in DB2 SQL Reference.
MAXRO
Specifies the maximum amount of time that is tolerated for the last iteration of
log processing during reorganization. During that iteration, applications have
read-only access.
The actual execution time of the last iteration can exceed the value specified for
MAXRO.
(integer)
Is the number of seconds. The default is the most recently specified value
of MAXRO.
(DEFER)
Specifies that the log phase is deferred indefinitely.
LONGLOG
Specifies the action that DB2 performs (after sending the LONGLOG message
to the console) if the number of log records that are processed during the next
iteration is not sufficiently lower than the number of log records that were
processed during the previous iterations. The default is the most recently
specified value of LONGLOG.
(CONTINUE)
Specifies that DB2 continues performing reorganization.
(TERM)
Specifies that DB2 terminates reorganization after the delay.
(DRAIN)
Specifies that DB2 drains the write claim class after the delay. The number
of log records, and thus the estimated time, for a future iteration of log
processing will be 0.
DELAY integer
Specifies a lower bound for the interval between the time when REORG sends
the LONGLOG message to the console and the time when REORG performs
the action specified by the LONGLOG parameter.
24 Command Reference
-ALTER UTILITY (DB2)
integer is the number of seconds. The value must be nonnegative. The default
is the most recently specified value of DELAY.
Usage note
REORG can be altered only from the DB2 subsystem on which it is running.
Example
The following example alters the execution of the REORG utility for the utility job
step whose utility identifier is REORGEMP:
-ALTER UTILITY (REORGEMP) REORG MAXRO(240) LONGLOG DRAIN
In this example:
v MAXRO(240) changes the maximum tolerable time for the last iteration of log
processing to 240 seconds (4 minutes).
v LONGLOG DRAIN changes the action that DB2 performs (if reorganization’s
reading of the log is not catching up to applications’ writing of the log quickly
enough) to draining of the write claim class.
v DELAY was not specified and therefore, the example does not change the
existing delay between sending of the LONGLOG message to the console and
performing the action specified by LONGLOG.
v DEADLINE was not specified and the example does not change the existing
deadline (if any) of the last iteration of log processing.
Chapter 2. Commands 25
-ARCHIVE LOG (DB2)
When specified with the option MODE(QUIESCE), the ARCHIVE LOG command
attempts to quiesce (suspend) all DB2 user update activity on the DB2 active log
prior to the offload process. Once a system-wide point of consistency is reached
(that is, when all currently active update users have reached a commit point), the
active log is immediately truncated, and the offload process is initiated. The
resulting point of consistency is captured in the current active log before it is
offloaded. In a data sharing environment, you can create a system-wide point of
consistency only for the entire group.
For further information regarding the ARCHIVE LOG command, see Part 4 (Volume
1) of DB2 Administration Guide.
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
The ARCHIVE LOG command can also be issued from the MVS subsystem
interface (SSI) to enable automated scheduling systems and other programs to
execute the command via supervisor call instruction (SVC) 34.
Authorization
To execute this command, the privilege set of this process must include one of the
following:
v ARCHIVE privilege
v Installation SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
26 Command Reference
-ARCHIVE LOG (DB2)
Syntax
SCOPE(MEMBER)
ARCHIVE LOG
SCOPE(GROUP)
MODE(QUIESCE)
TIME(nnn) NO
WAIT( )
YES
CANCEL OFFLOAD
Option descriptions
SCOPE
Specifies whether the command applies to the entire data sharing group or to a
single member only. The SCOPE option is valid only in a data sharing
environment; the option is ignored in a non-data-sharing environment. SCOPE
cannot be specified if MODE(QUIESCE) is specified; the two keywords are
mutually exclusive.
(MEMBER)
Initiates offload processing only for the member from which the command is
issued. User update activity is not suspended. If that member, or the entire
group, is already archiving, the command fails. This is the default, except
when MODE(QUIESCE) is specified.
(GROUP)
Initiates offload processing for every member of the DB2 group. User
update activity is not suspended. If any member of the group, or the entire
group, is already archiving, the command fails.
MODE(QUIESCE)
Halts all new update activity by the DB2 subsystem for a specified period of
time and attempts to bring all existing users to a point of consistency after a
commit or rollback. When a point of consistency is reached and captured in the
current active log data set, the current active log data set is truncated, and
another log data set in the inventory becomes current. offload processing then
begins with the oldest active log data set and ends with the active log data set
that was truncated.
In a data sharing environment, before archiving logs of any member, the option
quiesces all active members of a data sharing group. The option also ensures
that each inactive member had successfully quiesced its update activity and
resolved any indoubt units of recovery (URs) before the inactive subsystem
completed normal termination. If any DB2 is in a failed state, fails during
quiesce processing, or is stopped with outstanding URs, the ARCHIVE LOG
command fails, and the remaining active members allow update activity to
proceed.
If there are no indoubt URs left on all quiesced members, active or inactive, the
archive operation can continue for active members in the group. Thus, you can
archive logs of a data sharing group normally without forcing all members to be
active. The current logs of inactive members are truncated and offloaded after
they start up.
Chapter 2. Commands 27
-ARCHIVE LOG (DB2)
If a system-wide point of consistency cannot be reached during the quiesce
period, which is a length of time you can control, execution of the ARCHIVE
LOG command fails and an error message is issued. In a data sharing
environment, the maximum time period applies for the whole group, and if any
DB2 cannot quiesce within the time allowed, the command fails.
If you do not use the TIME option to specify the quiesce time period, the default
is the value specified in the field QUIESCE PERIOD of installation panel
DSNTIPA.
If there is no update activity on DB2 data when the command ARCHIVE LOG
MODE(QUIESCE) is issued, the active log is truncated and offloaded
immediately.
TIME(nnn)
Specifies the maximum length of time, in seconds, in which the DB2
subsystem is allowed to attempt a full system quiesce.
The default is the period specified in the field QUIESCE PERIOD of
installation panel DSNTIPA. See Part 2 of DB2 Installation Guide for more
information on this field.
nnn can range from 001 to 999 seconds. You must allocate an appropriate
time period for the quiesce processing or the following events can occur:
v The quiesce processing can expire before a full quiesce is accomplished.
v An unnecessary DB2 lock contention can be imposed.
v A time-out can occur.
This option is valid only when used in conjunction with the option
MODE(QUIESCE).
WAIT
Specifies whether the DB2 subsystem should wait until the quiesce
processing has completed before returning control to the invoking console
or program, or return control when the quiesce processing begins.
This option is valid only when used in conjunction with the option
MODE(QUIESCE).
(YES)
Specifies that the quiesce processing must complete before returning
control to the invoking console or program.
If WAIT(YES) is used, quiesce processing is synchronous to the user;
that is, additional DB2 commands can be issued, but they are not
processed by the DB2 command processor until the ARCHIVE LOG
command is complete.
(NO)
Specifies that control must be returned to the invoking program when
the quiesce processing begins.
If WAIT(NO) is used, quiesce processing is asynchronous to the user;
that is, you can enter additional DB2 commands once the ARCHIVE
LOG command returns control to you.
CANCEL OFFLOAD
Cancels any offloading currently in progress and restarts the offload process,
beginning with the oldest active log data set that has not been offloaded and
proceeding through all active log data sets that need offloading. Any suspended
offload operations are restarted.
28 Command Reference
-ARCHIVE LOG (DB2)
Usage notes
Remote site recovery: The ARCHIVE LOG command is very useful when
performing a DB2 backup in preparation for a remote site recovery. For example,
the command allows the DB2 subsystem to quiesce all users after a commit point,
and capture the resulting point of consistency in the current active log before the
archive is taken. Therefore, when the archive log is used with the most current
image copy (during an offsite recovery), the number of data inconsistencies will be
minimized. See Part 4 (Volume 1) of DB2 Administration Guide for additional
information on backup and recovery.
Available active log space: ARCHIVE LOG cannot be used when the current
active log is the last available active log data set because of the following reasons:
v All available active log space would be used.
v The DB2 subsystem would halt processing until an offload is complete.
ARCHIVE LOG with the option MODE(QUIESCE) is not allowed when a STOP DB2
MODE(FORCE) or STOP DB2 MODE(QUIESCE) is in progress. If an attempt is
made to execute the ARCHIVE LOG command under these circumstances, error
message DSNJ315I or DSNJ316I is issued.
If the system was not fully quiesced (as determined by the number of users which
could not be quiesced), error message DSNJ317I is issued and ARCHIVE LOG
command processing is terminated. The current active log data set is not truncated
and switched to the next available active log data set and the archive log is not
created.
Demand on DB2 resources: Using the option MODE(QUIESCE) during prime time
or during a period in which time is critical causes a significant disruption in the
availability of DB2 for all users of DB2 resources.
Chapter 2. Commands 29
-ARCHIVE LOG (DB2)
Quiescing members of a data sharing group: It is not possible to quiesce a
single member of a data sharing group. When MODE(QUIESCE) is specified,
SCOPE(GROUP) is assumed.
Examples
Example 1: Truncate the current active log data sets and initiate an asynchronous
job to offload the truncated data sets. No quiesce processing occurs.
-ARCHIVE LOG
Example 2: Initiate a quiesce period. If all DB2 update activity is stopped within this
period, truncate the current active log data set and switch to the next available
active log data set. Let the value in the field QUIESCE PERIOD of installation panel
DSNTIPA determine the length of the quiesce period. The MODE(QUIESCE)
processing is asynchronous.
If the DB2 subsystem can successfully block all update activity before the quiesce
period ends, it proceeds to the next processing step. If the quiesce time period is
insufficient to successfully quiesce the DB2 subsystem, the active log data sets are
not truncated and the archive does not occur.
-ARCHIVE LOG MODE(QUIESCE)
Example 3: Initiate a quiesce period. If all DB2 update activity is stopped within this
period, truncate the current active log data set and switch to the next available
active log data set. The maximum length of the quiesce processing period is seven
minutes (420 seconds) and the processing is synchronous for the entire seven
minutes.
If the DB2 subsystem can successfully block all update activity before the quiesce
period ends, it proceeds to the next processing step. If the quiesce time period is
insufficient to successfully quiesce the DB2 subsystem, the active log data sets are
not truncated and the archive does not occur.
-ARCHIVE LOG MODE(QUIESCE) WAIT(YES) TIME(420)
Example 4: In a data sharing environment, initiate a quiesce period for all members
of the data sharing group. If all DB2 update activity is stopped within this period,
truncate the current active log data set and switch to the next available active log
data set. Specify a quiesce time period of 10 minutes (600 seconds) to override the
value in the field QUIESCE PERIOD of installation panel DSNTIPA for member
DB1G. If the update activity has not quiesced after the 10 minute quiesce period,
the command fails and new update activity is allowed to proceed.
-DB1G ARCHIVE LOG MODE(QUIESCE) TIME(600)
Example 5: In a data sharing environment, truncate the active log data sets for
group member DB2G and initiate an asynchronous job to offload the truncated data
sets, without any quiesce processing. In this example, SCOPE(MEMBER) is used
by default.
-DB2G ARCHIVE LOG
30 Command Reference
-ARCHIVE LOG (DB2)
Example 6: In a data sharing environment, truncate the data sets for all members
of the data sharing group and initiate an asynchronous job to offload the truncated
data sets, without any quiesce processing.
-DB2G ARCHIVE LOG SCOPE(GROUP)
Chapter 2. Commands 31
BIND PACKAGE (DSN)
Environment
You can use BIND PACKAGE from DB2I, or from a DSN session under TSO that
runs in either the foreground or background.
Authorization
The package owner must have authorization to execute all statements embedded in
the package for BIND PACKAGE to build a package without producing error
messages. (The SYSADM authority includes this authorization.) For
VALIDATE(BIND), DB2 verifies the authorization at bind time. For VALIDATE(RUN),
DB2 verifies the authorization initially at bind time, but if the authorization check
fails, DB2 rechecks it at run time.
32 Command Reference
BIND PACKAGE (DSN)
Table 10. Summary of privileges needed for BIND PACKAGE options
Bind option Installation panel field Authorization required to run BIND
BIND NEW PACKAGE PACKAGE
ADD, using the default owner or BINDADD The primary authorization ID (default
primary authorization ID owner) must have one of the following
to add a new package or new version
of an existing package to a collection:
v The BINDADD system privilege and
either the CREATE IN privilege or
PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
BIND The primary authorization ID (default
owner) must have one of the following
to add a new package or a new
version of an existing package to a
collection:
v The BINDADD system privilege and
either the CREATE IN privilege or
PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
v PACKADM authority on the
collection or on all collections
v The BIND package privilege (can
only add a new version of an
existing package)
ADD, specifying an OWNER other BINDADD If the binder does not have SYSADM
than the primary authorization ID (1) or SYSCTRL authority, the
authorization ID of the OWNER must
have one of the following to add a
new package or new version of an
existing package to a collection:
v The BINDADD system privilege and
either the CREATE IN privilege or
PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
BIND If the binder does not have SYSADM
or SYSCTRL authority, the
authorization ID of the OWNER must
have one of the following to add a
new package or new version of an
existing package to a collection:
v The BINDADD system privilege and
either the CREATE IN privilege or
PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
v PACKADM authority on the
collection or on all collections
v The BIND package privilege (can
only add a new version of an
existing package)
Chapter 2. Commands 33
BIND PACKAGE (DSN)
Table 10. Summary of privileges needed for BIND PACKAGE options (continued)
Bind option Installation panel field Authorization required to run BIND
BIND NEW PACKAGE PACKAGE
REPLACE, using the default owner or BINDADD or BIND Primary authorization ID must have
primary authorization ID one of the following:
v Ownership of the package
v BIND privilege on the package
v PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
REPLACE, specifying an OWNER BINDADD or BIND If the binder does not have SYSADM
other than the primary authorization ID or SYSCTRL authority, the
(1)
authorization ID of the OWNER must
have one of the following:
v BIND privilege on the package
v PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
COPY BINDADD or BIND The primary or secondary
authorization ID of the binder or
OWNER must have one of the
following on the package being
copied:
v Ownership of the package
v COPY privilege on the package
v BINDAGENT privilege from the
owner of the package
v PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
Notes:
1. If any of the authorization IDs of the process has the SYSADM authority or
SYSCTRL authority, OWNER authorization-id can be any value. If any of the
authorization IDs has the BINDAGENT privilege granted from the owner, then
authorization-id can specify the grantor as OWNER. Otherwise, the OWNER
authorization-id must be one of the primary or secondary authorization IDs of
the binder.
34 Command Reference
BIND PACKAGE (DSN)
Syntax
enable-block
QUALIFIER(qualifier-name)
MEMBER(dbrm-member-name)
LIBRARY(dbrm-pds-name)
COPY(collection-id.package-id)
COPYVER(version-id) COMPOSITE
OPTIONS( COMMAND )
DEFER(PREPARE) ACTION (REPLACE)
NODEFER(PREPARE) REPLVER(version-id)
(ADD)
YES DBPROTOCOL ( DRDA ) 1
CURRENTDATA( NO ) PRIVATE DEGREE( ANY )
DYNAMICRULES( RUN ) ENCODING( ASCII ) NO
BIND EBCDIC EXPLAIN( YES )
DEFINEBIND UNICODE
DEFINERUN ccsid
INVOKEBIND
INVOKERUN
I IMMEDWRITE( NO ) ISOLATION( RR )
FLAG( W ) PH1 RS
E YES CS
C UR
NC
NOREOPT(VARS)
NO REOPT(VARS)
KEEPDYNAMIC( YES )
OPTHINT ( ’hint-id’ ) , RELEASE( COMMIT )
DEALLOCATE
PATH( schema-name )
USER
NOPACKAGE RUN
SQLERROR( CONTINUE ) VALIDATE( BIND )
Chapter 2. Commands 35
BIND PACKAGE (DSN)
enable-block:
ENABLE(*)
,
ENABLE ( BATCH )
DISABLE DLIBATCH ,
DB2CALL
CICS DLIBATCH( connection-name )
IMS ,
IMSBMP
IMSMPP CICS( applid )
REMOTE ,
RRSAF
IMSBMP( imsid )
,
IMSMPP( imsid )
,
REMOTE( location-name )
<luname>
Option descriptions
For descriptions of the options shown in the syntax diagram, see “Options of BIND
and REBIND for PLAN, PACKAGE, and TRIGGER PACKAGE” on page 44.
Examples
Example 1: Replace version APRIL_VERSION of package TEST.DSN8BC71 at
local location USIBMSTODB22 with another version of the package. The new
version (or it could be the same) is in the DBRM DSN8BC71. If the DBRM contains
no version ID, the version ID of the package defaults to the empty string. The
package runs only from the TSO BATCH environment, and from the CICS
environment if the connection ID is CON1. The name PRODUCTN qualifies all
unqualified table, view, alias and index names.
BIND PACKAGE (USIBMSTODB22.TEST) -
MEMBER (DSN8BC71) -
ACTION (REPLACE) REPLVER (APRIL_VERSION) -
QUALIFIER (PRODUCTN) -
ENABLE (BATCH, CICS) CICS (CON1)
Assume that a supervisor routinely executes SQL statements using SPUFI to check
the status of parts as they go through the assembly process and to update a table
with the results of her inspection. She does not need to know the exact status of
the parts; a small margin of error is acceptable.
36 Command Reference
BIND PACKAGE (DSN)
The supervisor queries the status of the parts from a production table called
ASSEMBLY-STATUS and makes the updates in a non-production table called
REPORTS. She uses the SPUFI option AUTOCOMMIT NO and has the habit of
leaving data on the screen while she performs other tasks.
Chapter 2. Commands 37
BIND PLAN (DSN)
Environment
You can use BIND PLAN through DB2I, or from a DSN session under TSO that
runs in either the foreground or background.
Authorization
The plan owner must have authorization to execute all SQL statements embedded
in the plan1 for BIND PLAN to build a plan without producing error messages. (The
SYSADM authority includes this authorization.) For VALIDATE(BIND), DB2 verifies
the authorization at bind time. For VALIDATE(RUN), DB2 verifies the authorization
initially at bind time, but if the authorization check fails, DB2 rechecks it at run time.
Table 11 explains the authorization required to run BIND PLAN, depending on the
options specified.
Table 11. Summary of privileges needed for BIND PLAN options
Option Authorization required to run BIND PLAN
ADD, using the Primary authorization ID (default owner) must have one of the
default owner or following:
primary v BINDADD privilege
authorization ID v SYSADM or SYSCTRL authority
ADD, specifying an If the binder does not have SYSADM or SYSCTRL authority, the
OWNER other than authorization ID of the new OWNER must have one of the following:
the primary v BINDADD privilege
authorization ID v SYSADM or SYSCTRL authority
1. This excludes statements included in DBRMs that are bound to packages included in the package list of the plan.
38 Command Reference
BIND PLAN (DSN)
Table 11. Summary of privileges needed for BIND PLAN options (continued)
Option Authorization required to run BIND PLAN
REPLACE, If the binder does not have SYSADM or SYSCTRL authority, the
specifying an authorization ID of the OWNER must have one of the following:
OWNER other than v Ownership of the plan
the primary v BIND privilege on the plan
authorization ID v SYSADM or SYSCTRL authority
For additional information on the required authorization to execute BIND PLAN see
Part 5 (Volume 2) of DB2 Administration Guide.
Chapter 2. Commands 39
BIND PLAN (DSN)
Syntax
BIND
PLAN(plan-name) OWNER(authorization-id) QUALIFIER(qualifier-name)
NODEFER(PREPARE)
enable-block member-block
DEFER(PREPARE) USE
ACQUIRE( ALLOCATE )
( REPLACE ) CACHESIZE(decimal-value)
RETAIN
ACTION (ADD)
YES CURRENTSERVER(location-name) DBPROTOCOL ( DRDA )
CURRENTDATA( NO ) PRIVATE
1 EXPLICIT RUN
DEGREE( ANY ) DISCONNECT( AUTOMATIC ) DYNAMICRULES( BIND )
CONDITIONAL
ENCODING( ASCII ) NO I
EBCDIC EXPLAIN( YES ) FLAG( W )
UNICODE E
ccsid C
IMMEDWRITE( NO ) ISOLATION( RR ) NO
PH1 RS KEEPDYNAMIC( YES )
YES CS
UR
NOREOPT(VARS)
REOPT(VARS) OPTHINT ( ’hint-id’ ) ,
PATH( schema-name )
USER
COMMIT DB2 RUN
RELEASE( DEALLOCATE ) SQLRULES( STD ) VALIDATE( BIND )
40 Command Reference
BIND PLAN (DSN)
enable-block:
ENABLE(*)
, ,
ENABLE ( BATCH )
DISABLE DLIBATCH ,
DB2CALL
CICS DLIBATCH( connection-name )
IMS ,
IMSBMP
IMSMPP CICS( applid )
RRSAF ,
IMSBMP( imsid )
,
IMSMPP( imsid )
member-block:
MEMBER( dbrm-member-name )
,
LIBRARY( dbrm-pds-name )
,
Option descriptions
For descriptions of the options shown in the syntax diagram, see “Options of BIND
and REBIND for PLAN, PACKAGE, and TRIGGER PACKAGE” on page 44.
Examples
Example 1: This subcommand creates a new plan called IMSONLY. The SQL
statements for the plan are in the DBRM member DSN8BC71. An ISOLATION level
of cursor stability (CS) provides maximum concurrency when you run the plan, and
protects database values only while the program uses them. DEPTM92 owns the
plan, but PRODUCTN qualifies any unqualified table, view, index, and alias names
referenced in the DBRM.
A cache size of 0 indicates that users will not run the plan repeatedly. Caching the
names of users authorized to run the plan helps only when the same user runs the
Chapter 2. Commands 41
BIND PLAN (DSN)
plan repeatedly while it is in the EDM pool. Since this is not the case with this plan,
there is no need to reserve space in the EDM pool for a cache that the plan does
not use.
The option ENABLE(IMS) runs the plan only from an IMS environment (DLI Batch,
BMP and MPP). If you attempt to run the plan from another environment, such as
TSO Batch, the plan allocation fails.
BIND PLAN(IMSONLY) -
MEMBER(DSN8BC71) -
ACTION(ADD) -
ISOLATION(CS) -
OWNER(DEPTM92) -
QUALIFIER(PRODUCTN) -
CACHESIZE -
ENABLE(IMS)
To allow other users having only the EXECUTE privilege on a plan to run both the
embedded and dynamic SQL statements, you must bind that plan with the option
DYNAMICRULES(BIND). When DYNAMICRULES(BIND) is in effect for plan
IMSONLY:
v A single authorization ID, the authorization ID for DEPTM92, is used for
authorization checking of both the embedded and dynamic SQL statements in the
DBRM.
v PRODUCTN is the implicit qualifier of unqualified object names referenced in
both the embedded and dynamic SQL statements in the DBRM.
Example 3: This subcommand creates a new plan called CICSONLY. The plan
specifies an ISOLATION level of cursor stability (CS). DEPTM12 owns the plan, but
TESTSYS qualifies any unqualified table, view, index, and alias names referenced
in the DBRM. A cache size of 0 indicates that users will not run the plan repeatedly.
The option ENABLE(CICS) CICS(CON1) runs the plan only from CICS VTAM®
node CON1 which is specified in the APPLID parameter of the CICS SIT table. If
you attempt to run the plan from another environment or from another CICS VTAM
note, the run attempt fails.
42 Command Reference
BIND PLAN (DSN)
BIND PLAN(CICSONLY) -
MEMBER(DSN8BC71) -
ACTION(ADD) -
ISOLATION(CS) -
OWNER(DEPTM12) -
QUALIFIER(TESTSYS) -
CACHESIZE(0) -
ENABLE(CICS) CICS(CON1)
Chapter 2. Commands 43
BIND PLAN (DSN)
Defaults: The default for an option is the value used if you omit the entire option.
A default of plan value for BIND PACKAGE means that the default is the same
as the value determined during the bind or rebind of the plan to which the
package is appended at run time.
A default of existing value for REBIND PLAN or REBIND PACKAGE means that
the default is the value that was determined during the previous bind or rebind
of the plan or package you are rebinding.
For all other cases, the option descriptions note the specific defaults, which DB2
assigns at bind time. If a specific default value exists, that value is underlined.
Catalog records: The DB2 catalog records information about plans and packages,
chiefly in the tables SYSIBM.SYSPLAN and SYSIBM.SYSPACKAGE. The
descriptions of where the options record information omit the constant qualifier,
SYSIBM, of those table names.
Determines whether to acquire resources for DBRMs specified in the MEMBER list
when the application first accesses them or when the plan is allocated. Local or
remote packages associated with the plan acquire their resources when the
application first accesses them.
(USE)
Acquires table space locks only when the application program bound to the plan
first uses them.
(ALLOCATE)
Acquires all table space locks when the plan is allocated. The value has no
effect on dynamic SQL statements, which always use ACQUIRE(USE).
If you use ACQUIRE(ALLOCATE), you must also use
RELEASE(DEALLOCATE). ACQUIRE(ALLOCATE) can increase the plan size,
because additional items become resident in the plan.
Defaults:
Process
Default value
BIND PLAN
USE
BIND PACKAGE
N/A
REBIND PLAN
existing value
REBIND PACKAGE
N/A
44 Command Reference
BIND PLAN (DSN)
There is no ACQUIRE option for packages. A package always acquires resources
when it first uses them, as if you specified ACQUIRE(USE). See Part 5 (Volume 2)
of DB2 Administration Guide.
Determines whether the object (plan or package) replaces an existing object with
the same name or is new.
(REPLACE)
The object replaces an existing one with the same identifier, and a new entry
replaces the old one in the catalog table SYSPLAN or SYSPACKAGE. If no
object with the given identifier already exists, the bind process creates the new
object and a new entry.
The authorization ID designated explicitly or implicitly by the option OWNER
becomes the owner of the new object. If that authorization ID is not the
previous owner, all grants of privileges for the object that the previous owner
issued change to name the new owner as the grantor.
If the bind fails, the old object and its entry remain.
For BIND PACKAGE: You cannot use REPLACE with a remote package bound
with either of the options ENABLE or DISABLE. The attempt causes the bind to
fail.
REPLVER(version-id) (For BIND PACKAGE only)
Replaces a specific version of the package, identified by version-id. If the
package with the specified version-id does not exist, the bind fails.
The default for version-id comes from the DBRM if you use the MEMBER
option on BIND, or from the COPYVER option if you use the COPY option.
RETAIN (For BIND PLAN only)
Preserves EXECUTE privileges when you replace the plan. If ownership of
the plan changes, the new owner grants the privileges BIND and EXECUTE
to the previous owner.
RETAIN is not the default. If you do not specify RETAIN, everyone but the
plan owner loses the EXECUTE privilege (but not the BIND privilege). If
plan ownership changes, the new owner grants the BIND privilege to the
previous owner.
(ADD)
Adds a new object, but does not replace an existing one. If the object name
Chapter 2. Commands 45
BIND PLAN (DSN)
already exists in the catalog, the bind fails. If the bind fails for any reason, the
bind process does not produce a new package or plan and makes no entry in
the catalog.
Defaults:
Process
Default value
BIND PLAN
REPLACE
BIND PACKAGE
REPLACE
REBIND PLAN
N/A
REBIND PACKAGE
N/A
CACHESIZE (value of field PLAN AUTH CACHE) On: BIND and REBIND PLAN
(decimal-value)
Determines the size (in bytes) of the authorization cache acquired in the EDM pool
for the plan. At run time, the authorization cache stores user IDs authorized to run.
Consulting the cache can avoid a catalog lookup for checking authorization to run
the plan.
decimal-value
The size of the cache can range from 0 to 4096. Nonzero values that are not
multiples of 256 round to the next highest multiple of 256. CACHESIZE(0)
specifies creating no cache when the plan runs.
Defaults:
Process
Default value
BIND PLAN
Value of field PLAN AUTH CACHE on installation panel DSNTIPP, which
has a default of 0
46 Command Reference
BIND PLAN (DSN)
BIND PACKAGE
N/A
REBIND PLAN
Existing value
REBIND PACKAGE
N/A
For additional information on determining an optimal cache size, see Part 5 of DB2
Application Programming and SQL Guide.
Determines that you are copying an existing package and names that package.
Copying the package recalculates the access paths in the copy.
To create a remote copy, this option copies SQL statements from a package at your
local server. Therefore, you must hold the COPY privilege or its equivalent at the
local server.
collection-id
The name of the collection that contains the package to copy, as listed in
column COLLID of catalog table SYSPACKAGE.
package-id
The name of the package to copy, as listed in column NAME of catalog table
SYSPACKAGE.
COPYVER(version-id)
Determines the version of the package to copy. The default for version-id is the
empty string.
Restrictions:
v collection-id.package-id must identify a package on the local server.
v You cannot copy to a package in the same collection. If you make the copy on
the local server, collection-id. on the COPY option must not name the collection
used on the PACKAGE option.
Defaults:
Process
Default value
BIND PLAN
N/A
BIND PACKAGE
None
REBIND PLAN
N/A
REBIND PACKAGE
N/A
COPY has no default. If you do not use COPY, you must use MEMBER. You cannot
use both options.
Chapter 2. Commands 47
BIND PLAN (DSN)
The option values of the package copied (except the values of ENABLE, DISABLE,
OWNER, and QUALIFIER) become the defaults for binding the new package. You
can override a default by choosing a new value for an option on the BIND
PACKAGE command.
Copy packages to remote servers: To copy and bind packages from DB2 Version
7 to some other server that does not support all the new BIND options in Version 7,
use the new OPTIONS(COMMAND) option on BIND PACKAGE COPY. Any options
you do not explicitly specify on the BIND PACKAGE subcommand are set to the
server’s defaults. Using this option can prevent bind errors when you bind and copy
packages to servers other than DB2 Version 7.
Determines whether to require data currency for read-only and ambiguous cursors
when the isolation level of cursor stability is in effect. It also determines whether
block fetching can be used for distributed, ambiguous cursors.
For more information about updating the current row of a cursor, block fetching, and
data currency, see Part 4 of DB2 Application Programming and SQL Guide.
(YES) Specifies that currency is required for read-only and ambiguous cursors.
DB2 acquires page or row locks to ensure data currency. Block fetching for
distributed, ambiguous cursors is inhibited.
(NO) Specifies that currency is not required for read-only and ambiguous cursors.
Block fetching for distributed, ambiguous cursors is allowed.
If your application attempts to dynamically prepare and execute a DELETE
WHERE CURRENT OF statement against an ambiguous cursor, after that
cursor is opened, use of CURRENTDATA(NO) is not recommended. You
receive a negative SQLCODE if your application attempts a DELETE
WHERE CURRENT OF statement for any of the following cursors:
v A cursor that is using block fetching
v A cursor that is using query parallelism
v A cursor that is positioned on a row that is modified by this or another
application process
Restriction for remote rebinds: You cannot use CURRENTDATA when rebinding
a package at a remote server. To change the value of CURRENTDATA, you can:
v Issue BIND REPLACE, remotely or locally.
v Free the package and issue BIND ADD, remotely or locally.
v Rebind the package locally at the location where the package resides.
Defaults:
Process
Default value
BIND PLAN
YES
BIND PACKAGE
YES
48 Command Reference
BIND PLAN (DSN)
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
Determines the location to connect to before running the plan. The column
CURRENTSERVER in catalog table SYSPLAN records the value of location-name.
The special register CURRENT SERVER also receives that value at the server
when the plan is allocated. When the plan runs, the requester implicitly uses a type
1 CONNECT statement to that location.
You should use CURRENTSERVER to cause a local application to use data from a
remote server without changing the application. Avoid using CURRENTSERVER
with applications that contain explicit CONNECT statements. The implicit type 1
CONNECT statement that is used by CURRENTSERVER causes any explicit
CONNECT statement issued in the application to be type 1, even if the application
was precompiled with the default type 2.
location-name
The name of the location to connect to. The catalog table SYSIBM.LOCATIONS
must contain this name. If the table does not exist, if the table does not contain
the DBMS, or if there are no packages at that location, warning messages
occur.
Defaults:
Process
Default value
BIND PLAN
Local DBMS (regardless of the name of the local location)
BIND PACKAGE
N/A
REBIND PLAN
Existing value
REBIND PACKAGE
N/A
Specifies which protocol to use when connecting to a remote site that is identified
by a three-part name statement.
Chapter 2. Commands 49
BIND PLAN (DSN)
For DRDA, a package must be bound to each remote site that is referenced by a
three-part name statement. Specify DRDA® to inform DB2 that the three-part name
statements in the plan or package are to be converted to DRDA protocol.
If you specify an option on the BIND PACKAGE command, DB2 uses that remote
access method for the package statements, regardless of the BIND PLAN option.
For remote bind, the default is the system default at the remote site.
If you specify an option on the BIND PLAN statement, that information is stored in
table SYSPLAN.
(DRDA)
DBPROTOCOL DRDA is passed on BIND PACKAGE, BIND PLAN, REBIND
PACKAGE, or REBIND PLAN invocation.
(PRIVATE)
DBPROTOCOL PRIVATE is passed on BIND PACKAGE, BIND PLAN, REBIND
PACKAGE, or REBIND PLAN invocation.
Defaults:
Process
Default value
BIND PLAN
DRDA
BIND PACKAGE
System default
REBIND PLAN
Value that was specified the last time the plan was bound
REBIND PACKAGE
Value that was specified the last time the package was bound
Determines whether to defer preparation for dynamic SQL statements that refer to
remote objects, or to prepare them immediately. If you defer preparation, the
dynamic statement prepares when DB2 first encounters a statement of the type
EXECUTE, OPEN, or DESCRIBE that refers to the dynamic statement.
50 Command Reference
BIND PLAN (DSN)
DEFER(PREPARE) and distributed processing: To improve performance,
consider using DEFER(PREPARE) when binding dynamic or static SQL for DB2
private protocol access and when binding dynamic SQL for DRDA access. Specify
the bind option DEFER(PREPARE) instead of NODEFER(PREPARE). DB2 does
not prepare the dynamic SQL statement until that statement executes. This reduces
network traffic, which improves the performance of the dynamic SQL statement.
Defaults:
Process
Default value
BIND PLAN
NODEFER
BIND PACKAGE
Plan value
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
For plans, the value of DEGREE applies only to the DBRMs bound directly to the
plan (named in the MEMBER option on BIND PLAN), and has no affect on PKLIST
names. The value has no effect on dynamic SQL statements, which use the value
of the special register CURRENT DEGREE. The value of the special register can
be changed by executing the SET CURRENT DEGREE statement.
(1) Prohibits parallel processing.
(ANY) Allows parallel processing.
Defaults:
Process
Default value
Chapter 2. Commands 51
BIND PLAN (DSN)
BIND PLAN
1
BIND PACKAGE
1
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
Defaults:
Process
Default value
BIND PLAN
EXPLICIT
BIND PACKAGE
N/A
REBIND PLAN
Existing value
REBIND PACKAGE
N/A
Determines what values apply at run time for the following dynamic SQL attributes:
v The authorization ID that is used to check authorization
v The qualifier that is used for unqualified objects
v The source for application programming options that DB2 uses to parse and
semantically verify dynamic SQL statements
52 Command Reference
BIND PLAN (DSN)
v Whether dynamic SQL statements can include GRANT, REVOKE, ALTER,
CREATE, DROP, and RENAME statements
Chapter 2. Commands 53
BIND PLAN (DSN)
When the package is run as or runs under a stored procedure or
user-defined function package, DB2 processes dynamic SQL statements
using define behavior, which consists of the following attribute values:
v DB2 uses the authorization ID of the user-defined function or stored
procedure owner for authorization checking of dynamic SQL statements
in the application package.
v The default qualifier for unqualified objects is the user-defined function or
stored procedure owner.
v The attribute values that are described in “Common attribute values for
bind, define, and invoke behaviors” on page 55.
54 Command Reference
BIND PLAN (DSN)
Common attribute values for bind, define, and invoke behavior: The following
attribute values apply to dynamic SQL statements in plans or packages that have
bind, define, or invoke behavior:
v You can execute the statement SET CURRENT SQLID in a package or plan that
is bound with any DYNAMICRULES value. However, DB2 does not use the value
of CURRENT SQLID as the authorization ID for dynamic SQL statements.
DB2 always uses the value of CURRENT SQLID as the qualifier for the
EXPLAIN output PLAN_TABLE.
v If the value of installation option USE FOR DYNAMICRULES is YES, DB2 uses
the application programming default values that were specified during installation
to parse and semantically verify dynamic SQL statements. If the value of USE for
DYNAMICRULES is NO, DB2 uses the precompiler options to parse and
semantically verify dynamic SQL statements. For a list of the application
programming defaults that the USE FOR DYNAMICRULES option affects, see
Part 5 of DB2 Application Programming and SQL Guide.
v GRANT, REVOKE, CREATE, ALTER, DROP, and RENAME statements cannot
be executed dynamically.
Remote DB2 servers: For a package that uses DRDA access, DB2 sends the
DYNAMICRULES option to the DB2 server at bind time.
For a plan or package that uses DB2 private protocol access, DB2 sends a
DYNAMICRULES value of BIND or RUN to the server at run time, using the
following rules:
v If the DYNAMICRULES value with which the package is bound is BIND,
DEFINEBIND, or INVOKEBIND, DB2 sends a value of BIND to the server.
v If the DYNAMICRULES value with which the package is bound is RUN,
DEFINERUN, or INVOKERUN, DB2 sends a value of RUN to the server.
Table 12 summarizes the dynamic SQL statement attribute values for each
behavior. For more information about the dynamic SQL attributes that are affected
by the DYNAMICRULES option, see Part 5 of DB2 Application Programming and
SQL Guide.
Table 12. Definitions of dynamic SQL statement behaviors
Value for dynamic SQL attributes
Dynamic SQL attribute Bind behavior Run behavior Define behavior Invoke behavior
Authorization ID Package OWNER Current SQLID User-defined Authorization ID of
function or stored invoker
procedure owner
Default qualifier for Bind OWNER or Current SQLID User-defined Authorization ID of
unqualified objects QUALIFIER value function or stored invoker
procedure owner
CURRENT SQLID Initialized to Primary Initialized to Primary Initialized to Primary Initialized to Primary
authid. SET SQLID authid. SET SQLID authid. SET SQLID authid. SET SQLID
is allowed. is allowed. is allowed. is allowed.
Source for application As determined by Install panel As determined by As determined by
programming options the DSNHDECP DSNHDECP the DSNHDECP the DSNHDECP
parameter application defaults parameter parameter
DYNRULS DYNRULS DYNRULS
Can execute GRANT, No Yes No No
REVOKE, CREATE,
ALTER, DROP, RENAME?
Chapter 2. Commands 55
BIND PLAN (DSN)
Defaults:
Process
Default value
BIND PLAN
RUN
BIND PACKAGE
Plan value
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
Determines which connections can use the plan or package. You cannot use both
DISABLE and ENABLE. For packages, DISABLE and ENABLE are valid only for
local bind operations.
ENABLE
Lists the system connection types that can use the plan or package. Connection
types not listed cannot use it.
DISABLE
Lists the system connection types that cannot use the plan or package.
Connection types not listed can use it.
With some connection types you can list connection IDs to identify specific
connections of the type to disable or enable.
If you list connection IDs as disabled, any connections not listed for the same
connection type are enabled.
If you list connection IDs as enabled, any connections not listed for the same
connection type are disabled.
A connection ID is valid only after the keyword that names its corresponding
connection type.
Connection types:
(*) Specifies all valid connection types. Use only with ENABLE.
56 Command Reference
BIND PLAN (DSN)
(BATCH)
Indicates that all TSO connections are either enabled or disabled for the plan or
package.
(CICS)
Identifies the CICS connection. All CICS VTAM node names specified in the
CICS SIT table are either enabled or disabled for the plan or package.
(CICS) CICS(applid, ...)
Identifies the CICS VTAM node name specified in the APPLID parameter of the
CICS SIT table. The CICS VTAM node identified by applid is either enabled or
disabled for the plan or package.
(DB2CALL)
Indicates that the call attachment facility (CAF) connection is either enabled or
disabled for the plan or package.
(DLIBATCH)
Identifies the Data Language I (DL/I) Batch Support Facility connection. All
connection identifiers from the DDITV02 data set or the job name in the JCL
that the DL/I batch support system needs to have are either enabled or disabled
for the plan or package.
(DLIBATCH) DLIBATCH(connection-name, ...)
Specifies the connection identifier as from the DDITV02 data set or the job
name in the JCL that the DL/I batch support system needs to have. The DL/I
batch connection identified by connection-name is either enabled or disabled for
the plan or package.
(IMS)
Specifies that all Information Management System (IMS) connections,
DLIBATCH, IMSBMP, and IMSMPP are either enabled or disabled for the plan
or package.
(IMSBMP)
Specifies the IMS connection for the Batch Message Program (BMP) region. All
IMS BMP connections identified by the value of IMSID on the CTL parameter
EXEC are either enabled or disabled for the plan or package.
(IMSBMP) IMSBMP(imsid, ...)
Specifies the value of IMSID on the CTL parameter EXEC. The IMS BMP
connection identified by imsid is either enabled or disabled for the plan or
package.
