DB2 V8 Command Reference
DB2 V8 Command Reference
DB2 V8 Command Reference
Version 8
Command Reference
SC18-7416-00
DB2 Universal Database for z/OS
®
Version 8
Command Reference
SC18-7416-00
Note
Before using this information and the product it supports, be sure to read the general information under “Notices” on page
425.
Part 3. Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
iv Command Reference
Option descriptions . . . . . . . . . . . . . . . . . . . . . . . 104
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 108
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Contents v
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Option descriptions . . . . . . . . . . . . . . . . . . . . . . . 151
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 151
Output . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 154
vi Command Reference
Option descriptions . . . . . . . . . . . . . . . . . . . . . . . 199
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Contents vii
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Option descriptions . . . . . . . . . . . . . . . . . . . . . . . 223
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 223
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Contents ix
Environment . . . . . . . . . . . . . . . . . . . . . . . . . 293
Authorization . . . . . . . . . . . . . . . . . . . . . . . . . 293
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Option descriptions . . . . . . . . . . . . . . . . . . . . . . . 294
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 295
Output . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
x Command Reference
Chapter 60. -SET ARCHIVE (DB2) . . . . . . . . . . . . . . . . . 315
Environment . . . . . . . . . . . . . . . . . . . . . . . . . 315
Authorization . . . . . . . . . . . . . . . . . . . . . . . . . 315
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Option descriptions . . . . . . . . . . . . . . . . . . . . . . . 315
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 316
Output . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Contents xi
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Option descriptions . . . . . . . . . . . . . . . . . . . . . . . 339
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 340
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Contents xiii
Chapter 82. -STOP TRACE (DB2) . . . . . . . . . . . . . . . . . 399
Environment . . . . . . . . . . . . . . . . . . . . . . . . . 399
Authorization . . . . . . . . . . . . . . . . . . . . . . . . . 399
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Option descriptions . . . . . . . . . . . . . . . . . . . . . . . 400
Usage notes . . . . . . . . . . . . . . . . . . . . . . . . . 402
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Programming interface information . . . . . . . . . . . . . . . . . 426
Trademarks. . . . . . . . . . . . . . . . . . . . . . . . . . 427
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . 463
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Important
In this version of DB2 UDB for z/OS, the DB2 Utilities Suite is available as an
optional product. You must separately order and purchase a license to such
utilities, and discussion of those utility functions in this publication is not
intended to otherwise imply that you have a license to them. See Part 1 of
DB2 Utility Guide and Reference for packaging details.
Naming conventions
When a parameter refers to an object created by SQL statements (for example,
tables, table spaces, and indexes), SQL syntactical naming conventions are
followed.
See Part 4 (Volume 1) of DB2 Administration Guide for more information about
connection names.
correlation-id
An identifier of 1 to 12 characters that identifies a process within an address
space connection. A correlation ID must begin with a letter.
A correlation ID can be one of the following:
v For DSN processes running in TSO foreground, the correlation ID is the TSO
logon identifier.
v For DSN processes running in TSO batch, the correlation ID is the job name.
v For CAF processes, the correlation ID is the TSO logon identifier.
v For RRSAF processes, the correlation ID is the value specified during
signon.
v For IMS processes, the correlation ID is pst#.psbname.
v For CICS processes, the correlation ID is
identifier.thread_number.transaction_identifier.
See Part 4 (Volume 1) of DB2 Administration Guide for more information about
correlation IDs.
data-set-name
An identifier of 1 to 44 characters that identifies a data set.
dbrm-member-name
An identifier of one to eight letters or digits that identifies a member of a
partitioned data set. (MVS™ requires this naming convention.)
A DBRM member name should not begin with DSN; this can sometimes conflict
with DB2-provided DBRM member names. If a DBRM member name beginning
with DSN is specified, DB2 issues a warning message.
dbrm-pds-name
An identifier of 1 to 44 characters that identifies a partitioned data set.
ddname
An identifier of one to eight characters that designates the name of a DD
statement.
hexadecimal-constant
A sequence of digits or any of the letters from A to F (uppercase or lowercase).
When referring to a DB2 product other than DB2 UDB for z/OS, this information
uses the product’s full name to avoid ambiguity.
required_item
required_item
optional_item
If an optional item appears above the main path, that item has no effect on the
execution of the statement and is used only for readability.
optional_item
required_item
v If you can choose from two or more items, they appear vertically, in a stack.
If you must choose one of the items, one item of the stack appears on the main
path.
required_item required_choice1
required_choice2
If choosing one of the items is optional, the entire stack appears below the main
path.
required_item
optional_choice1
optional_choice2
If one of the items is the default, it appears above the main path and the
remaining choices are shown below.
v An arrow returning to the left, above the main line, indicates an item that can be
repeated.
required_item repeatable_item
If the repeat arrow contains a comma, you must separate repeated items with a
comma.
required_item repeatable_item
A repeat arrow above a stack indicates that you can repeat the items in the
stack.
v Keywords appear in uppercase (for example, FROM). They must be spelled exactly
as shown. Variables appear in all lowercase letters (for example, column-name).
They represent user-supplied names or values.
v If punctuation marks, parentheses, arithmetic operators, or other such symbols
are shown, you must enter them as part of the syntax.
Refer to “How to use the DB2 library” on page 423 for information about how to use
the DB2 library.
Accessibility
Accessibility features help a user who has a physical disability, such as restricted
mobility or limited vision, to use software products. The major accessibility features
in z/OS products, including DB2 UDB for z/OS, enable users to:
v Use assistive technologies such as screen reader and screen magnifier software
v Operate specific or equivalent features by using only a keyboard
v Customize display attributes such as color, contrast, and font size
Assistive technology products, such as screen readers, function with the DB2 UDB
for z/OS user interfaces. Consult the documentation for the assistive technology
products for specific information when you use assistive technology to access these
interfaces.
xx Command Reference
Online documentation for Version 8 of DB2 UDB for z/OS is available in the DB2
Information Center, which is an accessible format when used with assistive
technologies such as screen reader or screen magnifier software. The DB2
Information Center for z/OS solutions is available at the following Web site:
http://publib.boulder.ibm.com/infocenter/db2zhelp.
www.ibm.com/software/db2zos/library.html
This Web site has a feedback page that you can use to send comments.
v Print and fill out the reader comment form located at the back of this book. You
can give the completed form to your local IBM branch office or IBM
representative, or you can send it to the address printed on the reader comment
form.
A process is represented to DB2 by a set of identifiers (IDs). What the process can
do with DB2 is determined by privileges and authorities that can be held by its
identifiers. “The privilege set of a process” means the entire set of privileges and
authorities that can be used by the process in a specific situation.
During the precompilation process, the DB2 precompiler produces both modified
source code and a database request module (DBRM) for each application program.
The modified source code must be compiled and link-edited before the program can
be run. DBRMs must be bound to a plan or package.
When determining the maximum size of a plan, you must consider several physical
limitations, including the time required to bind the plan, the size of the EDM pool,
and fragmentation. There are no restrictions to the number of DBRMs that can be
included in a plan. However, packages provide a more flexible method for handling
a large number of DBRMs within a plan. As a general rule, the EDM pool should be
at least 10 times the size of the largest DBD or plan, whichever is greater. For
further information, see Part 2 of DB2 Installation Guide.
The BIND PACKAGE subcommand allows you to bind DBRMs individually. It gives
you the ability to test different versions of a program without extensive rebinding.
Package binding is also the only method for binding programs at remote sites.
Even when they are bound into packages, all application programs must be
designated in an application plan. BIND PLAN establishes the relationship between
the DB2 system and all DBRMs or packages in that plan. Plans can specify
explicitly named DBRMs, packages, collections of packages, or a combination of
these elements. The plan contains information about the designated DBRMs or
packages and about the data that the application program intends to use. The plan
is stored in the DB2 catalog.
In addition to building packages and plans, the bind process does the following
tasks:
v Validates the SQL statements using the DB2 catalog. During the bind
process, DB2 checks your SQL statements for valid table, view, and column
names. Because the bind process occurs as a separate step before program
execution, errors are detected and can be corrected before the program is
executed.
v Verifies that the process binding the program is authorized to perform the
data accessing operations requested by your program’s SQL statements.