(IMSMPP)
Specifies the IMS connection for the Message Processing Program (MPP) and
IMS Fast Path (IFP) regions. All IMS MPP connections identified by the value of
the IMSID on the CTL parameter EXEC. are either enabled or disabled for the
plan or package.
(IMSMPP) IMSMPP(imsid, ...)
Specifies the value of IMSID on the CTL parameter EXEC. The IMS MPP
connection identified by imsid is either enabled or disabled for the plan or
package.
(REMOTE)
Indicates that all remote connections are either enabled or disabled for the plan
or package.
(REMOTE) REMOTE (location-name,...,< luname>,...) (PACKAGE only)
Specifies that the remote connections identified by the following are either
enabled or disabled for the package:
Chapter 2. Commands 57
BIND PLAN (DSN)
location-name
Specifies the location name of a requesting DBMS that is a DB2 for
OS/390 and z/OS subsystem.
< luname>
Specifies the logical unit name, as defined to VTAM at the server location,
of a requesting DBMS that is not a DB2 for OS/390 and z/OS subsystem.
You must bracket a logical unit name with the less than (<) and the greater
than (>) characters to differentiate it from a location name.
(RRSAF)
Indicates that the RRS attachment facility connection is either enabled or
disabled for the plan or package.
Performance hint: Whenever the plan or package is allocated, DB2 must check
the connection type and connection name with the list of enabled or disabled
connections. For best performance, keep the list short.
Defaults:
Process
Default value
BIND PLAN
ENABLE(*)
BIND PACKAGE
ENABLE(*)
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
Catalog record: Table SYSPKSYSTEM for packages and table SYSPLSYSTEM for
plans.
|| ENCODING (ASCII) On: BIND and REBIND PLAN and
| (EBCDIC) PACKAGE
| (UNICODE)
| (ccsid)
|
Specifies the application encoding for all host variables static statements in the plan
# or package. EBCDIC is the only valid option for a plan or package that was
# precompiled on DB2 Version 6 or earlier.
Defaults: The default package application encoding scheme is not inherited from
the plan application encoding option. The default for a package that is bound on a
remote DB2 for OS/390 is the system default application encoding scheme at the
remote server.
Process
Default value
58 Command Reference
BIND PLAN (DSN)
BIND PLAN
The system default application encoding scheme that was specified at
installation time.
BIND PACKAGE
The system default application encoding scheme that was specified at
installation time.
REBIND PLAN
The value that was specified the last time that the plan or package was
bound.
REBIND PACKAGE
The value that was specified the last time that the plan or package was
bound.
Obtains information about how SQL statements in the package, or in the member
list of the plan, are to execute, and then inserts that information into the table
owner.PLAN_TABLE, where owner is the authorization ID of the owner of the plan
or package. This option does not obtain information for statements that access
remote objects.
The EXPLAIN option also populates two optional tables, if they exist:
DSN_STATEMNT_TABLE and DSN_FUNCTION_TABLE.
You can get EXPLAIN output for a statement that is embedded in a program that is
bound with EXPLAIN(NO) by embedding the SQL statement EXPLAIN in the
program. Otherwise, the value of the EXPLAIN option applies to all explainable SQL
statements in the program, and to the fullselect portion of any DECLARE CURSOR
statements.
For a description of the tables populated by the EXPLAIN option, see information
about the EXPLAIN statement in Chapter 5 of DB2 SQL Reference.
For automatic rebind: EXPLAIN(YES) is in effect if you bind the plan or package
with EXPLAIN(YES) and if the value of field EXPLAIN PROCESSING on installation
panel DSNTIPO is YES. If EXPLAIN(YES) and VALIDATE(BIND) are in effect and
PLAN_TABLE is not correct, the automatic rebind fails.
(NO) Provides no EXPLAIN information.
(YES) Inserts information in the tables populated by EXPLAIN. If
Chapter 2. Commands 59
BIND PLAN (DSN)
owner.PLAN_TABLE does not exist at bind time, the value of the option
VALIDATE determines the success of the bind operation.
v If the value is BIND, the bind fails.
v If the value is RUN, DB2 checks to see if the table exists again at run
time. If it still does not exist, the plan or package cannot run. If it does
exist, DB2 inserts information in PLAN_TABLE before the plan or
package runs.
Defaults:
Process
Default value
BIND PLAN
NO
BIND PACKAGE
NO
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
Defaults:
60 Command Reference
BIND PLAN (DSN)
Process
Default value
BIND PLAN
I
BIND PACKAGE
I
REBIND PLAN
I
REBIND PACKAGE
I
Tells whether immediate writes will be done for updates made to group buffer pool
dependent pagesets or partitions. This option is only applicable for data sharing
environments. Table 13 shows the implied hierarchy of this option. The
IMMEDWRITE option values are as follows:
(NO) Specifies that normal write activity is done. Updated pages that are group
buffer pool dependent are written at or before phase two of commit or at the
end of abort for transactions that have rolled back.
(PH1) Specifies that updated pages that are group buffer pool dependent are
written at or before phase one of commit. If the transaction subsequently
rolls back, the pages will be updated again during the rollback process, and
they will be written again at the end of abort.
(YES) Specifies that updated pages that are group buffer pool dependent are
immediately written as soon as the buffer update completes. Updated
pages are written immediately even if the buffer is updated during forward
progress or during rollback of a transaction. Specifying this option may
impact performance.
Table 13. The implied hierarchy of the IMMEDWRITE option
IMMEDWRITE IMMEDWRI
bind option subsystem parameter Value at run time
NO NO NO
NO PH1 PH1
NO YES YES
PH1 NO PH1
PH1 PH1 PH1
PH1 YES YES
YES NO YES
YES PH1 YES
YES YES YES
Chapter 2. Commands 61
BIND PLAN (DSN)
Specify IMMEDWRITE(YES) to cause the originating transaction to immediately
write its updated GBP-dependent buffers (instead of waiting until the end of commit
or rollback), which will ensure that the dependent transaction always gets the same
results regardless of whether it runs on the same member or a different member as
the originating transaction. IMMEDWRITE(YES) should be used with caution
because of its potential impact to performance. The impact will be more significant
for plans and packages that do many buffer updates to GBP-dependent pages, and
not as noticeable for plans or packages that perform few buffer updates to
GBP-dependent pages. The following options can be considered as alternatives to
using IMMEDWRITE(YES):
v Always run the dependent transaction on the same DB2 member as the
originating transaction.
v Run the dependent transaction with ISOLATION(RR).
v Wait until the completion of phase two of commit before spawning the dependent
transaction.
v CURRENTDATA(YES) or ISOLATION(RS) can be used to solve the problem only
if the originating transaction updates columns that are not in the WHERE clause
of the dependent transaction.
Defaults:
Process
Default value
BIND PLAN
NO
BIND PACKAGE
NO
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The default for a package on a remote DB2 server is IMMEDWRITE(NO).
Determines how far to isolate an application from the effects of other running
applications. For more information on isolation levels, see Improving Concurrency in
Part 5 (Volume 2) of DB2 Administration Guide.
(RR) Repeatable read. Ensures that:
v Your application does not read a row that another process has changed
until that process releases that row.
v Other processes do not change a row that your application reads until
your application commits or terminates.
(RS) Read stability. Ensures that:
v Your application does not read a row that another process has changed
until that process releases that row.
v Other processes do not change a row that satisfies the application’s
search condition until your application commits or terminates. It does
62 Command Reference
BIND PLAN (DSN)
allow other application processes to insert a row, or to change a row that
did not originally satisfy the search condition.
You can use this option only with a read-only operation: SELECT, SELECT
INTO, or FETCH using a read-only cursor. If you specify ISOLATION(UR)
for any other operation, DB2 uses ISOLATION(CS) for that operation.
(NC) No commit. Used on packages that are bound to certain servers other than
DB2 for OS/390 and z/OS. DB2 for OS/390 and z/OS does not support NC.
If the server does not support this isolation level, it uses UR.
For more information about how the ISOLATION option affects locking and
concurrency, including how DB2 resolves conflicts by using the most restrictive
value when the values specified in the plan and package differ, see Part 4 of DB2
Application Programming and SQL Guide.
Defaults:
Process
Default value
BIND PLAN
RR
BIND PACKAGE
Plan value
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The default for binding a package to a remote server is RR.
For REBIND PACKAGE, you cannot change ISOLATION from a specified value to a
default of the plan value by using REBIND PACKAGE. To do that, you must use
BIND PACKAGE ACTION(REPLACE).
Determines whether DB2 keeps dynamic SQL statements after commit points.
Chapter 2. Commands 63
BIND PLAN (DSN)
(NO) Specifies that DB2 does not keep dynamic SQL statements after commit
points.
(YES) Specifies that DB2 keeps dynamic SQL statements after commit points.
Defaults:
Process
Default value
BIND PLAN
NO
BIND PACKAGE
NO
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The default for a package on a remote DB2 server is KEEPDYNAMIC(NO).
Determines what partitioned data sets (libraries) to search for the DBRMs listed in
the MEMBER option. The libraries must be cataloged.
The bind process searches for the libraries in the order that you list them. If the
libraries do not contain some DBRM listed in the MEMBER option, and if a JCL
statement exists for DBRMLIB DD, then the process searches for the member
among the libraries that the JCL statement describes.
64 Command Reference
BIND PLAN (DSN)
For BIND PACKAGE, you can specify only one library to search.
For BIND PLAN, you can specify one or more libraries to search.
Defaults:
Process
Default value
BIND PLAN
None
BIND PACKAGE
None
REBIND PLAN
N/A
REBIND PACKAGE
N/A
The default is to search only the libraries described by the DD statement for
DBRMLIB.
For BIND PACKAGE, you can use only one member. If you do not use MEMBER,
you must use COPY. You cannot use both options.
For BIND PLAN, you can list many members. DB2 sorts the member list in
alphabetical order. If you do not use MEMBER, you must use PKLIST.
Defaults:
Process
Default value
BIND PLAN
None
BIND PACKAGE
None
REBIND PLAN
N/A
REBIND PACKAGE
N/A
Catalog record: Column NAME of table SYSPACKAGE for BIND PACKAGE, or the
table SYSDBRM for BIND PLAN.
Chapter 2. Commands 65
BIND PLAN (DSN)
OPTHINT ('hint-id') On: BIND and REBIND PLAN and
PACKAGE
Controls whether query optimization hints are used for static SQL.
('hint-id')
A character string of up to eight characters in length, which is used by the
optimizer when searching the PLAN_TABLE for rows to use as input to the
optimizer. The delimiters can only be single quotation marks (').
If 'hint-id' contains all blank characters, DB2 does not use optimization hints
for static SQL statements.
DB2 uses optimization hints only when optimization hints are enabled for your
system. To enable optimization hints, specify YES in the OPTIMIZATION HINTS
field of installation panel DSNTIP4.
For more information about using the OPTHINT option, see Part 5 (Volume 2) of
DB2 Administration Guide.
Defaults:
Process
Default value
BIND PLAN
All blanks, use normal optimization
BIND PACKAGE
All blanks, use normal optimization
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The default for a package on a remote server is all blanks.
66 Command Reference
BIND PLAN (DSN)
v For a remote copy, the server-defined BIND PACKAGE options defaults
are used at the server. You must use the OPTIONS(COMMAND) when
copying to a downlevel server. A down-level server is any server that is
not DB2 Version 7.
Defaults:
Process
Default value
BIND PACKAGE COPY
OPTIONS(COMPOSITE)
Determines the authorization ID of the owner of the object (plan or package). The
owner must have the privileges required to execute the SQL statements contained
in the object.
If ownership changes, all grants for privileges on the object that the previous owner
issued change to name the new owner as the grantor. The new owner has the
privileges BIND and EXECUTE on the object and grants them to the previous
owner.
You can bind or rebind only the objects for which the authorization ID has bind
privileges. If you do not specify an authorization ID, the process rebinds only the
objects for which the primary ID has bind privileges.
For remote BIND or REBIND PACKAGE only, the value of OWNER is subject to
translation when sent to the remote system.
Defaults:
Process
Default value
BIND PLAN
Primary ID
BIND PACKAGE
Primary ID
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The default owner is the primary authorization ID of the agent that runs the bind
process.
Chapter 2. Commands 67
BIND PLAN (DSN)
v Copy a trigger package
The following options identify the location, collection, package name, and version of
the package. You can identify a location and collection. For BIND, the DBRM
supplies the package ID and version ID if you use the option MEMBER, or those
IDs come from the option COPY. For REBIND, you must identify a package name,
and you can also supply a version ID.
location-name
The location of the DBMS where the package binds or rebinds and where the
description of the package resides. The location name must be defined in
catalog table SYSIBM.LOCATIONS. If that table does not exist or if the DBMS
is not in it, you receive an error message.
The default is the local DBMS.
collection-id or *
Specifies the collection to contain the package to bind, or that already contains
the package to rebind. There is no default.
For REBIND, you can use an asterisk (*) to rebind all local packages with the
specified package-id in all the collections for which you have bind privileges.
package-id or * (For REBIND only)
Specifies the name of the package to rebind, as listed in column NAME of
catalog table SYSPACKAGE. There is no default.
You can use an asterisk (*) to rebind all local packages in collection-id for which
you have bind privileges.
version-id or * (For REBIND only)
Specifies the version of the package to rebind, as listed in column VERSION of
catalog table SYSPACKAGE.
You can use an asterisk (*) to rebind all local versions of the specified
package-id in collection-id for which you have bind privileges.
Using simply () rebinds the version of the package that is identified by the
empty string.
If you omit version-id, the default depends on the how you specify package-id. If
you use * for package-id, then version-id defaults to *. If you explicitly provide a
value for package-id, then version-id defaults to the empty string version.
DBRMs created in releases of DB2 before Version 2 Release 3 use a version-id
of the empty string by default.
(*) (For REBIND only)
Rebinds all local DB2 packages for which the applicable authorization ID has
the BIND privilege. Specifying (*) is the same as specifying the package name
as (*.*.(*)) or (*.*). The applicable authorization ID is:
v The value of OWNER, if you use that option
v The primary authorization ID of the process running the bind, if you do not
use the option OWNER
68 Command Reference
BIND PLAN (DSN)
v Which packages are bound depending on how you specify collections, packages,
and versions on the REBIND PACKAGE command, see Part 4 of DB2
Application Programming and SQL Guide.
Determines the SQL path that DB2 uses to resolve unqualified user-defined distinct
types, functions, and stored procedure names (in CALL statements).
For the PATH option, consider the following guidelines when you specify a
schema-name:
v The specified schema names are not folded to uppercase by DB2. This behavior
is different than that for schema names in SQL statements, which are folded to
uppercase before being stored in the catalog. If you do not specify these
nondelimited schema names in upper case, DB2 cannot find a match in the
catalog for those schema names.
v You can specify delimited identifiers in both mixed and uppercase characters.
The PATH keyword is mutually exclusive with the PATHDEFAULT keyword. Do not
specify both keywords in the same REBIND command.
(schema-name)
Identifies a schema.
DB2 does not validate that the specified schema actually exists at
precompile or at bind time.
You do not need to explicitly specify the SYSIBM, SYSFUN, and SYSPROC
schemas; DB2 implicitly assumes that these schemas are at the beginning
of the SQL path. DB2 adds these schemas in the order listed above. If you
do not specify the SYSIBM, SYSFUN, and SYSPROC schemas, they are
not included in the 254-byte length.
(schema-name, ...)
Identifies a list of schemas. The same schema name should not appear
more than once in the SQL path.
The number of schemas you can specify is limited by the length of the
resulting SQL path, which cannot exceed 254 bytes. To calculate the length
of the resulting SQL path:
1. Take the length of each schema.
2. Add 2 for delimiters around each schema-name in the list.
3. Add 1 for each comma after each schema. Do not add 1 for the last
schema.
USER Represents a maximum 8-byte schema-name. At bind time, DB2 includes
this 8-byte length in the total length of the list of schema names specified
for the PATH bind option. The maximum length for a list of schema names,
including comma separators, delimiters, and the 8-byte USER value, is 254
bytes. If you exceed this limit, DB2 generates an error message at bind
time.
At run time, DB2 substitutes the run-time value of the USER special
register, which contains the primary authorization ID of the run-time
process, for the schema-name in the position of USER in the PATH
schema-name list.
Chapter 2. Commands 69
BIND PLAN (DSN)
If you specify USER in a list of schema names, do not use delimiters
around the USER keyword.
For more information about schema names, ordinary identifiers, and delimited
identifiers, see Chapter 2 of DB2 SQL Reference.
Defaults:
Process
Default value
BIND PLAN
"SYSIBM", "SYSFUN", "SYSPROC", plan qualifier 2
BIND PACKAGE
2
"SYSIBM", "SYSFUN", "SYSPROC", package qualifier
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The PATHDEFAULT keyword is mutually exclusive with the PATH keyword. Do not
specify both keywords in the same REBIND command.
Defaults:
Process
Default value
REBIND PLAN
None
REBIND PACKAGE
None
PKLIST determines what packages to include in the package list for the plan. The
order in which you list packages with partial identifiers determines the search order
at run time and can affect performance.
NOPKLIST is used with REBIND PLAN only. NOPKLIST determines that the plan
rebinds without a package list. If a package list already exists, then NOPKLIST
deletes it.
location-name or *
Names the location of the DBMS where the package resides, or defers that
choice until run time. Use either a particular location name or an asterisk (*), or
omit this part of the identifier. The default is the local DBMS.
2. Although this is the default value, it is not stored in the catalog. Instead, the catalog value is blank.
70 Command Reference
BIND PLAN (DSN)
If you use a particular location name, then that DBMS should be defined in
catalog table SYSIBM.LOCATIONS. If that table does not exist or if the
DBMS is not in it, you receive warning messages.
If you use an asterisk, at run time the location comes from the special
register CURRENT SERVER. DB2 checks privileges to use the SQL
statements in the package at that location.
collection-id or *
Names the collection that contains the package or defers that choice until run
time. Use either a particular collection ID or an asterisk (*). There is no default.
If you use an asterisk, then DB2 checks the privileges to use the SQL
statements embedded in the package run time. At that time also, DB2
determines the collection ID as follows:
v If the value in the special register CURRENT PACKAGESET is not blank,
then that value is the collection ID.
v If the value of CURRENT PACKAGESET is blank, then DB2 skips the entry
unless it is the last entry in the package list. If it is the last or only entry, an
error message occurs.
package-id or *
Names a particular package or specifies, by the asterisk, all packages in the
collection. Because you cannot specify a version-id for the packages included in
the package list, all versions are effectively included.
Defaults:
Process
Default value
BIND PLAN
None
BIND PACKAGE
N/A
REBIND PLAN
Existing value
REBIND PACKAGE
N/A
PKLIST has no default; if you do not use PKLIST, you must use MEMBER.
The default for NOPKLIST is to use the package list specified in the PKLIST option,
if any, during the current or previous bind or rebind.
Chapter 2. Commands 71
BIND PLAN (DSN)
(plan-name)
Specifies the name of the application plan.
For REBIND only, the value of column NAME in the catalog table SYSPLAN;
you can use a list of plan names.
The default is to perform all bind functions, including error diagnostics, without
producing an application plan and without inserting rows into PLAN_TABLE for
the option EXPLAIN.
(*) (For REBIND only)
Rebinds all plans for which the applicable authorization ID has the BIND
privilege. The applicable ID is:
v The value of OWNER, if you use that option
v The authorization ID of the process running the bind, if you do not use the
option OWNER
Determines the implicit qualifier for unqualified names of tables, views, indexes, and
aliases contained in the plan or package.
(qualifier-name)
Specifies the value of the implicit qualifier. This value is not subject to
translation when sent to a remote system for BIND or REBIND PACKAGE.
Defaults:
Process
Default value
BIND PLAN
Owner ID
BIND PACKAGE
Owner ID
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The default is the owner’s authorization ID, whether you use the OWNER option or
its default.
Determines when to release resources that a program uses, either at each commit
point or when the program terminates.
(COMMIT)
Releases resources at each commit point.
(DEALLOCATE)
Releases resources only when the program terminates.
72 Command Reference
BIND PLAN (DSN)
The value has no effect on dynamic SQL statements, which always use
RELEASE(COMMIT), with one exception: When you use
RELEASE(DEALLOCATE) and KEEPDYNAMIC(YES), and your subsystem is
installed with YES for field CACHE DYNAMIC SQL on installation panel
DSNTIP4, the RELEASE(DEALLOCATE) option is honored for dynamic
SELECT, INSERT, UPDATE and DELETE statements.
Locks that are acquired for dynamic statements are held until one of the
following events occurs:
v The application process ends (deallocation).
v The application issues a PREPARE statement with the same statement
identifier. (Locks are released at the next commit point.)
v The statement is removed from the cache because it has not been used.
(Locks are released at the next commit point.)
v An object that the statement is dependent on is dropped or altered, or a
privilege that the statement needs is revoked. (Locks are released at the next
commit point.)
For more information about how the RELEASE option affects locking and
concurrency, see Part 5 (Volume 2) of DB2 Administration Guide or Part 5 of DB2
Application Programming and SQL Guide.
Defaults:
Process
Default value
BIND PLAN
COMMIT
BIND PACKAGE
Plan value
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The default for a package that is bound at a remote server is COMMIT.
Specifies whether to have DB2 determine an access path at run time using values
for host variables, parameter markers, and special registers.
NOREOPT(VARS)
Does not determine an access path at run time.
REOPT(VARS)
Re-determines the access path at run time.
Usage notes:
v You cannot use both REOPT(VARS) and NOREOPT(VARS).
v You cannot use both REOPT(VARS) and KEEPDYNAMIC(YES).
Chapter 2. Commands 73
BIND PLAN (DSN)
v You cannot use both REOPT(VARS) and NODEFER(PREPARE).
Defaults:
Process
Default value
BIND PLAN
NOREOPT
BIND PACKAGE
NOREOPT
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
The default for a package on a remote DB2 server is NOREOPT(VARS).
Defaults:
Process
Default value
BIND PLAN
N/A
BIND PACKAGE
NOPACKAGE
REBIND PLAN
N/A
REBIND PACKAGE
N/A
Because you cannot use the option SQLERROR for REBIND PACKAGE, the value
for the previous package remains in effect when you rebind that package. If you
rebind a package that uses SQLERROR(CONTINUE), those SQL statements found
in error at bind time do not rebind.
74 Command Reference
BIND PLAN (DSN)
application process that uses the plan and executes type 2 CONNECT statements.
It has no effect on type 1 CONNECT statements or the rules for DB2 private
protocol access.
(DB2) No error occurs if CONNECT identifies an existing SQL connection. If X is
an existing SQL connection, CONNECT TO X makes X the current
connection. If X is already the current connection, CONNECT TO X has no
effect on the state of any connections.
(STD) An error occurs if CONNECT identifies an existing SQL connection.
Therefore, if X is a dormant SQL connection, you must use the SQL
statement SET CONNECTION to make X the current connection.
For local operations, the value of SQLRULES is used for the initial value of the SQL
special register CURRENT RULES.
Defaults:
Process
Default value
BIND PLAN
DB2
BIND PACKAGE
N/A
REBIND PLAN
Existing value
REBIND PACKAGE
N/A
Determines whether to recheck, at run time, errors of the type "OBJECT NOT
FOUND" and "NOT AUTHORIZED" found during bind or rebind. The option has no
effect if all objects and needed privileges exist.
(RUN) Indicated that if not all objects or privileges exist at bind time, the process
issues warning messages, but the bind succeeds. DB2 checks existence
and authorization again at run time for SQL statements that failed those
checks during bind. The checks use the authorization ID of the plan or
package owner.
(BIND)
Indicates that if not all objects or needed privileges exist at bind time, the
process issues error messages, and does not bind or rebind the plan or
package, except that:
For BIND PACKAGE only, if you use the option
SQLERROR(CONTINUE), the bind succeeds but the SQL statements in
it that have errors cannot execute.
Defaults:
Process
Default value
BIND PLAN
RUN
Chapter 2. Commands 75
BIND PLAN (DSN)
BIND PACKAGE
RUN
REBIND PLAN
Existing value
REBIND PACKAGE
Existing value
76 Command Reference
-CANCEL THREAD (DB2)
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or a CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of this process must include one of the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
CANCEL THREAD(token)
DDF THREAD( luwid ) DUMP NOBACKOUT
token
Option descriptions
THREAD (token)
Identifies a specific thread, either distributed or not, whose processing you want
to cancel. DB2 assigns a token to each thread that is unique for that DB2
subsystem, but not necessarily unique across subsystems.
The token is a one- to six-digit decimal number. It can be determined from the
DB2 command DISPLAY THREAD or from an IFI READS call for IFCID 0147 or
0148. The token can also appear after the equal sign in DB2 messages that
display an LUWID.
DDF THREAD(luwid)
Identifies distributed threads for which you want to cancel processing. luwid is a
logical unit of work identifier (LUWID), consisting of:
v A fully qualified LU network name, which consists of:
– A one- to eight-character network ID
– A period
– A one- to eight-character network LU name
v An LUW instance number, which consists of 12 hexadecimal characters that
uniquely identify the unit of work
Chapter 2. Commands 77
-CANCEL THREAD (DB2)
If you enter three fields separated by periods, DB2 assumes that you are
entering an LUWID.
You might have two or more distributed threads with the same LUWID. All
distributed threads with the same LUWID are canceled.
The LUWID can be determined from the DB2 DISPLAY THREAD command and
other DB2 messages.
DUMP
Provides a dump for diagnostic purposes.
| NOBACKOUT
| Specifies that DB2 will not attempt to back out the data during transaction
| rollback processing. Cancelling the thread with NOBACKOUT leaves objects in
| an inconsistent state. Do not issue this command with NOBACKOUT unless
| you have a plan to resolve the data inconsistency.
| Multiple NOBACKOUT requests are allowed. However, if the thread is active
| and the request is accepted, subsequent requests are ignored. You can choose
| to issue a subsequent request if a request fails (as indicated by message
| DSNI032I). Objects that the thread modifies are recovered (backed out). If back
| out processing fails, the objects are marked REFRESH PENDING (REFP) and
| either RECOVER PEINDING (RECP) or REBUILD PENDING (RBDP or
| PSRBD) in the database exception table. Resolve the REFP status of the object
| by running the RECOVER utility to recover the object to a prior point in time or
| by running LOAD REPLACE on the object.
Usage notes
Canceling distributed threads: Canceling a distributed thread can cause the
thread to enter the indoubt state. Message DSNL450I is issued if the CANCEL
command causes the DDF thread to be converted from active to indoubt. DB2
releases the resources that the thread holds when the indoubt state is resolved by
automatic indoubt resolution with the coordinator, or by resolution with the
command RECOVER INDOUBT.
78 Command Reference
-CANCEL THREAD (DB2)
sessions. To do this, you need to know the VTAM session IDs (SIDs) that
correspond to the thread. Take the following steps:
1. Issue the DB2 command DISPLAY THREAD(*) LUWID(nnnn) DETAIL. (The
value of nnnn is the token or LUWID provided by CANCEL DDF THREAD.)
This gives you the VTAM session IDs that must be canceled. Sessions are
identified by the column header SESSID as shown in the following DISPLAY
THREAD output:
-DIS THD(*) LUWID(123) DETAIL
DSNV401I - DISPLAY THREAD REPORT FOLLOWS:
DSNV402I - ACTIVE THREADS:
NAME ST A REQ ID AUTHID PLAN ASID TOKEN
BATCH TR * 5 BKH2C SYSADM BKH2 000D 123
V444-DB2NET.LUND0.9F6D9F459E92=123 ACCESSING DATA AT
V446-SAN JOSE:LUND1
V447--LOCATION SESSID A ST TIME
V448--SAN JOSE 00D3590EA1E89701 S1 9332108460302
V448--SAN JOSE 00D3590EA1E89822 V R1 9332108460431
DISPLAY ACTIVE REPORT COMPLETE
DSN9022I - DSNVDT '-DIS THD' NORMAL COMPLETION
D NET,ID=LUND0,SCOPE=ACT
4. Issue the VTAM command VARY NET,TERM for each of the VTAM SIDs
associated with the DB2 thread. In this case, it might be necessary to cancel
only the session ID that DISPLAY THREAD shows to be processing in VTAM
(D2D3590EA1E89822).
For more information about VTAM commands, see VTAM for MVS/ESA Operation.
Chapter 2. Commands 79
-CANCEL THREAD (DB2)
| 1. Issue the DB2 command DISPLAY THREAD(*) LUWID(nnnn) DETAIL. (The
| value of nnnn is the token or LUWID provided by CANCEL THREAD.)
| Find the IP address and local port for the connection to the partner, as shown
| in the following DISPLAY THREAD output:
| #display thread(*) detail
|
| DSNV401I # DISPLAY THREAD REPORT FOLLOWS -
| DSNV402I # ACTIVE THREADS -
| NAME ST A REQ ID AUTHID PLAN ASID TOKEN
| TEST0001 TR 4 CTHDCORID001 SYSADM DONSQL1 0027 19
| V444-USIBMSY.SYEC715B.B4FA989AF056=19 ACCESSING DATA AT
| V446-STL714A:9.112.114.102:446
| V447--LOCATION SESSID A ST TIME
| V448--STL714A 1028:446 S2 0032608521413
| DISPLAY ACTIVE REPORT COMPLETE
| DSN9022I # DSNVDT '-DIS THD' NORMAL COMPLETION
| In this case, the partner’s IP address and port is 9.112.114.102 446, and the
| local port is 1028.
| 2. Determine the associated TCP/IP connection ID:
| d tcpip,,netstat,conn,ipaddr=9.112.114.102
|
| EZZ2500I NETSTAT CS V2R10 TCPIP 534
| USER ID CONN LOCAL SOCKET FOREIGN SOCKET STATE
| V71BDIST 0000049D 9.112.114.103..1028 9.112.114.102..446 ESTBLSH
| 1 OF 1 RECORDS DISPLAYED
| 3. Terminate the connection:
| v tcpip,,drop,conn=0000049d
|
| EZZ0060I PROCESSING COMMAND: VARY TCPIP,,DROP,
| CONN=0000049D
| EZZ0053I COMMAND VARY DROP COMPLETED SUCCESSFULLY
| v Terminating TCP/IP connection for a server thread::
| 1. Issue the DB2 command DISPLAY THREAD(*) LUWID(nnnn) DETAIL. (The
| value of nnnn is the token or LUWID provided by CANCEL THREAD.)
| Find the IP address and local port for the connection to the partner, as shown
| in the following DISPLAY THREAD output:
| !display thread(*) detail
|
| DSNV401I ! DISPLAY THREAD REPORT FOLLOWS -
| DSNV402I ! ACTIVE THREADS -
| NAME ST A REQ ID AUTHID PLAN ASID TOKEN
| TEST0001 RA * 2 CTHDCORID001 SYSADM DONSQL1 002D 11
| V445-USIBMSY.SYEC715B.B4FA9BB94FA7=11 ACCESSING DATA FOR
| 9.112.114.103
| V447--LOCATION SESSID A ST TIME
| V448--9.112.114.103 446:1029 W R2 0032609061159
| DISPLAY ACTIVE REPORT COMPLETE
| DSN9022I ! DSNVDT '-DIS THD' NORMAL COMPLETION
| In this case, the partner’s IP address is 9.112.114.103 and the local port is
| 1029.
| 2. Determine the associated TCP/IP connection ID:
| d tcpip,,netstat,conn,ipaddr=9.112.114.103
|
| EZZ2500I NETSTAT CS V2R8 TCPIP 126
| USER ID CONN LOCAL SOCKET FOREIGN SOCKET STATE
| V61ADIST 0000048E 9.112.114.102..446 9.112.114.103..1029 ESTABLS
| 1 OF 1 RECORDS DISPLAYED
80 Command Reference
-CANCEL THREAD (DB2)
| Find the entry where the foreign socket shows the partner’s IP address and
| port (9.112.114.103 1029) and note the CONN.
| 3. Terminate the connection:
| v tcpip,,drop,conn=0000048e
|
| EZZ0060I PROCESSING COMMAND: VARY TCPIP,,DROP,
| CONN=0000048E
| EZZ0053I COMMAND VARY DROP COMPLETED SUCCESSFULLY
| Examples
Example 1: To cancel a non-distributed thread whose token you found through
-DISPLAY THREAD and to produce a diagnostic dump, issue:
-CANCEL THREAD (123) DUMP
Assume that the output from -DISPLAY THREAD shows that the thread-ID and
token associated with this LUWID is 45162. You can also cancel this thread by
issuing:
-CANCEL DDF THREAD (45162)
or
-CANCEL THREAD (45162)
As in the first example, specifying DUMP with any of the commands shown in this
example causes a diagnostic dump to be produced.
Chapter 2. Commands 81
/CHANGE (IMS)
/CHANGE (IMS)
The IMS command /CHANGE resets an indoubt unit of recovery as identified by the
OASN keyword of the /DISPLAY command. That command deletes the item from
the standpoint of IMS, but it does not communicate to DB2.
Abbreviation: /CHA
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in IMS
Administration Guide: System.
Syntax
Option descriptions
SUBSYS
Deletes IMS recovery elements from one or more subsystems.
One of the following subparameters must be coded:
subsystem-name, ...
Specifies one or more subsystems from which recovery elements will be
deleted.
ALL
Deletes IMS recovery elements from all subsystems.
subsystem-name OASN schedule-number, ...
Deletes one or more origin application schedule numbers from one
subsystem, specified by subsystem-name.
schedule-number can be a list of up to 32768 origin application schedule
numbers. The numbers are displayed using the OASN parameter of the
/DISPLAY command.
RESET
Deletes the indoubt recovery unit. The recovery unit represents an incomplete
unit of work assigned to an external subsystem as the result of an application
request.
Usage note
The preceding description of the /CHANGE command is a partial description only.
For a complete description, see IMS Command Reference.
82 Command Reference
/CHANGE (IMS)
Examples
Example 1: Reset all indoubt recovery units for subsystem DB2.
/CHA SUBSYS DB2 RESET
Example 3: Reset indoubt recovery units identified by OASN numbers 99, 685, and
2920 for subsystem DB2.
/CHA SUBSYS DB2 OASN 99 685 2920 RESET
Chapter 2. Commands 83
DCLGEN (DSN)
For further information regarding the DCLGEN command and uses for its output,
see Part 2 of DB2 Application Programming and SQL Guide.
Environment
The declarations generator is executed by the DSN subcommand DCLGEN. That
subcommand can be issued from a DSN session, running in either foreground or
background mode, or it can be issued through DB2I.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v SELECT privilege on the table or view
v Ownership of the table or view
v DBADM authority on the database containing the table
v SYSADM authority
v SYSCTRL authority (catalog tables only)
Syntax
LIBRARY(library name )
(member-name) /password ADD
ACTION( REPLACE )
COBOL NAMES(prefix) STRUCTURE(structure-name) APOST
LANGUAGE( PLI ) QUOTE
C
COB2
IBMCOB
CPP
NO DBCSSYMBOL( G ) YES NO
LABEL YES N DBCSDELIM( NO ) COLSUFFIX( YES )
NO
INDVAR( YES )
84 Command Reference
DCLGEN (DSN)
Option descriptions
TABLE
Specifies what table or view for which to generate a declaration. table-name or
view-name is the qualified or unqualified name of the table or view.
The name must follow the following rules:
v If the name is a single-byte or mixed string and contains special characters
other than underscores (_), it must be enclosed between apostrophes ('). If
the language is COBOL, single-byte underscores in the name are translated
into hyphens (-) by DCLGEN. Double-byte character set (DBCS) names need
not be enclosed in apostrophes.
v If the name contains single-byte apostrophes, each one must be doubled ('').
(Some host languages do not permit apostrophes in variable names.)
A table or view name that contains a period and is not enclosed by apostrophes
is a qualified table name. The characters to the left of the period constitute the
table owner, and those to the right of the period constitute the table name. Any
table name enclosed in apostrophes is an unqualified table name. To
understand how DCLGEN determines the table name qualifier, see the
description of the OWNER option, which follows.
OWNER(owner-name)
Specifies a qualifier for the table name. owner-name is the qualifier for the table
name.
If you specify a qualified table name for the TABLE(table-name) option, and you
also specify OWNER(owner-name), the qualifier portion of table-name
supersedes owner-name as the table name qualifier. If you specify an
unqualified table name for the TABLE(table-name) option, and you do not
specify OWNER(owner-name), the SQL authorization ID is the table name
qualifier.
DCLGEN supports the use of underscore (_) as a valid character in the
owner-name keyword parameter.
The following table illustrates the decision process for determining the DCLGEN
table name qualifier.
AT(location-name)
Identifies the location of the table or view name specified in TABLE
(table-name). location-name, which can consist of 1 to 16 characters, uniquely
identifies an instance of a table or view in a network.
If you specify AT, location-name is used as the prefix for the table name, and
table-name or table-view must be a qualified name.
DCLGEN supports the use of underscore (_) as a valid character in the
location-name keyword parameter.
Chapter 2. Commands 85
DCLGEN (DSN)
LIBRARY(library-name(member-name)/password)
Specifies the data set into which the declarations go. This data set must already
exist and be accessible to the declarations generator. It can be either sequential
or partitioned.
If the library name is not enclosed within apostrophes, DCLGEN constructs the
following full data set name:
user-prefix.library-name.language.(member-name)
where:
user-prefix
The user prefix of the primary authorization ID of the transaction.
language
The value of the LANGUAGE option: COBOL, COB2, PLI, or C;
(member-name)
Optional; if not used, the output goes to a sequential data set.
password is optional.
ACTION
Indicates whether to add or replace the data set.
(ADD)
Adds the data set as a new member, if it does not already exist.
The default is ACTION(ADD).
(REPLACE)
Replaces an existing member or data set with the new one. If the output is
to a partitioned data set, and no member exists with the given name, one is
added.
LANGUAGE
Specifies the language of the generated declaration.
Possible languages are:
v (COBOL), for OS/VS COBOL
v (COB2), for other COBOL languages
v (PLI), for PL/I
v (C), for C/370
v (IBMCOB), for IBM COBOL
v (CPP), for C⁺⁺
NAMES(prefix)
Allows field names to be formed in the declaration.
Avoid possible name conflicts between DCLGEN output and the source
program. If a conflict occurs, use NAMES or STRUCTURE, or manually edit the
generated declaration or source program.
prefix can contain double-byte characters.
The field names consist of prefix concatenated with a number from one to three
digits in length. prefix can have up to 28 characters. If prefix is a single-byte or
mixed string and the first character is not alphabetic, it must be enclosed in
apostrophes. For example, if prefix is ABCDE, the field names will be ABCDE1,
ABCDE2, and so on, up to a maximum of ABCDE999. Special characters can
be used, but use caution to avoid possible name conflicts.
86 Command Reference
DCLGEN (DSN)
For COBOL and PL/I, if the prefix is a DBCS string, the field name will be the
DBCS prefix concatenated with the DBCS representation of the number. For
example, if prefix is <D1D2D3> (where “<” and “>” represent shift-out and
shift-in characters, respectively, and D1D2D3 represent double-byte characters),
generated field names will be <D1D2D3.1>, <D1D2D3.2>, and so on. The
period (.) represents X’42’.
The column names in the table are taken as default names for the fields in the
output.
STRUCTURE(structure-name)
Specifies the generated data structure.
structure-name can have up to 31 characters. If structure-name is a single-byte
or mixed string and the first character is not alphabetic, it must be enclosed in
apostrophes. Special characters can be used, but use caution to avoid possible
name conflicts.
structure-name can contain double-byte characters.
For SQL output, the name is the same as the table or view name. If the host
language is C, the default structure name is the prefix DCL concatenated with
the table name. If the host language is COBOL or PL/I and the table name is a
single-byte or mixed string, the default structure name is also the prefix DCL
concatenated with the table name. If the host language is COBOL or PL/I and
the table name is a DBCS string, the default structure name is the prefix
<.D.C.L> concatenated with the table or view name. “<” and “>” represent
shift-out and shift-in characters, respectively. You must guard against possible
conflicts with names in the source program. DCLGEN allows the specified
structure name to be the same as the table or view name, but will issue a
warning message.
APOST or QUOTE
Specifies the string delimiter character used in the host language. This option is
effective only for COBOL programs.
APOST specifies the apostrophe (') as the host language string delimiter; the
SQL delimiter is the quotation mark (").
QUOTE specifies the quotation mark (") as the host language delimiter; the
SQL delimiter is the apostrophe (').
If neither APOST nor QUOTE is specified, the default is either APOST or
QUOTE for COBOL, depending on what was specified on DB2 installation panel
DSNTIPF.
The string delimiter delimits strings in host language statements. The SQL
escape character delimits table and column names in the SQL DECLARE
TABLE statement produced by DCLGEN. It is possible, by a choice made
during DB2 installation, to make both delimiters the quotation mark or both the
apostrophe.
LABEL
Indicates whether to include column labels in the output as comments. (Column
labels can be assigned by the LABEL ON statement.)
NO
Omits the column labels.
YES
Includes the column labels.
Chapter 2. Commands 87
DCLGEN (DSN)
DBCSSYMBOL
Specifies the symbol used to denote a graphic data type in a COBOL PICTURE
clause.
(G)
Graphic data is denoted using G.
(N)
Graphic data is denoted using N.
DBCSDELIM
Specifies whether the DBCS table and column names in the generated
DECLARE table statement will be delimited.
(YES)
DBCS table and column names will be delimited in the DCLGEN table
declaration.
(NO)
DBCS table and column names will not be delimited in the DCLGEN table
declaration.
COLSUFFIX
Determines whether to form field names by attaching the column name to the
prefix given by the NAMES option.
(NO)
The column name is not used as a suffix, and field names are controlled by
the option NAMES, as in Version 3.
(YES)
If NAMES is specified, DCLGEN forms field names by adding column
names as a suffix to the value of NAMES. For example, if the prefix given
by NAMES is “NEW” and the column name is EMPNO, then the field name
is “NEWEMPNO”.
If NAMES is not specified, DCLGEN issues a warning message and uses
the column names as the field names, as in Version 3.
INDVAR
Determines whether to create an indicator variable array for the host variable
structure.
(NO)
DCLGEN does not create an indicator variable array.
(YES)
DCLGEN creates an indicator array for the host variable structure. The
array name is the table name with a prefix of “I” (or DBCS letter “<I>” if the
table name is double-byte).
Usage notes
Parsing of the DCLGEN command conforms to standard TSO parsing conventions.
For information about TSO command parsing, see the OS/390 TSO/E Programming
Services.
88 Command Reference
DCLGEN (DSN)
Comments: The output for all host languages includes comments. The leading
comment block echoes the DCLGEN subcommand that requested the declarations.
The trailing comment block indicates the number of variables declared.
Using the output: To include the DCLGEN output in an application program, use
the SQL INCLUDE statement. The same member name specified in the DCLGEN
LIBRARY parameter is specified on the INCLUDE statement.
Prompts: Online TSO will prompt for missing or incorrectly specified options.
Editing the output: It is expected that the output of DCLGEN will not meet every
need. You can freely edit the output before including it in a program. For example,
you might want to change a variable name, or include SQL escape characters.
You can edit the output to add WITH DEFAULT to NOT NULL for columns that do
not allow null values. If you edit the output, you must provide a default value.
If your column names contain embedded blanks, they will also be reflected in the
host variable declarations, and you will have to remove, or translate, any blank
characters to some other value.
COBOL and binary integers: DB2 uses the full size of binary integers. It can place
larger values than allowed in the specified number of digits in the COBOL
declaration, which can result in truncated values.
For small integers that can exceed 9999, use S9(5). For large integers that can
exceed 999,999,999, use S9(10) COMP-3 to obtain the decimal data type. If
COBOL is used for integers that exceed the COBOL PICTURE, specify the column
as decimal to ensure that the data types match and perform well.
COBOL and the underscore character: Because COBOL does not allow the use
of the underscore character, DCLGEN translates any underscore characters in the
table’s column names into hyphens (-) for use in the generated structure.
COBOL and DBCS: OS/VS COBOL does not support DBCS, but later versions of
COBOL (VS COBOL II and COBOL/370) do. Although DB2 accepts values outside
of the range from X’41’ to X’FE’, in COBOL data definition statements, both bytes of
each double-byte character in data names must be within this range. Data names
must also contain at least one DBCS character that does not have X’42’ as its first
byte.
Chapter 2. Commands 89
DCLGEN (DSN)
PL/I DCL Itable-name(n) BIN FIXED (15);
Examples
Example 1: This example shows the use of the DCLGEN. The statement
DCLGEN TABLE(VEMPL) -
LIBRARY('prefix.SRCLIB.DATA(DSN8MPEM)') -
LANGUAGE(PLI) -
APOST
/*********************************************************************/
/* DCLGEN TABLE(VEMPL) - */
/* LIBRARY('prefix.SRCLIB.DATA(DSN8MPEM)') - */
/* LANGUAGE(PLI) - */
/* APOST */
/* ... IS THE DCLGEN COMMAND THAT MADE THE FOLLOWING STATEMENTS */
/*********************************************************************/
EXEC SQL DECLARE VEMPL TABLE
( EMPNO CHAR(6) NOT NULL,
FIRSTNME VARCHAR(12) NOT NULL,
MIDINIT CHAR(1) NOT NULL,
LASTNAME VARCHAR(15) NOT NULL,
WORKDEPT CHAR(3) NOT NULL
) ;
/*********************************************************************/
/* PLI DECLARATION FOR TABLE VEMPL */
/*********************************************************************/
DCL 1 DCLVEMPL,
5 EMPNO CHAR(6),
5 FIRSTNME CHAR(12) VAR,
5 MIDINIT CHAR(1),
5 LASTNAME CHAR(15) VAR,
5 WORKDEPT CHAR(3);
/*********************************************************************/
/* THE NUMBER OF COLUMNS DESCRIBED BY THIS DECLARATION IS 5 */
/*********************************************************************/
Example 2: This example shows the use of NAMES and STRUCTURE. The
statement
DCLGEN TABLE(VEMPL) -
LIBRARY('prefix.SRCLIB.DATA(DSN8MPEM)') -
LANGUAGE(PLI) -
NAMES(FIELD) -
STRUCTURE(EMPRECORD) -
APOST
90 Command Reference
DCLGEN (DSN)
/*********************************************************************/
/* DCLGEN TABLE(VEMPL) - */
/* LIBRARY('prefix.SRCLIB.DATA(DSN8MPEM)') - */
/* LANGUAGE(PLI) - */
/* NAMES(FIELD) - */
/* STRUCTURE(EMPRECORD) - */
/* APOST */
/* ... IS THE DCLGEN COMMAND THAT MADE THE FOLLOWING STATEMENTS */
/*********************************************************************/
EXEC SQL DECLARE VEMPL TABLE
( EMPNO CHAR(6) NOT NULL,
FIRSTNME VARCHAR(12) NOT NULL,
MIDINIT CHAR(1) NOT NULL,
LASTNAME VARCHAR(15) NOT NULL,
WORKDEPT CHAR(3) NOT NULL
) ;
/*********************************************************************/
/* PLI DECLARATION FOR TABLE VEMPL */
/*********************************************************************/
DCL 1 EMPRECORD,
5 FIELD1 CHAR(6),
5 FIELD2 CHAR(12) VAR,
5 FIELD3 CHAR(1),
5 FIELD4 CHAR(15) VAR,
5 FIELD5 CHAR(3);
/*********************************************************************/
/* THE NUMBER OF COLUMNS DESCRIBED BY THIS DECLARATION IS 5 */
/*********************************************************************/
Chapter 2. Commands 91
/DISPLAY (IMS)
/DISPLAY (IMS)
The IMS command /DISPLAY displays the status of the connection between IMS
and an external subsystem (as well as all application programs communicating with
the external subsystem), or the outstanding recovery units associated with the
subsystem.
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in the
IMS Administration Guide: System.
Syntax
OASNSUBSYS subsystem-name
OASN SUBSYS ALL
Option descriptions
One of the following options is required:
SUBSYS
Identifies the subsystems to display information about.
subsystem-name, ...
Specifies one or more subsystems. See “Output” on page 93 for a
description of possible subsystem status.
ALL
Displays information about all subsystems.
OASN SUBSYS
Displays the outstanding recovery units (origin application schedule numbers, or
OASN) associated with the external subsystems. The OASN is assigned by IMS
when it schedules an application into a dependent region. That, coupled with
the IMS ID, becomes the recovery token for units of work distributed to other
subsystems.
subsystem-name, ...
Specifies one or more subsystems to display information about.
ALL
Displays the outstanding recovery units associated with all external
subsystems.
92 Command Reference
/DISPLAY (IMS)
Output
The command recognition character (CRC) is displayed for each external
subsystem. Subsystem status is one of the following:
CONNECTED
An IMS control region or dependent region has successfully connected to
the external subsystem. At this point, the two systems can begin a normal
dialog.
NOT CONNECTED
The external subsystem is in an idle state. That is, either it has not been
the object of the /START SUBSYS command, or the external subsystem
initialization exit routine indicated not to connect.
CONNECT IN PROGRESS
The connection process for the specified subsystem is in progress.
STOPPED
The specified subsystem has been stopped with the /STOP SUBSYS
command. All region connections to the specified external subsystem have
been terminated.
STOP IN PROGRESS
The /STOP SUBSYS command is in progress. Before it completes
successfully, all active connections to the specified subsystem from all IMS
regions must be quiesced.
INVALID SUBSYSTEM NAME = subsystem-name
The indicated subsystem name has not been defined to the IMS subsystem
PROCLIB member. Add the subsystem definition to the subsystem member
and issue the /START SUBSYS command.
SUBSYSTEM subsystem-name NOT DEFINED BUT RECOVERY OUTSTANDING
The indicated subsystem name has not been defined to IMS in the external
subsystem PROCLIB member, but IMS still has outstanding recovery
elements from a previous execution when the name was known. To resolve
the recovery element problem, either add the indicated subsystem definition
to the external subsystem PROCLIB member and then issue the /START
SUBSYS command, or issue the /DISPLAY OASN SUBSYS command to
determine the identification of the OASNs and then manually resolve the
recovery elements by issuing the /CHANGE SUBSYS RESET command.
TERM IN PROGRESS
An internal termination of the subsystem is underway. This type of
termination was instigated by IMS abnormal condition processing, an
external subsystem exit, or the external subsystem.
Chapter 2. Commands 93
/DISPLAY (IMS)
ACTIVE
An IMS application program has established communication with an
external subsystem.
The absence of a PSB name for a thread indicates that a connection to the external
subsystem exists, but an application program is not currently occupying the region.
The presence or absence of an LTERM name indicates whether a region is
message-driven.
Example
Display the status of connections between IMS and all subsystems.
/DISPLAY SUBSYSTEM ALL
SUBSYS CRC REGID PROGRAM LTERM STATUS
SSTR ? CONN
1 DDLTLM17 PTERM01 CONN,ACTIVE
2 DDLTLM06 PTERM02 CONN
*85202/065933*
94 Command Reference
-DISPLAY ARCHIVE (DB2)
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v ARCHIVE or DISPLAY system privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
DISPLAY ARCHIVE
Usage note
Data sharing members: Although the command ARCHIVE LOG SCOPE(GROUP)
or ARCHIVE LOG MODE(QUIESCE) initiates archive processing for all members of
a data sharing group, the command DISPLAY ARCHIVE shows information only for
the member for which it is issued. To display input archive log information for all
members of a data sharing group, enter the command to each member.
Example
Display tape unit information about input archive logs.
-DISPLAY ARCHIVE
DSNJ322I - DISPLAY ARCHIVE REPORT FOLLOWS-
COUNT TIME
(TAPE UNITS) (MIN,SEC)
DSNZPARM 2 0,00
CURRENT 2 5,30
===============================
ADDR STATUS CORR-ID VOLSER DATASET_NAME
290 AVAIL ***** TAPE1 DSNCAT.ARCHLOG1.A0000033
294 PREM ***** TAPE3 DSNCAT.ARCHLOG1.A0000035
293 BUSY RECOVER2 TAPE2 DSNCAT.ARCHLOG1.A0000034
END OF DISPLAY ARCHIVE REPORT.
DSN9022I - DSNJC001 '-DISPLAY ARCHIVE' NORMAL COMPLETION
Chapter 2. Commands 95
-DISPLAY ARCHIVE (DB2)
v Current specifications for the COUNT and TIME parameters
v Availability status of allocated dedicated tape units
v Volume and data set names associated with all busy tape units
96 Command Reference
-DISPLAY BUFFERPOOL (DB2)
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v DISPLAY system privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
( ACTIVE )
DISPLAY BUFFERPOOL
( * ) INTERVAL ACTIVE
, DETAIL( ) LIST( )
* *
( bpname )
ACTIVE
( )
LSTATS * *
,
DBNAME ( database-name )
name1:name2
name*
* GBPDEP( YES ) CASTOWNR( YES )
, NO NO
SPACENAM( space-name )
name1:name2
name*
Option descriptions
(ACTIVE)
Displays the current buffer pool status for all active buffer pools.
(*) Displays the current buffer pool status for all active or inactive buffer pools.
Chapter 2. Commands 97
-DISPLAY BUFFERPOOL (DB2)
(bpname)
Names the buffer pool for which current status is to be displayed.
v 4-KB page buffer pools are named BP0, BP1, ..., BP49.
v 8-KB page buffer pools are named BP8K0, BP8K1, ..., BP8K9.
v 16-KB page buffer pools are named BP16K0, BP16K1, ..., BP16K9.
v 32-KB page buffer pools are named BP32K, BP32K1, ..., BP32K9.
DETAIL
Produces a detail report for one or more buffer pools. If DETAIL is not specified,
a summary report is produced.
(INTERVAL)
Requests statistics accumulated since the last incremental display, or since
the buffer pool was first activated if there was no previous incremental
display.
(*) Requests statistics accumulated since the buffer pool was first activated.
LIST
Lists the open index spaces and table spaces associated with the buffer pools
included in the report. Basic information is provided for no-data-sharing systems
while more detail is provided if data-sharing is active.
(ACTIVE)
Restricts the list of open index spaces and table spaces to those that are
currently in use.
(*) Requests a list of all open index spaces and table spaces, whether
currently in use or not.
LSTATS
Lists data set statistics for the open index spaces and table spaces associated
with the buffer pools included in the report. The statistics displayed are
incremental since the last time they were displayed.
(ACTIVE)
Restricts the list statistics to those data sets that are currently in use.
The default is ACTIVE when LIST is not specified or if LIST is specified
with no parameter. If LIST is specified with a parameter and LSTATS has
no parameter, then the parameter specified for LIST is used for LSTATS.
(*) Includes statistics for all open index spaces and table spaces, whether
currently in use or not.
DBNAME
Specifies which databases are included in the LIST display and the LSTATS
display. If you specify DBNAME without LIST, LIST(ACTIVE) is assumed.
ABBREVIATION: DBN
(database-name, ...)
Identifies one or more databases to be included in the LIST and
LSTATS displays. database-name can have any of the forms in the
following list. In the list, name1 and name2 represent strings of from
one to eight characters. name represents a string of from one to eight
characters.
Form Displays the status of...
name1
The database name1
98 Command Reference
-DISPLAY BUFFERPOOL (DB2)
name1:name2
All databases with names from name1 to name2 in a sorted list
of database names.
name* All databases whose names begin with the string name
(*) Displays information on all databases that match the LIST specification.
This is the default.
SPACENAM
Specifies which table spaces or index spaces within the specified databases to
include in the LIST display and the LSTATS display. If you use SPACENAM
without DBNAME, DBNAME(*) is assumed.
ABBREVIATION: SPACE
(*) Displays information about all table spaces and index spaces of the
specified databases. This is the default.
(space-name, ...)
Identifies one or more spaces to be included in the LIST and LSTATS
displays. You can write space-name like database-name to designate:
v The name of a single table space or index space
v A range of names
v A partial name followed by a pattern character
GBPDEP
Indicates whether to restrict the list of data sets to those that are
group-buffer-pool-dependent. This option is not valid if this is a non-data sharing
DB2.
(YES)
Restricts the list of page sets to those that are ″group buffer pool
dependent″ (GBP-dependent). An index space or table space is
GBP-dependent if either of these conditions are true:
v There is inter-DB2 R/W interest in it.
v There are changed pages from it in the group buffer pool that have not
yet been written to disk.
(NO)
Restricts the list of page sets to those that are non-group buffer pool
dependent.
CASTOWNR
Indicates whether to restrict the list of data sets to those for which this DB2
member is the castout owner. This option is not valid if this is a non-data
sharing DB2.
(YES)
Restricts the list of page sets for which this DB2 member is the castout
owner.
(NO)
Restricts the list of page sets for which this DB2 member is not the castout
owner.
Output
You can request a summary report or a detail report.
Chapter 2. Commands 99
-DISPLAY BUFFERPOOL (DB2)
Summary report
A summary report contains the following information, as seen in “Example 1” on
page 103:
Identification:
BUFFERPOOL NAME
Buffer pool external name (BP0, BP1, ..., BP49, or BP32K, BP32K1, ...,
BP32K9).
BUFFERPOOL ID
Buffer pool internal identifier (0-49, 80-89, 100-109, 120-129).
USE COUNT
Number of open table spaces or index spaces that reference this buffer
pool. (Inactive pools have a zero use count.)
VIRTUAL BUFFERPOOL SIZE
User-specified virtual buffer pool size
BUFFERS ALLOCATED
Number of allocated buffers in an active virtual buffer pool.
TO BE DELETED
Number of buffers to be deleted in an active virtual buffer pool (because of
pool contraction).
IN-USE/UPDATED
Number of currently active (not stealable) buffers in the virtual buffer pool.
Hiperpool Values:
HIPERPOOL SIZE
User-specified hiperpool size.
CASTOUT
Hiperpool CASTOUT attribute.
ALLOCATED
Number of allocated buffers in an active hiperpool.
TO BE DELETED
Number of buffers to be deleted in an active hiperpool (because of pool
contraction).
BACKED BY ES
Number of hiperpool buffers backed by expanded storage.
Thresholds:
VP SEQUENTIAL
Sequential steal threshold for the virtual buffer pool.
HP SEQUENTIAL
Sequential steal threshold for the hiperpool.
DEFERRED WRITE
Deferred write threshold for the virtual buffer pool.
VERTICAL DEFERRED WRT
Vertical deferred write threshold for the virtual buffer pool.
PARALLEL SEQUENTIAL
Parallel sequential threshold for the virtual buffer pool.
Detail report
A detail report includes all summary report information and additional buffer pool
related statistics. You can request cumulative statistics (accumulated since DB2
startup) or incremental statistics (accumulated since the last incremental display). A
sample report appears in “Example 2” on page 103. The statistics in a detail report
are grouped in the following categories:
| Note: When Fast Synchronous Data Mover Facility (FSDMF) is installed, these
| counters will be zero.
HP READS
Number of pages moved asynchronously from the hiperpool to the virtual
pool using the Asynchronous Data Mover Facility
HP WRITES
Number of pages moved asynchronously from the virtual pool to the
hiperpool using the Asynchronous Data Mover Facility
READ FAILURES
Number of page read failures that occurred using the Asynchronous Data
Mover Facility
WRITE FAILURES
Number of page write failures using that occurred the Asynchronous Data
Mover Facility
Examples
Example 1: A summary report is the default report if the DETAIL option is not
specified. The following is an example of a summary report which could be
produced by the command:
-DIS BUFFERPOOL(BP0) LIST(*) DBNAME(DSN8*)
Example 2: A detail report can be generated that includes all summary report
information and additional buffer pool related statistics. The following is an example
of a detail report that could be produced by the command:
-DISPLAY BUFFERPOOL(BP0) DETAIL
Example 3: With the summary or detail report, you can list open table spaces and
index spaces associated with the buffer pool. You can also request a display of
statistics for each listed table space and index space. An example of a report
generating this information could be produced by the command:
-DISPLAY BUFFERPOOL(BP0) LIST LSTATS
In a data sharing environment, the command can be issued from any DB2 in the
group that has access to the database.
Abbreviation: -DIS DB
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
No special privilege is required to issue -DISPLAY DATABASE.
The DISPLAY system privilege allows you to display status information for any
database. The resulting display lists those databases for which the primary
authorization ID or any of the secondary authorization IDs has the DISPLAYDB
privilege. Error messages are produced for those databases specified over which
the set of privileges does not include one of the following:
v DISPLAYDB privilege
v DISPLAY privilege
v DBMAINT, DBCTRL, or DBADM authority
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
USE
CLAIMERS
LOCKS
LPL
WEPR
,
SPACENAM ( space-name )
*
spacename1:spacename2 USE ONLY
spacename* CLAIMERS
*spacename LOCKS
*spacename* LPL
*spacestring1*spacestring2* WEPR
(1)
ONLY
, 50
LIMIT( integer )
PART( integer ) *
integer1:integer2
AFTER ACTIVE RESTRICT ( ) ADVISORY ( )
, ,
ACHKP ICOPY
CHKP AUXW
COPY
GRECP
LPL
RBDP
RECP
REORP
RO
STOP
UT
UTRO
UTRW
UTUT
UT*
WEPR
Notes:
1 If you specify the ONLY option without the SPACENAM() keyword, only the LIMIT, AFTER, and
RESTRICT keywords apply. Chapter 2. Commands 107
-DISPLAY DATABASE (DB2)
Option descriptions
(database-name, ...)
Identifies one or more databases whose status is to be displayed.
(*) Displays information on all databases that are defined to the DB2 subsystem for
which the privilege set of the process has the required authorization.
dbname and dbstring can have any of the forms in the following table (where
dbname1 and dbname2 represent any strings of from one to eight characters, and
dbname represents any string of from one to seven characters):
Table 14. Forms of dbname and dbstring
Form Displays the status of...
dbname1:dbname2 All databases whose names collate greater than or equal to
dbname1 and less than or equal to dbname2
dbname* All databases whose names begin with the string dbname
*dbname All databases whose names end with the string dbname
*dbname* All databases whose names contain the string dbname
*dbstring1*dbstring2* All databases whose names contain the strings dbstring1 and
dbstring2
SPACENAM
Specifies what space to display. If you use SPACENAM, you must also specify
the corresponding database name. If (*) is used to specify multiple databases,
SPACENAM(*) can be specified to display all objects in these databases.
Abbreviation: SPACE, SP
(space-name, ...)
Lists one or more spaces whose status is to be displayed. You can write
space-name like database-name to designate:
v The name of a single table space or index space
v A range of names
v A partial name, including a beginning or ending pattern-matching
character (*), a pattern-matching character between two strings, or any
combination of these3
(*) Displays information about all table spaces and index spaces of the
specified database.
spacename and spacestring can have any of the forms in the following table
(where spacename1 and spacename2 represent any strings of from one to
eight characters, and spacename represents any string of from one to seven
characters):
Table 15. Forms of spacename and spacestring
Form Displays the status of...
spacename1::spacename2 All table spaces or index spaces whose names collate greater than or equal to
spacename1 and less than or equal to spacename2
3. Consecutive pattern-matching characters (*) are not allowed, and you cannot specify two pattern-matching characters in the middle
of a keyword string.
USE
Displays information about the following:
v The applications and subsystems of the database or space that has internal
DB2 resources allocated
v The applications and subsystems of the database or space on whose behalf
locks for the space are held or waited upon
v The connection IDs, correlation IDs, and authorization IDs for all applications
allocated to spaces and partitions whose statuses are displayed
v The LUWID and location of any remote threads accessing the local database
CLAIMERS
Displays information about the following:
v The claims on all table spaces, index spaces and partitions whose statuses
are displayed
v The LUWID and location of any remote threads accessing the local database
v The connection IDs, correlation IDs, and authorization IDs for all applications
allocated to spaces whose statuses are displayed
v The logical partitions that have logical claims and the claims associated with
them
CLAIMERS overrides both LOCKS and USE. If you specify CLAIMERS, any
references to LOCKS or USE are ignored.
LOCKS
Displays information about the following:
v The applications and subsystems on whose behalf locks are held, waited
upon, or retained for the database or space
v The transaction locks for all table spaces, tables, index spaces and partitions
whose statuses are displayed
v The connection IDs, correlation IDs, and authorization IDs for all applications
allocated to spaces whose statuses are displayed
v The LUWID and location of any remote threads accessing the local database
v The drain locks for a resource held by running jobs
v The logical partitions that have drain locks and the drain locks associated
with them
v The retained locks for a resource
v The page set or partition physical locks (P-locks) for a resource
LOCKS overrides USE. If both LOCKS and USE are specified, USE is ignored.
DB2 displays tables with table locks when you specify both the LOCKS and
ONLY keywords.
PART (integer, ...)
Indicates the partition number of one or more partitions whose status is to be
displayed. The integer specified must identify a valid partition number for the
corresponding space name and database name. integer can be written to
designate either:
v A list of one or more partitions, or
v A range of all partition numbers that collate greater than or equal to integer1
and less than or equal to integer2
Both a list and a range cannot be specified.
LIMIT
Limits the number of messages to be displayed by the command.
(integer)
Is the maximum number of messages that are to be displayed. The default
is 50. The maximum number of messages that can be displayed is limited
by the space available.
(*) Limits the display to the space available.
AFTER
Displays the following information:
v If only a database name is used, AFTER continues the display of all other
databases whose names collate greater than that name.
v If SPACENAM and a table space or index space name are used, AFTER
continues the display to all other table spaces or index spaces in the same
database whose names collate greater than that name.
AFTER cannot be used with more than one database name, table space name,
index space name, with any pattern-matching character (*) within the database
name, or with the SPACENAM() keyword.
| Specify one or more of the following keywords to limit objects that are to be
| listed.
| ACHKP
| Displays objects in the auxiliary warning advisory state.
| CHKP Display objects that are in CHECK-pending status.
| COPY Display objects that are in COPY-pending status.
| GRECP
| Displays objects that are in group buffer pool RECOVER-pending
| status.
| LPL Displays logical page list entries.
|
# RBDP Displays index objects that are in REBUILD- or RECOVER-pending
# status. This includes the restricted states RBDP, LPL, and WEPR.
|
# RECP Displays objects that are in RECOVER-pending status, including the
# restricted states RECP, RECP*, LPL, and WEPR (write error page
# range).
| REORP
| Displays objects that are in REORG-pending status.
| RO Displays objects that are in read-only mode.
| STOP Displays objects that are stopped, including the restricted states STOP,
| STOPE, STOPP, and LSTOP.
| UT Displays objects that are in utility access mode.
| Specify one or more of the following keywords to limit the objects listed.
| AUXW
| Displays objects that are in the auxiliary warning advisory state.
| ICOPY
| Displays objects that are in the informational copy pending advisory
| state.
| For information about resetting an advisory status, see Part 2 of DB2 Utility
Guide and Reference.
Usage notes
Displaying DB2 catalog tables: You can always display the DB2 catalog tables.
However, if a table space in the catalog containing information about user
databases or user table spaces is stopped, those databases or table spaces cannot
be displayed. Trying to display them will cause an error. See Appendix D of DB2
SQL Reference for a list of table space names and assigned tables.
If you issue DISPLAY DATABASE LOCKS on the catalog (DSNDB06), you may see
a lock held on SYSDBASE with the correlation ID 020.DBCMD_05 or
020.DBCMD_06. This simply indicates the lock that DISPLAY DATABASE itself
needs and is normal.
Displaying restricted and advisory status objects: To display all resources that
are in restricted status, you must issue the DISPLAY DATABASE command twice.
To display table spaces and indexes in restricted status, use the SPACENAM
parameter with RESTRICT. To display databases in restricted status, do NOT use
the SPACENAM parameter. Spaces could be unavailable even if they show RW
mode if the database is in restricted status.
Displaying logical partitions: If you issue DISPLAY DATABASE with the PART
parameter for a logical partition of a type 2 index, DB2 does not display physical
claimers and physical locks in the output.
Output
Message DSNT392I status information: The status codes that are displayed by
the DISPLAY DATABASE command and their respective descriptions are as follows:
ACHKP
Indicates an error in the LOB column of the base table space. The base
table space has the auxiliary CHECK-pending restrictive status.
| AREST
Indicates that an object (a table space, index space, or a physical partition
of a table space or index space) is in an advisory RESTART-pending state.
If backout activity against the object is not already underway, initiate it either
by issuing the RECOVER POSTPONED command, or by recycling the
system with the system parameter LBACKOUT=AUTO.
AUXW
Either the base table space is in the auxiliary warning advisory status,
indicating an error in the LOB column, or the LOB table space is in the
auxiliary warning advisory status, indicating an invalid LOB.
CHKP The object (a table space, a partition within a table space, or an index) is in
the CHECK-pending status.
COPY The object (a table space or a partition within a table space) is in the
COPY-pending status. An image copy is required for this object.
GRECP
The object is GBP-dependent and a group buffer pool RECOVER is
pending.
ICOPY
The index space is in the informational COPY-pending advisory status.
LPL The object has entries in the logical page list.
LSTOP
The logical partition of a nonpartitioning index is stopped.
Example 2: Display information about table space TBS33 in database CB3 when
the table space is defined with LOCKPART YES. LOCKS displays lock information
for table spaces and tables specified; LUWIDs and locations of any remote threads;
and connection-name, correlation-id, and authorization ID information.
-DISPLAY DATABASE(CB3) SPACENAM(TBS33) LOCKS
If the table space is defined with LOCKPART NO, the display looks like this. The
LOCKINFO field shows a value of S, indicating that this is a table space lock. If
partitions are held in different statuses, those statuses are listed below the table
space locks.
NAME TYPE PART STATUS CONNID CORRID LOCKINFO
-------- ---- ---- ------------------ -------- ------------ ---------
TSPART TS LSS001 DSN2SQL H-IS,S,C
- MEMBER NAME DB1G
TSPART TS LSS002 DSN2SQL H-IS,S,C
- MEMBER NAME DB2G
TSPART TS 01 RO H-S,PP,I
- MEMBER NAME DB1G
TSPART TS 02 RW H-S,PP,I
- MEMBER NAME DB2G
TSPART TS 03 RW H-S,PP,I
- MEMBER NAME DB2G
TSPART TS 04 RW
two applications are accessing TSPART, and the partitions have different statuses.
In the output, DB2 displays the locks as table space locks, as shown here:
NAME TYPE PART STATUS CONNID CORRID LOCKINFO
-------- ---- ---- ------------------ -------- ------------ ---------
TSPART TS LSS001 DSN2SQL H-IS,S,C
TSPART TS LSS002 DSN2SQL H-IS,S,C
TSPART TS 01 RO
TSPART TS 04 RW
Example 7: Suppose that you have executed the ALTER TABLESPACE statement
on table space TSPART so that TSPART is now defined with LOCKPART YES.
LOCKPART YES causes DB2 to do selective partition locking on TSPART. When
you specify this command:
-DB1G DISPLAY DATABASE(DSN8D71A) SPACE(TSPART) PART(1:4) LOCKS
Example 8: Display information about all table spaces and index spaces in the
range of databases from DBKD0101 to DBKD0106 that are in a restrictive status.
Limit the number of messages that are displayed to the available space.
-DISPLAY DATABASE(DBKD0101,DBKD0103) SPACENAM(*) RESTRICT LIMIT(*)
Example 9: Display information about all table spaces that are in the auxiliary
warning advisory status (AUXW), and all index spaces that are in informational
COPY pending status (ICOPY) in database DBIQUQ01. Limit the number of
messages that are displayed to the available space.
-DISPLAY DATABASE(DBIQUQ01) SPACENAM(*) LIMIT(*) ADVISORY
| Environment
| This command can be issued from an MVS console, a DSN session under TSO, a
| DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
| instrumentation facility interface (IFI).
| Authorization
| To execute this command, the privilege set of the process must include one of the
| following:
| v DISPLAY privilege
| v SYSOPR, SYSCTRL, or SYSADM authority
| DB2 commands issued from an MVS console are not associated with any
| secondary authorization IDs.
| Syntax
|
DISPLAY DDF
DETAIL
| Option descriptions
| DETAIL
| Displays additional configurational and statistical information.
| Output
| The -DISPLAY DDF command displays the following output:
| STATUS
| The operational status of DDF.
| LOCATION
| The location name of DDF.
| LUNAME
| The fully qualified LUNAME of DDF.
| GENERICLU
| The fully qualified generic LUNAME of DDF.
| IPADDR
| The IP address of DDF.
| TCPPORT
| The SQL listener port used by DDF.
| Examples
| Example 1: Display DDF detail report where DDF has not yet been started:
| #dis ddf det
| DSNL080I # DSNLTDDF DISPLAY DDF REPORT FOLLOWS:
| DSNL081I STATUS=STOPDQ
| DSNL082I LOCATION LUNAME GENERICLU
| DSNL083I STL715B -NONE.SYEC715B -NONE
| DSNL084I IPADDR TCPPORT RESPORT
| DSNL085I -NONE 447 5002
| DSNL086I SQL DOMAIN=-NONE
| DSNL086I RESYNC DOMAIN=-NONE
| DSNL090I DT=A CONDBAT= 64 MDBAT= 64
| DSNL092I ADBAT= 0 QUEDBAT= 0 IN1DBAT= 0 CONQUED= 0
| DSNL093I DSCDBAT= 0 IN2CONS= 0
| DSNL099I DSNLTDDF DISPLAY DDF REPORT COMPLETE
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
# Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following authorities for each function:
v DISPLAY privilege
v Ownership of the function
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
(*.*)
DISPLAY FUNCTION SPECIFIC
,
( schema.specific-function-name )
schema.partial-name*
LOCAL
SCOPE ( )
GROUP
Option descriptions
schema.specific-function-name
Displays information for the specific named function in the specified schema.
You cannot specify a function name as you can in SQL; you must use the
specific name. If a specific name was not specified on the CREATE FUNCTION
statement, query SYSIBM.SYSROUTINES for the correct specific name:
# Usage notes
If you do not specify a partial or specific function name, DB2 displays information
for all functions that DB2 applications have accessed since the DB2 subsystem was
started.
This command does not apply to built-in functions or user-defined functions that are
sourced on another function.
Output
This command displays one output line for each function that a DB2 application has
accessed.
Information returned by this command reflects a dynamic status. By the time DB2
displays the information, the status might have changed.
------- SCHEMA=PAYROLL
FUNCTION STATUS ACTIVE QUEUED MAXQUE TIMEOUT WLM_ENV
APPL1 STARTED 1 0 0 0 PAYROLL
APPL2 STARTED 1 0 0 0 PAYROLL
APPL3 STARTED 0 1 2 0 PAYROLL
APPL5 STOPREJ 0 0 0 0 SANDBOX
APPL6 STOPABN 0 0 0 0 PAYROLL
FUNC1 STOPQUE 0 0 0 0 SANDBOX
Message DSNX971I lists a range of functions that are stopped because a STOP
FUNCTION SPECIFIC command included a partial name with the pattern-matching
character (*). See “-STOP FUNCTION SPECIFIC” on page 321 for more
information.
Examples
Example 1: Display information about functions in the PAYROLL schema and the
HRPROD schema.
-DISPLAY FUNCTION SPECIFIC(PAYROLL.*, HRPROD.*)
------ SCHEMA=PAYROLL
FUNCTION STATUS ACTIVE QUEUED MAXQUE TIMEOUT WLM_ENV
PAYRFNC1 STARTED 0 0 1 0 PAYROLL
PAYRFNC2 STOPQUE 0 5 5 3 PAYROLL
PAYRFNC3 STARTED 2 0 6 0 PAYROLL
USERFNC4 STOPREJ 0 0 1 0 SANDBOX
------ SCHEMA=PAYROLL
FUNCTION STATUS ACTIVE QUEUED MAXQUE TIMEOUT WLM_ENV
USERFNC2 STOPQUE 0 5 5 3 SANDBOX
USERFNC4 STOPREJ 0 0 1 0 SANDBOX
DSNX9DIS DISPLAY FUNCTION SPECIFIC REPORT COMPLETE
DSN9022I - DSNX9COM '-DISPLAY FUNC' NORMAL COMPLETION
Example 3: Display information about all functions in the PAYROLL schema that
DB2 applications have accessed. This example assumes that the STOP FUNCTION
SPECIFIC(PAYROLL.*) ACTION(QUEUE) command is in effect at the time you
issue the DISPLAY FUNCTION SPECIFIC command:
-DISPLAY FUNCTION SPECIFIC(PAYROLL.*)
------ SCHEMA=PAYROLL
FUNCTION STATUS ACTIVE QUEUED MAXQUE TIMEOUT WLM_ENV
USERFNC2 STOPQUE 0 5 5 3 SANDBOX
USERFNC4 STOPQUE 0 0 1 0 SANDBOX
FUNCTIONS USERFNC2 - USERFNC29999999999 STOP QUEUE
FUNCTIONS USERFNC4 - USERFNC49999999999 STOP QUEUE
DSNX9DIS DISPLAY FUNCTION SPECIFIC REPORT COMPLETE
DSN9022I - DSNX9COM '-DISPLAY FUNC' NORMAL COMPLETION
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v DISPLAY privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
DISPLAY GROUP
DETAIL
Option descriptions
DETAIL
Displays information about the parallelism coordinator and parallelism assistant.
Usage notes
Member status: Message DSN7106I includes information about the XCF status of
the members (STATUS in the display output). The status can be ACTIVE,
QUIESCED, or FAILED.
ACTIVE indicates that the DB2 subsystem is active, and FAILED indicates that it is
failed. A QUIESCED status results from a STOP DB2 command and consists of
several subcategories:
QUIESCED
This is a normal quiesced state, as the result of a normal STOP DB2
command.
Q Q (quiesced) can be paired with one or more of the following letters:
I Indoubt or postponed abort units of recovery (URs) are outstanding.
This means retained locks are held.
C There was a castout error. The last updater of the page set or
partition could not write from the coupling facility to disk.
Output
DISPLAY GROUP command output: The DISPLAY GROUP command displays
the following output:
*** BEGIN
The name of the DB2 group
DB2 MEMBER
The names of its members
ID The IDs of its members
SUBSYS
The subsystem names of its members
CMDPREF
The command prefix for each member
STATUS
The status of each member (ACTIVE, QUIESCED with or without additional
conditions, or FAILED)
SYSTEM NAME
The names of the MVS system where the member is running, or was last
running in cases when the member status is QUIESCED or FAILED
IRLM SUBSYS
The name of the IRLM subsystem to which the DB2 member is connected
IRLMPROC
The procedure names of the connected IRLM
SYSTEM NAME
The MVS system name where the data sharing member runs on.
LVL A string of three numeric characters that list as follows:
v DB2 version
v DB2 release
v DB2 modification level
SCA The SCA structure size in KB and the percentage currently in use
LOCK1
The LOCK1 structure size in KB.
If the output indicates that either the lock structure or SCA are 0% in use, that does
not necessarily mean that the structure is empty. It could mean that the structures
are very large and that the number of locks held or the number of records in the
SCA is less than 1%.
Examples
Example 1: The following sample output for a data sharing group can be generated
by the command:
-DB1A DIS GROUP
Example 3: Using the DETAIL option, you can obtain more information about the
data sharing group as shown in the following example using the command:
-DB1A DIS GROUP DETAIL
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v DISPLAY privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
DISPLAY GROUPBUFFERPOOL
(*) *
, TYPE ( GCONN )
MCONN
( gbpname ) NOCACHE
structure-name
MDETAIL GDETAIL
INTERVAL INTERVAL
( ) ( )
* *
NO
CONNLIST ( YES )
Option descriptions
(*) Displays the group buffer pool status for all group buffer pools.
gbpname
Names the group buffer pool for which status is to be displayed.
v 4-KB group buffer pools are named GBP0, GBP1, ..., GBP49.
v 8-KB group buffer pools are named GBP8K0, GBP8K1, ... , GBP8K9.
v 16-KB group buffer pools are named GBP16K0, GBP16K1, ... , GBP16K9.
v 32-KB group buffer pools are named GBP32K, GBP32K1, ... , GBP32K9.
(structure-name)
Names the backing coupling facility structure for the group buffer pool. The
coupling facility structure name has the following format:
groupname_gbpname
where groupname is the DB2 data sharing group name and the underscore (_)
separates groupname and gbpname.
TYPE
Indicates the type of group buffer pools (among those that are specified) for
which information is displayed.
(*) All group buffer pools specified. This is the default.
(GCONN)
Group buffer pools that are currently connected to any member of the data
sharing group. The connection can be “active” or “failed-persistent”.
(MCONN)
Group buffer pools that are currently connected to the member to which the
command is directed.
(NOCACHE)
Group buffer pools that have the GBPCACHE attribute set to NO.
MDETAIL
Shows a detailed statistical report for the specified group buffer pools, reflecting
Output
The three report types are:
v A summary report
v A group detail report
v A member detail report
Summary report
You can display summary information about group buffer pools. The report indicates
whether this DB2 is actively connected to the group buffer pools you requested
information for. The summary report also shows the following information:
Examples
Example 1: This is an example of a summary report that can be produced by the
following command:
-DISPLAY GROUPBUFFERPOOL(GBP29)
Message DSNB799I is displayed if the group buffer pool is duplexed and the
secondary group buffer pool is currently allocated. If a secondary group buffer pool
is not allocated, message DSNB799I is not included in the output.
Example 2: Assume you want a summary report about group buffer pool
twenty-nine, including all connections to that group buffer pool. Enter the following
command:
-DISPLAY GROUPBUFFERPOOL(GBP29) CONNLIST(YES)
Example 3: This example shows a group detail report that is produced by the
command:
-DISPLAY GROUPBUFFERPOOL(GBP29) GDETAIL(*)
Message DSNB762I is displayed in the output only if the secondary group buffer
pool is allocated.
Example 4: This example shows the member detail section from the report that is
produced by the command:
-DISPLAY GROUPBUFFERPOOL(GBP29) MDETAIL(*)
Messages DSNB764I and DSNB793I are displayed in the output only if the
secondary group buffer pool is allocated.