When you issue BIND, you can specify an authorization ID as the owner of the
plan or package. The owner can be any one of the authorization IDs of the
process that is performing the bind. The bind process determines whether the
owner of the plan or package is authorized to access the data the program
requests.
v Selects the access paths that are needed to access the DB2 data your
program needs to process. In selecting an access path, DB2 considers
indexes, table sizes, and other factors. DB2 considers all indexes that are
available to access the data and decides which ones (if any) to use when
selecting a path to the data.
6 Command Reference
Part 2. Working with commands
This part contains information about working with commands.
Recognition character
Command
Primary keyword
Value
-DISPLAY DATABASE(J64DBASE),SPACENAM(PROJ32)
Value
Keyword
Separators
10 Command Reference
* An asterisk means any of the following usages:
* A single asterisk as a keyword_value indicates all. For example:
-DISPLAY UTILITY (*)
*keyword_value
An asterisk as the first character of a keyword_value indicates that
a match for the value will be satisfied when all characters following
the * are the same. For example: (*BCD)
keyword*value
An intermediate asterisk indicates that a match for the value will be
satisfied when all characters preceding and all characters following
the asterisk are the same. For example: (ABC*EFG)
keyword_value*
An asterisk as the final character of a keyword_value indicates that
a match will for the value will be satisfied when all characters
preceding the asterisk are the same. For example: (ABC*)
*keyword*_value*
Asterisks used as the first, intermediate and final characters in a
string are also valid. For example: (*BCD*FGH*)
For example, DISPLAY UTILITY (*) displays the status of all utilities;
DISPLAY UTILITY (R2*) displays the status of all utilities whose identifiers
begin with R2.
Do not use more than one parameter after an equal sign, or an error condition
occurs.
The following commands have either group or member scope, depending on which
options you specify with them:
|| ARCHIVE LOG (DB2) START FUNCTION SPECIFIC (DB2)
| DISPLAY FUNCTION SPECIFIC (DB2) START PROCEDURE (DB2)
| DISPLAY PROCEDURE (DB2) START TRACE (DB2)
| DISPLAY THREAD (DB2) STOP FUNCTION SPECIFIC (DB2)
| DISPLAY TRACE (DB2) STOP PROCEDURE (DB2)
| DISPLAY UTILITY (DB2) STOP TRACE (DB2)
| MODIFY irlmproc,SET (z/OS IRLM) TERM UTILITY (DB2)
| MODIFY irlmproc,STATUS (z/OS IRLM)
|
All other commands have member scope. The description of each command
includes its scope. For more details on data sharing, see DB2 Data Sharing:
Planning and Administration.
For more information about submitting DB2 commands through IFI, see Appendix E
(Volume 2) of DB2 Administration Guide.
To continue a subcommand on the next line while using the DSN processor, type
either a hyphen (-) or a plus sign (+) at the end of the current line. If you use a plus
sign, precede it by at least one blank character to prevent the concatenation of
character strings from line to line. Using a plus sign causes TSO/E to delete leading
delimiters (blanks, commas, tabs, and comments) on the continuation line, and will
reduce the overall size of the command.
Abbreviations: The names of the DSN command and its subcommands cannot be
abbreviated. For compatibility with prior releases of DB2, abbreviations for some
keywords are allowed.
| Table 1 lists each DSN command or subcommand described in this book, its
| function, and the page number where you can find more information about the
| command.
Table 1. DSN command and subcommands
DSN command
or
subcommand Function Refer to page
BIND Builds an application package or plan 49, 55
DB2 commands Execute a DB2 command Table 2 on page 22
DCLGEN (DECLARATIONS GENERATOR) Produces 103
declarations for tables or views
DSN Starts a DSN session 209
END Ends the DSN session 255
FREE Deletes an application package or plan 257, 261
REBIND Updates an application package or plan 285, 289
REBIND Updates an application trigger package 293
TRIGGER
PACKAGE
RUN Executes an application program 311
SPUFI Executes the SQL Processor Using File 325
Input
DB2 commands
Environment: The command START DB2 can be issued only from a z/OS console.
All other DB2 commands can be issued from the following environments:
v A z/OS console or application program
v A DSN session
v A DB2I panel
v An IMS terminal
v A CICS terminal
v An application program, using the DB2 instrumentation facility interface (IFI)
Extended MCS Consoles: The extended MCS console feature of z/OS lets a z/OS
system have more than 99 consoles. Because DB2 supports extended MCS
consoles, messages returned from a DB2 command are routed to the extended
MCS console that issued the command. For more information on extended MCS
consoles, see Part 4 (Volume 1) of DB2 Administration Guide, and z/OS MVS
Planning: Operations.
| Table 2 lists each DB2 command, its function, and the page number where you can
| find more information about the command.
Table 2. DB2 commands
DB2 command Function Refer to page
-ALTER BUFFERPOOL Alters attributes for the buffer pools 29
-ALTER Alters attributes for the group buffer pools 35
GROUPBUFFERPOOL
-ALTER UTILITY Alters parameter values of the REORG utility 39
-ARCHIVE LOG Enables a site to close a current active log and 43
open the next available log data set
-CANCEL THREAD Cancels processing for specific local or distributed 95
threads
-DISPLAY ARCHIVE Displays information about archive log processing 117
-DISPLAY Displays information about the buffer pools 119
BUFFERPOOL
-DISPLAY DATABASE Displays status information about DB2 databases 129
-DISPLAY FUNCTION Displays statistics about external user-defined 147
SPECIFIC functions
-DISPLAY GROUP Displays information about the data sharing group 151
to which a DB2 subsystem belongs
-DISPLAY Displays status information about DB2 group 157
GROUPBUFFERPOOL buffer pools
-DISPLAY LOCATION Displays status information about distributed 169
threads
-DISPLAY LOG Displays log information and status of the offload 173
task
-DISPLAY PROCEDURE Displays status information about stored 175
procedures
-DISPLAY RLIMIT Displays status information about the resource 181
limit facility (governor)
-DISPLAY THREAD Displays information about DB2 threads 183
-DISPLAY TRACE Displays information about DB2 traces 197
-DISPLAY UTILITY Displays status information about a DB2 utility 203
-MODIFY TRACE Changes the IFCIDs (trace events) associated 281
with a particular active trace
-RECOVER BSDS Reestablishes dual bootstrap data sets 297
-RECOVER INDOUBT Recovers threads left indoubt 299
22 Command Reference
Table 2. DB2 commands (continued)
DB2 command Function Refer to page
-RECOVER Completes back-out processing for units of 303
POSTPONED recovery left incomplete during an earlier restart
-RESET GENERICLU Purges information stored by VTAM® in the 305
coupling facility
-RESET INDOUBT Purges information displayed in the indoubt 307
thread report generated by the -DISPLAY
THREAD command
-SET ARCHIVE Controls the allocation of tape units and the 315
deallocation time of the tape units for archive log
processing
-SET LOG Modifies the checkpoint frequency 319
-SET SYSPARM Changes subsystem parameters online 323
-START DATABASE Makes the specified database available for use 331
-START DB2 Initializes the DB2 subsystem (can be issued only 339
from a z/OS console)
-START DDF Starts the distributed data facility 343
-START FUNCTION Activates an external function that is stopped 345
SPECIFIC
-START PROCEDURE Activates the definition of stopped or cached 355
stored procedures
-START RLIMIT Starts the resource limit facility (governor) 359
-START TRACE Initiates DB2 trace activity 361
-STOP DATABASE Makes specified databases unavailable for 375
applications
-STOP DB2 Stops the DB2 subsystem 381
-STOP DDF Stops the distributed data facility 383
-STOP FUNCTION Stops the acceptance of SQL statements for 387
SPECIFIC specified functions
-STOP PROCEDURE Stops the acceptance of SQL CALL statements 393
for stored procedures
-STOP RLIMIT Stops the resource limit facility (governor) 397
-STOP TRACE Stops trace activity 399
-TERM UTILITY Terminates execution of a utility 405
IMS commands
Environment: Each IMS command can be issued from an IMS terminal.
| Table 3 on page 24 lists the IMS commands that are described in this book, each
| command’s function, and the page number where you can find more information
| about the command
| Table 4 lists the CICS attachment facility commands described in this book, each
| command’s function, and the page number where you can find more information
| about each command.
Table 4. CICS attachment facility commands
CICS attachment
facility commands Function Refer to page
DSNC Allows you to enter DB2 commands from CICS 213
DSNC DISCONNECT Disconnects threads 215
DSNC DISPLAY Displays information on CICS transactions 217
| DSNC MODIFY Modifies the message queue destination of the 221
| DB2CONN, or modifies the maximum active
| thread value for the pool, for DSNC commands,
| or for DB2ENTRY
DSNC STOP Stops the CICS attachment facility 223
DSNC STRT Starts the CICS attachment facility 225
| Table 5 lists each z/OS IRLM command described in this book, each command’s
| function, and the page number where you can find more information about each
| command.
Table 5. z/OS commands affecting the IRLM
z/OS command Function Refer to page
MODIFY Abends IRLM 263
irlmproc,ABEND
24 Command Reference
Table 5. z/OS commands affecting the IRLM (continued)
z/OS command Function Refer to page
MODIFY irlmproc,DIAG Initiates diagnostic dumps for IRLM subsystems 265
| MODIFY Releases IRLM retained locks 267
irlmproc,PURGE
| MODIFY irlmproc,SET Dynamically sets various IRLM operational 269
| parameters
MODIFY Displays IRLM status 273
irlmproc,STATUS
START irlmproc Starts an IRLM component with an 349
installation-supplied procedure
STOP irlmproc Shuts down IRLM normally 391
TRACE CT Starts, stops, or modifies IRLM tracing 411
TSO CLISTs
| Table 6 lists the TSO CLIST command, each command’s function, and, in the case
| of DSNH, the page number where you can find more information about this
| command.
Table 6. TSO CLISTs
CLIST Function Refer to page
DSNH Prepares a program for execution, and executes 227
it if it runs under TSO. Runs under TSO in
foreground or background.
DSNU Generates JCL to execute DB2 utility jobs. Can
be executed directly or by using DB2I. For details
about this command procedure, see DB2 Utility
Guide and Reference.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS® terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
VPPSEQT(integer) VPXPSEQT(integer) DWQT(integer)
VDWQT(integer1,integer2) PGSTEAL( LRU )
FIFO
NO
PGFIX( YES )
Option descriptions
(bpname)
Specifies the buffer pool to alter.
v 4-KB page buffer pools are named BP0, BP1, ..., BP49.
v 8-KB page buffer pools are named BP8K0, BP8K1, ..., BP8K9.
v 16-KB page buffer pools are named BP16K0, BP16K1, ..., BP16K9.
v 32-KB page buffer pools are named BP32K, BP32K1, ..., BP32K9.
VPSIZE (integer)
| Changes the buffer pool size.
| integer specifies the number of buffers to allocate to the active buffer pool.
| integer can range from 0 to 250000000 for 4-KB page buffer pools other than
| BP0. For BP0, the minimum value is 2000. For 8-KB page buffer pools, the
| range is from 1000 to 125000000. For 16-KB page buffer pools, the range is
| from 0 to 62500000. For 32-KB page buffer pools, the range is from 0 to
| 31250000.
| DB2 limits the total VPSIZE for all buffer pools to 1 TB. In addition, DB2 limits
| the amount of buffer pool storage to approximately twice the available real
| storage for the z/OS image.
If you specify VPSIZE as 0 for an active buffer pool (other than BP0), DB2
quiesces all current database access and update activities for that buffer pool
and then deletes the buffer pool. Subsequent attempts to use table spaces or
| indexes that are assigned to that buffer pool fail.
VPSEQT (integer)
| Changes the sequential steal threshold for the buffer pool.
| integer specifies the sequential steal threshold for the buffer pool. This value is
| expressed as a percentage of the total buffer pool size, and valid values range
| from 0 to 100. This threshold affects the allocation of buffers in the buffer pool
to page read requests that are part of a sequential access pattern. This
includes pages being prefetched. If the number of buffers that contain
sequentially accessed pages exceeds the threshold, a sequential request
attempts to reuse one of those buffers rather than a buffer that contains a
non-sequentially accessed page. The initial default value is 80.
| When VPSEQT=0, sequentially accessed pages are not kept in the buffer pool
after being released by the accessing agent. Also, prefetch is disabled.
When VPSEQT=100, DB2 does not prefer reusing sequential buffers over using
non-sequential buffers.
VPPSEQT (integer)
| Changes the parallel sequential threshold for the buffer pool. This threshold
| determines how much of the buffer pool is used for parallel processing
operations.
| integer specifies the parallel sequential threshold for the buffer pool. This value
is expressed as a percentage of the sequential steal threshold, and valid values
range from 0 to 100. The initial default value is 50.
When VPPSEQT=0, parallel processing operations are disabled.
VPXPSEQT (integer)
| Changes the assisting parallel sequential threshold for the buffer pool. This
| threshold determines the portion of the buffer pool that is used for processing
queries that originate on other members of the data sharing group. This option
is valid and effective only when DB2 is in data sharing mode; it is ignored when
DB2 is not in data sharing mode.
| integer specifies the assisting parallel sequential threshold for the buffer pool.
integer is expressed as a percentage of the parallel sequential threshold
(VPPSEQT). Whenever the sequential steal threshold or the parallel sequential
threshold is altered, it directly affects the portion of buffer resources dedicated
to assistant parallel operations. The valid values range from 0 to 100. The initial
default value is 0.
30 Command Reference
-ALTER BUFFERPOOL (DB2)
When VPXPSEQT=0, this buffer pool cannot be used to assist another DB2
| with parallel processing.
DWQT (integer)
Changes the buffer pool’s deferred write threshold.
| integer specifies the deferred write threshold for the buffer pool. This value is
| expressed as a percentage of the total buffer pool size, and valid values range
from 0 to 90. This threshold determines when deferred writes begin, based on
the number of unavailable buffers. When the count of unavailable buffers
| exceeds the threshold, deferred writes begin. The initial default value is 30
| percent.
VDWQT (integer1,integer2)
Changes the buffer pool’s vertical deferred write threshold.
| integer1 specifies the vertical deferred write threshold for the buffer pool.
| integer1 is expressed as a percentage of the total buffer pool size, and valid
values range from 0 to 90.
This threshold determines when deferred writes begin, based on the number of
updated pages for a given data set. Deferred writes begin for that data set
when the count of updated buffers for a data set exceeds the threshold. This
threshold can be overridden for page sets accessed by DB2 utilities and must
be less than or equal to the value specified for the DWQT option.
| The default value is 5 percent. A value of 0 indicates that the deferred write of
32 pages begins when the updated buffer count for the data set reaches 40.
| integer2 specifies the vertical deferred write threshold for the buffer pool.
integer2 is expressed as an absolute number of buffers. You can use integer2
| when you want a relatively low threshold value for a large buffer pool, but
integer1 cannot provide a fine enough granularity between integer1 values of 0
and 1. integer2 only applies when integer1 is 0; DB2 ignores a value specified
for integer2 if the value specified for integer1 is non-zero. integer2 can range
from 0 to 9999. The default value is 0.
If integer1 is 0 and integer2 is a non-zero value, DB2 uses the value specified
for integer2 to determine the threshold. If both values are 0, the integer1 value
| of 0 is used as the threshold.
PGSTEAL
| Specifies the page-stealing algorithm that DB2 uses for the buffer pool.
The initial default is PGSTEAL (LRU). However, when you issue the ALTER
BUFFERPOOL command, you must explicitly specify either LRU or FIFO when
the PGSTEAL option is used.
| (LRU)
| Specifies that the buffer pool buffers should be managed by using the least
recently used (LRU) algorithm.
| (FIFO)
| Specifies that the buffer pool buffers should be managed by using the
first-in-first-out (FIFO) algorithm.
| PGFIX
| Specifies whether the buffer pool should be fixed in real storage when it is
| used.
| (NO)
| Specifies that the buffer pool is not fixed in real storage. Page buffers are
| fixed and unfixed in real storage across each I/O and group buffer pool
| operation.
| This is the default.
| (YES)
| Specifies that the buffer pool is fixed in real storage. Page buffers are fixed
| when they are first used after the buffer pool is allocated or expanded.