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v DISPLAY privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
(*)
DISPLAY LOCATION
, DETAIL
( location-name )
partial-location*
<luname>
ipaddr
Option descriptions
(*) Displays information for all remote locations.
(location-name)
Lists one or more location names, separated by commas. If location-name is
not specified, information for all remote locations is displayed.
Because DB2 does not receive a location name from requesters that are not
DB2 for OS/390 and z/OS subsystems, you can enter the LUNAME or IP
address of such a requester. Enclose the LUNAME by the less-than (<) and
greater-than (>) symbols. Enter the IP address in the form nnn.nnn.nnn.nnn.
For example, -DISPLAY LOCATION(<LULA>) displays information about a
remote location (that is not DB2 for OS/390 and z/OS) with the LUNAME of
Output
The DISPLAY LOCATION command displays the following output:
LOCATION
The LOCATION of the remote system.
PRDID
The product identifier (PRDID) of the remote system. The PRDID is
displayed in the form nnnvvrrm, where:
nnn The database product
vv The product version
rr The product release
m The product modification level
LINKNAME
The address (LU name or IP address) of the remote system.
REQUESTERS
The number of active threads from the local subsystem that are accessing
the remote system.
SERVERS
The number of threads from the remote system that are accessing the local
subsystem.
CONVERSATIONS
The total number of conversations or sockets related to the partner system.
Examples
Example 1: Display information about threads and conversations with specific
remote locations, using the following command:
-DISPLAY LOCATION(SAN_JOSE,SAN_FRANCISCO)
Example 2: Display information about threads and conversations with all remote
locations. Additionally, display detail conversation information about DB2 system
threads that communicate with other locations. This is an example of the output
generated by the following command:
-DISPLAY LOCATION DETAIL
Example 3: Display information for a DB2 that is connected to the following DRDA
partners:
v A non-MVS server named DRDALOC via TCP/IP.
v Several TCP/IP clients from the same TCP/IP host as the DRDALOC server.
v A DB2 for MVS server named DB2SERV via SNA.
DISPLAY LOCATION(*)
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following authorities:
v DISPLAY privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands that are issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
DISPLAY LOG
Usage notes
Information provided by the DISPLAY LOG command: You can use the
DISPLAY LOG command to view the current LOGLOAD setting, including
information about the current active log data sets and status of the offload task. You
can obtain additional information about log data sets and checkpoint information by
using the Print Log Map utility (DSNJU004). For more information about the Print
Log Map utility, see Part 3 of DB2 Utility Guide and Reference.
Examples
Example 1: Display log information and status of the offload task.
DISPLAY LOG
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or a CICS terminal, or a program using the
instrumentation facility interface (IFI).
Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v DISPLAY privilege
v SYSOPR, SYSCTRL, or SYSADM authority
v Ownership of the stored procedure
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
(*.*)
DISPLAY PROCEDURE
, LOCAL
SCOPE ( )
( schema.procedure-name ) GROUP
schema.partial-name*
procedure-name
partial-name*
Option descriptions
(*.*)
Displays information for all stored procedures in all schemas that have been
accessed by DB2 applications since DB2 was started.
Output
Sample output: The DISPLAY PROCEDURE command generates the following
output:
DSNX940I - DSNX9DIS DISPLAY PROCEDURE REPORT FOLLOWS -
Message DSNX943I lists a range of procedures that are stopped because a STOP
PROCEDURE command included a partial name with a pattern-matching character
(*) such as:
-STOP PROCEDURE(ABC*)
Examples
Example 1: Display information about all stored procedures that have been
accessed by DB2 applications.
-DISPLAY PROCEDURE
------ SCHEMA=SYSPROC
PROCEDURE STATUS ACTIVE QUEUED MAXQUE TIMEOUT WLM_ENV
USERPRC2 STOPQUE 0 5 5 3 SANDBOX
USERPRC4 STOPREJ 0 0 1 0 SANDBOX
DSNX9DIS DISPLAY PROCEDURE REPORT COMPLETE
DSN9022I - DSNX9COM '-DISPLAY PROC' NORMAL COMPLETION
------ SCHEMA=PAYROLL
PROCEDURE STATUS ACTIVE QUEUED MAXQUE TIMEOUT WLM_ENV
PAYPRC1 STARTED 0 0 1 0 PAYROLL
PAYPRC2 STOPQUE 0 5 5 3 PAYROLL
PAYPRC3 STARTED 2 0 6 0 PAYROLL
USERPRC4 STOPREJ 0 0 1 0 SANDBOX
------ SCHEMA=HRPROD
PROCEDURE STATUS ACTIVE QUEUED MAXQUE TIMEOUT WLM_ENV
HRPRC1 STARTED 0 0 1 0 HRPROCS
HRPRC2 STOPREJ 0 0 1 0 HRPROCS
DSNX9DIS DISPLAY PROCEDURE REPORT COMPLETE
DSN9022I - DSNX9COM '-DISPLAY PROC' NORMAL COMPLETION
------ SCHEMA=SYSPROC
PROCEDURE STATUS ACTIVE QUEUED MAXQUE TIMEOUT WLM_ENV
USERPRC2 STOPQUE 0 5 5 3 SANDBOX
USERPRC4 STOPQUE 0 0 1 0 SANDBOX
PROCEDURES USERFNC2 - USERFNC29999999999 STOP QUEUE
PROCEDURES USERFNC4 - USERFNC49999999999 STOP QUEUE
DSNX9DIS DISPLAY PROCEDURE REPORT COMPLETE
DSN9022I - DSNX9COM '-DISPLAY PROC' NORMAL COMPLETION
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
DISPLAY RLIMIT
Example
Display the current status of the resource limit facility.
-DISPLAY RLIMIT
If the resource limit facility (RLF) is inactive, the following output is generated:
DSNT701I - RESOURCE LIMIT FACILITY IS INACTIVE
DSN9022I - DSNTCDIS 'DISPLAY RLIMIT' NORMAL COMPLETION
If the RLF is active, the value of field RESOURCE AUTHID on panel DSNTIPP is
SYSADM, and the resource limit specification table with
RLST NAME SUFFIX = 03 was started, the following output is generated:
DSNT700I = SYSADM.DSNRLST03 IS THE ACTIVE RESOURCE LIMIT
SPECIFICATION TABLE
DSN9022I = DSNTCDIS 'DISPLAY RLIMIT' NORMAL COMPLETION
Distributed threads are those threads that have a connection with a remote location
(active or inactive) or that had a connection with a remote location (indoubt). An
allied thread and a parallel task thread can be distributed or nondistributed; a
database access thread is always distributed.
The -DISPLAY THREAD command allows you to select the type of information you
want to display by using one or more of the following criteria:
v Active threads, inactive threads, indoubt threads, postponed threads, or the set of
active, indoubt, and postponed threads (see discussion under the TYPE option
for more information)
v The allied threads associated with the address spaces whose connection names
are specified
v Allied threads
v Distributed threads
v Distributed threads associated with a specific remote location
v Detailed information about connections with remote locations
v A specific logical unit of work ID (LUWID)
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
# Data sharing scope: Group or member, depending on the value of the SCOPE
# option.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v DISPLAY privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
DISPLAY THREAD
, MEMBER
SCOPE ( )
( connection-name ) GROUP
partial-connection*
( * )
ACTIVE , DETAIL
TYPE( INDOUBT )
* LOCATION( location-name )
INACTIVE partial-location*
POSTPONED *
,
LUWID( luwid )
partial-luwid*
token
,
RRSURID ( rrs-urid )
( * )
Option descriptions
Only under certain conditions, as described below, are any of the following options
required.
If neither (connection-name) nor (*) is specified, then the following rules apply:
v If the command is issued from a DSN session under TSO, a DB2I panel (DB2
COMMANDS), or an IMS or CICS terminal, then the connection name is
inherited from the associated address space.
v If the command is not issued from one of the above environments, then the
following rules apply:
– If neither LOCATION nor LUWID is specified, then processing terminates with
a DSNV413I message.
– If LOCATION or LUWID is specified, then only distributed threads of the type
selected by the TYPE option are displayed.
– When location-name is explicitly specified, then only distributed threads of the
type selected by the TYPE option that either have (active or inactive threads)
or had (indoubt threads) a connection with the specified location are
displayed.
(connection-name, ...)
Lists one or more connection names (of 1 to 8 characters each). Allied threads
are selected only from the address spaces associated with those connection
names. The LOCATION option can restrict what is displayed:
v If LOCATION(*) is specified, then only distributed threads of the type
specified in the TYPE option are displayed.
The default is to display only the connections associated with the transaction
manager from which the command was entered.
# SCOPE
# Specifies the scope of the command.
# (LOCAL)
# Displays only threads on the current member.
# (GROUP)
# Displays all threads on the data sharing group.
# TYPE
Tells what type of thread to display.
Abbreviation: T
(ACTIVE)
Displays only active threads. An active allied thread is connected to DB2 via
TSO, BATCH, IMS, CICS or CAF. An active database access thread is
connected via VTAM to another system and is performing work on behalf of
that system. If, during command processing, an active thread becomes
indoubt, it can appear twice—once as active and once as indoubt.
Abbreviation: A
The information produced by ACTIVE can be useful for debugging
purposes, especially messages DSNV403I and DSNV404I; the contents of
those messages are described in Part 2 of DB2 Messages and Codes.
(INDOUBT)
Displays only indoubt threads.
An indoubt thread is a participant in a two-phase commit protocol that has
completed the first phase of commit, and has then lost communication with
the commit coordinator, and does not know whether to commit or roll back
the updates that have been made.
The indoubt thread information displayed includes threads for which DB2
has a coordinator role, a participant role, or both coordinator and participant
roles.
Usage notes
Formatted report for distributed threads: The series of messages DSNV444I
through DSNV446I augment the formatted report for -DISPLAY THREAD
Threads using private protocol and DRDA access: It is possible for a database
access thread that is connected to a requester to also be connected to another
database server location using DB2 private protocol access or DRDA access. In this
case, DB2 issues message DSNV445I for the requester, and message DSNV444I
and zero or more DSNV446I messages for the remote server connections. In this
case, the database access thread acts as an intermediate database server.
Showing parallel tasks: The DB2 DISPLAY THREAD command shows parallel
tasks by using a status type of PT. The parallel tasks are displayed immediately
after the originating task. If the thread has a status of PT, the connection name
contains blanks if the thread of the originating task is running on the same DB2.
This shows that these parallel tasks are related to the originating task. If the parallel
task is running on a DB2 that is different from the DB2 that runs the originating
task, then the connection name is shown and the entry is followed by message
DSNV443I.
Output
Table 16 shows sample -DISPLAY THREAD commands and the types of output
they generate. The DETAIL keyword is not included because it affects only the
amount of information displayed about a distributed thread.
| If RRSURID(*) is specified, then only threads involved in any RRS URID will be
| displayed. If RRSURID(rrs-urid) is specified, then only threads involved in that
| specific RRS URID will be displayed.
Table 16. Sample DISPLAY THREAD commands. The following output is generated when
commands are issued from different environments with different TYPE specifications.
(Specifying TYPE(*) displays the equivalent output of both TYPE(ACTIVE) and
TYPE(INDOUBT) in one report.)
ACTIVE INDOUBT INACTIVE
Command issued from a DSN session under TSO, DB2I, IMS or CICS, where the
connection name is inherited
-DIS THD 1 1 2
-DIS THD LOC(*) 3 3 2
-DIS THD LOC(location-name) 4 4 2
Command issued from MVS console
-DIS THD 6 6 6
Examples
Example 1: The output of the command DISPLAY THREAD shows a token for
every thread, distributed or not. This example shows the token for an allied thread
that is not distributed. The token is 123. You can use the thread’s token as the
parameter in the command CANCEL THREAD.
-DIS THD(*) DETAIL
Example 3: In this example, a system at STL has a TSO application and an IMS
application. The system at STL fails after DB2 commits the TSO application, but
before the commit decision has been communicated to the participant subsystems
at SJ and LA. The failure occurs before IMS has communicated the commit or
rollback decision to STL’s DB2. The DISPLAY THREAD commands that are issued
after the STL DB2 restarts but before reconnect with IMS. DISPLAY THREAD
commands that are issued at each location show output similar to the following
output:
At STL:
-DIS THD(*) TYPE(INDOUBT)
At San Jose:
-DIS THD(*) TYPE(INDOUBT)
Example 4: This example shows a thread executing within a stored procedure and
a thread waiting for a stored procedure to be scheduled. Assume that an application
makes a call to stored procedure PROC1 and then to stored procedure PROC2.
PROC2 is in a STOP QUEUE state.
The output for PROC1 while it is executing shows a status of SP in the ST column,
which indicates that a thread is executing within a stored procedure:
-DIS THD(*)
The output for PROC2, while it is queued, shows a status of SW in the ST column,
which indicates that a thread is waiting for a stored procedure to be scheduled:
-DIS THD(*)
Example 6: This example shows the detail report for a DB2 client that uses TCP/IP
to access a remote DRDA server.
DISPLAY THREAD(*) LOCATION(*)
Example 7: This example shows the detail report for a DB2 server that is accessed
by a DRDA client using TCP/IP.
DISPLAY THREAD(*) LOCATION(*)
Example 8: This example shows information about units of work whose back-out
processing has been postponed.
-DISPLAY THREAD (*) TYPE (POSTPONED)
Example 9: This example shows the token for a thread that is executing a
user-defined function. The token is 18.
-DISPLAY THREAD(*) DETAIL
| Example 10: This example shows information about a thread that is involved in an
| RRS Unit of Recovery.
| -DIS THD(*) RRSURID(*)
| Example 11: This example shows information about a thread where DB2 is the
| coordinator for an indoubt RRS Unit of Recovery. DB2 has committed the thread
| but has not been able to resolve the RRS UR with RRS.
| -DIS THD(*) TYPE(I) RRSURID(*)
There is an additional option to this command and values for a few options that are
not described here. They are intended for service and use under the direction of
IBM support personnel. For details, see DB2 Diagnosis Guide and Reference.
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
# Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v DISPLAY privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
( * )
DISPLAY TRACE
( PERFM ) LOCAL
( ACCTG ) SCOPE ( )
( STAT ) GROUP
( AUDIT )
( MONITOR )
destination block constraint block DETAIL(output-type) COMMENT(string)
destination block:
DEST( GTF )
SMF
SRV
OPn
constraint block:
* * *
, , ,
* *
, ,
Option descriptions
None of the options are required. The command DISPLAY TRACE lists all active
traces. Each option that is used, except TNO, limits the effect of the command to
active traces that were started using the same option, either explicitly or by default,
with exactly the same parameter values. For example, the command
-DISPLAY TRACE (PERFM) CLASS (1,2)
lists only the active traces that were started using the options PERFM and CLASS
(1,2); it does not list, for example, any trace started using CLASS(1).
(*) Does not limit the list of traces. The default is (*).
The CLASS option cannot be used with -DISPLAY TRACE (*).
Each of the following keywords limits the list to traces of the corresponding type.
For further descriptions of each type, see “-START TRACE (DB2)” on page 299.
See “-START TRACE (DB2)” on page 299 for a list of allowable destinations for
each trace type.
PLAN(plan-name, ...)
Limits the list to traces started for particular application plans. Up to eight plan
names can be used. If more than one name is used, only one value can be
used for AUTHID, TNO, and LOCATION. Do not use this option with STAT.
The default is PLAN(*), which does not limit the list.
AUTHID(authorization-id, ...)
Limits the list to traces started for particular authorization identifiers. Up to eight
identifiers can be used. If more than one identifier is used, only one value can
be used for PLAN, TNO, and LOCATION. Do not use this option with STAT.
The default is AUTHID(*), which does not limit the list.
CLASS(integer, ...)
Limits the list to traces started for particular classes. For descriptions of the
allowable classes, see “-START TRACE (DB2)” on page 299.
The default is CLASS(*), which does not limit the list.
TNO(integer, ...)
Limits the list to particular traces, identified by their trace numbers (1 to 32, 01
to 09). Up to eight trace numbers can be used. If more than one number is
used, only one value each for PLAN, AUTHID, and LOCATION can be used.
The default is TNO(*), which does not limit the list.
LOCATION(location-name, ...)
Limits the list to traces started for threads that have a distributed relationship
with the specified location.
(location-name)
The location names that you supply are the 1 to 16 character identifiers
assigned to the DB2 subsystem whose traces you want to display. Supplying an
* as the location name indicates that the trace display must include all traces
started with any location name qualifier.
You can specify up to eight location names. If you specify more than one
location name, you can only specify one value each for PLAN, AUTHID, and
TNO.
LOCATION cannot be specified when you choose a statistics trace.
Requesters other than DB2 for OS/390 and z/OS: DB2 does not receive a
location name from requesters that are not DB2. To display information about a
requester that is not a DB2 for OS/390 and z/OS subsystem, enter its
LUNAME, enclosed by the less-than (<) and greater-than (>) symbols. For
example, the following command displays information about a remote location
with the LUNAME of LULA:
-DISPLAY TRACE (*) LOCATION (<LULA>)
Examples
Example 1: List all traces that have the generalized trace facility as their only
destination.
-DISPLAY TRACE (*) DEST (GTF)
Example 4: List all active audit traces for threads that are connected to the DB2
subsystem with location name USIBMSTODB23.
-DISPLAY TRACE (AUDIT) LOCATION (USIBMSTODB23)
Example 5: Output from -DISPLAY TRACE is a set of messages that look like this:
- 10.26.34 -DISPLAY TRACE
- 10.26.34 STC 21 DSNW127I - CURRENT TRACE ACTIVITY IS -
- TNO TYPE CLASS DEST QUAL
- 01 STAT 01 SMF NO
- 02 ACCTG 01 SMF YES
- 03 PERFM 01,02,03 GTF YES
- 04 AUDIT 01,02,03,04, SMF YES
- 04 06,07
- 05 MON 01,02,03 OP1 NO
- *********END OF DISPLAY TRACE SUMMARY DATA*********
- 10.26.34 STC 21 DSN9022I - DSNWVCM1 '-DISPLAY TRACE' NORMAL COMPLETION
The output from the command consists of informational messages only. One set of
messages is returned for each job identified by the command. For utility jobs in a
data sharing group, the output shows the member name of the system on which
each utility job is running.
The status from the display represents the current status, except in a data sharing
group when the utility is running on a member other than the one from which the
command is issued. In that case, the status is current as of the last checkpoint.
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Data sharing scope: Group or member, depending on which option you choose
Authorization
None is required.
Syntax
Option descriptions
Use at least one of the following options but do not use the same one more than
once.
(utility-id)
Identifies a single job by its utility identifier, the value given for the UID
parameter when the job was created.
If utility-id was created by the DSNU CLIST by default, it has the form of
tso-userid.control-file-name. For a list of values for control-file-name, see the
description of the UID parameter for the DSNU command procedure (CLIST) in
DB2 Utility Guide and Reference.
If utility-id was omitted, utility-id has the form userid.jobname.
(partial-utility-id*)
Identifies a set of utility jobs. A status message is shown for each utility
identifier that begins with the characters of partial-utility-id.
One set of messages is returned for each job identified by the command.
Usage notes
DISPLAY status: The status displayed in the returned message is the status at the
time the DB2 utility function received the command. Execution has proceeded,
therefore the current state of the utility can be different from the state reported. For
instance, the DISPLAY UTILITY command can indicate a particular utility identifier is
active, but, when the message is received by the requester, the utility job step could
have terminated so that the utility identifier is no longer known to DB2.
Output
The output from -DISPLAY UTILITY consists of informational messages only.
Output during LOG phase of REORG with SHRLEVEL CHANGE: During the
LOG phase of REORG with SHRLEVEL CHANGE, the output of -DISPLAY UTILITY
now includes the additional information found in message DSNU383I as shown in
“Example 4” on page 174 as follows:
Examples
Example 1: Display status information for all utility jobs currently known to DB2.
-DISPLAY UTILITY (*)
Example 2: Display the status of utilities on all members of the data sharing group.
-DB1G DISPLAY UTILITY (*)
The following output, which shows utility jobs on members DB1G and DB2G, is
generated:
DSN (TSO)
The TSO command DSN enables you to issue DSN subcommands, namely:
During a DSN session, you can enter DB2 commands or comments. DB2
commands must start with a hyphen (-). Comments must start with an asterisk (*).
During a DSN session, you can also issue TSO commands, except for FREE, RUN,
TEST, and TIME. To use TSO TEST to debug an application program, execute it
with the DSN command; for example:
TEST 'prefix.SDSNLOAD(DSN)' CP
The ABEND subcommand listed above is used for diagnostic purposes only, and is
intended to be used only under the direction of your IBM Support Center. Use it
only when diagnosing a problem with DSN or DB2. Percent commands are not
recognized during a DSN session, they are only supported by the TSO command
processor.
Environment
A DSN session runs under TSO in either foreground or background mode. When
you run it in background mode, you are not prompted for corrections or additional
required information.
You can also start a DSN session from a CLIST running in either foreground or
background mode.
Authorization
None is required for the DSN command, but authorization is required for most
subcommands.
Syntax
DSN
DSN 0 TEST(integer)
SYSTEM( subsystem-name ) RETRY( integer )
group-attachment-name
YES
GROUP( )
NO
Option descriptions
None of the following options are required.
SYSTEM
| Usage notes
Beginning a DSN session: Issue the DSN command to begin a DSN session,
which allows you to enter DSN subcommands. These rules govern the session:
v In foreground operation, you are prompted for input by the prompt string DSN at
the terminal. In background mode, your input is read from the SYSTSIN data set.
v Except for delimited table names in the DCLGEN command, input in lowercase
letters is changed to uppercase.
v If duplicate keywords of any subcommand are specified, only the last of these
keywords is processed. For example, if both MEMBER(dbrm-member-name1)
and MEMBER(dbrm-member-name2) are specified with BIND PLAN, DB2
receives only the latter, MEMBER(dbrm-member-name2).
v If ATTENTION (PA1) is pressed during a DSN session, and PROMPT is specified
in the TSO user profile, message DSNE005 appears: EXECUTION IS
INTERRUPTED, ENTER C TO CANCEL, OR ANY OTHER REPLY TO RESUME THE
subcommand SUBCOMMAND.
If you enter C, the current subcommand is canceled and the current DB2
connection terminates; a new one is established, and another DSN prompt
appears. Any other reply, except ATTENTION, causes the current subcommand
to continue from the point at which it was interrupted.
If a DSN session is started from a CLIST, or a CLIST is executed under DSN,
CONTROL PROMPT must be specified in the CLIST in order to receive message
DSNE005.
v After a command is processed during a DSN session, you are prompted for
input. That cycle continues until you end the session.
v You can end the session by doing one of the following:
– Issue the END subcommand. Control is passed to TSO.
DSN return code processing: At the end of a DSN session, register 15 contains
the highest value placed there by any DSN subcommand used in the session or by
any program run by the RUN subcommand. Your run-time environment might format
that value as a return code. The value does not, however, originate in DSN.
Examples
Example 1: Start a DSN session. If the attempt to connect to DB2 fails, five retries
(at 30 second intervals) are to be made.
DSN SYSTEM (DB2) RETRY (5)
Example 2: Start a DSN session, run a program, and then end the session and
return to TSO.
TSO prompt : READY
USER enters: DSN SYS (SSTR)
DSN prompt : DSN
USER enters: RUN PROGRAM (MYPROG)
DSN prompt : DSN
USER enters: END
TSO prompt : READY
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires the appropriate level of CICS authority, as described in the
appropriate CICS for MVS/ESA CICS-RACF Security Guide or CICS for MVS/ESA
Operations and Utilities Guide.
Entering the DSNC command requires no privileges from DB2 security. For a
description of the privileges required to issue a DB2 command using the DSNC
command, see the command’s description.
Syntax
DSNC db2-command
destination
Option descriptions
destination
Identifies another terminal to receive display information. It must be a valid
terminal that is defined to CICS and supported by CICS basic mapping support
(BMS).
db2-command
Specifies the exact DB2 command that you want to enter from a CICS terminal.
It must be preceded by a hyphen.
Usage note
Screen scrolling: The CICS SIT table keyword SKRxxxx can be used to support
the scrolling of DSNC DB2 commands from your terminal. For further information
regarding the SIT keywords and parameters, see CICS for MVS/ESA System
Definition Guide.
Example
Example: Issue the DB2 command -DISPLAY THREAD from a CICS terminal.
DSNC -DISPLAY THREAD
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
appropriate CICS for MVS/ESA CICS-RACF Security Guide.
Syntax
Option description
plan-name
Specifies a valid application plan.
Usage notes
Preventing creation of threads: The command DSNC DISCONNECT does not
prevent threads from being created on behalf of transactions. The command only
causes currently connected threads to be terminated as soon as they are not being
used by a transaction. To interrupt a transaction and cancel a thread faster, you can
use the command CANCEL THREAD. For details, see “-CANCEL THREAD (DB2)”
on page 77.
You can stop the transactions associated with a particular plan ID in CICS with the
MAXIMUM setting for TCLASS or MAXACTIVE setting for TRANCLASS. This
prevents new instances of the transaction from causing a re-creation of a thread.
Alternative for protected threads: You may want to deallocate a plan for rebinding
or for running a utility against the database. If you are using a protected thread, use
DSNC MODIFY rather than DSNC DISCONNECT. Modify the THRDA value of the
plan to zero to send all the threads to the pool. The protected thread will terminate
on its own within 60 seconds and DISCONNECT is unnecessary.
Example
Disconnect active threads for PLAN1.
DSNC DISC PLAN1
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
CICS for MVS/ESA CICS-RACF Security Guide or CICS for MVS/ESA Operations
and Utilities Guide.
Syntax
Option descriptions
PLAN plan-name
Displays information about transactions by plan name.
plan-name is a valid plan name for which information is displayed.
Default: If you do not specify plan-name (or if you specify an asterisk, *),
information is displayed for all active plan names listed in the resource control
table.
TRANSACTION transaction-id
Displays information about transactions by transaction ID.
Abbreviation: TRAN
transaction-id is a valid transaction ID for which information is displayed. For a
group transaction entry in the resource control table, you can enter an identifier
for any transaction associated with the group.
Default: If you do not specify a transaction ID, information is displayed for all
active transactions listed in the resource control table.
STATISTICS
Displays the statistical counters associated with each entry in the resource
control table. The counters concern the usage of the available connections of
the CICS attachment facility to DB2.
Abbreviation: STAT
Usage notes
Entering parameters: Because the optional destination is sometimes preceded by
an optional plan name or transaction ID in the command, each parameter must be
unique and separately identifiable as either a name or a terminal identifier. If only
one parameter is entered, it is first checked to see whether it is a plan name or a
transaction ID, and it is then checked as a destination. To use a character string
that is both a plan name or transaction ID and also a valid terminal identifier, you
must use both the name and destination parameters to display the desired
information at the desired terminal.
Output
The following is an example of the output for the DSNC DISPLAY (PLAN or
TRANSACTION) command. For each created thread, the output shows the plan or
transaction name. An 'A' in field A/I indicates that the thread is within a unit of work.
An 'I' indicates that the thread is waiting for a unit of work authorization ID for the
plan being used.
For each entry in the RCT, the output of a DSNC DISPLAY STATISTICS command
as seen in “Example 4” on page 183 displays the following information:
TRAN Transaction name. For group entries, this is the name of the first transaction
defined in the group. DSNC shows the statistics for the TYPE=COMD RCT
entry. POOL shows statistics for the TYPE=POOL entry, unless the
TYPE=POOL entry contains the parameter TXID=x.
PLAN The plan name associated with this entry. Eight asterisks in this field
indicates that this transaction is using dynamic plan allocation. The
command processor transaction DSNC does not have a plan associated
with it because it uses a command processor.
CALLS
The total number of SQL statements issued by transactions associated with
this entry.
Examples
Example 1: Display information on all active plan IDs listed in the resource control
table. The display information is to be sent to another terminal designated as
MTO2.
DSNC DISP PLAN * MTO2
Example 2: Display information about all active transactions listed in the resource
control table.
DSNC DISP TRANSACTION
Example 4: This is an example of the output for the DSNC DISPLAY STATISTICS
command:
DSNC014I STATISTICS REPORT FOR 'DSNCRCTC' FOLLOWS
-----COMMITS-----
TRAN PLAN CALLS AUTHS W/P HIGH ABORTS 1-PHASE 2-PHASE
DSNC 1 1 1 1 0 0 0
POOL POOL 0 0 0 0 0 0 0
XC01 DSNXC01 22 1 11 2 0 7 5
XC02 DSNXC02 0 0 0 0 0 0 0
XA81 DSNA81 0 0 0 0 0 0 0
XCD4 DSNCED4 0 0 0 0 0 0 0
XP03 DSNTP03 1 1 0 1 0 1 0
XA20 DSNTA20 1 1 0 1 0 0 1
XA88 ******** 0 0 0 0 0 0 0
DSNC020I THE DISPLAY COMMAND IS COMPLETE
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
appropriate CICS for MVS/ESA CICS-RACF Security Guide or CICS for MVS/ESA
Operations and Utilities Guide.
Syntax
Option descriptions
DESTINATION
Specifies that the ERRDEST parameter of the resource control table is to be
changed, replacing the “old” destination ID with the “new” destination ID.
Abbreviation: DEST
old
Is any destination ID currently active in the ERRDEST of the resource
control table.
new
Is a new destination identifier. The new destination is verified to ensure that
it is an existing transient data entry in the destination control table.
TRANSACTION
Specifies that the maximum active thread value associated with the given
transaction or group is to be modified.
Abbreviation: TRAN
transaction-id
Is a valid transaction identifier. If the change is for a group transaction entry
in the RCT, any transaction ID associated with the group can be entered to
identify the entry.
integer
Is a new maximum value.
The command DSNC MODIFY TRANSACTION can also allow creation of protected
threads. If THRDS=2, THRDA=2 and THRDM=6 and the value of THRDA is
modified to 1, one of the protected threads is eliminated. If the value of THRDA is
then modified back to 2, the thread that is re-created is protected.
Example
Change the specification of the ERRDEST parameter in the resource control table
from MTO1 to MTO2.
DSNC MODI DEST MTO1 MTO2
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
appropriate CICS for MVS/ESA CICS-RACF Security Guide or CICS for MVS/ESA
Operations and Utilities Guide.
Syntax
QUIESCE
DSNC STOP FORCE
Option descriptions
QUIESCE
Specifies that the CICS attachment facility is to be stopped after CICS
transactions currently running terminate.
Abbreviation: Q
FORCE
Specifies that the CICS attachment facility is to be stopped immediately by
forcing disconnection with DB2, regardless of any transactions that are running.
Usage notes
Requirements for restarting: Using FORCE can leave threads in an indoubt
situation. Restarting requires reconnection of CICS and DB2 to resolve any indoubt
situations. In a data sharing environment, resolution of indoubt situations requires
that the CICS be reconnected to the same DB2 member.
Output destinations: Output from the command DSNC STOP is sent to both the
requesting terminal, and to the transient data queue for error messages defined in
the DSNCRCT TYPE=INITIAL macro.
Example
Stop the CICS attachment facility.
DSNC STOP FORCE
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
appropriate CICS for MVS/ESA CICS-RACF Security Guide or CICS for MVS/ESA
Operations and Utilities Guide.
Syntax
DSNC STRT
rct-suffix ,ssid
Option descriptions
rct-suffix
Specifies the resource control table to be loaded when the CICS attachment
facility starts. The rct-suffix, which can be one or two bytes, is appended to
DSN2CT to create the name of the resource control table. (For example, if you
specify 33 as the rct-suffix, module DSN2CT33 is loaded.)
The default is the suffix specified in the CICS INITPARM parameter, a feature
of the new CICS attachment facility. If a suffix was not specified in INITPARM,
the default is 00, and module DSN2CT00 is loaded.
ssid
Specifies the subsystem ID (SSID) field of the resource control table, which
allows the attachment facility to connect to any DB2 subsystem using just one
resource control table. No blanks are allowed between the suffix and the SSID.
The default is the SSID specified in the CICS INITPARM parameter. If an SSID
was not specified in INITPARM, the default is the SSID specified in the
resource control table.
Usage note
Output destinations: Output from the DSNC START command is sent to both the
requesting terminal, and to the transient data queue for error messages defined in
the DSNCRCT TYPE=INIT macro.
Examples
Example 1: Start the CICS Version 4 Release 1 attachment facility. Use
DSN2CT33 to connect to SSID DB2P.
DSNC STRT 33,DB2P
Example 3: Start the CICS Version 4 Release 1 attachment facility. Use DSN2CTA
to connect to the SSID that is specified in DSN2CTA.
DSNC STRT A
DSNH processing is a sequential process that can include any of the following
actions referred to by the two-letter step name:
Individual steps or a sequence of steps can be performed, and you can end the
process at any point you choose. Any steps in the process that are skipped must
have been previously completed successfully by DSNH. For guidance in preparing
an application program for execution, see DB2 Application Programming and SQL
Guide. See Table 1 on page 7 for a description of the DSN BIND subcommands.
Environment
The DSNH CLIST can run in TSO foreground or in batch under the TSO terminal
monitor program. DB2I uses the DSNH CLIST on the precompiler panel to control
program preparation. You can pass DSNH parameters from DB2I panels on the
″Other options″ lines.
Authorization
See “BIND PACKAGE (DSN)” on page 32 for a description of the privileges
necessary to bind a package.
See “BIND PLAN (DSN)” on page 38 for a description of the privileges necessary to
bind a plan.
See “RUN (DSN)” on page 262 for a description of the privileges necessary to run a
plan.
DSNH INPUT(data-set-name)
clist-parameter
Notation of CLIST parameters for the BIND PLAN and BIND PACKAGE steps:
Many parameters of BIND PLAN and of BIND PACKAGE provide the same function
and are spelled alike. CLIST parameters for BIND PLAN and BIND PACKAGE are
differentiated from general parameters and from each other by prefixes. A
parameter name prefixed by the letter B applies to the BIND PLAN subcommand; a
parameter name prefixed by the letter P applies to BIND PACKAGE.
In Table 18, a prefix is separated from the DB2 parameter name by a slash (/).
Table 17 shows the variations possible for a single parameter name.
Table 17. DSNH CLIST prefixing rules
Parameter value Function or subcommand Example
parameter If no prefix is specified, the parameter applies to DBRMLIB
a single function or subcommand.
B/parameter The prefix B is used to indicate that this variation BDBRMLIB
of the parameter applies only to the BIND PLAN
step.
P/parameter The prefix P is used to indicate that this variation PDBRMLIB
of the parameter applies only to the BIND
PACKAGE step.
The only parameter required on the DSNH statement is INPUT; the others are
optional. In the table of general parameters that follow:
v Parameter values must be enclosed between parentheses.
v Parameter values need not be enclosed between apostrophes. However,
– If the value is a list of tokens with separators, it must be enclosed between
apostrophes.
– If the value is a data set name, your user identifier is prefixed to it. To avoid
the prefix, enclose the name between sets of three apostrophes.
v Most parameter values that are data set names (dsname) cannot include
member names. Exceptions are noted in the parameter descriptions.
v Underlined values are defaults. Default names can be changed to names specific
to your site when DB2 is installed.
LIST displays TSO commands after substitution for symbols and before
command execution.
DEFAULT indicates that the same DBRM library data set defined for the
DB2 precompiler process (DBRMLIB(parameter)) is also used on the
LIBRARY(dsname) subcommand keyword. If the precompiler DBRMLIB was
not specified, then the default generated DBRMLIB library based upon the
INPUT data set name is used.
member is obtained from the data set member name specified on the DSNH
INPUT parameter, or from the data set name as follows:
Given INPUT(outname.DBRM(dbrmmem)):
– outname.DBRM(dbrmmem) - If member name is specified
– outname.DBRM(dbrm) - If no member name is specified
The default is the value of the DECIMAL POINT field, set on the DB2
APPLICATION PROGRAMMING DEFAULTS panel during installation.
DEFAULT designates the value chosen, during installation, for the STRING
DELIMITER field on the APPLICATION PROGRAMMING DEFAULTS panel.
APOST specifies the apostrophe as the string delimiter for host language
statements.
QUOTE specifies a quotation mark as the string delimiter for host language
statements.
ENTRY entry-name Specifies the entry point assigned by the linkage editor.
The default depends on the host language and the value of RUN.
v For the PL/I language, the ENTRY value default is:
– NONE if the RUN value is CICS
– PLISTART for any other RUN value.
v For the ASM language, the ENTRY value default is DLITASM if the RUN
value is IMS.
v For COBOL, the ENTRY value default is DLITCBL if the RUN value is
IMS.
v For any other language, the ENTRY value default is NONE (no specified
entry point) for any RUN value.
FLAG I Tells what messages you want to see. Use one of the values listed to show
C messages of the corresponding types:
E v I All informational, warning, error, and completion messages
W v W Only warning, error, and completion messages
v E Only error and completion messages
v C Only completion messages
FORTLIB dsname Specifies the linkage editor include library to be used for Fortran routines.
The default is the value of the LANGUAGE DEFAULT field, set on the DB2
APPLICATION PROGRAMMING DEFAULTS panel during installation.
IMSPRE prefix Sets the prefix for RESLIB, used for routines to be included by the linkage
editor for IMS.
YES indicates that the linkage editor is to be executed. The DSNHLI entry
point from the precompiler is directed to the appropriate language interface
module specified by the RUN parameter.
The LLIB and LnLIB libraries are concatenated with the XLIB library and the
linkage editor include libraries for the specific host language. Object and
load module libraries must not be mixed in this concatenation.
The default plan name is the first of the following available choices defined
in the INPUT data set:
v DBRM member name
v Leftmost qualifier
This parameter can apply to IBMCOB that also has a prelink step. Whether
the prelink step applies to C or IBMCOB is determined by the choice of
values C, CPP, or IBMCOB for the HOST parameter.
Descriptions of the prelink process for C and IBMCOB are presented in their
respective language publications.
dsname specifies a data set to be used for the output. Do not enclose
dsname between apostrophes. The current user profile is prefixed to
dsname. The following suffixes are also added:
v SYSCPRT.LIST for PL/I macro listings (these listings are overwritten by
the compiler listings)
v PCLIST for precompiler listings
v CXLIST for CICS command translator listings
v LIST for compiler listings
The PRINT parameter is ignored for the compile step when HOST(CPP)
is specified.
v SYSOUT.PRELLIST for C prelink utility listings
v LINKLIST for link-edit listings
LEAVE sends output to the specified print data set. You can allocate the
print data set:
v Dynamically
v In the JCL used to run the DSNH CLIST (if in batch mode)
v With the TSO ALLOCATE command (before running DSNH)
The default is 8.
LEAVE gets input from SYSIN if the only steps taken are LINK and RUN.
LEAVE gets input from FT05F001 if the language is Fortran. Do not use
LEAVE for any other cases.
LEAVE sends output to SYSPRINT if the only steps taken are LINK and
RUN. LEAVE sends output to FT06F001 if the language is Fortran. Do not
use LEAVE for any other cases.
ALL indicates that SQL statements are to be interpreted for use by database
management systems that are not DB2 for OS/390 and z/OS. SQL syntax
checking is deferred until bind time so that the remote location can bind the
resulting DBRM. When SQL(ALL) is in effect, the precompiler issues an
informational message if SAA reserved words are used as identifiers.
SQL(ALL) is the recommended mode if you have written your application to
be executed in a environment that is not DB2 for OS/390 and z/OS.
This parameter is effective only for COBOL. For PL/I, Fortran, and
assembler language programs, the precompiler forces the APOSTSQL
option.
DEFAULT designates the value chosen, during installation, for the SQL
STRING DELIMITER field on the APPLICATION PROGRAMMING
DEFAULTS panel.
APOSTSQL specifies that the string delimiter is the apostrophe (') and the
escape character is the quotation mark (").
QUOTESQL specifies that the string delimiter is the quotation mark (") and
the escape character is the apostrophe (').
SQLFLAG IBM or SAA Specifies the standard to be used to check the syntax of SQL statements.
STD or 86 Deviations from the standard are flagged by informational messages written
ssname to the precompiler output listing.
qualifier
IBM or SAA requests the use of the IBM SQL Version 2 syntax.
ssname requests full semantics checking for catalog access using the
specified DB2 subsystem name. If ssname is not specified, only syntax
checking is performed.
dsname specifies a data set to be used for terminal output. Do not enclose
dsname between apostrophes. The following suffixes are added to dsname:
v PCTERM for precompiler output
v LIST for compiler output
AUTO specifies that the consistency token is used to generate the version
ID. If the consistency token is a timestamp, the timestamp is converted into
ISO character format and used as the version identifier.
The default in any other mode is the UADS unit name for the current TSO
user.
WSECSPAC integer Tells the amount of secondary space to allocate for work data sets, in the
units given by SPACEUN.
DLIBATCH DLIBATCH
IMSBMP IMSBMP
IMSMPP IMSMPP
RRSAF RRSAF
EXPLAIN NO EXPLAIN NO
YES YES
FLAG I FLAG I
C C
E E
W W
IMSBMP NONE1 IMSBMP imsid 1
Keyword is not specified on
imsid subcommand invocation.
IMSMPP NONE1 IMSMPP imsid 1
Keyword is not specified on
imsid subcommand invocation.
ISOLATION RR ISOLATION RR
RS RS
CS CS
UR UR
KEEPDYNAMIC NO KEEPDYNAMIC NO
YES YES
NODEFER NONE1 NODEFER PREPARE 1
Keyword is not specified on
PREPARE subcommand invocation.
OPTHINT (’ ’) OPTHINT (’ ’)
(’hint-id’) (’hint-id’)
DLIBATCH DLIBATCH
IMSBMP IMSBMP
IMSMPP IMSMPP
REMOTE REMOTE
RRSAF RRSAF
PDLIBATCH NONE1 DLIBATCH connection-name 1
Keyword is not specified on
list of subcommand invocation.
connection-ids
PDMEM DEFAULT1 MEMBER dbrm-member- 1
DBRM member name
dbrm-member- name obtained from one of the
name following sources, in the order
NONE2 listed:
v PDBRMLIB member name
v DBRMLIB member name
v INPUT member name, or
generated using dsname
2
Keyword is not specified on
subcommand invocation.
DLIBATCH DLIBATCH
IMSBMP IMSBMP
IMSMPP IMSMPP
REMOTE REMOTE
RRSAF RRSAF
EXPLAIN NO EXPLAIN NO
YES YES
PFLAG I FLAG I
C C
E E
W W
PIMSBMP NONE1 IMSBMP imsid 1
Keyword is not specified on
imsid subcommand invocation.
PIMSMPP NONE1 IMSMPP imsid 1
Keyword is not specified on
imsid subcommand invocation.
PISOLATION NONE1 ISOLATION1 RR 1
For local packages, the
RR RS default value is the same as
RS CS that of the plan appended at
CS UR execution time. For remote
UR NC packages, the default value is
NC RR.
PKEEPDYNAMIC NONE KEEPDYNAMIC NO
NO YES
YES
PNODEFER NONE1 NODEFER PREPARE 1
Keyword is not specified on
PREPARE subcommand invocation.
POPTHINT (’ ’) OPTHINT (’ ’)
(’hint-id’) (’hint-id’)
POWNER NONE1 OWNER authorization-id 1
Keyword is not specified on
authorization-id subcommand invocation.
PACKAGE DEFAULT1 PACKAGE location-name. 1
Member name defined in the
location-name. collection-id INPUT parameter data set, or
collection-id the data set name if no
member name was specified.
PPATH (schema-name) PATH (schema-name)
(USER)(schema- (USER)(schema-
name, USER, ...) name, USER, ...)
Usage notes
CICS translator: Do not use CICS translator options in the source language for
assembler programs; pass the options to the translator with the CICSOPT option.
Several COBOL options require DD statements that are not provided by the DSNH
CLIST, as shown in Table 22.
Table 22. COBOL options that require additional DD statements
Option Statements required for...
CDECK SYSPUNCH
COUNT SYSCOUNT, SYSDBG, SYSDBOUT, SYSUT5, a debug file
DECK SYSPUNCH
DUMP SYSABEND, SYSDUMP, or SYSUDUMP
FDECK SYSPUNCH
FLOW SYSCOUNT, SYSDBG, SYSDBOUT, SYSUT5, a debug file
LVL SYSUT6
STATE SYSCOUNT, SYSDBG, SYSDBOUT, SYSUT5, a debug file
COBOL parameters: The BUF and SIZE parameters passed to the COBOL
compiler might have to be changed.
COPTION: Do not use the COPTION parameter to specify values for the
LINECOUNT, SOURCE, TERM, and XREF compiler options; use the DSNH
LINECOUNT, SOURCE, TERM, and XREF keywords.
Fortran and PL/I considerations: Variable-format input records are not supported.
Library limits: There can be at most eight bind libraries, four precompile libraries,
four compile libraries, and four link-edit libraries.
Link-edit:
v DSNH cannot process programs that need additional link-edit control statements,
and cannot link-edit programs that use the call attachment facility.
v You cannot use the NOLOAD and SYNTAX link-edit options.
NONE is a reserved word: NONE cannot be the name of an input or a load library,
or the value of the string passed with PARMS.
SYSPROC: If compilation is done, the SYSPROC data set must include the DB2
CLIST library.
WORKUNIT parameter: You must use the WORKUNIT parameter when running
the DSNH CLIST in batch mode. This insures that the temporary and intermediate
data sets are allocated to the correct devices.
Examples
Example 1: Precompile, bind, compile, link-edit, and run the COBOL program in
data set prefix.SDSNSAMP(DSN8BC4).
v The compiler load module is in SYS1.LINKLIB (IKFCBL00).
v Additional load modules to be included are in prefix.RUNLIB.LOAD and
prefix.SDSNSAMP.
v The load module is be put into the data set prefix.RUNLIB.LOAD(DSN8BC4).
v The plan name is DSN8BC71 for the bind and run.
v DCLGEN data from prefix.SRCLIB.DATA is required for the precompile.
This example assumes that the DSNH CLIST is in your SYSPROC concatenation.
DSNH INPUT('prefix.SDSNSAMP(DSN8BC4)'') -
COBLOAD('SYS1.LINKLIB(IKFCBL00)'') -
LLIB('prefix.RUNLIB.LOAD'') -
L2LIB('prefix.SDSNSAMP'') -
LOAD('prefix.RUNLIB.LOAD'') -
PLAN(DSN8BC71) -
PLIB('prefix.SRCLIB.DATA'')
The COPTION parameters are enclosed between single apostrophes so that they
are passed by TSO as a single parameter. If a single token is being passed as a
parameter, no apostrophes are needed. That same rule applies to the PARMS and
CICSOPT parameters.
If a data set name is being passed as a parameter, and you want TSO to add your
user prefix, no apostrophes are needed. If the usual TSO prefixing and suffixing
must not be performed, the data set name must be enclosed between sets of three
apostrophes if the CLIST is executed implicitly, and sets of six apostrophes if the
CLIST is executed explicitly.
The user prefix for that example is prefix; if it had been SMITH, the listing data set
names would be as shown above, except that SMITH would be used as the first
level qualifier. For example, the compiler listings would have gone to
SMITH.PROG.LIST.
SYSUT10 and SYSCPRT are always allocated to the same data set or
destination.
v SYSTERM is used in the compile step. It is based on the TERM keyword.
v CEEDUMP is used in the run step. It is based on the RUNOUT keyword.
v The LOPTION keyword values of AMODE(31) and RMODE(ANY) are required
when link editing the C sample program to insure 31-bit addressability during
execution.
ALLOC DD(SYSPROC) DSN('prefix.SDSNCLST ') SHR
%DSNH BIND(YES) ACQUIRE(USE) ACTION(REPLACE)-
EXPLAIN(NO) -
CICSXLAT(NO) -
COMPILE(YES) -
CCLLIB('EDC.V1R1M1.SEDCBASE'')-
CCLOAD('EDC.V1R1M1.SEDCCOMP(EDCCOMP)'')-
DBRM('prefix.DBRMLIB.DATA(DSN8BD3)'')-
DECIMAL(PERIOD) DELIMIT(DEFAULT) FLAG(I)-
HOST(C) ISOLATION(RR)-
INPUT('prefix.SDSNSAMP(DSN8BD3)'')-
LINK(YES)-
LLIB('prefix.RUNLIB.LOAD'')-
L2LIB('prefix.SDSNLOAD'')-
LOAD('prefix.RUNLIB.LOAD'')-
LOPTION('AMODE(31) RMODE(ANY)')-
MACRO(NO)-
OUTNAME(TEMP)-
PLAN(DSN8BD31) PRECOMP(YES)-
PLIB('prefix.SDSNSAMP'')-
PRELINK(NO)-
POPTION(NONE)-
PRINT(TEMP) RCTERM(8)-
RELEASE(COMMIT) RETAIN(YES)-
RUN(NO) RUNIN(TERM)-
RUNOUT(TERM) SOURCE(YES)-
SYSTEM(DSN) SQLDELIM(DEFAULT)-
VALIDATE(RUN)
END (DSN)
The DSN subcommand END is used to end the DSN session and return to TSO.
Environment
This subcommand originates from a TSO input stream when DSN is running in
either background or foreground mode.
Authorization
None is required.
Syntax
END
Usage note
Ending the DSN session in batch or foreground: In batch, if END is not found in
the SYSIN stream, /* or // ends the DSN session. From the foreground, pressing
the ATTENTION key twice ends the DSN session.
Example
End the DSN session and return to TSO.
TSO prompt : READY
USER enters: DSN SYS (SSTR)
DSN prompt : DSN
USER enters: RUN PROGRAM (MYPROG)
DSN prompt : DSN
USER enters: END
TSO prompt : READY
The FREE PACKAGE subcommand deletes corresponding table entries from the
catalog tables. Authorization for a package name is only removed when no more
versions of the package exist. After a version of a package has been freed, that
package name is then available for use in a BIND PACKAGE subcommand to
create a new package.
The FREE PACKAGE subcommand does not proceed until all currently executing
applications using the package finish executing.
Environment
You can enter this subcommand from DB2I, or from a DSN session under TSO that
is running in either foreground or background.
Authorization
To execute this subcommand, the privilege set of the process must include one of
the following:
v Ownership of the package
v BINDAGENT privilege granted by the owner of the package
v SYSCTRL or SYSADM authority
v PACKADM authority for the collection or for all collections
The BIND privilege on a package is not sufficient to allow a user to free a package.
Syntax
FREE PACKAGE
( collection-id . package-id )
location-name. * * .( )
version-id
*
*
I
FLAG( W )
E
C
Usage notes
Freeing multiple packages: If you free multiple packages with this subcommand,
each successful free is committed before freeing the next package.
Freeing trigger packages: You cannot free a trigger package using the FREE
PACKAGE subcommand.
For more information about dropping triggers, see Chapter 5 of DB2 SQL
Reference.
Examples
Example 1: Free version newver of the package TEST.DSN8BC71 located at
USIBMSTODB22. Generate only warning, error, and completion messages (not
informational messages).
FREE PACKAGE (USIBMSTODB22.TEST.DSN8BC71.(newver)) FLAG(W)
Example 2: Free all packages at the local server in the collection named
TESTCOLLECTION.
FREE PACKAGE (TESTCOLLECTION.*)
The FREE PLAN subcommand deletes corresponding table entries from the
SYSIBM.SYSPLAN catalog tables. All authorization against an application plan
name is dropped. The application plan name is then available for use in a BIND
PLAN subcommand to create a new package.
The FREE PLAN subcommand does not proceed until all currently executing
applications using that plan finish executing.
For additional information on plans, see Part 5 of DB2 Application Programming and
SQL Guide.
Environment
You can enter this subcommand from DB2I, or from a DSN session under TSO that
is running in either foreground or background.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v Ownership of the plan
v BIND privilege on the plan
v BINDAGENT privilege granted by the plan owner
v SYSCTRL or SYSADM authority
Syntax
Option descriptions
(plan-name, ...)
Lists the names of one or more plans you want to free.
(*) Frees all application plans over which you have BIND authority. Be careful
when using this form of the command.
FLAG
Indicates what messages you want to see. Use one of the values listed to show
messages of the corresponding types.
(I) All: informational, warning, error, and completion messages.
(W) Only warning, error, and completion messages.
(E) Only error and completion messages.
Usage notes
Freeing multiple plans: If you free multiple plans with this subcommand, each
successful free is committed before freeing the next plan.
If an error occurs on a certain plan specified explicitly in a list or implicitly with (*),
FREE PLAN terminates for that plan and continues with the next plan to be
processed.
Example
Free plan DSN8BC71 from DB2. Generate only warning, error, and completion
messages (not informational messages).
FREE PLAN (DSN8BC71) FLAG (W)
Abbreviation: F
Environment
This command can be issued only from an MVS console.
Authorization
The command requires an appropriate level of MVS authority, as described in
OS/390 MVS System Commands.
Syntax
,DUMP
MODIFY irlmproc,ABEND
,NODUMP
Option descriptions
Parameters must be separated by commas with no spaces.
irlmproc
Identifies the procedure name of the IRLM that is to be terminated.
DUMP
Specifies that IRLM is to terminate abnormally with a U2020 abend. A system
dump is taken to the SYS1.DUMPXX data set. IRLM does not de-register from
ARM.
NODUMP
Specifies that IRLM is to FORCE the DBMS off and terminate normally without
generating a dump. All DBMS work is quiesced and IRLM stops itself.
A second invocation will cause IRLM to terminate abnormally with a U2020
abend; no dump will be taken.
Usage notes
Terminating IRLM: If there are any difficulties terminating IRLM, see “Usage note”
on page 324
Deregistering IRLM: You can use the NODUMP option to deregister IRLM before
stopping it. This action prevents the automatic restart manager from immediately
trying to restart IRLM.
Example
Enter on an MVS system console:
F KRLM001,ABEND
The default is dump. If you do not want a dump, you must specify:
F KRLM001,ABEND,NODUMP
Abbreviation: F
Environment
This command can be issued only from an MVS console.
Authorization
The command requires an appropriate level of MVS authority, as described in
OS/390 MVS System Commands.
Syntax
Option descriptions
Parameters must be separated by commas with no spaces.
irlmproc
Identifies the procedure name of the IRLM instance that is to be diagnosed.
DIAG
Indicates that this is a diagnostic dump.
DELAY
Directs IRLM to generate a dump the first time it detects that child lock
propagation to the coupling facility is taking longer than 45 seconds. The dump
is placed in the SYS1.DUMPxx data set.
| PLOCK
| Directs IRLM to generate a dump the first time it detects that P-lock negotiation
| is taking longer than two minutes. Dumps of the IRLM and DB2 address spaces
| are taken and placed in the SYS1.DUMPxx data set.
| ALL
| Directs IRLM to generate diagnostic dumps for IRLM or DBMS subsystems in a
| data sharing group for the following unusual conditions:
| v P-lock negotiation takes longer than two minutes
| v Child-lock propagation takes longer than 45 seconds
# If IRLM detects a delay in the child-lock propagation process, it retries the XES
# calls in order to recover.
# Note: Always start the IRLM XCF CTRACE internally and wait 30 seconds
# before issuing this command.
# Usage note
# The MODIFY irlmproc,DIAG command should be used only under the direction of
# IBM service.
Restrictions: This command is active for only one incident per IRLM, that is, after
an IRLM instance detects the delay and initiates the dump. You can initiate one
dump per IRLM in the group. You must re-enter the command to initiate another
dump. Be aware that when you enter this command for one member of the data
sharing group, any member that detects the delay initiates a dump.
The irlmproc identifies the procedure name for IRLM. If multiple IRLM instances
exist in the same system, each procedure must have a unique procedure name.
Example
Issue this command to initiate one diagnostic dump for the IR21PROC IRLM
subsystem. The dump occurs once, after the propagation of child locks takes longer
than 45 seconds.
MODIFY IR21PROC,DIAG,DELAY
| Abbreviation: F
| Environment
| This command can be issued only from an MVS console.
| Authorization
| The command requires an appropriate level of MVS authority, as described in
| OS/390 MVS System Commands.
| Syntax
|
MODIFY irlmproc,PURGE,db2name
| Option descriptions
| Use commas with no spaces to separate parameters.
| irlmproc
| Specifies the IRLM that is to process the command.
| db2name
| The DB2 name, as displayed by the STATUS command.
| Usage notes
| DB2 subsystem inactive: The DB2 subsystem which owns the retained locks must
| be inactive or else this command will fail.
| Example
| Example: Enter on an MVS system console:
| F IR21I,PURGE,DB2A
Abbreviation: F
Environment
This command can be issued only from an MVS console.
Authorization
The command requires an appropriate level of MVS authority, as described in
OS/390 MVS System Commands.
Syntax
Option descriptions
Use commas with no spaces to separate parameters.
irlmproc
Specifies the IRLM that is to process the command.
SET
# Sets the following values for this IRLM:
CSA=nnn
Requests that IRLM dynamically set the maximum amount of common
storage area (CSA) for this IRLM to use for lock control structures. nnn
must be a one- to three-digit number from 1 through 999. The number
indicates what multiple of 1 MB of storage the specified IRLM will use.
For example, CSA=6 allows the IRLM to use 6 MB of CSA.
The lock control structures are allocated from extended common
storage area (ECSA) when PC=NO, or from IRLM private region when
PC=YES.
IRLM does not immediately allocate CSA storage for the new value you
set using this command; IRLM allocates storage as needed, not to
exceed the amount of CSA specified. If the amount of storage currently
Usage notes
Determining limits for CSA values: Do not modify the CSA value without first
contacting the system programmer to determine the amount of CSA storage that
can be used for IRLM.
Effect of an IRLM restart: The values you set using the MODIFY irlmproc,SET
command do not persist through a stop and restart of IRLM. The number of trace
buffers for each trace type returns to the default value of 10, and the value for
MAXCSA returns to the value you set for the MAXCSA parameter on the IRLM
startup procedure.
# The value for the number of LOCK Table Entries specifed during normal group
startup and during REBUILD are used in the following order:
# 1. The value specified on the MODIFY irlmproc,SET,LTE= command, if greater
than 0.
# 2. The value from the LTE= in the IRLMPROC, if greater than 0.
| 3. The existing logic, which determines the nearest power of 2 after dividing the
| QUERY size returned by 2 times LTE width based on MAXUSRS.
| If an attempt is made to use a nonzero value from either option number 1 or 2, and
| that value is too large for the structure size returned on the QUERY, then the value
| from the next option in the sequence will be used instead.
Examples
Example 1: Enter on an MVS system console:
# F IR21I,SET,CSA=10
# Explanation: IR21001 is the IRLM subsystem name concatenated with the IRLM
# system ID.
Abbreviation: F
Environment
This command can be issued only from an MVS console.
Data sharing scope: Member or group, depending on which option you choose
Authorization
The command requires an appropriate level of MVS authority, as described in
OS/390 MVS System Commands.
Syntax
,irlmx
MODIFY irlmproc,STATUS
,ALLD
,ALLI
,MAINT
,STOR
,TRACE
Option descriptions
irlmproc
Specifies the IRLM that is to process the command.
irlmx
Specifies which IRLM’s status is to be displayed. irlmx is the concatenation of
the IRLM subsystem name and IRLM member ID as specified in the IRLM
startup procedure (DB2 installation panel DSNTIPI). An example is DB2G2 (ID
is 2).
ALLD
Requests the DB2 subsystem name and status of a DB2 that is identified to an
IRLM. In the data sharing group, this command lists information about all DB2s
that are currently identified to an IRLM, assuming that the IRLM on which the
command is issued is connected to the data sharing group. You can determine
if the IRLM is connected by issuing a MODIFY irlmproc,STATUS command and
checking that the output shows SCOPE=GLOBAL.
If a DB2 is down and holds retained locks, that DB2 is also displayed. However,
the IRLM that is displayed with that DB2 can vary depending on several
circumstances:
v Normally, it is the last IRLM to which DB2 identified.
Usage notes
Messages: If irlmx is not specified, or if this IRLM is in a non-data-sharing
environment, message DXR101I is issued. That message lists each subsystem
connected to the IRLM specified by irlmx, with an indication as to whether the
connection is active.
Examples
Example 1: Enter on the MVS1 system console:
F IRTPROC,STATUS
Explanation: The operator on system 1 has requested information about the DB2
systems connected to the IRLM identified by the IRLM procedure named IRTPROC.
If the IRLM is SCOPE=GLOBAL on the irlmproc and is not connected to any group,
the status message shows:
DXR101I IR21001 STATUS SCOPE=DISCON
Example 2: Assume you have a data sharing group. Enter on a system console:
F DB1GIRLM,STATUS,ALLD
Explanation: The output shows all the DB2s that are connected to IRLMs in this
data sharing group (the group to which the IRLM processing the request belongs).
The value “UP” in the STATUS field indicates that the DB2 is active. Other possible
values for STATUS include:
DOWN
The DB2 is failed. All “modify” type locks held by this DB2 have been
retained by IRLM. The DB2 is known to be down only if it has retained
locks.
SYSFAIL
The IRLM that DB2 is identified to has been disconnected from the data
sharing group. All “modify” type locks held by this DB2 have been retained
by IRLM. The DB2 is known to be SYSFAIL only if it has retained locks.
Example 3: Again, assume data sharing is in effect. Enter the following on the
system console:
F DB1GIRLM,STATUS,ALLI
Explanation: The output shows the IRLMs that are participating in this data sharing
group (the group which includes the IRLM processing the request). Other
information includes:
STATUS
The value “UP” in the STATUS field indicates that the IRLM is active.
Explanation: The output shows information only for the IRLM specified. The group
function level shown is the function level for the specified IRLM. Refer to Example 3
on page 234 for additional information on interpreting output.
Explanation: The example shows that current storage allocated for IRLM is 4048
KB, and the greatest amount that has been allocated since the last time IRLM was
started is 4086 KB. The storage for the locking structures (RHB and RLB) is
contained within ECSA, because this IRLM is defined with PC=NO. Use the
following information to interpret the display output:
PC Displays the current value for the PC option of the
IRLM startup procedure.
For more information, see the explanation of message DXR100I in DB2 Messages
and Codes.
Example 6: Assume the IRLM was started with PC=YES. Enter the following
command on the system console:
F IR21PROC,STATUS,STOR
Explanation: This example was created using a poorly-tuned application, and shows
how important a well-tuned system is for predicting system storage needs. This
example illustrates what can happen when an application generates a high IRLM
For more information about reducing lock contention, see Part 5 (Volume 2) of DB2
Administration Guide. For more information about tuning your system, see Chapter
6 of DB2 Data Sharing: Planning and Administration.
Explanation: This example shows that the storage currently allocated for IRLM
tracing is 256 KB, the maximum number of trace buffers allowed per trace type is
set to 10, and the external CTRACE writer is not active. For more information about
the trace types, see “TRACE CT (MVS IRLM)” on page 340.
Use the TRACE CT command of MVS on page 340 to activate or deactivate traces.
You cannot turn off the EXP and INT traces. The XIT (for data sharing), EXP, and
INT traces are automatically activated when you start IRLM. All traces are
automatically activated with IRLMPROC TRACE=YES.
The trace size for each buffer is 64 KB. Use the MODIFY irlmproc,SET,TRACE=nnn
command on page 228 to change the maximum number of trace buffers.
| Explanation: The output shows the maintenance levels of IRLM load module
| CSECTS in a two-column format.
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Before you modify an active trace, ensure that an IFI application program or the IFC
Selective Dump utility (DSN1SDMP) did not start the trace. If you modify a trace
started by DSN1SDMP, the DSN1SDMP utility abnormally terminates. When
DSN1SDMP terminates, it stops the trace. This stop could interfere with the
MODIFY TRACE command which stops and restarts the trace.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v TRACE privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
*
,
IFCID( ifcid_nbr )
COMMENT(string)
Option descriptions
TRACE
Determines which IFCIDs are started. For more descriptions of each trace type,
see “-START TRACE (DB2)” on page 299.
One additional trace type is not described here. It is intended for service and is
to be used under the direction of IBM support personnel. For details, see DB2
Diagnosis Guide and Reference.
CLASS(integer, ...)
Limits the list to IFCIDs started for specified classes.
Abbreviation: C
integer is a class to which the list of IFCIDs started is limited. For descriptions
of the allowable classes, see “-START TRACE (DB2)” on page 299.
The default is CLASS(*), which starts all default IFCID classes.
TNO(integer)
Specifies the particular trace to be modified, identified by its trace number (1 to
32, 01 to 09). You can only specify one trace number. TNO is a required option
for the MODIFY TRACE command.
No default exists for the TNO keyword.
IFCID( ifcid_nbr, ...)
Specifies which other IFCIDs (trace events), in addition to those IFCIDs
contained in the classes specified in the CLASS option, are to be started. To
start only those IFCIDs specified in the IFCID option, use trace classes 30-32.
These classes have no predefined IFCIDs and are available for a location to
use. (See “Example” for an example of activating only those trace events
specified in the IFCID option.)
If you do not specify the IFCID option, only those IFCIDs contained in the
activated trace classes are started.
The maximum number of IFCIDs is 156. The range of values that are valid for
the IFCID option is 1 through 350, with the exception of: 4, 5, 185, 187, 217,
232, 234, 240, and 241.
The default is IFCID(*).
COMMENT(string)
Gives a comment that is reproduced in the trace output record (except in the
resident trace tables).
string is any character string; it must be enclosed between apostrophes if it
includes a blank, comma, or special character.
Example
Change trace number 6 so that it collects only statistics and accounting data. You
can define CLASS(30) at your site.
-MODIFY TRACE(S) IFCID(1,2,3) TNO(6) CLASS(30)
COMMENT ('STATS AND ACCOUNTING ON')
REBIND PACKAGE is generally faster and more economical than BIND PACKAGE.
You should use BIND PACKAGE with the ACTION(REPLACE) option under the
following conditions:
v When you change the SQL statements
v When you recompile the program
v You previously ran BIND PACKAGE with the SQLERROR(CONTINUE) option
For more information on using REBIND PACKAGE, see Part 5 of DB2 Application
Programming and SQL Guide.
Environment
You can use REBIND PACKAGE through DB2I, or enter the REBIND PACKAGE
subcommand from a DSN session running in foreground or background.
Authorization
The package owner must have authorization to execute all SQL statements
embedded in the package for REBIND PACKAGE to build a package without
producing error messages. For VALIDATE(BIND), DB2 verifies the authorization at
bind time. For VALIDATE(RUN), DB2 verifies the authorization initially at bind time,
but if the authorization check fails, DB2 rechecks it at run time.
For additional information on the authorization required to execute BIND PLAN, see
Part 5 (Volume 2) of DB2 Administration Guide.
REBIND PACKAGE
( collection-id . package-id )
location-name. * * .( )
version-id
*
*
OWNER(authorization-id) QUALIFIER(qualifier-name) CURRENTDATA( YES )
NO
DBPROTOCOL ( DRDA ) DEFER(PREPARE) DEGREE( 1 )
PRIVATE NODEFER(PREPARE) ANY
DYNAMICRULES( RUN ) ENCODING( ASCII ) EXPLAIN( YES )
BIND EBCDIC NO
DEFINE UNICODE
INVOKE ccsid
I IMMEDWRITE( NO ) ISOLATION( RR )
FLAG( W ) PH1 RS
E YES CS
C UR
NC
NOREOPT(VARS)
NO REOPT(VARS) OPTHINT ( ’hint-id’ )
KEEPDYNAMIC( YES )
,
PATH( schema-name )
USER
(1) RELEASE( COMMIT ) VALIDATE( RUN )
PATHDEFAULT DEALLOCATE BIND
Notes:
1 The PATHDEFAULT keyword is mutually exclusive with the PATH keyword. Do not specify both
keywords in the same REBIND command.
enable block
,
ENABLE ( BATCH )
DISABLE DLIBATCH ,
DB2CALL
CICS DLIBATCH( connection-name )
IMS ,
IMSBMP
IMSMPP CICS( applid )
REMOTE ,
RRSAF
ENABLE(*) IMSBMP( imsid )
,
IMSMPP( imsid )
,
REMOTE( location-name )
<luname>
Option descriptions
For descriptions of the options shown in the syntax diagram, see “Options of BIND
and REBIND for PLAN, PACKAGE, and TRIGGER PACKAGE” on page 44.
Usage note
If you rebind multiple packages, DB2 commits each successful rebind before
rebinding the next package.
Example
Rebind packages TEST.DSN8BC71.(MAY_VERSION) and
PRODUCTION.DSN8BC71.(DEC_VERSION), both located at the local location
USIBMSTODB22. The packages can run only from the CICS or the DLIBATCH
environments if the connection ID is CON2. This replaces the CON1 specified on
the BIND PACKAGE command.
REBIND PACKAGE (USIBMSTODB22.TEST.DSN8BC71.(MAY_VERSION),
USIBMSTODB22.PRODUCTION.DSN8BC71.(DEC_VERSION)) -
ENABLE (CICS,DLIBATCH) CICS (CON2)
REBIND PLAN is generally faster and more economical than BIND PLAN. But if
you change the SQL statements or recompile a program, you should use BIND
PLAN with the option ACTION(REPLACE).
For more information on using REBIND PLAN, see Part 5 of DB2 Application
Programming and SQL Guide.
Environment
You can use REBIND PLAN through DB2I, or enter the REBIND PLAN
subcommand from a DSN session running in foreground or background.
Authorization
The plan owner must have authorization to execute all SQL statements embedded
in the plan for REBIND PLAN to build a plan without producing error messages. For
VALIDATE(BIND), DB2 verifies the authorization at bind time. For VALIDATE(RUN),
DB2 verifies the authorization initially at bind time, but if the authorization check
fails, DB2 rechecks it again at run time. If you use the PKLIST keyword, you must
have EXECUTE authority for the packages or collections specified on PKLIST.
, NODEFER(PREPARE)
DEFER(PREPARE)
PKLIST( collection-id .package-id )
location-name. * .*
*.
NOPKLIST
ACQUIRE( USE ) CACHESIZE(decimal-value) CURRENTDATA( NO )
ALLOCATE YES
CURRENTSERVER(location-name) DBPROTOCOL ( DRDA ) DEGREE( 1 )
PRIVATE ANY
DISCONNECT( EXPLICIT ) DYNAMICRULES( RUN ) ENCODING( ASCII )
AUTOMATIC BIND EBCDIC
CONDITIONAL UNICODE
ccsid
EXPLAIN( NO ) I IMMEDWRITE( NO )
YES FLAG( W ) PH1
E YES
C
NOREOPT(VARS)
ISOLATION( RR ) NO REOPT(VARS) OPTHINT ( ’hint-id’ )
RS KEEPDYNAMIC( YES )
CS
UR
, (1) RELEASE( COMMIT )
PATHDEFAULT DEALLOCATE
PATH( schema-name )
USER
SQLRULES( DB2 ) VALIDATE( RUN )
STD BIND
Notes:
1 The PATHDEFAULT keyword is mutually exclusive with the PATH keyword. Do not specify both
keywords in the same REBIND command.
enable block
,
ENABLE ( BATCH )
DISABLE DLIBATCH ,
DB2CALL
CICS DLIBATCH( connection-name )
IMS ,
IMSBMP
IMSMPP CICS( applid )
RRSAF ,
ENABLE(*)
IMSBMP( imsid )
,
IMSMPP( imsid )
Option descriptions
For descriptions of the options shown in the syntax diagram, see “Options of BIND
and REBIND for PLAN, PACKAGE, and TRIGGER PACKAGE” on page 44.
Usage note
If you rebind multiple plans, DB2 commits each successful rebind before rebinding
the next plan.
Example
Rebind plan DSN8BC71 to enable DB2 to take advantage of a newly created index.
Use FLAG(W) to issue warning, error, and completion messages, but not
informational messages. Use VALIDATE(BIND) to point out any error conditions
during the bind process. Use ISOLATION(CS) to prevent other applications from
changing the database values that this application uses only while the application is
using them. This isolation level protects changed values until the application
commits or terminates. Omit the OWNER keyword to leave the plan’s owner
authorization ID the same. Omit the ENABLE or DISABLE keywords to use the
connections previously defined for the plan.
REBIND PLAN (DSN8BC71) -
FLAG (W) -
VALIDATE (BIND) -
ISOLATION (CS)
If the rebind is successful, the trigger package is marked valid. When REBIND
TRIGGER PACKAGE(*) is issued, the rebind will affect all trigger packages that the
issuer is authorized to rebind. Trigger packages cannot be rebound remotely. The
location name is permitted when specifying the package name on a REBIND
TRIGGER PACKAGE subcommand. However, the location name must not refer to a
remote location.
For more information on using REBIND TRIGGER PACKAGE, see Part 5 of DB2
Application Programming and SQL Guide.
Environment
You can use REBIND TRIGGER PACKAGE through DB2I, or enter the REBIND
TRIGGER PACKAGE subcommand from a DSN session that is running in
foreground or background.
Authorization
To build a package without producing error messages, the package owner must
have authorization to execute all SQL statements that are embedded in the
package for REBIND TRIGGER PACKAGE.
To execute this subcommand, the privilege set of the process must include one of
the following authorities:
v Ownership of the trigger package
v BIND privilege on the trigger package
v BINDAGENT privilege from the owner of the trigger package
v PACKADM authority on the collection or on all collections
v SYSADM or SYSCTRL authority
When the trigger package is bound, the privileges of the current authorization ID
are used when checking authority to bind statements within the triggered action. On
REBIND TRIGGER PACKAGE, one of the following authorizations is needed:
v Ownership of the package
v BIND privilege on the package
v BINDAGENT privilege granted from owner
v PACKADM, SYSADM, or SYSCTRL
CURRENTDATA( YES ) ENCODING( ASCII ) EXPLAIN( YES )
NO EBCDIC NO
UNICODE
ccsid
I IMMEDWRITE( NO ) ISOLATION( RR )
FLAG( W ) PH1 RS
E YES CS
C UR
NC
RELEASE( COMMIT )
DEALLOCATE
Option descriptions
TRIGGER PACKAGE
Determines what trigger package or packages to rebind.
The following options identify the location, collection, and package name of the
package. You can identify a location and collection. For REBIND TRIGGER, you
must identify a trigger package name.
location-name
Identifies the current local location. Remote rebind of a trigger package is
not allowed. location-name is the location of the DBMS where the package
rebinds and where the description of the package resides.
The default is the local DBMS.
collection-id or *
Identifies the schema-name that already contains the trigger package to
rebind. No default exists.
For REBIND TRIGGER, you can use an asterisk (*) to rebind all local
packages with the specified package-id in all the collections for which you
have bind privileges.
package-id or *
Identifies the name of the trigger package to rebind, as listed in the NAME
column of the SYSPACKAGE catalog table. No default exists.
You can use the pattern-matching character (*) to rebind all local triggers in
collection-id for which you have bind privileges.
For descriptions of the options shown in the syntax diagram, see “Options of BIND
and REBIND for PLAN, PACKAGE, and TRIGGER PACKAGE” on page 44.
Usage notes
Restrictions on trigger packages: A trigger package can be explicitly rebound, but
it cannot be explicitly bound using the BIND PACKAGE subcommand.
A trigger package cannot be copied, and it can only be rebound locally. Remote
rebind of a trigger package is not allowed.
Output
REBIND TRIGGER PACKAGE updates the COLLID and NAME columns in the
SYSPACKAGE catalog table.
Example
Issue the following command to rebind trigger package TRIG1 in the ADMF001
collection of packages:
REBIND TRIGGER PACKAGE (ADMF001.TRIG1);
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v BSDS privilege
v SYSCTRL or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
RECOVER BSDS
Usage note
-RECOVER BSDS following a BSDS I/O error: For a detailed description of steps
the installation must take to reestablish dual BSDS mode after a BSDS I/O error
occurs, see Part 4 (Volume 1) of DB2 Administration Guide.
Example
Reestablish dual BSDS mode.
-RECOVER BSDS
This command should only be used when automatic resolution will not work. It is
also critical that the commit/abort decision (that is made by the coordinator) must be
determined.
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v RECOVER privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
ID( correlation-id )
*
,
NID( network-id )
,
LUWID( luwid )
token
Option descriptions
(connection-name)
Is a one- to eight-character connection name. Allied threads (including those
that are distributed) belonging to that connection name are recovered. This
parameter is ignored if LUWID is specified.
Usage note
When to use a network ID: network-id is not normally needed, because
correlation-id can identify indoubt threads. However, if correlation-id is not unique,
network-id must be used. This statement does not apply if a LUWID is specified.
Examples
Example 1: Recover indoubt allied threads. Schedule a commit for all threads
associated with the connection name from which the command is entered.
-RECOVER INDOUBT ACTION(COMMIT) ID(*)
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), or an IMS or CICS terminal.
Authorization
To execute this command, the privilege set of the process must include one of the
following authorities:
v RECOVER privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
RECOVER POSTPONED
CANCEL
| Option descriptions
| CANCEL
# Specifies to stop DB2 processing of all postponed abort units of recovery
# immediately. Cancelling postponed abort units of recovery leaves objects in an
# inconsistent state.
# Objects that the postponed units of recovery modify are recovered (backed out).
# If back out processing fails, the objects are marked REFRESH PENDING
# (REFP) and either RECOVER PENDING (RECP) or REBUILD PENDING
# (RBDP or PSRBD) in the database exception table. Resolve the REFP status of
# the object by running the RECOVER utility to recover the object to a prior point
# in time or by running LOAD REPLACE on the object.
| Usage note
Recovery action: Recovery (rollback) action is always taken for all POSTPONED
ABORT units of recovery.
Output
The output from -RECOVER POSTPONED consists of informational messages
only.
Example
Issue the following command to recover postponed-abort units of recovery.
-RECOVER POSTPONED
If postponed-abort units of recovery are found, output similar to the following output
is generated:
DSNV435I - RESOLUTION OF POSTPONED ABORT URS HAS BEEN SCHEDULED
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.IPKD013A PART 00000004.
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.TPKD0103 PART 00000004.
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.IXKD013C PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.IUKD013B PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.IPKD013A PART 00000002.
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.TPKD0103 PART 00000002.
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0101.IXKD011C PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0101.IXKD011B PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0101.IUKD011A PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0101.TLKD0101 PART (n/a).
DSN9022I - DSNVRP 'RECOVER POSTPONED' NORMAL COMPLETION
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
Option descriptions
(luname)
Specifies the real VTAM LU name of the partner whose generic LU name
mapping is being purged. The NETID of this partner LU must be the same as
the local DB2 NETID.
(netid.luname)
Indicates the VTAM shared memory information associated with the specified
NETID and LUNAME is purged.
(*) Purges the VTAM shared memory information for all partners of this DB2
subsystem. This command option should only be used if you are planning to
remove this DB2 subsystem from the DB2 group.
Usage notes
The following conditions must be satisfied for the RESET GENERICLU command to
be successful:
Examples
Example 1: Purge the VTAM generic name mapping associated with partner
NET1.USER5LU.
-DB2A RESET GENERICLU(NET1.USER5LU)
Example 2: Purge the VTAM generic name mappings for all LUs that are partners
of this DB2 subsystem. Use this version of the command only when removing this
DB2 from the data sharing group.
-DB2A RESET GENERICLU(*)
This command must be used to purge indoubt thread information in the following
situations:
v For threads where DB2 has a coordinator responsibility that it cannot fulfill
because of participant cold start, sync point protocol errors, or indoubt resolution
protocol errors.
v For threads that were indoubt but were resolved with the RECOVER INDOUBT
command, and subsequent resynchronization with the coordinator shows
heuristic damage.
The RESET column of a display thread report for indoubt threads indicates
whether information in the report must be purged with this command.
This command can also be used to purge indoubt thread information for threads
where:
v DB2 has a coordinator responsibility even when no errors have been detected
that preclude automatic resolution with the participants. The FORCE keyword
must be specified to purge this information. Resynchronization with affected
participants is not performed.
v DB2 has a participant responsibility even when no errors have been detected
that preclude automatic resolution with the coordinator. Resynchronization with
the coordinator will not be performed.
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v RECOVER privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
LOCATION( location-name )
,
IPADDR( nnn.nnn.nnn.nnn:port )
* FORCE
,
LUWID( luwid )
token LOCATION(location-name)
Option descriptions
LUNAME(luname, ...)
Purges all qualifying indoubt information that pertains to the named LUNAME.
luname
Is expressed as a one- to eight-character name. If you use more than one
LUNAME, separate items in the list by commas.
(*) Purges indoubt information for all SNA locations.
FORCE
Forces the purging of coordinator and participant indoubt resolution
responsibility even when no errors that preclude automatic resolution have been
detected. FORCE can be used in conjunction with IPADDR or LUNAME.
Purging resynchronization information when no errors that preclude automatic
resynchronization have been detected simulates a cold start. Thus, no
connections can exist between DB2 and the named partner when this command
is executed. After execution of the FORCE option, the next connection with the
named partner location will be a cold start connection. If a connection with the
named partner exists at the time this command is executed, execution fails with
message DSNL448I.
FORCE can be used to bypass warm start connectivity problems when errors
occurring in the recovery log name exchange result in the partner refusing the
connection attempt.
LOCATION(location-name, ...)
Purges all qualifying indoubt information pertaining to the named location.
location-name is expressed as a 1- to 16-character name, and identifies the
partner, whether it is a requester or server. If the partner is not a DB2 for
OS/390 and z/OS subsystem, the location name may be expressed as a:
v One- to eight-character luname, as defined to VTAM at the server location.
This name must be enclosed with the less than (<) and the greater than (>)
characters to distinguish it from a DB2 location name.
v Dotted decimal TCP/IP address.
Output
The response from this command includes any of the messages from DSNL440I
through DSNL449I.
Usage notes
Purging participant indoubt information: Be cautious when using the FORCE
option to purge participant indoubt information. Normally, after the use of the
RECOVER INDOUBT command, automatic resolution with the coordinator
determines if heuristic damage has occurred. This detection is lost if RESET
INDOUBT is used before automatic resolution with the coordinator can be achieved.