Usage notes
The following sections contain additional information about how to use the ALTER
BUFFERPOOL command.
Changing several buffer pool attributes: A failure in modifying one buffer pool
attribute has no effect on other modifications requested in the same command.
| Altering attributes stored in the BSDS: The buffer pool attributes that are stored
in the BSDS cannot be changed offline.
| Setting a buffer pool to be fixed in real storage: If you use the ALTER
| BUFFERPOOL command with the PGFIX option set to YES to fix a buffer pool in
| real storage, the change is pending and the buffer pool becomes fixed only at the
| next allocation.
| In order to fix the buffer pool in real storage, issue the command ALTER
| BUFFERPOOL(bpname) PGFIX(YES). If the buffer pool that you specify for bpname is
| not currently allocated, the buffer pool will become fixed in real storage when it is
| allocated. If the buffer pool that you specify for bpname is currently allocated, do
| one of the following procedures to fix the buffer pool in real storage:
| v If the buffer pool that you specify for bpname is not one of the buffer pools that
| is used for the DB2 catalog and directory (BP0, BP8K0, BP16K0, or BP32K):
| 1. Issue the ALTER BUFFERPOOL command with the VPSIZE option set to 0
| to deallocate the buffer pool:
| -ALTER BUFFERPOOL(bpname) VPSIZE(0)
32 Command Reference
-ALTER BUFFERPOOL (DB2)
| 2. Issue the ALTER BUFFERPOOL command with the VPSIZE and PGFIX
| options to change the buffer pool size and to use long-term page fixing at the
| next allocation:
| -ALTER BUFFERPOOL(bpname) VPSIZE(vpsize) PGFIX(YES)
| v If the buffer pool that you specify for bpname is one of the buffer pools that is
| used for the DB2 catalog and directory (BP0, BP8K0, BP16K0, or BP32K):
| 1. Issue the ALTER BUFFERPOOL command with the PGFIX option to change
| the buffer pool to use long-term page fixing (the change is pending until the
| next allocation of the buffer pool):
| -ALTER BUFFERPOOL(bpname) PGFIX(YES)
| 2. Issue the STOP DATABASE command or the STOP DB2 command to
| deallocate the buffer pool
| 3. Issue the START DATABASE command or the START DB2 command to
| reallocate the buffer pool (depending on which command you used to
| deallocate the buffer pool)
Relating VPPSEQT and VPXSEQT: Table 7 explains how the two parallel
sequential thresholds, VPPSEQT for parallel sequential and VPXPSEQT for
assisting parallel sequential threshold, are related. VPXPSEQT is a percentage of
VPPSEQT, which is itself a portion of VPSEQT. Multiply VPXPSEQT by VPPSEQT
| to obtain the total amount of the buffer pool that can be used to assist another DB2
subsystem with parallel processing. In addition, VPPSEQT is affected by changing
VPSIZE and VPSEQT; therefore, VPXPSEQT is also affected by VPSIZE and
VPSEQT. For more information about the relationships of the various thresholds
and possible configurations, see Chapter 6 of DB2 Data Sharing: Planning and
Administration.
Table 7. Relationship between VPPSEQT and VPXPSEQT
| The percentage of the buffer
pool available to assist Sysplex
If VPPSEQT is set to and VPXPSEQT is set to query parallelism equals
50 50 25
50 100 50
100 50 50
any value 0 0
0 any value 0
Examples
| Example 1: The following command sets the buffer pool for BP0 to 2000.
| -ALTER BUFFERPOOL(BP0) VPSIZE(2000)
| Example 2: The following command sets the sequential steal threshold of the buffer
| pool for BP0 to 75 % of the buffer pool size.
| -ALTER BUFFERPOOL(BP0) VPSEQT(75)
| Example 3: The following command deletes BP1. Be very careful when using this
option because specifying a 0 size for an active buffer pool causes DB2 to quiesce
all current database access. All subsequent requests to open page sets fail.
| -ALTER BUFFERPOOL(BP1) VPSIZE(0)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
AUTOREC( YES ) RATIO(ratio) CLASST(integer)
NO
GBPOOLT(integer) GBPCHKPT(integer)
Option descriptions
(gbpname)
Specifies the DB2 group buffer pool to alter.
v 4-KB group buffer pools are named GBP0, GBP1, ... , GBP49.
v 8-KB group buffer pools are named GBP8K0, GBP8K1, ... , GBP8K9.
v 16-KB group buffer pools are named GBP16K0, GBP16K1, ... , GBP16K9.
v 32-KB group buffer pools are named GBP32K, GBP32K1, ... , GBP32K9.
(structure-name)
Specifies the coupling facility structure for the group buffer pool. The coupling
facility structure name has the format, groupname_gbpname.
groupname is the DB2 data sharing group name and the underscore (_)
separates groupname and gbpname.
GBPCACHE
Specifies whether gbpname is to be used for both caching data and
cross-invalidation, or just for cross-invalidation.
(YES)
Indicates that gbpname is used for caching data and cross-invalidation.
Any no-data-caching attribute that is specified at either the page set or
group buffer pool level takes precedence over a caching specification. For
more information, refer to Table 8.
Table 8. Precedence of a no-data-caching specification
Group buffer pool Attribute that takes
specification Page set specification precedence
GBPCACHE CHANGED
GBPCACHE(NO) GBPCACHE ALL GBPCACHE(NO)
GBPCACHE(YES) GBPCACHE NONE GBPCACHE NONE
(NO)
Indicates that gbpname is used only for cross-invalidation. This group buffer
pool contains no data entries. The GBPCACHE option of table spaces or
index spaces that use this group buffer pool is ignored.
AUTOREC
Specifies whether automatic recovery by DB2 takes place when a structure
failure occurs or when the connectivity of all members of the group to the group
buffer pool is lost.
(YES)
Enables DB2 to automatically recover page sets and partitions that have a
status of group buffer pool RECOVER pending (GRECP) and that have
pages on the logical page list.
(NO)
Disables automatic recovery. Issue a START DATABASE command to
recover page sets and partitions that have a status of GRECP or that have
pages on the logical page list.
RATIO (ratio)
Changes the desired ratio of the number of directory entries to the number of
data pages in the group buffer pool; that is, how many directory entries exist for
each data page.
ratio can be a decimal number from 1.0 to 255, inclusive. Any digits after the
first decimal place are ignored; for example, 5.67 is treated as 5.6. If ratio is
greater than 25, any digits after the decimal point are ignored; for example,
25.98 is treated as 25. The default ratio is 5.
The actual number of directory entries and data pages that are allocated
depends on the size of the coupling facility structure, which is specified in the
coupling facility policy definitions (CFRM policy).
CLASST (integer)
Changes the threshold at which class castout is started. integer is expressed as
a percentage of the number of data entries; it can range from 0 to 90. The
| default is 5 percent.
36 Command Reference
-ALTER GROUPBUFFERPOOL (DB2)
For example, CLASST(10) starts class castout when the number of pages in
that class equals 10 % of the group buffer pool page capacity.
GBPOOLT (integer)
Changes the threshold at which data in the group buffer pool is cast out to disk.
integer is expressed as a percentage of the number of data entries and can
| range from 0 to 90. The default is 30 percent.
For example, GBPOOLT(55) casts out data if the number of pages in the group
buffer pool equals 55 % of the group buffer pool page capacity.
GBPCHKPT (integer)
Changes the time interval, in minutes, between successive checkpoints of the
group buffer pool. integer can range from 1 to 999999. Unless a value is
| explicitly specified for the GBPCHKPT option, the default value is 4 minutes.
The more frequently checkpoints are taken, the less time it takes to recover the
group buffer pool if the coupling facility fails.
Usage notes
Defaults: Issuing the ALTER GROUPBUFFERPOOL command does not change
any option that is not explicitly specified; the default is to leave the value
unchanged. Table 9 lists the default values for the options when the command is
first issued for a group buffer pool or a structure.