RUN (DSN)
The DSN subcommand RUN executes an application program, which can contain
SQL statements.
Environment
This subcommand can be issued under the DSN command processor running in
either foreground or background mode, or it can be issued using the DB2I RUN
panel.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v EXECUTE privilege on the plan
v Ownership of the plan
v SYSADM authority
To run an application, the plan must be enabled for your local server. Any
associated packages from which you execute statements must also be enabled.
Syntax
RUN PROGRAM(program-name)
PLAN(plan-name) LIBRARY(library-name)
CP PLAN(plan-name)
PARMS(parameter-string)
Option descriptions
Use at least one of the two following clauses, but do not use the same clause
twice.
PROGRAM (program-name)
Identifies the program you want to run.
CP
Directs input to the user’s command processor, and causes a prompt to be
issued: 'ENTER TSO COMMAND'. This is useful for running command
processors and debugging programs (for example, COBTEST).
Processing the specified TSO command creates a new task control structure
under which the TSO command executes. All application programs initiated
from this TSO command session also execute under the same task structure,
and must establish a new connection to DB2 if they use SQL requests.
When the TSO command completes, the new task structure is terminated, and
control is returned to the original DB2 connection and task structure established
by the DSN command.
Later TSO commands can be issued directly from the DSN session, or through
the RUN subcommand with the CP option.
Usage note
Multitasking restriction: When running a program that uses a multitasking
environment, the first task to issue an SQL statement must issue all subsequent
SQL calls. That is, only one task in a multitasking environment can issue SQL calls.
This task must be a subtask of, or running at the same TCB level as, the DSN main
program.
Examples
Example 1: Run application program DSN8BC4. The application plan has the same
name. The program is in library 'prefix.RUNLIB.LOAD'.
DSN SYSTEM (DSN)
RUN PROGRAM (DSN8BC4) LIB ('prefix.RUNLIB.LOAD')
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v ARCHIVE privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
SET ARCHIVE
COUNT ( integer ) TIME( minutes )
,seconds
,seconds
1440
NOLIMIT
DEFAULT
Option descriptions
The following options overrule the READ TAPE UNITS(COUNT) and DEALLC
PERIOD TIME subsystem parameters specified at installation.
COUNT(integer)
Specifies the maximum number of tape units that can be dedicated to reading
archive logs. This value affects the allowed concurrent reads for unique archive
data sets residing on tapes.
integer can range from 1 to 99.
v If the number specified is greater than the current specification, the maximum
number of tape units allowable for reading archive logs increases.
v If the number specified is less than the current specification, tape units that
are not being used are immediately deallocated to adjust to the new COUNT
Usage notes
Archive tape reading performance: To achieve the best performance for reading
archive tapes, specify the maximum values allowed (within system constraints) for
both the COUNT and TIME options.
Output
The response from this command includes any of the messages from DSNJ334I
through DSNJ337I.
Examples
Example 1: Allocate two tape units that can remain unused for 30 seconds before
they are deallocated.
-SET ARCHIVE COUNT(2) TIME(,30)
Example 2: Allocate four tape units that can remain unused for 2 minutes before
they are deallocated.
-SET ARCHIVE COUNT(4) TIME(2)
| Environment
| This command can be issued from an MVS console, a DSN session under TSO, a
| DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
| instrumentation facility interface (IFI).
| Authorization
| To execute this command, the privilege set of the process must include SYSOPR,
| SYSCTRL, or SYSADM authorities. DB2 commands that are issued from an MVS
| console are not associated with any secondary authorization IDs.
| Syntax
|
| Option descriptions
| LOAD(load-module-name)
| Specifies the name of the load module to load into storage. The default load
| module is DSNZPARM.
| RELOAD
| Reloads the last named subsystem parameter load module into storage.
| STARTUP
| Resets loaded parameters to their startup values.
| Usage notes
| To update the subsystem parameters on a subsystem, follow these steps:
| 1. Run through the installation process in Update mode.
| 2. Produce a new subsystem parameter load module.
| 3. Issue the SET SYSPARM command.
| Examples
| Example 1: Change from DSNZPARM to ADMPARM1
| -SET SYSPARM LOAD(ADMPARM1)
| Example 3: Reload the subsystem parameters that the DB2 subsystem loaded at
| startup
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following authorities:
v ARCHIVE privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands that are issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
Option descriptions
The following option overrules the LOGLOAD subsystem parameter that is specified
in the CHECKPOINT FREQ field on panel DSNTIPN at installation.
LOGLOAD(integer)
Specifies the number of log records that DB2 writes between the start of
successive checkpoints. You can optionally specify a value of 0 to initiate a
system checkpoint without modifying the current LOGLOAD value.
integer can be 0, or within the range from 200 to 16000000.
| CHKTIME(integer)
| Specifies the number of minutes between the start of successive checkpoints.
| This option overrides log records specified by installation options or the
| LOGLOAD option that are based on checkpoint frequency.
| integer can be any integer value from 0 to 60. Specifying 0 starts a system
| checkpoint immediately without modifying the checkpoint frequency.
| SUSPEND
| Specifies to suspend logging and update activity for the current DB2 subsystem
| until SET LOG RESUME is issued. DB2 externalizes unwritten log buffers,
| takes a system checkpoint (in non-data sharing environments), updates the
Usage notes
How LOGLOAD and CHKTIME values affect DB2 performance: LOGLOAD and
CHKTIME values can affect the amount of time needed to restart DB2 after
abnormal termination. A large value for either option can result in lengthy restart
times. A low value can result in excessive checkpointing. However, When you
specify LOGLOAD(0) or CHKTIME(0), the checkpoint request is synchronous when
issued from a batch job, and asynchronous when issued from an MVS or TSO
console.
Use the DISPLAY LOG command to display the current LOGLOAD setting.
| The value that you specify for LOGLOAD or CHKTIME is reset to the value
| specified in the subsystem parameter when DB2 is restarted. If you load a different
| value by issuing the command SET SYSPARM, the new value is used.
| When to suspend logging: Specify SET LOG SUSPEND before making a remote
| copy of the entire database and logs for a system-level, point-in-time recovery or
| disaster recovery. You can make remote copies with peer-to-peer remote recovery
| (PPRC) and FlashCopy. Suspending logging to make a remote copy of the
| database lets you avoid quiescing update activity. Read-only activity continues while
| logging is suspended.
| The backup made between the SET LOG SUSPEND and the SET LOG RESUME
| window might contain uncommitted data. If you must restore the entire DB2
| subsystem to the time when the log was suspended, restore the entire database
| and logs from the backup, then restart DB2 to recover the entire DB2 subsystem to
| a consistent state. For details, see Part 4 (Volume 1) of DB2 Administration Guide.
Examples
Example 1: Initiate a system checkpoint without modifying the current LOGLOAD
value.
-SET LOG LOGLOAD(0)
SPUFI (DSN)
The DSN subcommand SPUFI executes the SQL processor using file input.
Environment
You can use this subcommand only under ISPF. You can issue it from ISPF option
6, or from a CLIST.
Authorization
None is required.
Syntax
SPUFI
Usage notes
SPUFI session: The effect of the SPUFI subcommand is to execute SPUFI and to
present the SPUFI panel as the start of a SPUFI session. For a description of the
panel and instructions on using SPUFI, see Part 1 of DB2 Application Programming
and SQL Guide.
In the SPUFI session, you can access the CURRENT SPUFI DEFAULTS panel.
You can change DB2I defaults by splitting the screen and accessing the DB2I
DEFAULTS panel, or by changing the defaults before starting the SPUFI session.
SPUFI panel variables: The SPUFI panel variables you enter after invoking SPUFI
directly with the DSN command are not saved in the same place. Panel variables
therefore vary depending on whether you execute the facility directly, or through
DB2I.
/SSR (IMS)
The IMS /SSR command allows the IMS operator to enter an external subsystem
command.
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in the
IMS Administration Guide: System.
In addition, the set of privileges held by the primary authorization ID or any of the
secondary authorization IDs must include the authority to enter the DB2 command
that follows /SSR. For a description of the privileges required to issue a DB2
command, see the description of the appropriate DB2 command in this book.
Syntax
/SSR subsystem-command
Option description
subsystem-command
Specifies a valid subsystem command. The first character following /SSR must
be the subsystem recognition character of the subsystem to which the
command is to be directed (DB2).4
Usage note
Routing the command: IMS uses the command recognition character (CRC) to
determine which external subsystem, in this case DB2, receives the command. The
only action taken by IMS is to route the command to the appropriate subsystem.
4. The subsystem recognition character is defined in the IMS SSM member for the external subsystem.
/START (IMS)
The IMS /START command (with the SUBSYS parameter) makes connection
between IMS and the specified external subsystem available. Establishing the
connection allows application programs to access resources managed by the
external subsystem.
The following is only a partial description of the /START command. For a complete
description, see IMS Command Reference.
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in the
IMS Administration Guide: System.
Syntax
/START
,
SUBSYS subsystem-name
SUBSYS ALL
Option descriptions
SUBSYS
Specifies one or more names of external subsystems to be connected to IMS,
or all external subsystems.
subsystem-name, ...
Identifies one or more names of external subsystems to be connected to
IMS.
ALL
Indicates that all external subsystems are to be connected to IMS.
Usage note
Inactive entries: The copy in main storage of the external subsystem PROCLIB
entry is refreshed as part of /START command function when that entry is not active
(that is, when the connection does not exist). This allows the installation to stop the
subsystem connection, change the specifications in the PROCLIB entry, then restart
the subsystem connection without bringing down IMS.
In a data sharing environment, the command can be issued from any DB2 on the
group that has access to the database.
Abbreviation: -STA DB
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
All databases specified for which the privilege set of the process has the STARTDB
privilege are started. The privilege set of the process must include one of the
following:
v STARTDB privilege
v DBMAINT, DBCTRL, or DBADM authority
v SYSCTRL or SYSADM authority
When this set does not contain the STARTDB privilege for a specified database, an
error message is issued.
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Database DSNDB06 contains the table spaces and index spaces required to check
the authorization for using START DATABASE. If a table or index space required for
this authorization check is stopped, or is unavailable because it is in LPL or GRECP
status, then installation SYSADM authority is required to start any data base, table
space, or index space, including the ones required for the authorization check.
Installation SYSOPR authority may also start DSNDB06 but only when in LPL or
GRECP status and if access mode is not changed.
,
SPACENAM( space-name )
* ,
spacename1:spacename2
spacename* PART( integer )
*spacename integer1:integer2
*spacename*
*spacestring1*spacestring2*
RW
ACCESS( RO )
UT
FORCE
Option descriptions
(database-name, ...)
Is the name of a database, or database for the table spaces or index spaces
that are to be started. If you use more than one name, separate names in the
list by commas.
(*) Starts all databases for which the privilege set of the process has at least
DBMAINT authority (except databases that are already started). You cannot use
(*) with ACCESS(FORCE).
You can start DSNDB01, DSNDB06, and work file databases, such as
DSNDB07, only by specifying them explicitly (for example, START
DATABASE(DSNDB01)).
dbname and dbstring can have any of the forms in the following list (where
dbname1 and dbname2 represent any strings of from 1 to 8 characters, and
dbname represents any string of from 1 to 7 characters):
Form Starts
dbname1:dbname2
All databases whose names collate greater than or equal to dbname1 and
less than or equal to dbname2
dbname*
All databases whose names begin with the string dbname
spacename and spacestring can have any of the forms in the following list
(where spacename1 and spacename2 represent any strings of from 1 to 8
characters, and spacename represents any string of from 1 to 7 characters):
Form Displays the status of
spacename1:spacename2
All table spaces or index spaces whose names collate greater than or
equal to spacename1 and less than or equal to spacename2
spacename*
All table spaces or index spaces whose names begin with the string
spacename
*spacename
All table spaces or index spaces whose names end with the string
spacename
*spacename*
All table spaces or index spaces whose names contain the string
spacename
*spacestring1*spacestring2*
All table spaces or index spaces whose names contain the strings
spacestring1 and spacestring2
5. Consecutive pattern-matching characters (*) are not allowed, and you cannot specify two pattern-matching characters (*) in the
middle of a keyword string.
The PART option is valid with partitioned table spaces, partitioned indexes,
and nonpartitioned type 2 indexes of partitioned table spaces. If you specify
PART with a nonpartitioned table space or index on a nonpartitioned table
space, you receive an error message, and the nonpartitioned space is not
started.
ACCESS
Tells whether the objects started can be read from and written to, read from
only, or accessed by utilities only.
Abbreviation: ACC
(RW)
Allows programs to read from or write to the specified databases, table
spaces, indexes, or partitions.
(RO)
Allows programs to only read from the specified databases, table spaces,
indexes, or partitions. Any programs attempting to change data will not
succeed. Do not use this option for a database for declared temporary
tables (databases created with the AS TEMP option).
(UT)
Allows only DB2 online utilities to access the specified databases, table
spaces, indexes, or partitions.
(FORCE)
Resets any indications that a table space, index, or partition is unavailable
because of pages in the logical page list, pending deferred restarts, write
error ranges, read-only accesses, or utility controls. FORCE also resets the
CHECK pending, COPY pending, and RECOVER pending states. Full
access to the data is forced. FORCE cannot be used to reset the restart
pending (RESTP) state.
With ACCESS(FORCE) you must use a single database name, the
SPACENAM option, and an explicit list of table space and index names.
You cannot use any range or combination of pattern-matching characters
(*), including DATABASE (*) or SPACENAM (*).
A utility restrictive state is reset (the utility is terminated) only if all the target
objects are reset with this command. To identify which objects are target
objects of the utility, use the DISPLAY DATABASE command, or run the
DIAGNOSE utility with the DISPLAY SYSUTIL option.
Usage notes
Data sets offline: It is not necessary for every disk pack containing partitions, table
spaces, or indexes to be online when a database is started. Packs must, however,
be online when partitions, table spaces, or indexes are first referred to. If they are
not, an error in opening occurs.
Table spaces and indexes explicitly stopped: If table spaces and indexes are
stopped explicitly (using the STOP DATABASE command with the SPACENAM
option), they must be started explicitly. Starting the database does not start table
spaces or indexes that have been explicitly stopped.
Effect on objects marked with GRECP or with LPL entries: If a table space,
partition, or index is in the group buffer pool RECOVER pending (GRECP) status,
or if it has pages in the logical page list (LPL), the START DATABASE command
begins recovery of the object. You must specify the SPACENAM option and
ACCESS (RW) or (RO).
If the object is stopped when the command is issued, then the START DATABASE
command both starts the object and clears the GRECP or LPL status. If the
GRECP or LPL recovery action cannot complete, the object is still started.
When recovering objects that are in GRECP or LPL status, avoid using
pattern-matching characters (*) for both the database name and the space name.
Multiple START DATABASE(dbname) SPACENAM(*) commands running in parallel
should complete faster than one START DATABASE(*) SPACENAM(*) command.
If you use pattern-matching characters (*) for both the database name and space
name, you must have DBMAINT authority and ensure that the catalog and directory
databases have already been explicitly started in this order:
-START DATABASE(DSNDB01) SPACENAM(*)
-START DATABASE(DSNDB06) SPACENAM(*)
Although not recommended, you can start an object using START DATABASE
ACCESS(FORCE). That deletes all LPL and write error page range entries without
recovering the pages. It also clears the GRECP status.
| When starting a LOB table space defined as LOG NO and either in GRECP or
| having pages in the LPL, the LOB table space will be placed in the AUXW state
| and the LOB will be invalidated if DB2 detects that log records required for LPL
| recovery are missing due to the LOG NO attribute.
If an object has retained locks (that is, a member of a DB2 data sharing group has
failed and the locks it held on the object are retained in the lock structure), then
START DATABASE ACCESS (FORCE) is not allowed.
Do not start table spaces or index spaces for defined temporary tables with RO or
UT access. You can start a temp file database with UT access to accommodate the
REPAIR DBD utility.
Starting a LOB table space: The START DATABASE command can be used to
start LOB table spaces and indexes on auxiliary tables. LOB table spaces are
started independently of the base table space with which the LOB table space is
associated.
Examples
Example 1: Start table space DSN8S71E in database DSN8D71A. Recover the
table space if it is in GRECP status or recover the pages on the LPL if one exists.
-START DATABASE (DSN8D71A) SPACENAM (DSN8S71E)
Example 2: Start all databases (except DSNDB01, DSNDB06, and work file
databases) for which you have authority. Recovery for any objects with GRECP or
LPL status is not performed.
-START DATABASE (*)
Example 3: Start the third and fourth partitions of table space DSN8S71E in
database DSN8D71A for read-only access. Recover the partitions if they are in
GRECP status or recover the pages on the LPL if one exists.
-START DATABASE (DSN8D71A) SPACENAM (DSN8S71E) PART (3,4) ACCESS (RO)
Example 4: Start all table spaces that begin with ″T″ and end with the string
″IQUA03″ in database DBIQUA01 for read and write access.
-START DATABASE (DBIQUA01) SPACENAM (T*IQUA03) ACCESS (RW)
The effect of restarting the system can be controlled by a “conditional restart control
record”, which you create by the DSNJU003 (change log inventory) utility. For more
details on the effects, see “Usage notes” on page 284 and the description of the
DSNJU003 utility in DB2 Utility Guide and Reference.
Environment
This command can be issued only from an MVS console. The name of the DB2
subsystem is determined by the command prefix. (This was called the subsystem
recognition character (SRC) in previous DB2 releases). For example, -START
indicates that the DB2 subsystem to be started is the one with '-' as the command
prefix.
The command is rejected if the DB2 subsystem is already active. The restart
recovery status of DB2 resources is determined from the prior DB2 shutdown
status.
Authorization
None is required. However, the command can be executed only from an MVS
console with the START command capability. See OS/390 MVS System
Commands.
Syntax
START DB2
DSNZPARM * NO
PARM( module name ) ACCESS( MAINT ) LIGHT( YES )
MSTR(jcl-substitution) DBM1(jcl-substitution) DIST(jcl-substitution)
Option descriptions
None of the following options are required.
PARM(module-name)
Specifies the load module that contains the DB2 subsystem parameters.
module-name is the name of a load module provided by the installation.
The default is DSNZPARM, which is provided by DB2.
ACCESS
Tells whether access to DB2 is to be general or restricted.
Usage notes
Command prefix: If your installation has more than one DB2 subsystem, you must
define more than one command prefix.
| Light restart with ARM: To enable a light restart in an ARM environment, you must
| code an ARM policy for DB2 and IRLM.
| The following example shows an ARM policy for DB2, where the element name is
| the DB2 data sharing group name and member name concatenated. For example,
| DSNDB0GDB1G.
| ELEMENT(elementname)
|
| RESTART_METHOD(SYSTERM,STC,'cmdprfx STA DB2,LIGHT(YES)')
| The following example shows an ARM policy for IRLM, where the element name is
| the IRLM group name and the ID concatenated. For example, DXRDB0GDJ1G001.
| ELEMENT(elementname)
|
| RESTART_METHOD(SYSTERM,STC,'cmdprfx S irlmproc,PC=YES')
| The element name that DB2 uses is the DB2 data sharing group name and
member name concatenated. For example, DSNDB0GDB1G. F
Endless wait during start: It is possible for the start operation to begin and fail to
complete, if the system services address space starts and the database services
address space cannot start. If a seemingly endless wait occurs, cancel the system
services address space from the console, and check both startup procedures for
JCL errors.
Examples
Example 1: Start the DB2 subsystem.
-START DB2
Example 2: Start the DB2 subsystem and provide a new value for the REGION
parameter in the startup procedure for the system services address space.
-START DB2 MSTR('REGION=6000K')
Example 3: Start the DB2 subsystem. Assuming that the EXEC statement of the
JCL that executes the startup procedure for the system services address space
uses the symbol RGN, provide a value for that symbol.
-START DB2 MSTR('RGN=6000K')
Example 4: DB2 subsystems DB1G and DB2G are members of a data sharing
group. Both were installed with a command prefix scope of STARTED. Start DB1G
and DB2G by routing the appropriate commands to the MVS system on which they
are to be started, MVS1 and MVS2.
ROUTE MVS1,-DB1G START DB2
ROUTE MVS2,-DB2G START DB2
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
START DDF
Usage note
The START DDF command activates the DDF interface to VTAM and TCP/IP. When
issued after STOP DDF MODE(SUSPEND), suspended threads are resumed and
DDF activity continues.
Example
Start the distributed data facility.
-START DDF
You do not need to issue the START FUNCTION SPECIFIC command when
defining a new function to DB2. DB2 automatically activates the new function on the
first SQL statement that invokes the new function.
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel, an IMS or CICS terminal, or a program using the instrumentation
facility interface (IFI).
# Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following authorities for each function:
v Ownership of the function
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands that are issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
(*.*)
START FUNCTION SPECIFIC
,
( schema.specific-function-name )
schema.partial-name*
LOCAL
SCOPE ( )
GROUP
Option descriptions
* (asterisk)(*.*)
Starts all functions in all schemas. This is the default.
schema.specific-function-name
Starts the specific function name in the schema. You cannot specify a function
name as you can in SQL; you must use the specific name. If a specific name
was not specified on the CREATE FUNCTION statement, query
SYSIBM.SYSROUTINES for the correct specific name:
SELECT SPECIFICNAME, PARM_COUNT
FROM SYSIBM.SYSROUTINES
WHERE NAME='function_name'
AND SCHEMA='schema_name';
# Usage notes
Language Environment® in the WLM-established stored procedure address
space: The -START FUNCTION SPECIFIC command does not refresh the
Language Environment in the WLM-established stored procedure address space.
You must issue the WLM command. For example, if you need to refresh the
Language Environment to get new copies of UDF load modules, issue the following
WLM command.
VARY WLM, APPLENV=applenv,REFRESH
Example 2: Start functions USERFN1 and USERFN2. If any requests are queued
for these functions, the functions are executed.
-START FUNCTION SPECIFIC(PAYROLL.USERFN1,PAYROLL.USERFN2)
Environment
This command can be issued only from an MVS console.
Authorization
The command requires an appropriate level of MVS authority, as described in
OS/390 MVS System Commands.
Syntax
START irlmproc,
DEADLOK=’iiii,kkkk’
IRLMGRP=’irlm-group-name’
IRLMID=n
IRLMNM=irlmname
LOCKTABL=irlmltnm
MAXCSA=nnn
MAXUSRS=nnn
PC= YES
NO
PGPROT= YES
NO
SCOPE= LOCAL
GLOBAL
NODISCON
TRACE= NO
YES
Option descriptions
irlmproc
Is the procedure name of the IRLM to be started.
nnn must be a one- to two-digit number from 1 to 32. The default is 7. The
recommended value is 7 or less.
Example
Enter the following command on the MVS system console:
S irlmproc,MAXCSA=8
This command starts the IRLM with 8 MB for MAXCSA which controls the CSA
(including ECSA) usage for locks when PC=NO.
You do not have to issue START PROCEDURE when defining a new stored
procedure to DB2. DB2 automatically activates the new definition when it first
receives an SQL CALL statement for the new procedure.
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
# Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
v Ownership of the stored procedure.
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
(*.*)
START PROCEDURE
, LOCAL
SCOPE ( )
( schema.procedure-name ) GROUP
schema.partial-name*
procedure-name
partial-name*
Option descriptions
(*.*)
Marks all stored procedures in all schemas as available to be called.
(schema.procedure-name)
Starts the specified stored procedure in the specified schema.
(schema.partial-name*)
Starts a set of stored procedures in the specified schema. The names of all
procedures in the set begin with partial-name and can end with any string,
including the empty string. For example, PAYROLL.ABC* starts all stored
procedures with names beginning with ABC in the PAYROLL schema.
procedure-name
Marks the one or more specific stored procedures as available to be called.
partial-name*
Marks a set of stored procedures in the SYSPROC schema as available to be
called. The names of all procedures in the set begin with partial-name and can
end with any string, including the empty string. For example, ABC* starts all
stored procedure names that begin with ABC in the SYSPROC schema.
# SCOPE
# Specifies the scope of the command.
# (LOCAL)
# Starts the specified stored procedures in the local member only.
# (GROUP)
# Starts the specified stored procedures in all members of the data sharing
# group.
# Usage notes
Errors in a definition of a stored procedure: Errors are detected at create time
for a stored procedure. See CREATE PROCEDURE in Chapter 5 of DB2 SQL
Reference for more information.
Example 2: Make specific stored procedures available to be called, and start any
requests waiting for those procedures.
-START PROCEDURE(USERPRC1,USERPRC2)
You can issue START RLIMIT even if the resource limit facility is active. The
resource limit specification table you identify is used for new threads, and existing
threads continue to be subject to the limits in the table that was active at the time
they were created.
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
START RLIMIT
ID=id
Option description
The following keyword is optional.
ID=id
Identifies the resource limit specification table for the governor to use.
id is the one or two identification characters specified when the table was
created. See Part 5 (Volume 2) of DB2 Administration Guide for more
information about resource limit specification tables.
The full name of the table is authid.DSNRLSTid, where authid is the value that
was specified in field RESOURCE AUTHID on installation panel DSNTIPP.
The default ID is the value that was specified in field RLST NAME SUFFIX on
installation panel DSNTIPO.
There is an additional option to this command and values for a few options that are
not described here. They are intended for service and use under the direction of
IBM support personnel. For details, see DB2 Diagnosis Guide and Reference.
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
# Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v TRACE privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
destination block constraint block COMMENT(string)
destination block:
DEST( GTF )
SMF
SRV
OPn
OPX
constraint block:
* * *
, , ,
*
, ,
(1) *
IFCID( ifcid ) BUFSIZE( k_bytes ) TDATA( CORRELATION )
TRACE
CPU
DISTRIBUTED
LOCATION( * )
,
location-name
<luname>
ipaddr
Notes:
1 Allows you to specify trace events in addition to the IFCIDs activated by the CLASS option. For
details, see the description of IFCID( ifcid, ...) on page 305.
Option descriptions
You must specify a trace type.
The options PERFM, ACCTG, STAT, AUDIT, and MONITOR identify the type of
trace started.
All traces to an OPX destination must be stopped before the buffer is marked
as not in use. Traces that are started to an OPX buffer that was formerly in use
write over the storage any previous traces had set.
To start a trace for a client with the IP address of 123.34.101.98, enter the
following command:
-START TRACE (PERFM) CLASS (*) LOCATION (123.34.101.98)
Usage notes
Number of traces: If you use one or no values for PLAN, AUTHID, or LOCATION,
the START TRACE command starts a single trace. If you use multiple values for
PLAN, AUTHID, or LOCATION, the command starts a trace for each plan,
authorization ID, or location. There can be up to 32 traces going at one time. If a
START TRACE command is entered from the console or from the DB2I panels to
an OPn or an OPX destination, message DSNW133I is issued to indicate trace data
lost.
Using the options PLAN, AUTHID, or LOCATION when starting monitor trace class
1 has no effect on the amount of data returned on IFI READS requests. See
Appendix E (Volume 2) of DB2 Administration Guide for more information on
qualifying monitor trace class 1 IFCIDs.
Using the options PLAN, AUTHID, or LOCATION has no effect when starting either
accounting or monitor trace classes 2, 5, or 7.
Stopping and starting DB2: If DB2 is stopped and started after you have started a
trace, the trace is not restarted automatically.
# If a trace is started with SCOPE(GROUP), and a new member joins the data
# sharing group after the trace is started, the new member also writes the trace data
# that is specified by the START TRACE command.
# Starting a trace with SCOPE(GROUP) can generate large amounts of trace data, so
# you may need to increase the size of the return area in your monitor program to
# hold the extra data.
Examples
Example 1: Start a performance trace for threads with remote activity to location
USIBMSTODB21. Only activate IFCIDs 44 (lock suspends) and 54 (lock
contention). Trace class 30 is available for installation use.
-START TRACE (PERFM)
DEST(GTF)
LOCATION(USIBMSTODB21)
CLASS(30)
IFCID(44)
Example 2: Start an accounting trace for plan DSN8BC71. Write records to SMF
(that will happen by default). Include a comment to identify the trace.
-START TRACE (ACCTG)
PLAN (DSN8BC71)
COMMENT ('ACCTG TRACE FOR DSN8BC71')
Example 3: Start the statistics trace. Write records to SMF (by default).
-START TRACE=S
/STOP (IMS)
The IMS /STOP command (with the SUBSYS parameter) prevents application
programs from accessing external subsystem resources.
The following is only a partial description of the /STOP command. For a complete
description, see IMS Command Reference.
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in the
IMS Administration Guide: System.
Syntax
Option descriptions
SUBSYS
Specifies whether connection is to be stopped for one or more names of
external subsystems presently connected to IMS, or for all of them.
subsystem-name, ...
Specifies one or more names of external subsystems whose connection to
IMS is to be stopped.
ALL
Indicates that connection is to be stopped for all external subsystems
presently connected to IMS.
Usage note
When to use /STOP: The /STOP command allows application programs currently
accessing external resources to complete normally. When all applications have
terminated, the connection to the external subsystem is also terminated. A /START
command must be issued to reestablish the connection.
The /STOP command can also be used to stop the subsystem connection in order
to change the specifications in the external subsystem’s PROCLIB member entry.
The /START command then refreshes the copy in main storage of the PROCLIB
entry with the modified entry.
In a data sharing environment, the command applies to every member of the data
sharing group. If a GBP-dependent object is stopped with the command STOP
DATABASE, DB2 performs the necessary processing to make the object no longer
GBP-dependent.
Abbreviation: -STO DB
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
All databases specified for which the set of privileges held by the privilege set of the
process has the STOPDB privilege are stopped. Error messages are produced for
those databases specified for which this set does not have the STOPDB privilege.
The privilege set of the process must include one of the following:
v STOPDB privilege
v DBMAINT, DBCTRL, or DBADM authority
v SYSCTRL or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Database DSNDB06 contains the table spaces and index spaces required to check
authorization. If you stop any table space or index space required for the START
DATABASE authorization check, then installation SYSADM authority is required to
restart it.
,
SPACENAM( space-name )
* ,
spacename1:spacename2
spacename* PART( integer )
*spacename integer1:integer2
*spacename*
*spacestring1*spacestring2*
AT(COMMIT)
Option descriptions
One of the following two options is required.
(database-name, ...)
Specifies the names of the database, or database for the table spaces or index
spaces to stop. If you use more than one name, separate names in the list by
commas.
(*) Stops all databases for which the privilege set of the process has at least
DBMAINT authority.
However, DSNDB01, DSNDB06, and work file databases, such as DSNDB07,
can be stopped only by specifying them explicitly (for example, STOP
DATABASE(DSNDB01)).
dbname and dbstring can have any of the forms in the following list (where
dbname1 and dbname2 represent any strings of from 1 to 8 characters, and
dbname represents any string of from 1 to 7 characters):
Form Stops...
dbname1:dbname2
All databases whose names collate greater than or equal to dbname1 and
less than or equal to dbname2
dbname*
All databases whose names begin with the string dbname
*dbname
All databases whose names end with the string dbname
spacename and spacestring can have any of the forms in the following list
(where spacename1 and spacename2 represent any strings of from 1 to 8
characters, and spacename represents any string of from 1 to 7 characters):
Form Displays the status of...
spacename1:spacename2
All table spaces or index spaces whose names collate greater than or
equal to spacename1 and less than or equal to spacename2
spacename*
All table spaces or index spaces whose names begin with the string
spacename
*spacename
All table spaces or index spaces whose names end with the string
spacename
*spacename*
All table spaces or index spaces whose names contain the string
spacename
*spacestring1*spacestring2*
All table spaces or index spaces whose names contain the strings
spacestring1 and spacestring2
PART (integer, ...)
Indicates the partition number of one or more partitions, within the specified
table space or index, that are to be stopped. The START or STOP state of
other partitions does not change.
The integer specified must identify a valid partition number for the
corresponding space name and database name. If you specify nonvalid
6. Consecutive pattern-matching characters (*) are not allowed, and you cannot specify two pattern-matching characters in the middle
of a keyword string.
Usage notes
Explicitly stopped databases: If table spaces and indexes are stopped explicitly
(using the STOP DATABASE command with the SPACENAM option), they must be
started explicitly using the START DATABASE command. Starting the database
does not start table spaces or indexes that have been stopped explicitly.
Stopped table spaces, indexes, and partitions: Table spaces, indexes, and
partitions are physically closed when the STOP DATABASE command is issued,
except for logical partitions of a nonpartitioning index of a partitioned table space.
Index spaces for declared temporary tables cannot be stopped or started.
Operation in TSO, MVS, and batch: When the STOP DATABASE command is
issued from a TSO or an MVS console, the command operates asynchronously to
keep the terminal free. When the command is issued from a batch job, it operates
synchronously in case later steps depend on the database being stopped. The
STOP DATABASE command drains work in progress on the database before
stopping it. If it cannot get the drain locks on the first request, it repeatedly tries
again. The command fails if it times out more than 15 times trying to get the locks
or if a serious deadlock situation occurs.
Ensuring that all databases are stopped: When the STOP DATABASE command
is processing asynchronously, message DSN9022I might be issued before the
command completes. Message DSNT736I is issued to indicate that the
asynchronous processing of the STOP DATABASE command is complete.
An object might remain in the STOP pending (STOPP) status if the STOP
DATABASE command does not successfully complete processing.
Stopping DSNDB01: If you try to stop the DSNDB01 database while an application
plan or package is executing, you might receive a time out because of locking
contention on DSNDB01. This is most likely to occur when an application plan or
package is executing for the first time since DB2 was started, or if the skeleton
cursor table (SKCT) for the plan or the skeleton package table (SKPT) for the
package was swapped out of the EDM pool.
After a disk failure: Issuing the STOP DATABASE command before interrupting
the I/O interface between the failed device and DB2 can result in incomplete I/O
requests. To prevent this hang situation, create an interruption either by forcing the
device offline using the MVS command VARY with the FORCE option, or by setting
the I/O timing interval for the device before any failures. You can set the I/O timing
interval through the IECIOSxx MVS parmlib member or by issuing the MVS
command:
SETIOS MIH,DEV=dddd,IOTIMING=mm:ss
Stopping a LOB table space: The STOP DATABASE command can be used to
stop LOB table spaces and indexes on auxiliary tables. LOB table spaces are
stopped independently of the base table space with which the LOB table space is
associated.
The following table summarizes the locking used by the STOP DATABASE
command.
Table 30. Locking used by the STOP DATABASE command
Command Table space type Locks acquired
STOP AT COMMIT Partitioned PART IX mass delete lock. Drain-all on partitions
specified.
Examples
Example 1: Stop table space DSN8S71E in database DSN8D71A and close the
data sets that belong to that table space.
-STOP DATABASE(DSN8D71A) SPACENAM(DSN8S71E)
Example 2: Stop all databases (except DSNDB01, DSNDB06, and work file
databases)
-STOP DATABASE(*)
Example 3: Stop all databases (except DSNDB01, DSNDB06, and work file
databases) when all jobs release their claims and all utilities release their drain
locks.
-STOP DATABASE(*) AT(COMMIT)
Example 5: Stop all table spaces with names that begin with "T" and end with the
"IQUA03" string in database DSN8D71A.
-STOP DATABASE(DSN8D71A) SPACENAM(T*IQUA03)
Output similar to the following output indicates that the command completed
successfully:
DSN9022I - DSNTDDIS 'STOP DATABASE' NORMAL COMPLETION
DSNT736I - ASYNCHRONOUS STOP DATABASE COMMAND HAS
COMPLETED FOR COMMAND: STOP DB(DSN8D71A) SPACE(T*IQUA03)
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v STOPALL privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
MODE(QUIESCE) CASTOUT(YES)
STOP DB2
MODE(FORCE) CASTOUT(NO)
Option descriptions
MODE
Indicates whether currently executing programs will be allowed to complete. For
the effects of this option on distributed threads, see the description of the
MODE option of “-STOP DDF (DB2)” on page 318.
(QUIESCE)
Allows currently executing programs to complete processing. No new
program is allowed to start.
(FORCE)
Terminates currently executing programs, including utilities. No new
program is allowed to start. MODE(FORCE) will probably cause indoubt
situations.Some tasks, such as stored procedures tasks and DB2 service
tasks, terminate abnormally. When they terminate abnormally, you might
see dumps and messages from these failures.
CASTOUT
Specifies whether the DB2 member performs castout processing for the page
sets or partitions for which the member was last updated. The CASTOUT option
only applies in a data sharing environment.
YES
Allow group buffer pool castout processing.
Usage notes
MODE(QUIESCE): If MODE(QUIESCE) is used, all connected address spaces
must terminate all connections before the DB2 subsystem stops. The system
operator can tell whether any connections remain by using the DISPLAY THREAD
command, and can cancel them by using the DB2 CANCEL command or MVS
commands.
With CASTOUT(NO), the DB2 member shuts down with QC status, as displayed by
the DISPLAY GROUP command, which indicates that the member quiesced with
some castout processing not completed. A retained page set or partition P-lock is
held in IX state for each object for which the DB2 member was the last updater.
Also, group buffer pool connections enter failed-persistent state.
Example
Example 1: Stop the DB2 subsystem. Allow currently active programs to complete.
Do not allow new programs to identify to DB2.
-STOP DB2 MODE (QUIESCE)
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following authorities:
v SYSOPR
v SYSCTRL
v SYSADM
DB2 commands that are issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
MODE(QUIESCE)
STOP DDF
MODE(FORCE)
MODE(SUSPEND) CANCEL(n)
WAIT(n)
Option descriptions
MODE
Indicates whether currently executing active distributed threads are allowed to
complete.
(QUIESCE)
Allows active distributed threads that are using DDF to complete normally
and terminates only inactive distributed threads. If DDF THREADS ACTIVE
was specified during DB2 installation, all DDF threads are active threads.
(FORCE)
Terminates all currently executing distributed threads.
Some tasks, such as stored procedures tasks and DB2 service tasks,
terminate abnormally. When they terminate abnormally, you might see
dumps and messages resulting from these failures.
(SUSPEND)
Suspends all DDF threads by:
Usage notes
MODE(QUIESCE): If MODE(QUIESCE) is used, all distributed activity must
complete before DDF stops. The operator can tell whether any distributed threads
remain by using DISPLAY THREAD with the LOCATION option. To cancel
distributed threads that are preventing DDF from stopping, see “Usage notes” on
page 78 for CANCEL THREAD, or use STOP DDF MODE(FORCE).
If any applications are updating remote servers that use two-phase commit,
MODE(FORCE) might result in indoubt threads at each server.
Table 31 summarizes the actions that DB2 takes when START DDF or STOP DDF
are issued with different DDF states.
Table 31. The result of commands on the DDF status
Command issued
DDF status START DDF STOP DB2 or STOP STOP DB2 or STOP STOP DDF
DDF without DDF with MODE(SUSPEND)
MODE(FORCE) MODE(FORCE)
Starting DSNL003I DSNL003I DSNL003I DSNL003I
Examples
Example 1: Stop the distributed data facility (MODE QUIESCE).
-STOP DDF
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
# Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following authorities for each function:
v Ownership of the function
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands that are issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
(*.*)
STOP FUNCTION SPECIFIC
,
( schema.specific-function-name )
schema.partial-name*
QUEUE LOCAL
ACTION ( REJECT ) SCOPE ( )
GROUP
# Usage notes
Limitations of STOP FUNCTION SPECIFIC: STOP FUNCTION SPECIFIC is only
applicable to external functions that run in the WLM application environment. STOP
FUNCTION SPECIFIC cannot stop a built-in function or a user-defined function
sourced on another function.
Examples
Example 1: Stop access to all functions. While the -STOP FUNCTION SPECIFIC
command is in effect, DB2 queues all attempts to execute functions.
-STOP FUNCTION SPECIFIC ACTION(QUEUE)
Example 2: Stop access to all functions. While the -STOP FUNCTION SPECIFIC
command is in effect, DB2 rejects attempts to execute functions.
-STOP FUNCTION SPECIFIC ACTION(REJECT)
Abbreviation: P
Environment
This command can be issued only from an MVS console.
Authorization
The command requires an appropriate level of MVS authority, as described in
OS/390 MVS System Commands.
Syntax
STOP irlmproc
Option description
irlmproc
Identifies the procedure name for the IRLM to be stopped.
Usage note
Terminating the IRLM: If IRLM does not shut down normally, issue the MODIFY
irlmproc,ABEND command to terminate the IRLM abnormally. If there are
outstanding DB2 requests in process and IRLM will not terminate, use the MVS
CANCEL command. If all other means of removing the subsystem fail, issue the
MVS FORCE CANCEL command:
F irlmproc,ABEND,DUMP
Example
Enter on the MVS1 system console:
P KRLM1
The operator on system 1 has terminated the IRLM procedure named KRLM1. The
operator on system 2 is informed that the IRLM in system 1 has terminated, but no
operator action on system 2 is required.
If the DB2 established stored procedure address space is connected to DB2, MVS
stops it based on the syntax of the STOP PROCEDURE command.
DB2 implicitly issues the command STOP PROCEDURE ACTION(REJECT) for any
stored procedure that exceeds the maximum abend count. That count is set by the
MAX ABEND COUNT field of installation panel DSNTIPX.