Table 9. Default option values when ALTER GROUPBUFFERPOOL is first issued
Option Value
GBPCACHE YES
RATIO 5
| CLASST 5 (%)
| GBPOOLT 30 (%)
| GBPCHKPT 4 (minutes)
When new values take effect: When you issue the ALTER GROUPBUFFERPOOL
command, some option specifications become effective only at the next allocation of
| the group buffer pool. Table 10 lists each option, when the new value takes effect,
| and if the option is applicable for a group buffer pool that is specified as
| GBPCACHE(NO).
Table 10. Changing group buffer pool attributes
Applicable if
Keyword New value takes effect GBPCACHE(NO)?
GBPCACHE at next allocation N/A
AUTOREC immediately No
2 3
RATIO at next allocation No
3
CLASST immediately No
3
GBPOOLT immediately No
3
GBPCHKPT immediately No
Notes:
1. You can use the z/OS command SETXCF START,REBUILD to have the change take
effect if the group buffer pool is not duplexed. If the group buffer pool is duplexed and
you want to change to GBPCACHE(NO), first go back to simplex mode and rebuild.
GBPCACHE(NO) is not allowed for duplexed group buffer pools.
2. You can use the z/OS command SETXCF START,REBUILD to have the change take
effect if the group buffer pool is not duplexed. If the group buffer pool is duplexed, first go
back to simplex mode and rebuild; then optionally go back to duplex mode. If a group
buffer pool is duplexed, both instances of that duplexed group buffer pool use the same
RATIO value.
3. DB2 issues message DSNB761 when you specify this option for a GBPCACHE(NO)
group buffer pool. These settings only take effect after the GBPCACHE attribute has
been changed to YES.
Examples
Example 1: For group buffer pool 0, change the ratio of directory entries to data
pages to one directory entry for every data page. The RATIO specification becomes
effective at the next allocation of the group buffer pool.
-DB1G ALTER GROUPBUFFERPOOL (GBP0) RATIO(1)
Example 2: For group buffer pool 2, change the class castout threshold to 10 %
and the group buffer pool castout threshold to 50 %. The new values take effect
immediately.
-DB1G ALTER GROUPBUFFERPOOL (GBP2) CLASST(10) GBPOOLT(50)
Example 3: Assume that the DB2 group name is DSNCAT. For group buffer pool 3,
change the class castout threshold to 10 %. The new value takes effect
immediately. Because the group name is DSNCAT, the coupling facility structure
name is DSNCAT_GBP3. Also, when a structure fails, the AUTOREC(YES) option
enables DB2 to automatically recover the page sets and partitions that are in a
GRECP status or that have pages on the logical page list.
-DB1G ALTER GROUPBUFFERPOOL (DSNCAT_GBP3) CLASST(10) AUTOREC(YES)
Example 4: For group buffer pool 32K, change the GBP checkpoint frequency to
five minutes. The new value takes effect immediately. In this example, with
AUTOREC(NO) specified, DB2 does not start automatic recovery when a structure
fails. You might choose this option if you want to determine what page sets or
partitions are in a GRECP status or have pages on the logical page list before you
enter the START DATABASE command to recover the data with the options you
specify.
-DB1G ALTER GROUPBUFFERPOOL (GBP32K) GBPCHKPT(5) AUTOREC(NO)
38 Command Reference
Chapter 11. -ALTER UTILITY (DB2)
The DB2 command ALTER UTILITY changes the values of certain parameters of an
execution of the REORG utility that uses SHRLEVEL REFERENCE or CHANGE.
Specifically, this command changes the values of DEADLINE, MAXRO, LONGLOG,
and DELAY. For more information about those parameters and the REORG utility,
see DB2 Utility Guide and Reference.
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or a CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use the primary or some secondary
authorization ID of the process that originally submitted the utility job. Alternatively,
you must use a privilege set of the process that includes one of the following
authorities:
v DBMAINT authority
v DBCTRL authority
v DBADM authority
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
For users with DBMAINT, DBCTRL, or DBADM authority, the command takes effect
only when a user has sufficient authority over each object that the utility job
accesses.
Syntax
MAXRO( integer ) LONGLOG( CONTINUE ) DELAY(integer)
DEFER TERM
DRAIN
Option descriptions
(utility-id)
Is the utility identifier, or the UID parameter, used when creating the utility job
step.
This job must execute REORG with SHRLEVEL CHANGE or SHRLEVEL
REFERENCE.
If utility-id was created by the DSNU CLIST by default, it has the form
tso-userid.control-file-name. For the control file name that is associated with
each utility, see DB2 Utility Guide and Reference.
If utility-id was created by default by the EXEC statement that executed
DSNUTLIB, it has the form userid.jobname.
DEADLINE
Specifies the deadline by which the user wants the switch phase of
reorganization to start. If DB2 estimates that the switch phase will not start by
the deadline, DB2 terminates reorganization. The default is the most recently
specified value of DEADLINE.
The pre-switch processing might continue until after the deadline.
(NONE)
Specifies that there is no deadline for the read-only iteration of log
processing.
(timestamp)
Specifies the deadline by which the user wants the switch phase to start
processing. This deadline must not have been reached when ALTER
UTILITY executes. For more information on the format for specifying a
timestamp, see the discussion of data types in DB2 SQL Reference.
MAXRO
Specifies the maximum amount of time that is tolerated for the last iteration of
log processing during reorganization. During that iteration, applications have
read-only access.
The actual execution time of the last iteration can exceed the value specified for
MAXRO.
(integer)
Specifies the number of seconds. The default is the most recently specified
value of MAXRO.
40 Command Reference
-ALTER UTILITY (DB2)
(DEFER)
Specifies that the log phase is deferred indefinitely.
LONGLOG
Specifies the action that DB2 performs (after sending the LONGLOG message
to the console) if the number of log records that are processed during the next
iteration is not sufficiently lower than the number of log records that were
processed during the previous iterations. The default is the most recently
specified value of LONGLOG.
(CONTINUE)
Specifies that DB2 continues performing reorganization.
(TERM)
Specifies that DB2 terminates reorganization after the delay.
(DRAIN)
Specifies that DB2 drain the write claim class after the delay (if specified).
The number of log records, and thus the estimated time, for a future
iteration of log processing will be 0.
DELAY (integer)
Specifies a lower bound for the interval between the time when REORG sends
the LONGLOG message to the console and the time when REORG performs
the action specified by the LONGLOG parameter.
integer is the delay in seconds. The value must be nonnegative. The default is
the most recently specified value of DELAY.
Usage note
You can alter a REORG job only from the DB2 subsystem on which it is running.
Example
The following example alters the execution of the REORG utility for the utility job
step whose utility identifier is REORGEMP:
-ALTER UTILITY (REORGEMP) REORG MAXRO(240) LONGLOG(DRAIN)
The following list explains what each option does in the preceding example:
v MAXRO(240) changes the maximum tolerable time for the last iteration of log
processing to 240 seconds (4 minutes).
v LONGLOG(DRAIN) specifies that DB2 drain the write claim class (if reading of
the log during REORG is not catching up to the speed at which the application is
writing the log).
v DELAY is not specified so this example does not change the existing delay
between sending the LONGLOG message to the console and performing the
action specified by LONGLOG.
v DEADLINE is not specified so this example does not change the deadline (if any)
that was defined in the last iteration of log processing.
When specified with the option MODE(QUIESCE), the ARCHIVE LOG command
attempts to quiesce (suspend) all DB2 user update activity on the DB2 active log
prior to the offload process. When a system-wide point of consistency is reached
(that is, when all currently active update users have reached a commit point), the
active log is immediately truncated, and the offload process is initiated. The
resulting point of consistency is captured in the current active log before it is
off-loaded. In a data sharing environment, you can create a system-wide point of
consistency only for the entire group.
For more information regarding the ARCHIVE LOG command, see Part 4 (Volume
1) of DB2 Administration Guide.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
The ARCHIVE LOG command can also be issued from the z/OS subsystem
interface (SSI) to enable automated scheduling systems and other programs to
execute the command via supervisor call instruction (SVC) 34.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v ARCHIVE privilege
v Installation SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
ARCHIVE LOG
MODE(QUIESCE)
TIME(nnn) NO
WAIT( )
YES
MEMBER
SCOPE( GROUP )
CANCEL OFFLOAD
Option descriptions
MODE(QUIESCE)
Halts all new update activity by the DB2 subsystem for a specified period of
time and attempts to bring all existing users to a point of consistency after a
commit or rollback. When a point of consistency is reached and captured in the
current active log data set, the current active log data set is truncated, and
another log data set in the inventory becomes current. Offload processing then
begins with the oldest active log data set and ends with the active log data set
that was truncated.
In a data sharing environment, before archiving logs of any member, this option
quiesces all active members of a data sharing group. MODE(QUIESCE) also
ensures that each inactive member had successfully quiesced its update activity
and resolved any indoubt units of recovery (URs) before the inactive subsystem
completed normal termination. If any DB2 subsystem is in a failed state, fails
during quiesce processing, or is stopped with outstanding URs, the ARCHIVE
LOG command fails, and the remaining active members allow update activity to
proceed.
If no indoubt URs exist on all quiesced members, active or inactive, the archive
operation can continue for active members in the group. Thus, you can archive
logs of a data sharing group normally without forcing all members to be active.
The current logs of inactive members are truncated and off-loaded after they
start.
If a system-wide point of consistency cannot be reached during the quiesce
period, which is a length of time you can specify, execution of the ARCHIVE
LOG command fails and an error message is issued. In a data sharing
environment, the maximum time period applies for the whole group, and if any
DB2 subsystem cannot quiesce within the time allowed, the command fails.
If there is no update activity on DB2 data when the command ARCHIVE LOG
MODE(QUIESCE) is issued, the active log is truncated and off-loaded
immediately.
TIME(nnn)
Specifies the maximum length of time, in seconds, in which the DB2
subsystem is allowed to attempt a full system quiesce.
If you do not specify a time, the default is the length of time specified in the
field QUIESCE PERIOD of installation panel DSNTIPA. See Part 2 of DB2
Installation Guide for more information about this field.
44 Command Reference
-ARCHIVE LOG (DB2)
nnn can range from 001 to 999 seconds. You must allocate an appropriate
time period for the quiesce processing or the following events can occur:
v The quiesce processing can expire before a full quiesce is accomplished.
v An unnecessary DB2 lock contention can be imposed.
v A time-out can occur.
This option is valid only when used in conjunction with the option
MODE(QUIESCE).
WAIT
Specifies whether the DB2 subsystem should wait until the quiesce
processing has completed before returning control to the invoking console
or program, or should return control when the quiesce processing begins.
This option is valid only when used in conjunction with the option
MODE(QUIESCE).
(NO)
Specifies that control must be returned to the invoking program when
the quiesce processing begins.
If WAIT(NO) is used, quiesce processing is asynchronous to the user;
that is, you can issue additional DB2 commands after the ARCHIVE
LOG command returns control to you.
(YES)
Specifies that the quiesce processing must complete before returning
control to the invoking console or program.
If WAIT(YES) is used, quiesce processing is synchronous to the user;
that is, additional DB2 commands can be issued, but they are not
processed by the DB2 command processor until the ARCHIVE LOG
command is complete.
SCOPE
Specifies whether the command applies to the entire data sharing group or to a
single member only. The SCOPE option is valid only in a data sharing
environment; the option is ignored in a non-data-sharing environment. SCOPE
cannot be specified if MODE(QUIESCE) is specified; the two keywords are
mutually exclusive.
(MEMBER)
Initiates offload processing only for the member from which the command is
issued. User update activity is not suspended. If that member, or the entire
group, is already archiving, the command fails. This is the default, except
when MODE(QUIESCE) is specified.
(GROUP)
Initiates offload processing for every member of the DB2 group. User
update activity is not suspended. If any member of the group, or the entire
group, is already archiving, the command fails.
CANCEL OFFLOAD
Cancels any off loading currently in progress and restarts the off-load process,
beginning with the oldest active log data set that has not been off loaded and
proceeding through all active log data sets that need off loading. Any
suspended off-load operations are restarted.
Usage notes
Remote site recovery: The ARCHIVE LOG command is very useful when
performing a DB2 backup in preparation for a remote site recovery. For example,
the command allows the DB2 subsystem to quiesce all users after a commit point,
and capture the resulting point of consistency in the current active log before the
archive is taken. Therefore, when the archive log is used with the most current
image copy (during an offsite recovery), the number of data inconsistencies will be
minimized. See Part 4 (Volume 1) of DB2 Administration Guide for additional
information on backup and recovery.
Available active log space: ARCHIVE LOG cannot be used when the current
active log is the last available active log data set because of the following reasons:
v All available active log space would be used.
v The DB2 subsystem would halt processing until an offload is complete.
ARCHIVE LOG with the option MODE(QUIESCE) is not allowed when a STOP DB2
MODE(FORCE) or STOP DB2 MODE(QUIESCE) is in progress. If an attempt is
made to run the ARCHIVE LOG command under these circumstances, error
message DSNJ315I or DSNJ316I is issued.
If the system was not fully quiesced (as determined by the number of users which
could not be quiesced), error message DSNJ317I is issued and ARCHIVE LOG
command processing is terminated. The current active log data set is not truncated
and switched to the next available active log data set, and the archive log is not
created.
46 Command Reference
-ARCHIVE LOG (DB2)
Examples
Example 1: Truncate the current active log data sets and initiate an asynchronous
job to offload the truncated data sets. No quiesce processing occurs.
-ARCHIVE LOG
Example 2: Initiate a quiesce period. If all DB2 update activity is stopped within this
period, truncate the current active log data set and switch to the next available
active log data set. Let the value in the field QUIESCE PERIOD of installation panel
DSNTIPA determine the length of the quiesce period. The MODE(QUIESCE)
processing is asynchronous.
If the DB2 subsystem can successfully block all update activity before the quiesce
period ends, it proceeds to the next processing step. If the quiesce time period is
insufficient to successfully quiesce the DB2 subsystem, the active log data sets are
not truncated and the archive does not occur.
-ARCHIVE LOG MODE(QUIESCE)
Example 3: Initiate a quiesce period. If all DB2 update activity is stopped within this
period, truncate the current active log data set and switch to the next available
active log data set. The maximum length of the quiesce processing period is seven
minutes (420 seconds) and the processing is synchronous for the entire seven
minutes.
If the DB2 subsystem can successfully block all update activity before the quiesce
period ends, it proceeds to the next processing step. If the quiesce time period is
insufficient to successfully quiesce the DB2 subsystem, the active log data sets are
not truncated and the archive does not occur.
-ARCHIVE LOG MODE(QUIESCE) WAIT(YES) TIME(420)
Example 4: In a data sharing environment, initiate a quiesce period for all members
of the data sharing group. If all DB2 update activity is stopped within this period,
truncate the current active log data set and switch to the next available active log
data set. Specify a quiesce time period of 10 minutes (600 seconds) to override the
value in the field QUIESCE PERIOD of installation panel DSNTIPA for member
DB1G. If the update activity has not quiesced after the 10 minute quiesce period,
the command fails and new update activity is allowed to proceed.
-DB1G ARCHIVE LOG MODE(QUIESCE) TIME(600)
Example 5: In a data sharing environment, truncate the active log data sets for
group member DB2G and initiate an asynchronous job to offload the truncated data
sets, without any quiesce processing. In this example, SCOPE(MEMBER) is used
by default.
-DB2G ARCHIVE LOG
Example 6: In a data sharing environment, truncate the data sets for all members
of the data sharing group and initiate an asynchronous job to offload the truncated
data sets, without any quiesce processing.
-DB2G ARCHIVE LOG SCOPE(GROUP)
48 Command Reference
Chapter 13. BIND PACKAGE (DSN)
The DSN subcommand BIND PACKAGE builds an application package. DB2
records the description of the package in the catalog tables and saves the prepared
package in the directory. For more information on using BIND PACKAGE, see Part
5 of DB2 Application Programming and SQL Guide.
Environment
You can use BIND PACKAGE from DB2I, or from a DSN session under TSO that
runs in either the foreground or background.
Authorization
The package owner must have authorization to execute all statements embedded in
the package for BIND PACKAGE to build a package without producing error
messages. (The SYSADM authority includes this authorization.) For
VALIDATE(BIND), DB2 verifies the authorization at bind time. For VALIDATE(RUN),
DB2 verifies the authorization initially at bind time, but if the authorization check
fails, DB2 rechecks it at run time.