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
v Ownership of the stored procedure.
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
(*.*)
STOP PROCEDURE
, QUEUE
ACTION ( REJECT )
( schema.procedure-name )
schema.partial-name*
procedure-name
partial-name*
LOCAL
SCOPE ( )
GROUP
Option descriptions
(*.*)
Stops access to all stored procedures in all schemas, including procedure
definitions that have not yet been accessed by DB2 applications. The
DB2-established stored procedures address space terminates after active work
is complete.
(schema.procedure-name)
Identifies the fully-qualified procedure name that is to be stopped.
(schema.partial-name*)
Stops a set of stored procedures in the specified schema. The names of all
procedures in the set begin with partial-name and can end with any string,
including the empty string. For example, PAYROLL.* stops all stored procedures
in the PAYROLL schema.
procedure-name
Identifies one or more specific stored procedure names to be stopped. The
procedure name is implicitly qualified with the SYSPROC schema name.
partial-name*
Stops a set of stored procedures within the SYSPROC schema. The names of
all procedures in the set begin with partial-name and can end with any string,
including the empty string. For example, ABC* stops all stored procedures with
names that begin with ABC.
ACTION
Indicates what to do with a CALL statement that is received while the procedure
is stopped. If STOP PROCEDURE is issued more than once for a given
procedure, the action taken is determined by the ACTION option on the most
recent command.
(QUEUE)
Queues the request until either:
v The wait exceeds the installation timeout value, or
v The stored procedure is started by the command START
PROCEDURE.
(REJECT)
Rejects the request
Usage notes
Permanently disabling a stored procedure: A stopped procedure does not remain
stopped if DB2 is stopped and restarted. To disable a stored procedure
permanently, you can:
v Drop the procedure using the DROP PROCEDURE statement. See Chapter 5 of
DB2 SQL Reference for more information.
v Use an ALTER PROCEDURE statement.
v Rename or delete the MVS load module.
Examples
Example 1: Stop access to all stored procedures, and terminate the DB2 stored
procedures address space. While the -STOP PROCEDURE command is in effect,
attempts to execute stored procedures are queued.
-STOP PROCEDURE ACTION(QUEUE)
DSNX947I - DSNX9SP2 STOP PROCEDURE SUCCESSFUL FOR *.*
DSN9022I - DSNX9COM '-STOP PROC' NORMAL COMPLETION
Example 2: Stop access to all stored procedures, and terminate the DB2 stored
procedures address space. While the -STOP PROCEDURE command is in effect,
attempts to execute stored procedures are rejected.
-STOP PROCEDURE ACTION(REJECT)
DSNX947I - DSNX9SP2 STOP PROCEDURE SUCCESSFUL FOR *.*
DSN9022I - DSNX9COM '-STOP PROC' NORMAL COMPLETION
Environment
This command can be issued from an MVS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
Syntax
STOP RLIMIT
Example
Stop the resource limit facility.
-STOP RLIMIT
There is an additional option to this command and values for a few options that are
not described here. They are intended for service and use under the direction of
IBM support personnel. For details, see DB2 Diagnosis Guide and Reference.
Environment
This command can be issued from an MVS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
# Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, the privilege set of the process must include one of the
following:
v TRACE privilege
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
COMMENT(string)
destination block:
DEST( )
GTF
SMF
SRV
OPn
constraint block:
* * *
, , ,
*
,
location-name
<luname>
ipaddr
Option descriptions
Each option that you use, except TNO, limits the effect of the command to active
traces that were started using the same option, either explicitly or by default, with
exactly the same parameter values. For example, the following command stops only
the active traces that were started using the options PERFM and CLASS (1,2):
-STOP TRACE (PERFM) CLASS (1,2)
This command does not stop, for example, any trace started using CLASS(1).
You must specify a trace type or an asterisk. For example, the following command
stops all active traces:
-STOP TRACE (*)
When stopping trace classes, a special circumstance occurs if monitor trace class 6
is active. Monitor trace class 6 enables and disables data propagation. To avoid
To stop monitor trace class 6, you must explicitly specify it as one of the arguments
of the CLASS option of the -STOP TRACE command, including any other monitor
trace classes that were started with monitor trace class 6. For example, if monitor
trace class 6 was started with the command -START TRACE(MON) CLASS(1,3,6),
the following command stops it:
-STOP TRACE(MON) CLASS(1,3,6)
In the case where monitor trace class 6 was started with the command -START
TRACE(MON) CLASS(*), you must explicitly specify all 32 monitor trace classes to
have monitor trace class 6 stopped:
-STOP TRACE(MON) CLASS(1,2,3,4,5,6,...32)
However, if monitor trace class 6 is not active the -STOP TRACE(*) command stops
all active traces.
Each of the following keywords limits the command to stopping traces of the
corresponding type. For further descriptions of each type, see “-START TRACE
(DB2)” on page 299.
Table 32. Trace types
Type Description Abbreviation
PERFM Performance records of specific events P
ACCTG Accounting records for each transaction A
STAT Statistical data S
AUDIT Audit data AU
MONITOR Monitor data MON
# SCOPE
# Specifies the scope of the command.
# (LOCAL)
# Stops the trace only on the local DB2 subsystem.
# (GROUP)
# Stops the trace on all members of a data sharing group.
# COMMENT(string)
Gives a comment that is reproduced in the trace output record for the STOP
TRACE command (except in the resident trace tables).
string is any SQL string; it must be enclosed between apostrophes if it includes
a blank, comma, or special character.
DEST
Limits stopping to traces started for particular destinations. You can use more
than one value, but do not use the same value twice. If you do not specify a
value for DEST, DB2 does not use destination to limit which traces to stop.
Abbreviation: D
Possible values and their meanings are:
Value Trace destination
GTF The generalized trace facility
SMF The System Management Facility
See “-START TRACE (DB2)” on page 299 for a list of allowable destinations for
each trace type.
PLAN(plan-name, ...)
Limits stopping to traces started for particular application plans. You can use up
to eight plan names. If you use more than one name, you can use only one
value for AUTHID, TNO, and LOCATION. Do not use this option with STAT.
The default is PLAN(*), which does not limit the command.
AUTHID(authorization-id, ...)
Limits stopping to traces started for particular authorization identifiers. You can
use up to eight identifiers. If you use more than one identifier, you can use only
one value for PLAN, TNO, and LOCATION. Do not use this option with STAT.
The default is AUTHID(*), which does not limit the command.
CLASS(integer, ...)
Limits stopping to traces started for particular classes. For descriptions of the
allowable classes, see “-START TRACE (DB2)” on page 299. You cannot
specify a class if you did not specify a trace type.
Abbreviation: C
The default is CLASS(*), which does not limit the command.
TNO(integer, ...)
Limits stopping to particular traces, identified by their trace numbers (1 to 32, 01
to 09). You can use up to eight trace numbers. If you use more than one
number, you can use only one value each for PLAN, AUTHID, and LOCATION.
The default is TNO(*), which does not limit the command.
LOCATION(location-name, ...)
Introduces a list of specific location names for which traces are stopped. Limits
the traces you can stop to those started for threads with connections to remote
locations; the use of the LOCATION option precludes stopping traces of
non-distributed threads.
You can specify up to eight location names. If you use more than one location
name, you can only use one value for PLAN, AUTHID, and TNO. You cannot
use this option with STAT.
The default is LOCATION( ), which does not limit the command.
(*) LOCATION(*) limits the command to those traces that were started with the
one or more location names specified on the LOCATION keyword of
-START TRACE.
<luname>
Stops the DB2 trace for the remote clients that are connected to DDF
through the remote SNA LU that you specify in <luname>.
ipaddr
Stops the DB2 trace for remote clients that are connected to DDF through
the remote TCP/IP host. nnn.nnn.nnn.nnnis the dotted decimal IP address.
Requesters other than DB2 for OS/390 and z/OS: DB2 does not receive a
location name from requesters that are not DB2. To display information about a
requester that is not a DB2 for OS/390 and z/OS subsystem, enter its
Usage notes
Traces started by a IFI/IFC program: Before you stop an active trace, ensure that
an IFI application program or the IFC Selective Dump utility (DSN1SDMP) did not
start the trace. If you stop a trace started by DSN1SDMP, the DSN1SDMP utility
abnormally terminates.
Examples
Example 1: Stop all traces that have the generalized trace facility as their only
destination.
-STOP TRACE (*) DEST (GTF)
Example 2: Stop an accounting trace of all threads between the local and
USIBMSTODB21 DB2 subsystems for plan DSN8BC71. Include a comment.
-STOP TRACE (ACCTG)
PLAN (DSN8BC71)
LOCATION (USIBMSTODB21)
COMMENT('ACCTG TRACE FOR DSN8BC71')
Environment
This command can be issued from an MVS console, a DSN session, DB2I panels
DB2 COMMANDS and DB2 UTILITIES, an IMS or CICS terminal, or a program
using the instrumentation facility interface (IFI).
Data sharing scope: Group or member. The utility is implicitly of group scope when
the utility is stopped. For release dependency information, see DB2 Data Sharing:
Planning and Administration.
Authorization
To execute this command, the primary or some secondary authorization ID of the
process must be the ID that originally submitted the utility job, or the privilege set of
the process must include one of the following:
v DBMAINT, DBCTRL, or DBADM authority
v SYSOPR, SYSCTRL, or SYSADM authority
DB2 commands issued from an MVS console are not associated with any
secondary authorization IDs.
For users with DBMAINT, DBCTRL, or DBADM authority, the command takes effect
only when it can be determined that the user has sufficient authority over each
object that the utility job accesses.
Database DSNDB06 contains the table spaces and index spaces required to check
authorization. If a table or index space required for authorization checking is
affected by a utility which you need to terminate, then installation SYSADM
authority is required to terminate that utility.
Syntax
Option descriptions
One of the following parameters must be specified.
Usage notes
Restarting utilities: A terminated utility job step cannot be restarted. You must
resubmit the step as a new utility job.
What happens to particular utilities: In some cases, terminating a utility job can
leave work in an undesirable state, requiring special processing before the job can
be resubmitted. The following list describes the effects of -TERM on jobs for each of
the utilities:
Utility Special effects of -TERM
| CATMAINT Places indexes on REBUILD-pending status.
| CHECK DATA Table spaces remain in CHECK-pending status.
CHECK INDEX None
| CHECK LOB Places LOB table spaces and indexes in the utility
| read-only (UTRO) state.
COPY Inserts “T” record in SYSIBM.SYSCOPY. When you
run COPY, it does not allow an incremental image
copy if the “T” record exists.
DIAGNOSE None
LOAD See DB2 Utility Guide and Reference for the effect
of -TERM on the LOAD utility phases
MERGECOPY None
| MODIFY RECOVERY None
| MODIFY STATISTICS None
QUIESCE None
| REBUILD INDEX Places the object being rebuilt in REBUILD-pending
| status
| RECOVER Places the object being recovered in
| RECOVER-pending status
| REORG INDEX See DB2 Utility Guide and Reference for the effect
| of -TERM on the REORG INDEX utility phases
Examples
Example 1: Terminate all utility jobs for which you are authorized.
-TERM UTILITY (*)
Example 2: Terminate all utility jobs whose utility ID begins with SMITH.
-TERM UTILITY
(SMITH*)
/TRACE (IMS)
The IMS /TRACE command directs and controls the IMS capabilities for tracing
internal IMS events. It also starts, stops, and defines the activity to be monitored by
the IMS Monitor. For more information about the IMS Monitor, see IMS Utilities
Reference: System.
Abbreviation: /TRA
Environment
This command can be issued only from an IMS terminal.
Authorization
To enter this command, users must have passed the IMS security check, as
described in IMS Administration Guide: System.
The syntax diagram below includes only those parameters that DB2 users need to
know. For a diagram with the complete syntax of this command, see IMS Command
Reference.
Syntax
/TRACE SET ON
OFF ALL NOLOG
TABLE SUBS OPTION LOG
Option descriptions
The option descriptions for the /TRACE command are described in IMS Command
Reference; however, this section provides information about the two parameters
that are especially important for DB2 users.
SUBS
Indicates that the external subsystem trace table (containing information about
every interaction with DB2) is to be enabled or disabled. SET ON TABLE SUBS
enables the DB2 trace facility, and SET OFF TABLE SUBS disables it.
If nothing is specified with the TABLE keyword, then the default is ALL; ALL
includes SUBS, as well as other trace tables.
LOG
Specifies that traced data is to be written to the IMS system log. Because IMS
has a tracing mechanism that writes trace entries to the IMS system log, it is
important that DB2 users specify SET ON and TABLE OPTION LOG.
Otherwise, the trace information that IMS provides will not be available unless a
control region dump occurs.
Examples
Example 1: This command starts IMS tracing and:
v Enables the DB2 trace
v Writes IMS trace tables to the IMS log before they wrap.
Environment
This command can be issued only from an MVS console.
Authorization
This command requires an appropriate level of MVS authority, as described in
OS/390 MVS System Commands.
The syntax diagram and option descriptions for this command are purposely
incomplete. Options that are not shown are described in OS/390 MVS System
Commands.
Syntax
,WRAP
TRACE CT, WTRSTART=parmlibmem
,NOWRAP
WTRSTOP=jobname
ON, COMP=irlmnm
,SUB=( DBM )
EXP
INT
SLM
XCF
XIT
OFF
Option descriptions
CT
Specifies the component trace. (Do not use other trace options available on the
MVS TRACE command).
WTRSTART=parmlibmem
Identifies the member that contains source JCL. That JCL executes the
CTRACE writer and defines the data set to which it writes the trace buffers.
This member can be a procedure cataloged in SYS1.PROCLIB or a job.
WRAP
Specifies that when the system reaches the end of the group of data
sets, it writes over the oldest data at the beginning of the first data set
in the group. The system uses only the primary extents of the data sets.
Usage notes
Include the IRLM load module in the MVS link list: This command uses MVS
component trace services. Include the IRLM load module DXRRL183, which
contains a routine for stopping and starting, in the MVS link list.
Setting the number of trace buffers: To set the number of trace buffers used by
traces, use the MVS MODIFY irlmproc,SET command on page 228.
Sample procedure for the CTRACE writer: This procedure identifies the data set
to which the next sample procedure writes data.
Sample procedure to start and stop a DBM trace to the CTRACE writer: After
you enter the command TRACE CT,WTRSTART, turn the trace on and connect the
writer, using the WTR parameter in the reply for the command TRACE CT.
TRACE CT,WTRSTART=CTWTR
TRACE
. CT,ON,COMP=IRLM001,SUB=(DBM)
.
.
R 15,WTR=CTWTR,END
TRACE
. CT,OFF,COMP=IRLM001,SUB=(DBM)
.
.
R
. 15,END
.
.
TRACE CT,OFF,COMP=IRLM001
Impact of setting TRACE CT ON: Each active subname type requires up to 0.7
MB of ECSA. Because IRLM initializes its own traces when it starts, the DISPLAY
TRACE command shows that all traces are off. After you issue the TRACE ON
command, the reports are accurate except for the two subname types, INT and
EXT, which cannot be turned off.
The most rewarding task associated with a database management system is asking
questions of it and getting answers, the task called end use. Other tasks are also
necessary—defining the parameters of the system, putting the data in place, and so
on. The tasks that are associated with DB2 are grouped into the following major
categories (but supplemental information relating to all of the following tasks for new
releases of DB2 can be found in DB2 Release Planning Guide):
Installation: If you are involved with DB2 only to install the system, DB2 Installation
Guide might be all you need.
If you will be using data sharing capabilities you also need DB2 Data Sharing:
Planning and Administration, which describes installation considerations for data
sharing.
End use: End users issue SQL statements to retrieve data. They can also insert,
update, or delete data, with SQL statements. They might need an introduction to
SQL, detailed instructions for using SPUFI, and an alphabetized reference to the
types of SQL statements. This information is found in An Introduction to DB2 for
OS/390, DB2 Application Programming and SQL Guide, and DB2 SQL Reference.
End users can also issue SQL statements through the Query Management Facility
(QMF™) or some other program, and the library for that licensed program might
provide all the instruction or reference material they need. For a list of the titles in
the QMF library, see the bibliography at the end of this book.
Application Programming: Some users access DB2 without knowing it, using
programs that contain SQL statements. DB2 application programmers write those
programs. Because they write SQL statements, they need DB2 Application
Programming and SQL Guide, DB2 SQL Reference, and DB2 ODBC Guide and
Reference, just as end users do.
If you are involved with DB2 only to design the database, or plan operational
procedures, you need An Introduction to DB2 for OS/390 and DB2 Administration
Guide. If you also want to carry out your own plans by creating DB2 objects,
granting privileges, running utility jobs, and so on, you also need:
v DB2 SQL Reference, which describes the SQL statements you use to create,
alter, and drop objects and grant and revoke privileges
v DB2 Utility Guide and Reference, which explains how to run utilities
v DB2 Command Reference, which explains how to run commands
If you will be using data sharing, you need DB2 Data Sharing: Planning and
Administration, which describes how to plan for and implement data sharing.
Diagnosis: Diagnosticians detect and describe errors in the DB2 program. They
might also recommend or apply a remedy. The documentation for this task is in
DB2 Diagnosis Guide and Reference and DB2 Messages and Codes.
You can view and search DB2 publications on the Web, or you can download and
print many of the most current DB2 books. Follow links to other Web sites with
more information about DB2 family and OS/390 solutions. Access DB2 on the Web
at the following address:
www.ibm.com/software/db2os390
DB2 publications
The publications for DB2 for OS/390 and z/OS are available in softcopy format and
hardcopy. IBM provides mid-version updates in softcopy on the Web and on
CD-ROM.
BookManager format
You can use online books on CD-ROM to read, search across books, print portions
of the text, and make notes in these BookManager books. Using the IBM Softcopy
Reader, appropriate IBM Library Readers, or the BookManager Read product, you
can view these books in the OS/390, VM, and Windows environments. You can also
view and search many of the DB2 BookManager books on the Web.
PDF format
Many of the DB2 books are available in Portable Document Format (PDF) for
viewing or printing from CD-ROM or the Web. Download the PDF books to your
intranet for distribution throughout your enterprise.
The books for Version 7 of DB2 UDB Server for OS/390 and z/OS are also
available on the following CD-ROM and DVD collection kits, which contain online
books for many IBM products:
v z/OS Software Collection , SK3T-4270, in English
v z/OS and Software Products DVD Collection , SK3T–4271–00, in English
v Online Library Omnibus Edition OS/390 Collection , SK2T-6700, in English
For more information, including the current local schedule, please contact your IBM
representative.
IBM also offers classes at your location, at a time that suits your needs. IBM can
customize courses to meet your exact requirements. The All-in-One Education and
Training Catalog describes the DB2 curriculum in the United States. You can inquire
about or enroll in these courses by calling 1-800-IBM-TEACH (1-800-426-8322).
You can also order books from the IBM Publication Center on the Web:
www.elink.ibmlink.ibm.com
In Version 7, some utility functions are available as optional products; you must
separately order and purchase a license to such utilities. Discussion of utility
functions in this publication is not intended to otherwise imply that you have a
license to them. See DB2 Utility Guide and Reference for more information about
utilities products.
Improved connectivity
Version 7 offers improved connectivity:
v Support for COMMIT and ROLLBACK in stored procedures lets you commit or
roll back an entire unit of work, including uncommitted changes that are made
from the calling application before the stored procedure call is made.
Appendix D. Summary of changes to DB2 for OS/390 and z/OS Version 7 355
v Support for Windows Kerberos security lets you more easily manage workstation
clients who seek access to data and services from heterogeneous environments.
v Global transaction support for distributed applications lets independent DB2
agents participate in a global transaction that is coordinated by an XA-compliant
transaction manager on a workstation or a gateway server (Microsoft Transaction
Server or Encina, for example).
v Support for a DB2 Connect Version 7 enhancement lets remote workstation
clients quickly determine the amount of time that DB2 takes to process a request
(the server elapsed time).
v Additional enhancements include:
– Support for connection pooling and transaction pooling for IBM DB2 Connect
– Support for DB2 Call Level Interface (DB2 CLI) bookmarks on DB2 UDB for
UNIX, Windows, OS/2
Migration considerations
# Migration with full fallback protection is available when you have either DB2 for
# OS/390 Version 5 or Version 6 installed. You should ensure that you are fully
# operational on DB2 for OS/390 Version 5, or later, before migrating to DB2 for
# OS/390 and z/OS Version 7.
To learn about all of the migration considerations from Version 5 to Version 7, read
the DB2 Release Planning Guide for Version 6 and Version 7; to learn about
content information, also read appendixes A through F in both books.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you any
license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785
U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
IBM World Trade Asia Corporation
Licensing
2-31 Roppongi 3-chome, Minato-ku
Tokyo 106-0032, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply to
you.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those
Web sites. The materials at those Web sites are not part of the materials for this
IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes
appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of
enabling: (i) the exchange of information between independently created programs
The licensed program described in this information and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement, or any equivalent agreement
between us.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Trademarks
The following terms are trademarks of the International Business Machines
Corporation in the United States, or other countries, or both:
Tivoli and NetView are trademarks of Tivoli Systems, Inc. in the United States, other
countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States and/or other countries.
Microsoft™, Windows™, Windows NT, and the Windows logo are trademarks or
registered trademarks of Microsoft, Inc. in the United States and/or other countries.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
Notices 359
360 Command Reference
Glossary
The following terms and abbreviations are defined allied thread. A thread that originates at the local DB2
as they are used in the DB2 library. subsystem and that can access data at a remote DB2
subsystem.
active member state. A state of a member of a data application. A program or set of programs that
sharing group. An active member is identified with a performs a task; for example, a payroll application.
group by XCF, which associates the member with a
particular task, address space, and MVS system. A application plan. The control structure that is
member that is not active has either a failed member produced during the bind process. DB2 uses the
state or a quiesced member state. application plan to process SQL statements that it
encounters during statement execution.
address space. A range of virtual storage pages that
is identified by a number (ASID) and a collection of application process. The unit to which resources and
segment and page tables that map the virtual pages to locks are allocated. An application process involves the
real pages of the computer’s memory. execution of one or more programs.
address space connection. The result of connecting application programming interface (API). A
an allied address space to DB2. Each address space functional interface that is supplied by the operating
that contains a task that is connected to DB2 has system or by a separately orderable licensed program
exactly one address space connection, even though that allows an application program that is written in a
more than one task control block (TCB) can be present. high-level language to use specific data or functions of
See also allied address space and task control block. the operating system or licensed program.
agent. As used in DB2, the structure that associates | application server. The target of a request from a
all processes that are involved in a DB2 unit of work. An | remote application. In the DB2 environment, the
allied agent is generally synonymous with an allied | application server function is provided by the distributed
thread. System agents are units of work that process | data facility and is used to access DB2 data from
independently of the allied agent, such as prefetch | remote applications.
processing, deferred writes, and service tasks.
archive log. The portion of the DB2 log that contains
alias. An alternative name that can be used in SQL log records that have been copied from the active log.
statements to refer to a table or view in the same or a
remote DB2 subsystem. | ASCII. An encoding scheme that is used to represent
| strings in many environments, typically on PCs and
allied address space. An area of storage that is | workstations. Contrast with EBCDIC and Unicode.
external to DB2 and that is connected to DB2. An allied
address space is capable of requesting DB2 services.
auxiliary table. A table that stores columns outside bootstrap data set (BSDS). A VSAM data set that
the table in which they are defined. Contrast with base contains name and status information for DB2, as well
table. as RBA range specifications, for all active and archive
log data sets. It also contains passwords for the DB2
B directory and catalog, and lists of conditional restart and
checkpoint records.
backward log recovery. The fourth and final phase of
BSAM. Basic sequential access method.
restart processing during which DB2 scans the log in a
backward direction to apply UNDO log records for all BSDS. Bootstrap data set.
aborted changes.
buffer pool. Main storage that is reserved to satisfy
base table. (1) A table that is created by the SQL the buffering requirements for one or more table spaces
CREATE TABLE statement and that holds persistent or indexes.
data. Contrast with result table and temporary table.
(2) A table containing a LOB column definition. The built-in function. A function that DB2 supplies.
actual LOB column data is not stored with the base Contrast with user-defined function.
table. The base table contains a row identifier for each
row and an indicator column for each of its LOB C
columns. Contrast with auxiliary table.
cache structure. A coupling facility structure that
basic sequential access method (BSAM). An access
stores data that can be available to all members of a
method for storing or retrieving data blocks in a
Sysplex. A DB2 data sharing group uses cache
continuous sequence, using either a sequential access
structures as group buffer pools.
or a direct access device.
CAF. Call attachment facility.
binary integer. A basic data type that can be further
classified as small integer or large integer. call attachment facility (CAF). A DB2 attachment
facility for application programs that run in TSO or MVS
binary large object (BLOB). A sequence of bytes
batch. The CAF is an alternative to the DSN command
where the size of the value ranges from 0 bytes to
processor and provides greater control over the
2 GB−1. Such a string does not have an associated
execution environment.
CCSID.
cascade delete. The way in which DB2 enforces
bind. The process by which the output from the SQL
referential constraints when it deletes all descendent
precompiler is converted to a usable control structure,
rows of a deleted parent row.
often called an access plan, application plan, or
package. During this process, access paths to the data cast function. A function that is used to convert
are selected and some authorization checking is instances of a (source) data type into instances of a
performed. The types of bind are: different (target) data type. In general, a cast function
automatic bind. (More correctly, automatic rebind) A has the name of the target data type. It has one single
process by which SQL statements are bound argument whose type is the source data type; its return
automatically (without a user issuing a BIND type is the target data type.
command) when an application process begins
catalog table. Any table in the DB2 catalog. claim class. A specific type of object access that can
be one of the following:
CCSID. Coded character set identifier. Cursor stability (CS)
Repeatable read (RR)
CDB. Communications database. Write
CFRM policy. A declaration by an MVS administrator claim count. A count of the number of agents that are
regarding the allocation rules for a coupling facility accessing an object.
structure.
clause. In SQL, a distinct part of a statement, such as
character large object (CLOB). A sequence of bytes a SELECT clause or a WHERE clause.
representing single-byte characters or a mixture of
single- and double-byte characters where the size of the CLIST. Command list. A language for performing TSO
value can be up to 2 GB−1. In general, character large tasks.
object values are used whenever a character string
might exceed the limits of the VARCHAR type. CLOB. Character large object.
character set. A defined set of characters. clustering index. An index that determines how rows
are physically ordered in a table space.
| character string. A sequence of bytes that represent
| bit data, single-byte characters, or a mixture of coded character set. A set of unambiguous rules that
| single-byte and multibyte characters. establish a character set and the one-to-one
relationships between the characters of the set and their
check constraint. See table check constraint. coded representations.
check integrity. The condition that exists when each coded character set identifier (CCSID). A 16-bit
row in a table conforms to the table check constraints number that uniquely identifies a coded representation
that are defined on that table. Maintaining check of graphic characters. It designates an encoding
integrity requires DB2 to enforce table check constraints scheme identifier and one or more pairs consisting of a
on operations that add or change data. character set identifier and an associated code page
identifier.
check pending. A state of a table space or partition
that prevents its use by some utilities and some SQL cold start. A process by which DB2 restarts without
statements because of rows that violate referential processing any log records. Contrast with warm start.
constraints, table check constraints, or both.
collection. A group of packages that have the same
checkpoint. A point at which DB2 records internal qualifier.
status information on the DB2 log; the recovery process
uses this information if DB2 abnormally terminates. column. The vertical component of a table. A column
has a name and a particular data type (for example,
CI. Control interval. character, decimal, or integer).
CICS. Represents (in this publication) one of the column function. An operation that derives its result
following products: by using values from one or more rows. Contrast with
CICS Transaction Server for OS/390: Customer scalar function.
Information Control System Transaction Server for
OS/390 command. A DB2 operator command or a DSN
CICS/ESA: Customer Information Control subcommand. A command is distinct from an SQL
System/Enterprise Systems Architecture statement.
CICS/MVS: Customer Information Control
System/Multiple Virtual Storage command prefix. A one- to eight-character command
identifier. The command prefix distinguishes the
CICS attachment facility. A DB2 subcomponent that command as belonging to an application or subsystem
uses the MVS subsystem interface (SSI) and cross rather than to MVS.
storage linkage to process requests from CICS to DB2
and to coordinate resource commitment.
Glossary 363
command recognition character (CRC) • current data
command recognition character (CRC). A character constraint. A rule that limits the values that can be
that permits an MVS console operator or an IMS inserted, deleted, or updated in a table. See referential
subsystem user to route DB2 commands to specific constraint, table check constraint, and uniqueness
DB2 subsystems. constraint.
command scope. The scope of command operation in control interval (CI). A fixed-length area or direct
a data sharing group. If a command has member scope, access storage in which VSAM stores records and
the command displays information only from the one creates distributed free space. Also, in a key-sequenced
member or affects only non-shared resources that are data set or file, the set of records pointed to by an entry
owned locally by that member. If a command has group in the sequence-set index record. The control interval is
scope, the command displays information from all the unit of information that VSAM transmits to or from
members, affects non-shared resources that are owned direct access storage. A control interval always includes
locally by all members, displays information on sharable an integral number of physical records.
resources, or affects sharable resources.
control interval definition field (CIDF). In VSAM, a
commit. The operation that ends a unit of work by field located in the 4 bytes at the end of each control
releasing locks so that the database changes that are interval; it describes the free space, if any, in the control
made by that unit of work can be perceived by other interval.
processes.
conversation. Communication, which is based on LU
commit point. A point in time when data is considered 6.2 or Advanced Program-to-Program Communication
consistent. (APPC), between an application and a remote
transaction program over an SNA logical unit-to-logical
committed phase. The second phase of the multisite unit (LU-LU) session that allows communication while
update process that requests all participants to commit processing a transaction.
the effects of the logical unit of work.
coordinator. The system component that coordinates
communications database (CDB). A set of tables in the commit or rollback of a unit of work that includes
the DB2 catalog that are used to establish work that is done on one or more other systems.
conversations with remote database management
systems. correlation ID. An identifier that is associated with a
specific thread. In TSO, it is either an authorization ID
compression dictionary. The dictionary that controls or the job name.
the process of compression and decompression. This
dictionary is created from the data in the table space or coupling facility. A special PR/SM™ LPAR logical
table space partition. partition that runs the coupling facility control program
and provides high-speed caching, list processing, and
concurrency. The shared use of resources by more locking functions in a Sysplex.
than one application process at the same time.
CRC. Command recognition character.
conditional restart. A DB2 restart that is directed by a
user-defined conditional restart control record (CRCR). CRCR. Conditional restart control record. See also
conditional restart.
connection. In SNA, the existence of a
communication path between two partner LUs that created temporary table. A table that holds temporary
allows information to be exchanged (for example, two data and is defined with the SQL statement CREATE
DB2 subsystems that are connected and GLOBAL TEMPORARY TABLE. Information about
communicating by way of a conversation). created temporary tables is stored in the DB2 catalog,
so this kind of table is persistent and can be shared
connection ID. An identifier that is supplied by the across application processes. Contrast with declared
attachment facility and that is associated with a specific temporary table. See also temporary table.
address space connection.
cross-system coupling facility (XCF). A component
consistency token. A timestamp that is used to of MVS that provides functions to support cooperation
generate the version identifier for an application. See between authorized programs that run within a Sysplex.
also version.
CS. Cursor stability.
constant. A language element that specifies an
unchanging value. Constants are classified as string current data. Data within a host structure that is
constants or numeric constants. Contrast with variable. current with (identical to) the data within the base table.
cursor. A named control structure that an application data definition name (ddname). The name of a data
program uses to point to a row of interest within some definition (DD) statement that corresponds to a data
set of rows, and to retrieve rows from the set, possibly control block containing the same name.
making updates or deletions.
Data Language/I (DL/I). The IMS data manipulation
cursor stability (CS). The isolation level that provides language; a common high-level interface between a
maximum concurrency without the ability to read user application and IMS.
uncommitted data. With cursor stability, a unit of work
holds locks only on its uncommitted changes and on the data partition. A VSAM data set that is contained
current row of each of its cursors. within a partitioned table space.
cycle. A set of tables that can be ordered so that each data sharing. The ability of two or more DB2
table is a descendent of the one before it, and the first subsystems to directly access and change a single set
table is a descendent of the last table. A self-referencing of data.
table is a cycle with a single member.
data sharing group. A collection of one or more DB2
subsystems that directly access and change the same
D data while maintaining data integrity.
DASD. Direct access storage device. data sharing member. A DB2 subsystem that is
assigned by XCF services to a data sharing group.
database. A collection of tables, or a collection of table
spaces and index spaces. data space. A range of up to 2 GB of contiguous
virtual storage addresses that a program can directly
database access thread. A thread that accesses data manipulate. Unlike an address space, a data space can
at the local subsystem on behalf of a remote hold only data; it does not contain common areas,
subsystem. system data, or programs.
database administrator (DBA). An individual who is data type. An attribute of columns, literals, host
responsible for designing, developing, operating, variables, special registers, and the results of functions
safeguarding, maintaining, and using a database. and expressions.
database descriptor (DBD). An internal date. A three-part value that designates a day, month,
representation of a DB2 database definition, which and year.
reflects the data definition that is in the DB2 catalog.
The objects that are defined in a database descriptor date duration. A decimal integer that represents a
are table spaces, tables, indexes, index spaces, and number of years, months, and days.
relationships.
DBA. Database administrator.
database management system (DBMS). A software
system that controls the creation, organization, and DBCLOB. Double-byte character large object.
modification of a database and the access to the data
DBCS. Double-byte character set.
stored within it.
DBD. Database descriptor.
database request module (DBRM). A data set
member that is created by the DB2 precompiler and that DBID. Database identifier.
contains information about SQL statements. DBRMs are
used in the bind process. DBMS. Database management system.
| database server. The target of a request from a local DBRM. Database request module.
| application or an intermediate database server. In the
| DB2 environment, the database server function is DB2 catalog. Tables that are maintained by DB2 and
| provided by the distributed data facility to access DB2 contain descriptions of DB2 objects, such as tables,
| data from local applications, or from a remote database views, and indexes.
| server that acts as an intermediate database server.
DB2 command. An instruction to the DB2 subsystem
DATABASE 2 Interactive (DB2I). The DB2 facility that allowing a user to start or stop DB2, to display
provides for the execution of SQL statements, DB2 information on current users, to start or stop databases,
(operator) commands, programmer commands, and to display information on the status of databases, and
utility invocation. so on.
Glossary 365
DB2 for VSE & VM • DRDA access
DB2 for VSE & VM. The IBM DB2 relational database direct access storage device (DASD). A device in
management system for the VSE and VM operating which access time is independent of the location of the
systems. data.
DB2I. DATABASE 2 Interactive. directory. The DB2 system database that contains
internal objects such as database descriptors and
DCLGEN. Declarations generator. skeleton cursor tables.
DDF. Distributed data facility. distinct type. A user-defined data type that is
internally represented as an existing type (its source
ddname. Data definition name. type), but is considered to be a separate and
incompatible type for semantic purposes.
deadlock. Unresolvable contention for the use of a
resource such as a table or an index. distributed data facility (DDF). A set of DB2
components through which DB2 communicates with
declarations generator (DCLGEN). A subcomponent
another RDBMS.
of DB2 that generates SQL table declarations and
COBOL, C, or PL/I data structure declarations that Distributed Relational Database Architecture
conform to the table. The declarations are generated (DRDA). A connection protocol for distributed relational
from DB2 system catalog information. DCLGEN is also database processing that is used by IBM’s relational
a DSN subcommand. database products. DRDA includes protocols for
communication between an application and a remote
declared temporary table. A table that holds
relational database management system, and for
temporary data and is defined with the SQL statement
communication between relational database
DECLARE GLOBAL TEMPORARY TABLE. Information
management systems.
about declared temporary tables is not stored in the
DB2 catalog, so this kind of table is not persistent and DL/I. Data Language/I.
can only be used by the application process that issued
the DECLARE statement. Contrast with created double-byte character large object (DBCLOB). A
temporary table. See also temporary table. sequence of bytes representing double-byte characters
where the size of the values can be up to 2 GB. In
default value. A predetermined value, attribute, or general, double-byte character large object values are
option that is assumed when no other is explicitly used whenever a double-byte character string might
specified. exceed the limits of the VARGRAPHIC type.
deferred write. The process of asynchronously writing | double-byte character set (DBCS). A set of
changed data pages to disk. | characters, which are used by national languages such
delimited identifier. A sequence of characters that are
| as Japanese and Chinese, that have more symbols
enclosed within double quotation marks ("). The
| than can be represented by a single byte. Each
sequence must consist of a letter followed by zero or
| character is 2 bytes in length. Contrast with single-byte
more characters, each of which is a letter, digit, or the
| character set and multibyte character set.
underscore character (_). double-precision floating point number. A 64-bit
approximate representation of a real number.
dependent. An object (row, table, or table space) that
has at least one parent. The object is also said to be a drain. The act of acquiring a locked resource by
dependent (row, table, or table space) of its parent. See quiescing access to that object.
parent row, parent table, parent table space.
drain lock. A lock on a claim class that prevents a
dependent row. A row that contains a foreign key that claim from occurring.
matches the value of a primary key in the parent row.
DRDA. Distributed Relational Database Architecture.
dependent table. A table that is a dependent in at
least one referential constraint. | DRDA access. An open method of accessing
| distributed data that you can use to can connect to
descendent. An object that is a dependent of an | another database server to execute packages that were
object or is the dependent of a descendent of an object. | previously bound at the server location. You use the
descendent row. A row that is dependent on another
| SQL CONNECT statement or an SQL statement with a
row, or a row that is a descendent of a dependent row.
| three-part name to identify the server. Contrast with
| private protocol access.
descendent table. A table that is a dependent of
another table, or a table that is a descendent of a
dependent table.
embedded SQL. SQL statements that are coded fixed-length string. A character or graphic string
within an application program. See static SQL. whose length is specified and cannot be changed.
Contrast with varying-length string.
escape character. The symbol that is used to enclose
an SQL delimited identifier. The escape character is the foreign key. A column or set of columns in a
double quotation mark ("), except in COBOL dependent table of a constraint relationship. The key
applications, where the user assigns the symbol, which must have the same number of columns, with the same
is either a double quotation mark or an apostrophe ('). descriptions, as the primary key of the parent table.
Each foreign key value must either match a parent key
ESDS. Entry sequenced data set. value in the related parent table or be null.
EUR. IBM European Standards. forward log recovery. The third phase of restart
processing during which DB2 processes the log in a
exception table. A table that holds rows that violate forward direction to apply all REDO log records.
referential constraints or table check constraints that the
CHECK DATA utility finds. free space. The total amount of unused space in a
page; that is, the space that is not used to store records
exclusive lock. A lock that prevents concurrently or control information is free space.
executing application processes from reading or
changing data. Contrast with share lock. function. A mapping, embodied as a program (the
function body), invocable by means of zero or more
executable statement. An SQL statement that can be input values (arguments), to a single value (the result).
embedded in an application program, dynamically See also column function and scalar function.
prepared and executed, or issued interactively.
Functions can be user-defined, built-in, or generated by
exit routine. A user-written (or IBM-provided default) DB2. (See built-in function, cast function, external
program that receives control from DB2 to perform function, sourced function, SQL function, and
specific functions. Exit routines run as extensions of user-defined function.)
DB2.
function package. A package that results from binding
explicit hierarchical locking. Locking that is used to the DBRM for a function program.
make the parent-child relationship between resources
known to IRLM. This kind of locking avoids global function package owner. The authorization ID of the
locking overhead when no inter-DB2 interest exists on a user who binds the function program’s DBRM into a
resource. function package.
Glossary 367
GB • in-commit
index partition. A VSAM data set that is contained internal resource lock manager (IRLM). An MVS
within a partitioning index space. subsystem that DB2 uses to control communication and
database locking.
index space. A page set that is used to store the
entries of one index. IRLM. Internal resource lock manager.
indicator column. A 4-byte value that is stored in a ISO. International Standards Organization.
base table in place of a LOB column.
isolation level. The degree to which a unit of work is
indoubt. A status of a unit of recovery. If DB2 fails isolated from the updating operations of other units of
after it has finished its phase 1 commit processing and work. See also cursor stability, read stability, repeatable
before it has started phase 2, only the commit read, and uncommitted read.
coordinator knows if an individual unit of recovery is to
be committed or rolled back. At emergency restart, if ISPF. Interactive System Productivity Facility.
DB2 lacks the information it needs to make this
decision, the status of the unit of recovery is indoubt ISPF/PDF. Interactive System Productivity
until DB2 obtains this information from the coordinator. Facility/Program Development Facility.