50 Command Reference
BIND PACKAGE (DSN)
Table 11. Summary of privileges needed for BIND PACKAGE options (continued)
Installation panel field BIND NEW Authorization required to run BIND
Bind option PACKAGE PACKAGE
REPLACE, using the default owner or BINDADD or BIND Primary authorization ID must have
primary authorization ID one of the following:
v Ownership of the package
v BIND privilege on the package
v PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
REPLACE, specifying an OWNER BINDADD or BIND If the binder does not have SYSADM
other than the primary authorization ID or SYSCTRL authority, the
(1)
authorization ID of the OWNER must
have one of the following:
v BIND privilege on the package
v PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
COPY BINDADD or BIND The primary or secondary
authorization ID of the binder or
OWNER must have one of the
following on the package being
copied:
v Ownership of the package
v COPY privilege on the package
v BINDAGENT privilege from the
owner of the package
v PACKADM authority on the
collection or on all collections
v SYSADM or SYSCTRL authority
Notes:
1. If any of the authorization IDs of the process has the SYSADM authority or SYSCTRL authority, OWNER
authorization-id can be any value. If any of the authorization IDs has the BINDAGENT privilege granted from the
owner, then authorization-id can specify the grantor as OWNER. Otherwise, the OWNER authorization-id must be
one of the primary or secondary authorization IDs of the binder.
Syntax
enable-block
QUALIFIER(qualifier-name)
MEMBER(dbrm-member-name)
LIBRARY(dbrm-pds-name)
COPY(collection-id.package-id)
COPYVER(version-id) COMPOSITE
OPTIONS( COMMAND )
DEFER(PREPARE) ACTION (REPLACE)
NODEFER(PREPARE) REPLVER(version-id)
(ADD)
YES DBPROTOCOL( DRDA ) 1
CURRENTDATA( NO ) PRIVATE DEGREE( ANY )
DYNAMICRULES( RUN ) ENCODING( ASCII ) NO
BIND EBCDIC EXPLAIN( YES )
DEFINEBIND UNICODE
DEFINERUN ccsid
INVOKEBIND
INVOKERUN
I IMMEDWRITE( NO ) ISOLATION( RR )
FLAG( W ) YES RS
E CS
C UR
NC
|
NO (1) OPTHINT( ’hint-id’ )
KEEPDYNAMIC( YES ) NONE
(2)
REOPT( ALWAYS )
ONCE
, RELEASE( COMMIT ) NOPACKAGE
DEALLOCATE SQLERROR( CONTINUE )
PATH( schema-name )
USER
RUN
VALIDATE( BIND )
Notes:
1 NOREOPT(VARS) can be specified as a synonym of REOPT(NONE)
2 REOPT(VARS) can be specified as a synonym of REOPT(ALWAYS)
52 Command Reference
BIND PACKAGE (DSN)
enable-block:
ENABLE(*)
,
ENABLE ( BATCH )
DISABLE DLIBATCH ,
DB2CALL
CICS DLIBATCH( connection-name )
IMS ,
IMSBMP
IMSMPP CICS( applid )
REMOTE ,
RRSAF
IMSBMP( imsid )
,
IMSMPP( imsid )
,
REMOTE( location-name )
<luname>
Option descriptions
For descriptions of the options shown in the syntax diagram, see Chapter 15, “BIND
and REBIND options,” on page 61.
Examples
Example 1: Replace version APRIL_VERSION of package TEST.DSN8BC81 at
local location USIBMSTODB22 with another version of the package. The new
version (or it could be the same) is in the DBRM DSN8BC81. If the DBRM contains
no version ID, the version ID of the package defaults to the empty string. The
package runs only from the TSO BATCH environment, and from the CICS
environment if the connection ID is CON1. The name PRODUCTN qualifies all
unqualified table, view, alias and index names.
BIND PACKAGE (USIBMSTODB22.TEST) -
MEMBER (DSN8BC81) -
ACTION (REPLACE) REPLVER (APRIL_VERSION) -
QUALIFIER (PRODUCTN) -
ENABLE (BATCH, CICS) CICS (CON1)
Assume that a supervisor routinely executes SQL statements using SPUFI to check
the status of parts as they go through the assembly process and to update a table
with the results of her inspection. She does not need to know the exact status of
the parts; a small margin of error is acceptable.
The supervisor queries the status of the parts from a production table called
ASSEMBLY-STATUS and makes the updates in a non-production table called
REPORTS. She uses the SPUFI option AUTOCOMMIT NO and has the habit of
leaving data on the screen while she performs other tasks.
54 Command Reference
Chapter 14. BIND PLAN (DSN)
The DSN subcommand BIND PLAN builds an application plan. All DB2 programs
require an application plan to allocate DB2 resources and support SQL requests
made at run time. For more information on using BIND PLAN, see Part 5 of DB2
Application Programming and SQL Guide.
Environment
You can use BIND PLAN through DB2I, or from a DSN session under TSO that
runs in either the foreground or background.
Authorization
The plan owner must have authorization to execute all SQL statements embedded
in the plan for BIND PLAN to build a plan without producing error messages. This
excludes statements included in DBRMs that are bound to packages included in the
package list of the plan. The SYSADM authority includes this authorization. For
VALIDATE(BIND), DB2 verifies the authorization at bind time. For VALIDATE(RUN),
DB2 verifies the authorization initially at bind time, but if the authorization check
fails, DB2 rechecks it at run time.
Table 12 explains the authorization required to run BIND PLAN, depending on the
options specified.
Table 12. Summary of privileges needed for BIND PLAN options
Option Authorization required to run BIND PLAN
ADD, using the Primary authorization ID (default owner) must have one of the
default owner or following:
primary v BINDADD privilege
authorization ID v SYSADM or SYSCTRL authority
ADD, specifying an If the binder does not have SYSADM or SYSCTRL authority, the
OWNER other than authorization ID of the new OWNER must have one of the following:
the primary v BINDADD privilege
authorization ID v SYSADM or SYSCTRL authority
REPLACE, using Primary authorization ID of the process must have one of the following:
the default owner or v Ownership of the plan
primary v BIND privilege on the plan
authorization ID v SYSADM or SYSCTRL authority
REPLACE, If the binder does not have SYSADM or SYSCTRL authority, the
specifying an authorization ID of the OWNER must have one of the following:
OWNER other than v Ownership of the plan
the primary v BIND privilege on the plan
authorization ID v SYSADM or SYSCTRL authority
PKLIST, specifying Authorization ID of the process must include one of the following:
individual packages v EXECUTE authority on each package specified in the PKLIST
v PACKADM authority on specific collections that contain the packages
or on all collections
v SYSADM authority
Table 12. Summary of privileges needed for BIND PLAN options (continued)
Option Authorization required to run BIND PLAN
PKLIST, specifying Authorization ID of the process must include one of the following:
(*), indicating all v EXECUTE authority on collection-id.*
packages in the v PACKADM authority on specific collections that contain the packages
collection or on all collections
v SYSADM authority
| Specifying the OWNER for ADD and REPLACE: If any of the authorization IDs of
| the process has SYSADM authority or SYSCTRL authority, OWNER authorization-id
| can be any value. If any of the authorization IDs has the BINDAGENT privilege
| granted from the owner, authorization-id can specify the grantor as OWNER.
| Otherwise, OWNER authorization-id must be one of the primary or secondary
| authorization IDs of the binder.
For additional information about the required authorization to execute BIND PLAN,
see Part 5 of DB2 Application Programming and SQL Guide.