More than one unit of recovery can be indoubt at
restart. J
indoubt resolution. The process of resolving the
Japanese Industrial Standards Committee (JISC).
status of an indoubt logical unit of work to either the
An organization that issues standards for coding
committed or the rollback state.
character sets.
inflight. A status of a unit of recovery. If DB2 fails
JCL. Job control language.
before its unit of recovery completes phase 1 of the
commit process, it merely backs out the updates of its JES. MVS Job Entry Subsystem.
unit of recovery at restart. These units of recovery are
termed inflight. JIS. Japanese Industrial Standard.
inheritance. The passing of class resources or job control language (JCL). A control language that
attributes from a parent class downstream in the class is used to identify a job to an operating system and to
hierarchy to a child class. describe the job’s requirements.
instrumentation facility component identifier Job Entry Subsystem (JES). An IBM licensed
(IFCID). A value that names and identifies a trace program that receives jobs into the system and
record of an event that can be traced. As a parameter processes all output data that is produced by the jobs.
on the START TRACE and MODIFY TRACE
commands, it specifies that the corresponding event is
to be traced. K
instrumentation facility interface (IFI). A KB. Kilobyte (1024 bytes).
programming interface that enables programs to obtain
online trace data about DB2, to submit DB2 commands, Kerberos. A network authentication protocol that is
and to pass data to DB2. designed to provide strong authentication for
client/server applications by using secret-key
Interactive System Productivity Facility (ISPF). An cryptography.
IBM licensed program that provides interactive dialog
services. Kerberos ticket. A transparent application mechanism
that transmits the identity of an initiating principal to its
inter-DB2 R/W interest. A property of data in a table target. A simple ticket contains the principal’s identity, a
space, index, or partition that has been opened by more session key, a timestamp, and other information, which
than one member of a data sharing group and that has is sealed using the target’s secret key.
been opened for writing by at least one of those
members.
Glossary 369
key • logical page list (LPL)
key. A column or an ordered collection of columns lock. A means of controlling concurrent events or
identified in the description of a table, index, or access to data. DB2 locking is performed by the IRLM.
referential constraint.
lock duration. The interval over which a DB2 lock is
key-sequenced data set (KSDS). A VSAM file or data held.
set whose records are loaded in key sequence and
controlled by an index. lock escalation. The promotion of a lock from a row,
page, or LOB lock to a table space lock because the
KSDS. Key-sequenced data set. number of page locks that are concurrently held on a
given resource exceeds a preset limit.
L locking. The process by which the integrity of data is
ensured. Locking prevents concurrent users from
labeled duration. A number that represents a duration accessing inconsistent data.
of years, months, days, hours, minutes, seconds, or
microseconds. lock mode. A representation for the type of access
that concurrently running programs can have to a
large object (LOB). A sequence of bytes representing resource that a DB2 lock is holding.
bit data, single-byte characters, double-byte characters,
or a mixture of single- and double-byte characters. A lock object. The resource that is controlled by a DB2
LOB can be up to 2 GB−1 byte in length. See also lock.
BLOB, CLOB, and DBCLOB.
lock parent. For explicit hierarchical locking, a lock
leaf page. A page that contains pairs of keys and that is held on a resource that has child locks that are
RIDs and that points to actual data. Contrast with lower in the hierarchy; usually the table space or
nonleaf page. partition intent locks are the parent locks.
linkage editor. A computer program for creating load lock promotion. The process of changing the size or
modules from one or more object modules or load mode of a DB2 lock to a higher level.
modules by resolving cross references among the
modules and, if necessary, adjusting addresses. lock size. The amount of data controlled by a DB2
lock on table data; the value can be a row, a page, a
link-edit. The action of creating a loadable computer LOB, a partition, a table, or a table space.
program using a linkage editor.
lock structure. A coupling facility data structure that is
L-lock. Logical lock. composed of a series of lock entries to support shared
and exclusive locking for logical resources.
load module. A program unit that is suitable for
loading into main storage for execution. The output of a log. A collection of records that describe the events
linkage editor. that occur during DB2 execution and that indicate their
sequence. The information thus recorded is used for
LOB. Large object. recovery in the event of a failure during DB2 execution.
LOB table space. A table space that contains all the logical claim. A claim on a logical partition of a
data for a particular LOB column in the related base nonpartitioning index.
table.
logical drain. A drain on a logical partition of a
local. A way of referring to any object that the local nonpartitioning index.
DB2 subsystem maintains. A local table, for example, is
a table that is maintained by the local DB2 subsystem. logical index partition. The set of all keys that
Contrast with remote. reference the same data partition.
local lock. A lock that provides intra-DB2 concurrency logical lock (L-lock). The lock type that transactions
control, but not inter-DB2 concurrency control; that is, its use to control intra- and inter-DB2 data concurrency
scope is a single DB2. between transactions. Contrast with physical lock
(P-lock).
local subsystem. The unique RDBMS to which the
user or application program is directly connected (in the logical page list (LPL). A list of pages that are in
case of DB2, by one of the DB2 attachment facilities). error and that cannot be referenced by applications until
the pages are recovered. The page is in logical error,
| location. The unique name of a database server. An because the actual media (coupling facility or DASD)
| application uses the location name to access a DB2 might not contain any errors. Usually a connection to
| database server. the media has been lost.
logical unit of work identifier (LUWID). A name that MTO. Master terminal operator.
uniquely identifies a thread within a network. This name
consists of a fully-qualified LU network name, an LUW multisite update. Distributed relational database
instance number, and an LUW sequence number. processing in which data is updated in more than one
location within a single unit of work.
log initialization. The first phase of restart processing
during which DB2 attempts to locate the current end of MVS. Multiple Virtual Storage.
the log.
MVS/ESA™. Multiple Virtual Storage/Enterprise
log record sequence number (LRSN). A number that Systems Architecture.
DB2 generates and associates with each log record.
DB2 also uses the LRSN for page versioning. The MVS/XA™. Multiple Virtual Storage/Extended
LRSNs that a particular DB2 data sharing group Architecture.
generates form a strictly increasing sequence for each
DB2 log and a strictly increasing sequence for each N
page across the DB2 group.
negotiable lock. A lock whose mode can be
log truncation. A process by which an explicit starting downgraded, by agreement among contending users, to
RBA is established. This RBA is the point at which the be compatible to all. A physical lock is an example of a
next byte of log data is to be written. negotiable lock.
LPL. Logical page list. network identifier (NID). The network ID that is
assigned by IMS or CICS, or if the connection type is
LRH. Log record header.
RRSAF, the OS/390 RRS unit of recovery ID (URID).
LRSN. Log record sequence number.
NID. Network ID.
LU name. Logical unit name, which is the name by
nonleaf page. A page that contains keys and page
which VTAM refers to a node in a network. Contrast
numbers of other pages in the index (either leaf or
with location name.
nonleaf pages). Nonleaf pages never point to actual
LUW. Logical unit of work. data.
LUWID. Logical unit of work identifier. nonpartitioning index. Any index that is not a
partitioning index.
Glossary 371
OASN (origin application schedule number) • precompilation
program. A single compilable collection of executable recovery pending (RECP). A condition that prevents
statements in a programming language. SQL access to a table space that needs to be
recovered.
protected conversation. A VTAM conversation that
supports two-phase commit flows. RECP. Recovery pending.
Glossary 373
redo • schema
redo. A state of a unit of recovery that indicates that resource limit facility (RLF). A portion of DB2 code
changes are to be reapplied to the DASD media to that prevents dynamic manipulative SQL statements
ensure data integrity. from exceeding specified time limits. The resource limit
facility is sometimes called the governor.
referential constraint. The requirement that nonnull
values of a designated foreign key are valid only if they resource limit specification table. A site-defined
equal values of the primary key of a designated table. table that specifies the limits to be enforced by the
resource limit facility.
referential integrity. The state of a database in which
all values of all foreign keys are valid. Maintaining restart pending (RESTP). A restrictive state of a page
referential integrity requires the enforcement of set or partition that indicates that restart (backout) work
referential constraints on all operations that change the needs to be performed on the object. All access to the
data in a table upon which the referential constraints are page set or partition is denied except for access by the:
defined. v RECOVER POSTPONED command
v Automatic online backout (which DB2 invokes after
relationship. A defined connection between the rows restart if the system parameter LBACKOUT=AUTO)
of a table or the rows of two tables. A relationship is the
internal representation of a referential constraint. RESTP. Restart pending.
relative byte address (RBA). The offset of a data result table. The set of rows that are specified by a
record or control interval from the beginning of the SELECT statement.
storage space that is allocated to the data set or file to
which it belongs. retained lock. A MODIFY lock that a DB2 subsystem
was holding at the time of a subsystem failure. The lock
remote. Any object that is maintained by a remote is retained in the coupling facility lock structure across a
DB2 subsystem (that is, by a DB2 subsystem other than DB2 failure.
the local one). A remote view, for example, is a view
that is maintained by a remote DB2 subsystem. RID pool. Record identifier pool.
Contrast with local.
RLF. Resource limit facility.
remote subsystem. Any RDBMS, except the local
subsystem, with which the user or application can RMID. Resource manager identifier.
communicate. The subsystem need not be remote in
RO. Read-only access.
any physical sense, and might even operate on the
same processor under the same MVS system. rollback. The process of restoring data changed by
SQL statements to the state at its last commit point. All
REORG pending (REORP). A condition that restricts
locks are freed. Contrast with commit.
SQL access and most utility access to an object that
must be reorganized. ROWID. Row identifier.
REORP. REORG pending. row identifier (ROWID). A value that uniquely
identifies a row. This value is stored with the row and
repeatable read (RR). The isolation level that provides
never changes.
maximum protection from other executing application
programs. When an application program executes with RS. Read stability.
repeatable read protection, rows referenced by the
program cannot be changed by other programs until the
program reaches a commit point. S
request commit. The vote that is submitted to the SBCS. Single-byte character set.
prepare phase if the participant has modified data and
is prepared to commit or roll back. SCA. Shared communications area.
resource. The object of a lock or claim, which could scalar function. An SQL operation that produces a
be a table space, an index space, a data partition, an single value from another value and is expressed as a
index partition, or a logical partition. function name, followed by a list of arguments that are
enclosed in parentheses. Contrast with column function.
resource control table (RCT). A construct of the
CICS attachment facility, created by site-provided macro schema. A logical grouping for user-defined functions,
parameters, that defines authorization and access distinct types, triggers, and stored procedures. When an
attributes for transactions or transaction groups. object of one of these types is created, it is assigned to
search condition. A criterion for selecting rows from a shift-out character. A special control character (X'0E')
table. A search condition consists of one or more that is used in EBCDIC systems to denote that the
predicates. subsequent bytes, up to the next shift-in control
character, represent DBCS characters. See also shift-in
secondary authorization ID. An authorization ID that character.
has been associated with a primary authorization ID by
an authorization exit routine. sign-on. A request that is made on behalf of an
individual CICS or IMS application process by an
secondary group buffer pool. For a duplexed group attachment facility to enable DB2 to verify that it is
buffer pool, the structure that is used to back up authorized to use DB2 resources.
changed pages that are written to the primary group
buffer pool. No page registration or cross-invalidation simple table space. A table space that is neither
occurs using the secondary group buffer pool. The partitioned nor segmented.
OS/390 equivalent is new structure.
| single-byte character set (SBCS). A set of characters
section. The segment of a plan or package that | in which each character is represented by a single byte.
contains the executable structures for a single SQL | Contrast with double-byte character set or multibyte
statement. For most SQL statements, one section in the | character set.
plan exists for each SQL statement in the source
SMF. System management facility.
program. However, for cursor-related statements, the
DECLARE, OPEN, FETCH, and CLOSE statements SMS. Storage Management Subsystem.
reference the same section because, they each refer to
the SELECT statement that is named in the DECLARE SNA. Systems Network Architecture.
CURSOR statement. SQL statements such as COMMIT,
ROLLBACK, and some SET statements do not use a sourced function. A function that is implemented by
section. another built-in or user-defined function that is already
known to the database manager. This function can be a
segmented table space. A table space that is divided scalar function or a column (aggregating) function; it
into equal-sized groups of pages called segments. returns a single value from a set of values (for example,
Segments are assigned to tables so that rows of MAX or AVG). Contrast with built-in function, external
different tables are never stored in the same segment. function, and SQL function.
sequential data set. A non-DB2 data set whose source program. A set of host language statements
records are organized on the basis of their successive and SQL statements that is processed by an SQL
physical positions, such as on magnetic tape. Several of precompiler.
the DB2 database utilities require sequential data sets.
SPUFI. SQL Processor Using File Input.
sequential prefetch. A mechanism that triggers
consecutive asynchronous I/O operations. Pages are SQL. Structured Query Language.
fetched before they are required, and several pages are
read with a single I/O operation. SQL authorization ID (SQL ID). The authorization ID
that is used for checking dynamic SQL statements in
| server. The target of a request from a remote some situations.
| requester. In the DB2 environment, the server function
| is provided by the distributed data facility, which is used SQLCA. SQL communication area.
| to access DB2 data from remote applications.
SQL communication area (SQLCA). A structure that
session. A link between two nodes in a VTAM is used to provide an application program with
network. information about the execution of its SQL statements.
Glossary 375
SQL/DS™ • TCB
SQL/DS™. Structured Query Language/Data System. subsystem. A distinct instance of a relational
This product is now obsolete and has been replaced by database management system (RDBMS).
DB2 for VSE & VM.
sync point. See commit point.
SQL escape character. The symbol that is used to
enclose an SQL delimited identifier. This symbol is the synonym. In SQL, an alternative name for a table or
double quotation mark ("). See also escape character. view. Synonyms can be used only to refer to objects at
the subsystem in which the synonym is defined.
SQL function. A user-defined function in which the
CREATE FUNCTION statement contains the source system administrator. The person at a computer
code. The source code is a single SQL expression that installation who designs, controls, and manages the use
evaluates to a single value. The SQL user-defined of the computer system.
function can return only one parameter.
system agent. A work request that DB2 creates
SQL path. An ordered list of schema names that are internally such as prefetch processing, deferred writes,
used in the resolution of unqualified references to and service tasks.
user-defined functions, distinct types, and stored
procedures. In dynamic SQL, the current path is found system conversation. The conversation that two DB2
in the CURRENT PATH special register. In static SQL, it subsystems must establish to process system
is defined in the PATH bind option. messages before any distributed processing can begin.
SQL Processor Using File Input (SPUFI). SQL Systems Network Architecture (SNA). The
Processor Using File Input. A facility of the TSO description of the logical structure, formats, protocols,
attachment subcomponent that enables the DB2I user and operational sequences for transmitting information
to execute SQL statements without embedding them in through and controlling the configuration and operation
an application program. of networks.
Structured Query Language (SQL). A standardized TB. Terabyte (1 099 511 627 776 bytes).
language for defining and manipulating data in a
TCB. Task control block (in MVS).
relational database.
TMP. Terminal Monitor Program. URID (unit of recovery ID). The LOGRBA of the first
log record for a unit of recovery. The URID also appears
trace. A DB2 facility that provides the ability to monitor in all subsequent log records for that unit of recovery.
and collect DB2 monitoring, auditing, performance,
accounting, statistics, and serviceability (global) data. user-defined data type (UDT). See distinct type.
transaction lock. A lock that is used to control user-defined function (UDF). A function that is
concurrent execution of SQL statements. defined to DB2 by using the CREATE FUNCTION
statement and that can be referenced thereafter in SQL
TSO. Time-Sharing Option. statements. A user-defined function can be an external
function, a sourced function, or an SQL function.
TSO attachment facility. A DB2 facility consisting of Contrast with built-in function.
the DSN command processor and DB2I. Applications
that are not written for the CICS or IMS environments UT. Utility-only access.
can run under the TSO attachment facility.
Glossary 377
view • z/OS
A version of a program is the source code that is
produced by precompiling the program. The program
version is identified by the program name and a
timestamp (consistency token).
A version of a DBRM is the DBRM that is produced
by precompiling a program. The DBRM version is
identified by the same program name and timestamp
as a corresponding program version.
A version of a package is the result of binding a
DBRM within a particular database system. The
package version is identified by the same program
name and consistency token as the DBRM.
A version of a LOB is a copy of a LOB value at a
point in time. The version number for a LOB is
stored in the auxiliary index entry for the LOB.
W
warm start. The normal DB2 restart process, which
involves reading and processing log records so that
data under the control of DB2 is consistent. Contrast
with cold start.
X
XCF. See cross-system coupling facility.
Z
z/OS. An operating system for the eServer product line
that supports 64-bit real storage.
Bibliography 381
v DFSMS/MVS: Utilities, SC26-4926 v System/390 9672/9674 System Overview,
v MVS/DFP: Using Data Sets, SC26-4749 GA22-7148
DFSORT™ ICSF/MVS
v DFSORT Application Programming: Guide, v ICSF/MVS General Information, GC23-0093
SC33-4035
IMS
Distributed Relational Database Architecture™ v IMS Batch Terminal Simulator General
v Data Stream and OPA Reference, SC31-6806 Information, GH20-5522
v IBM SQL Reference, SC26-8416 v IMS Administration Guide: System, SC26-9420
v Open Group Technical Standard v IMS Administration Guide: Transaction
The Open Group presently makes the following Manager, SC26-9421
DRDA® books available through its Web site at: v IMS Application Programming: Database
www.opengroup.org Manager, SC26-9422
– DRDA Version 2 Vol. 1: Distributed v IMS Application Programming: Design Guide,
Relational Database Architecture (DRDA) SC26-9423
– DRDA Version 2 Vol. 2: Formatted Data v IMS Application Programming: Transaction
Object Content Architecture Manager, SC26-9425
– DRDA Version 2 Vol. 3: Distributed Data v IMS Command Reference, SC26-9436
Management Architecture v IMS Customization Guide, SC26-9427
v IMS Install Volume 1: Installation and
Domain Name System Verification, GC26-9429
v DNS and BIND, Third Edition, Paul Albitz and v IMS Install Volume 2: System Definition and
Cricket Liu, O’Reilly, ISBN 1-56592-512-2 Tailoring, GC26-9430
v IMS Messages and Codes, GC27-1120
Education v IMS Utilities Reference: System, SC26-9441
v IBM Dictionary of Computing, McGraw-Hill,
ISBN 0-07031-489-6 ISPF
v 1999 IBM All-in-One Education and Training v ISPF V4 Dialog Developer's Guide and
Catalog, GR23-8105 Reference, SC34-4486
v ISPF V4 Messages and Codes, SC34-4450
Enterprise System/9000® and Enterprise v ISPF V4 Planning and Customizing, SC34-4443
System/3090™ v ISPF V4 User's Guide, SC34-4484
v Enterprise System/9000 and Enterprise
System/3090 Processor Resource/System Language Environment®
Manager Planning Guide, GA22-7123 v Debug Tool User's Guide and Reference,
SC09-2137
High Level Assembler
v High Level Assembler for MVS and VM and National Language Support
VSE Language Reference, SC26-4940 v IBM National Language Support Reference
v High Level Assembler for MVS and VM and Manual Volume 2, SE09-8002
VSE Programmer's Guide, SC26-4941
NetView®
Parallel Sysplex® Library v NetView Installation and Administration Guide,
v OS/390 Parallel Sysplex Application Migration, SC31-8043
GC28-1863 v NetView User's Guide, SC31-8056
v System/390 MVS Sysplex Hardware and
Software Migration, GC28-1862 Microsoft® ODBC
v OS/390 Parallel Sysplex Overview: An v Microsoft ODBC 3.0 Software Development Kit
Introduction to Data Sharing and Parallelism, and Programmer's Reference, Microsoft Press,
GC28-1860 ISBN 1-57231-516-4
v OS/390 Parallel Sysplex Systems Management,
GC28-1861 OS/390
v OS/390 Parallel Sysplex Test Report, v OS/390 C/C++ Programming Guide, SC09-2362
GC28-1963 v OS/390 C/C++ Run-Time Library Reference,
SC28-1663
Bibliography 383
v OS/390 DCE Administration Guide, SC28-1584 System/370™ and System/390
v OS/390 DCE Introduction, GC28-1581 v ESA/370 Principles of Operation, SA22-7200
v OS/390 DCE Messages and Codes, SC28-1591 v ESA/390 Principles of Operation, SA22-7201
v OS/390 UNIX System Services Command v System/390 MVS Sysplex Hardware and
Reference, SC28-1892 Software Migration, GC28-1210
v OS/390 UNIX System Services Messages and
Codes, SC28-1908 System Network Architecture (SNA)
v OS/390 UNIX System Services Planning, v SNA Formats, GA27-3136
SC28-1890 v SNA LU 6.2 Peer Protocols Reference,
v OS/390 UNIX System Services User's Guide, SC31-6808
SC28-1891 v SNA Transaction Programmer's Reference
v OS/390 UNIX System Services Programming: Manual for LU Type 6.2, GC30-3084
Assembler Callable Services Reference, v SNA/Management Services Alert
SC28-1899 Implementation Guide, GC31-6809
Index 387
D DB2 commands (continued)
commands (continued)
data set
TERM UTILITY 335, 337
naming convention xvi
completion messages 10
data sharing
description 4
delays, diagnosing 225
DISPLAY FUNCTION SPECIFIC 121
displaying
entering from
archive log information 95
supported environments 8
information about groups 125
scope 5
status of members 125
separator 4
identifying members with utility jobs 172
STOP FUNCTION SPECIFIC command 321
scope of commands 5
DBM1 option of START DB2 command 284
starting members 285
DBPROTOCOL
database
option of BIND PACKAGE subcommand 49
displaying status 106
option of BIND PLAN subcommand 49
reserved names 313
option of REBIND PACKAGE subcommand 49
starting 276
option of REBIND PLAN subcommand 49
stopping 310
DBPROTOCOL option, DSNH command 208
DATE
DBRM (database request module)
option of DSNH command 197
BIND PLAN subcommand 65
DB2
maximum number in plan 2
precompiler 4
DBRMLIB option of DSNH command 198
DB2 books online 351
DCLGEN subcommand of DSN
DB2 commands
declaring an indicator variable array 88
command names 4
description 84
commands
example 90
ALTER BUFFERPOOL 12, 18
forming field names 88
ALTER GROUPBUFFERPOOL 19, 22
option descriptions 85
ALTER UTILITY 23
DDF (distributed data facility)
ARCHIVE LOG 26, 31
displaying, DISPLAY DDF command 119
CANCEL THREAD 77, 81
DEADLINE option for ALTER UTILITY command 24
DISPLAY ARCHIVE 95, 96
DEADLOCK option of MODIFY irlmproc,SET command
DISPLAY BUFFERPOOL 97
of MVS 229
DISPLAY DATABASE 106
DEADLOK option of START irlmproc command 290
DISPLAY DDF 119
DECARTH option of DSNH command 198
DISPLAY GROUP 125, 129
DECIMAL
DISPLAY GROUPBUFFERPOOL 129
option of DSNH command 198
DISPLAY LOCATION 143, 145
DEFAULT
DISPLAY LOG 146
option of SET ARCHIVE command 266
DISPLAY PROCEDURE 148
DEFER
DISPLAY RLIMIT 152
option of BIND PACKAGE subcommand 50
DISPLAY THREAD 153
option of BIND PLAN subcommand 50, 51
DISPLAY TRACE 165, 170
option of DSNH command 208, 209
DISPLAY UTILITY 171, 174
option of REBIND PACKAGE subcommand 50
MODIFY TRACE 238, 240
option of REBIND PLAN subcommand 50
RECOVER BSDS 251
DEGREE
RECOVER INDOUBT 252, 254
option of BIND PACKAGE subcommand 51
RECOVER POSTPONED 255
option of BIND PLAN subcommand 51
RESET INDOUBT 259
option of DSNH command 208
START DATABASE 276
option of REBIND PACKAGE subcommand 51
START DB2 283, 285
option of REBIND PLAN subcommand 51
START DDF 286
degree of parallel processing 51
START FUNCTION SPECIFIC 287
DELAY
START PROCEDURE 294
keyword of MODIFY irlmproc,DIAG command 225
START RLIMIT 297, 298
option of ALTER UTILITY command 24
START TRACE 299
deleting
STOP DATABASE 310
IMS units of recovery 82
STOP DB2 316, 317
DELIMIT option of DSNH command 199
STOP DDF 318, 320
deregistering IRLM 223
STOP PROCEDURE 326
DEST option
STOP RLIMIT 329
DISPLAY TRACE command 167
STOP TRACE 330, 334
Index 389
DSN command of TSO (continued) DYNAMICRULES
description 175 option of BIND PACKAGE subcommand 52
example 177 option of BIND PLAN subcommand 52
option descriptions 175 option of REBIND PACKAGE subcommand 52
return codes 177 option of REBIND PLAN subcommand 52
subcommands 7 DYNAMICRULES option
ABEND 175 DSNH command 209
BIND PACKAGE 32, 37
BIND PLAN 38, 43
DCLGEN 84, 91 E
END 217 ENABLE
FREE PACKAGE 218, 220 option of BIND PACKAGE subcommand 56
FREE PLAN 221, 222 option of BIND PLAN subcommand 56
parsing 7 option of REBIND PACKAGE subcommand 56
REBIND PACKAGE 240 option of REBIND PLAN subcommand 56
REBIND PLAN 244 ENABLE option, DSNH command 209
REBIND TRIGGER PACKAGE 248 ENCODING
return codes 177 option of BIND PACKAGE subcommand 58
RUN 262, 264 option of BIND PLAN subcommand 58
SPUFI 273 option of REBIND PACKAGE subcommand 58
DSNC command of CICS option of REBIND PLAN subcommand 58
description 178 END
DSNC DISCONNECT command of CICS subcommand of DSN
description 179 description 217
example 179 example 217
DSNC DISPLAY command of CICS ENTRY option of DSNH command 199
description 180 escape character
example 182 APOST option of DCLGEN subcommand 87
option descriptions 180 QUOTE option of DCLGEN subcommand 87
output 181 executing
DSNC MODIFY command of CICS connections between IMS and a subsystem 275
description 184 EXPLAIN
example 185 option of BIND PACKAGE subcommand 59
option descriptions 184 option of BIND PLAN subcommand 59
DSNC STOP command of CICS option of REBIND PACKAGE subcommand 59
description 186 option of REBIND PLAN subcommand 59
example 186 option of REBIND TRIGGER PACKAGE
option descriptions 186 subcommand 59
DSNC STRT command of CICS EXPLAIN option, DSNH command 209, 212
description 187 extended MCS consoles, DB2 support of 8
example 187
option descriptions 187
DSNDB01 database F
authority needed to start 276 F irlmproc,ABEND command of MVS 223
DSNDB06 database F irlmproc,DIAG command of MVS 225
authority needed to start 276 F irlmproc,PURGE command of MVS IRLM 227
DSNH command of TSO F irlmproc,SET command of MVS IRLM 228
data set names 193 F irlmproc,STATUS command of MVS IRLM 232
description 189 FLAG option
example 214 BIND PACKAGE subcommand 60
option descriptions 190 BIND PLAN subcommand 60
DSNHDECP DSNH command 209
list of parameters 343 FREE PACKAGE subcommand 219
DSNZPARM FREE PLAN subcommand 221
list of parameters 343 of DSNH command 199
option of START DB2 command 283 REBIND PACKAGE subcommand 60
dump REBIND PLAN subcommand 60
IRLM diagnostic 225 REBIND TRIGGER PACKAGE subcommand 60
DUMP FORCE option
option of CANCEL THREAD command 78 DSNC STOP command 186
DWQT option of ALTER BUFFERPOOL command 14 RESET INDOUBT command 260
Index 391
IRLM (internal resource lock manager) (continued) LIMIT
DISPLAY GROUP command output 126 option of DISPLAY DATABASE command 110
locks LINECOUNT option
releasing 227 DSNH command 200
modifying, diagnostic trace 340 link-editing
restarting processing 189
effect on CSA value 229 LINK option of DSNH command 200
effect on number of trace buffers 229 LIST
starting option of DISPLAY BUFFERPOOL command 98
an IRLM component 290 LLIB option of DSNH command 200
starting, diagnostic trace 340 LnLIB option of DSNH command 200
status LOAD option
checking 228, 232 of DSNH command 200
stopping SET SYSPARM command 268
normal 324 LOAD utility
stopping, diagnostic trace 340 effects of TERM command 336
terminating LOCAL option of START irlmproc command 292
abnormal 223 LOCATION
normal 324 option of DISPLAY THREAD command 156
trace buffers, setting number of 228 option of DISPLAY TRACE command 168
IRLMGRP option option of RESET INDOUBT command 260
START irlmproc command 291 option of START TRACE command 306
IRLMID option of START irlmproc command 291 option of STOP TRACE command 333
IRLMNM option of START irlmproc command 291 location name
ISOLATION BIND PACKAGE subcommand 57, 67
option of BIND PACKAGE subcommand 62 DISPLAY LOCATION command 143
option of BIND PLAN subcommand REBIND PACKAGE subcommand 57, 67
description 62 REBIND TRIGGER PACKAGE subcommand 249
option of REBIND PACKAGE subcommand 62 LOCKS option of DISPLAY DATABASE command 109
option of REBIND PLAN subcommand 62 LOCKTABL option of START irlmproc command 291
option of REBIND TRIGGER PACKAGE LOG
subcommand 62 option of TRACE command 338
ISOLATION option, DSNH command 209 logical page list (LPL) 280
LOGLOAD option, SET LOG command 270
LONGLOG option of ALTER UTILITY option 24
K LOPTION option of DSNH command 200
KEEPDYNAMIC option LPL
BIND PACKAGE subcommand 63 option of DISPLAY DATABASE command 109
BIND PLAN subcommand 63 LPL (logical page list)
DSNH command 209 recovering pages
REBIND PACKAGE subcommand 63 using START DATABASE command 280
REBIND PLAN subcommand 63 LSTATS option of DISPLAY BUFFERPOOL
command 98
LTE option of MODIFY irlmproc,SET command of
L MVS 229
LABEL LUNAME
option of DCLGEN subcommand 87 DISPLAY LOCATION command 144
LANGUAGE option of RESET INDOUBT command 260
option of DCLGEN subcommand 86 LUWID option
LEAVE option of DSNH command 206 DISPLAY THREAD command 157
letter, description in DB2 xv RECOVER INDOUBT command 253
library RESET INDOUBT command 261
online 351
LIBRARY option
BIND PACKAGE subcommand 64 M
BIND PLAN subcommand 64 MACRO option of DSNH command 201
DCLGEN subcommand 86 MAINT option of MODIFY irlmproc,STATUS command
RUN subcommand 263 of MVS 233
LIGHT option, START DB2 command 284 MAINT option of START DB2 command 284
light restart MAXCSA option of START irlmproc command 291
with ARM 285
Index 393
NOBACKOUT package (continued)
option of CANCEL THREAD command 78 replacing version of 46
NODEFER option PACKAGE option, DSNH command 212
BIND PACKAGE subcommand 50 PACTION option, DSNH command 210
BIND PLAN subcommand 50 parallel processing
DSNH command 209 DEGREE option of bind subcommands 51
REBIND PACKAGE subcommand 50 VPPSEQT option of ALTER BUFFERPOOL
REBIND PLAN subcommand 50 command 14
NODISCON option of START irlmproc command 293 parameter
NODUMP option of MODIFY irlmproc,ABEND passing to application program 263
command 223 PARM option of START DB2 command 283
NOFOR option PARMS option
DSNH command 201 DSNH command 201
NONE keyword of MODIFY irlmproc,DIAG RUN subcommand 263
command 226 parsing rules
notices, legal 357 commands 3
NOWRAP option of TRACE CT command 341 PART
option of DISPLAY DATABASE command 110
option of START DATABASE command 279
O option of STOP DATABASE command 312
OASN option partial-location name, DISPLAY LOCATION
CHANGE command 82 command 144
DISPLAY command 92 PASS option of DSNH command 201
online books 351 PATH option
ONLY option of DISPLAY DATABASE command 110 BIND PACKAGE subcommand 69
OP option BIND PLAN subcommand 69
START TRACE command 302 DSNH command 210
STOP TRACE command 332 REBIND PACKAGE subcommand 69
operands REBIND PLAN subcommand 69
DB2 command 4 PATHDEFAULT option
OPTHINT option REBIND PACKAGE subcommand 70
BIND PACKAGE subcommand 66 REBIND PLAN subcommand 70
BIND PLAN subcommand 66 PBIND option, DSNH command 210
DSNH command 209 PC option of START irlmproc command 292
REBIND PACKAGE subcommand 66 PCICS option, DSNH command 211
REBIND PLAN subcommand 66 PCLOAD option of DSNH command 201
OPTIONS option PDBPROTOCOL option, DSNH command 211
BIND PACKAGE subcommand 66 PDBRMLIB option, DSNH command 211
OPTIONS option of DSNH command 201 PDEFER option, DSNH command 211
OUTNAME option of DSNH command 201 PDEGREE option, DSNH command 211
OWNER PDISABLE option, DSNH command 211
option of BIND PACKAGE subcommand 67 PDLIBATCH option, DSNH command 211
option of BIND PLAN subcommand 67 PDMEM option, DSNH command 211
option of DCLGEN subcommand 85 PDYNAMICRULES option, DSNH command 212
option of REBIND PACKAGE subcommand 67 PENABLE option, DSNH command 212
option of REBIND PLAN subcommand 67 PERFM option
OWNER option DISPLAY TRACE command 167
DSNH command 210 MODIFY TRACE command 238
START TRACE command 301
STOP TRACE command 332
P performance
P irlmproc command 324 trace
package class descriptions 304
binding, initiating 32 displaying 165
identifier starting 299
BIND PACKAGE subcommand 67 stopping 330
REBIND PACKAGE subcommand 67 PFLAG option, DSNH command 212
REBIND TRIGGER PACKAGE PGPROT option of START irlmproc command 292
subcommand 249 PGSTEAL option of ALTER BUFFERPOOL
rebinding 240 command 15
rebinding trigger 248
Index 395
recovery (continued) restarting (continued)
postponed units of recovery 255 utilities
REJECT option of STOP FUNCTION SPECIFIC 322 terminated job steps 336
RELEASE RESTRICT
option of BIND PACKAGE subcommand 72 option of DISPLAY DATABASE command 111
option of BIND PLAN subcommand RESUME option
description 72 SET LOG command 271
option of DSNH command 210 RETAIN option
option of REBIND PACKAGE subcommand 72 BIND PLAN subcommand 45
option of REBIND PLAN subcommand 72 DSNH command 210
option of REBIND TRIGGER PACKAGE retained lock 109
subcommand 72 RETRY
RELOAD option, SET SYSPARM command 268 option of DSN command 176
REMOTE option, DSNH command 213 return code
REOPT option CURRENTSERVER option of bind and rebind
BIND PACKAGE subcommand 73 subcommands 49
BIND PLAN subcommand 73 DSN command 177
DSNH command 210 RUN subcommand of DSN 177
REBIND PACKAGE subcommand 73 RO option of START DATABASE command 279
REBIND PLAN subcommand 73 RRSURID option, DISPLAY THREAD command 157
REORG INDEX utility RUN
effects of TERM command 336 option of DSNH command parameters 204
REORG TABLESPACE utility subcommand of DSN
effects of TERM command 337 description 262
REPAIR utility example 264
effects of TERM command 337 option descriptions 262
REPLACE return codes 177
option of DCLGEN subcommand 86 RUNIN option of DSNH command 204
option of DSNH command 207 running DSNH processing 189
REPLACE option RUNOUT option of DSNH command 204
DSNH command 210 RUNSTATS utility
replacing effects of TERM command 337
version of a package 46 RW option of START DATABASE command 279
REPLVER option
BIND PACKAGE subcommand 45
DSNH command 213 S
effect of 46 scanning rules
REPORT utility commands 3
effects of TERM command 337 schema.partial-name* option of DISPLAY FUNCTION
reports SPECIFIC command 122
detail report 101 schema.partial-name option of START FUNCTION
group detail report 132 SPECIFIC command 288
member detail report 133 schema.partial-name option of STOP FUNCTION
summary report SPECIFIC command 322
DISPLAY BUFFERPOOL command 100 schema.specific-function-name
DISPLAY GROUPBUFFERPOOL command 131, option of DISPLAY FUNCTION SPECIFIC
137 command 122
RES option of STOP TRACE command 332 schema.specific-function-name option of DISPLAY
RESET FUNCTION SPECIFIC command 121
option of CHANGE command 82 schema.specific-function-name option of START
RESET GENERICLU command FUNCTION SPECIFIC command 288
description 257 schema.specific-function-name option of STOP
example 258 FUNCTION SPECIFIC command 322
option descriptions 257 scope of commands 5
RESET INDOUBT command SCOPE option
description 259 ARCHIVE LOG command 27
option descriptions 260 DISPLAY THREAD command 155
restarting of DISPLAY FUNCTION SPECIFIC command 122
CICS attachment facility 186 of DISPLAY PROCEDURE command 149
connections between IMS and a subsystem 275 of STOP FUNCTION SPECIFIC command 322
status of DB2 resources 283 of STOP PROCEDURE command 328
Index 397
STOP PROCEDURE command TERM option
description 326 DSNH command 206
example 328 TERM UTILITY command
option descriptions 327 description 335
STOP RLIMIT command 329 example 337
STOP TRACE command terminating
description 330 connections between IMS and a subsystem 309
example 334 databases 310
option descriptions 332 DB2
STOR option of MODIFY irlmproc,STATUS command of description 316
MVS 233 IRLM
stored procedure abnormal 223
displaying status 148 normal 324
starting 294 stored procedures 326
stopping 326 trace activity 330
STOSPACE utility utilities
effects of TERM command 337 description 335
string TEST option
delimiter DSN command 176
COBOL 87 thread
SQL 87 canceling 77
string option naming convention xviii displaying
STRUCTURE option of DCLGEN subcommand 87 DISPLAY THREAD command 153
SUB option of TRACE CT command 341 TIME option
SUBS option of TRACE command 338 ARCHIVE LOG command 28
SUBSYS option DSNH command 206
CHANGE command 82 SET ARCHIVE command 266
DISPLAY command 92 TIMEOUT option of MODIFY irlmproc,SET command of
START command 275 MVS 229
STOP command 309 TNO option
subsystem DISPLAY TRACE command 168
name MODIFY TRACE command 239
naming convention xviii trace
naming convention xviii changing active traces 238
subsystem parameters displaying 165
list 343 events 338
NPGTHRSH 345 IFCIDs activated by trace class 303
PTASKROL 345 starting 299
SUFFIX option, DSNH command 206 stopping 330
summary report TRACE CT command of MVS
DISPLAY BUFFERPOOL command 100 description 340
DISPLAY GROUPBUFFERPOOL command 131, example 342
137 option descriptions 340
SUSPEND option TRACE
SET LOG command 270 command of IMS
STOP DDF command 318 description 338
syntax diagrams, how to read xix example 338
SYSTEM option option of START TRACE command 306
DSN command 175 TRACE option, START irlmproc command 293
DSNH command 206 TRACE option of MODIFY irlmproc,SET command of
MVS 229
TRACE option of MODIFY irlmproc,STATUS command
T of MVS 233
TABLE TRACK option of DSNH 205
option of DCLGEN subcommand 85 TRANSACTION option
table name DSNC DISPLAY command 180
naming convention xviii DSNC MODIFY command 184
table space TSO
naming convention xviii CLISTs
TDATA option of START TRACE command 306 DSNH 189, 216
TSO option of DSNH command 204
V Z
VALIDATE ZPARM 343
option of BIND PACKAGE subcommand 75
option of BIND PLAN subcommand 75
option of REBIND PACKAGE subcommand 75
option of REBIND PLAN subcommand 75
VALIDATE option, DSNH command 210
VDWQT option of ALTER BUFFERPOOL command 15
VERSION
option of DSNH command 206
version-id naming convention xviii
version of a package
BIND PACKAGE subcommand 67
REBIND PACKAGE subcommand 67
virtual buffer pool parallel sequential steal threshold
(VPSEQT) 14
virtual buffer pool sequential steal threshold
(VPSEQT) 13
VPPSEQT option of ALTER BUFFERPOOL
command 14
VPSEQT option of ALTER BUFFERPOOL
command 13
VPSIZE option of ALTER BUFFERPOOL command 12
VPTYPE option of ALTER BUFFERPOOL
command 13
VPXPSEQT
option of ALTER BUFFERPOOL command 14
VSAM (virtual storage access method)
password, DCLGEN subcommand 86
VTAM (Virtual Telecommunications Access Method)
commands
DISPLAY NET 79
Index 399
400 Command Reference
Readers’ Comments — We’d Like to Hear from You
DB2 Universal Database for OS/390 and z/OS
Command Reference
Version 7
Overall, how satisfied are you with the information in this book?
How satisfied are you that the information in this book is:
When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any
way it believes appropriate without incurring any obligation to you.
Name Address
Company or Organization
Phone No.
___________________________________________________________________________________________________
Readers’ Comments — We’d Like to Hear from You Cut or Fold
SC26-9934-01 Along Line
_ _ _ _ _ _ _Fold
_ _ _and
_ _ _Tape
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Please
_ _ _ _ _do
_ _not
_ _ staple
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Fold
_ _ _and
_ _ Tape
______
NO POSTAGE
NECESSARY
IF MAILED IN THE
UNITED STATES
_________________________________________________________________________________________
Fold and Tape Please do not staple Fold and Tape
Cut or Fold
SC26-9934-01 Along Line
SC26-9934-01