56 Command Reference
BIND PLAN (DSN)
Syntax
BIND
PLAN(plan-name) OWNER(authorization-id) QUALIFIER(qualifier-name)
NODEFER(PREPARE)
enable-block member-block
DEFER(PREPARE) USE
ACQUIRE( ALLOCATE )
(REPLACE) CACHESIZE(decimal-value) YES
RETAIN CURRENTDATA( NO )
ACTION (ADD)
CURRENTSERVER(location-name) DBPROTOCOL( DRDA ) 1
PRIVATE DEGREE( ANY )
EXPLICIT RUN ENCODING( ASCII )
DISCONNECT( AUTOMATIC ) DYNAMICRULES( BIND ) EBCDIC
CONDITIONAL UNICODE
ccsid
NO I IMMEDWRITE( NO ) ISOLATION( RR )
EXPLAIN( YES ) FLAG( W ) YES RS
E CS
C UR
|
NO (1) OPTHINT( ’hint-id’ )
KEEPDYNAMIC( YES ) NONE
(2)
REOPT( ALWAYS )
ONCE
, COMMIT DB2
RELEASE( DEALLOCATE ) SQLRULES( STD )
PATH( schema-name )
USER
RUN
VALIDATE( BIND )
Notes:
1 NOREOPT(VARS) can be specified as a synonym of REOPT(NONE)
2 REOPT(VARS) can be specified as a synonym of REOPT(ALWAYS)
enable-block:
ENABLE(*)
, ,
ENABLE ( BATCH )
DISABLE DLIBATCH ,
DB2CALL
CICS DLIBATCH( connection-name )
IMS ,
IMSBMP
IMSMPP CICS( applid )
RRSAF ,
IMSBMP( imsid )
,
IMSMPP( imsid )
member-block:
MEMBER( dbrm-member-name )
,
LIBRARY( dbrm-pds-name )
,
Option descriptions
For descriptions of the options shown in the syntax diagram, see Chapter 15, “BIND
and REBIND options,” on page 61.
Examples
Example 1: This subcommand creates a new plan called IMSONLY. The SQL
statements for the plan are in the DBRM member DSN8BC81. An ISOLATION level
of cursor stability (CS) provides maximum concurrency when you run the plan, and
protects database values only while the program uses them. DEPTM92 owns the
plan, but PRODUCTN qualifies any unqualified table, view, index, and alias names
that are referenced in the DBRM.
A cache size of 0 indicates that users will not run the plan repeatedly. Caching the
names of users authorized to run the plan helps only when the same user runs the
plan repeatedly while it is in the EDM pool. Because this is not the case with this
plan, there is no need to reserve space in the EDM pool for a cache that the plan
does not use.
58 Command Reference
BIND PLAN (DSN)
The option ENABLE(IMS) runs the plan only from an IMS environment (DLI Batch,
BMP and MPP). If you attempt to run the plan from another environment, such as
TSO Batch, the plan allocation fails.
BIND PLAN(IMSONLY) -
MEMBER(DSN8BC81) -
ACTION(ADD) -
ISOLATION(CS) -
OWNER(DEPTM92) -
QUALIFIER(PRODUCTN) -
CACHESIZE -
ENABLE(IMS)
To allow other users having only the EXECUTE privilege on a plan to run both the
embedded and dynamic SQL statements, you must bind that plan with the option
DYNAMICRULES(BIND). When DYNAMICRULES(BIND) is in effect for plan
IMSONLY:
v A single authorization ID, the authorization ID for DEPTM92, is used for
authorization checking of both the embedded and dynamic SQL statements in the
DBRM.
v PRODUCTN is the implicit qualifier of unqualified object names referenced in
both the embedded and dynamic SQL statements in the DBRM.
Example 3: This subcommand creates a new plan called CICSONLY. The plan
specifies an ISOLATION level of cursor stability (CS). DEPTM12 owns the plan, but
TESTSYS qualifies any unqualified table, view, index, and alias names referenced
in the DBRM. A cache size of 0 indicates that users will not run the plan repeatedly.
The option ENABLE(CICS) CICS(CON1) runs the plan only from CICS VTAM®
node CON1 which is specified in the APPLID parameter of the CICS SIT table. If
you attempt to run the plan from another environment or from another CICS VTAM
note, the run attempt fails.
BIND PLAN(CICSONLY) -
MEMBER(DSN8BC81) -
ACTION(ADD) -
ISOLATION(CS) -
OWNER(DEPTM12) -
QUALIFIER(TESTSYS) -
CACHESIZE(0) -
ENABLE(CICS) CICS(CON1)
60 Command Reference
Chapter 15. BIND and REBIND options
This chapter lists the options you can use for binding or rebinding plans and
packages. Some of the options are common for both bind and rebind and for both
plans and packages.
Defaults: The default for an option is the value used if you omit the entire option.
A default of plan value for BIND PACKAGE means that the default is the same
as the value determined during the bind or rebind of the plan to which the
package is appended at run time.
A default of existing value for REBIND PLAN or REBIND PACKAGE means that
the default is the value that was determined during the previous bind or rebind
of the plan or package that you are rebinding.
For all other cases, the option descriptions note the specific defaults, which DB2
assigns at bind time. If a specific default value exists, that value is underlined.
Catalog records: The DB2 catalog records information about plans and packages,
chiefly in the tables SYSIBM.SYSPLAN and SYSIBM.SYSPACKAGE. The
descriptions of where the options record information omit the constant qualifier,
SYSIBM, of those table names.
Determines whether to acquire resources for DBRMs specified in the MEMBER list
when the application first accesses them or when the plan is allocated. Local or
remote packages associated with the plan acquire their resources when the
application first accesses them.
(USE)
Acquires table space locks only when the application program bound to the plan
first uses them.
(ALLOCATE)
Acquires all table space locks when the plan is allocated. The value has no
effect on dynamic SQL statements, which always use ACQUIRE(USE).
If you use ACQUIRE(ALLOCATE), you must also use
RELEASE(DEALLOCATE). ACQUIRE(ALLOCATE) can increase the plan size,
because additional items become resident in the plan.
Defaults:
Process Default value
BIND PLAN USE
BIND PACKAGE N/A
REBIND PLAN Existing value
REBIND PACKAGE N/A
Determines whether the object (plan or package) replaces an existing object with
the same name or is new.
(REPLACE)
The object replaces an existing one with the same identifier, and a new entry
replaces the old one in the catalog table SYSPLAN or SYSPACKAGE. If no
object with the given identifier already exists, the bind process creates the new
object and a new entry.
The authorization ID designated explicitly or implicitly by the option OWNER
becomes the owner of the new object. If that authorization ID is not the
previous owner, all grants of privileges for the object that the previous owner
issued change to name the new owner as the grantor.
If the bind fails, the old object and its entry remain.
For BIND PACKAGE: You cannot use REPLACE with a remote package bound
with either of the options ENABLE or DISABLE. The attempt causes the bind to
fail.
REPLVER(version-id) (For BIND PACKAGE only)
Replaces a specific version of the package, identified by version-id. If the
package with the specified version-id does not exist, the bind fails.
The default for version-id comes from the DBRM if you use the MEMBER
option on BIND, or from the COPYVER option if you use the COPY option.
RETAIN (For BIND PLAN only)
Preserves EXECUTE privileges when you replace the plan. If ownership of
the plan changes, the new owner grants the privileges BIND and EXECUTE
to the previous owner.
RETAIN is not the default. If you do not specify RETAIN, everyone but the
plan owner loses the EXECUTE privilege (but not the BIND privilege). If
plan ownership changes, the new owner grants the BIND privilege to the
previous owner.
(ADD)
Adds a new object, but does not replace an existing one. If the object name
already exists in the catalog, the bind fails. If the bind fails for any reason, the
bind process does not produce a new package or plan and makes no entry in
the catalog.
62 Command Reference
BIND and REBIND options
Defaults:
Process Default value
BIND PLAN REPLACE
BIND PACKAGE REPLACE
REBIND PLAN N/A
REBIND PACKAGE N/A
CACHESIZE (value of field PLAN AUTH CACHE) On: BIND and REBIND PLAN
(decimal-value)
Determines the size (in bytes) of the authorization cache acquired in the EDM pool
for the plan. At run time, the authorization cache stores user IDs authorized to run.
Consulting the cache can avoid a catalog lookup for checking authorization to run
the plan.
decimal-value
The size of the cache can range from 0 to 4096. Nonzero values that are not
multiples of 256 round to the next highest multiple of 256. CACHESIZE(0)
specifies creating no cache when the plan runs.
Defaults:
Process Default value
BIND PLAN value of field PLAN AUTH CACHE on installation
panel DSNTIPP, which has a default of 0
BIND PACKAGE N/A
REBIND PLAN Existing value
REBIND PACKAGE N/A
For additional information on determining an optimal cache size, see Part 5 of DB2
Application Programming and SQL Guide.
Determines that you are copying an existing package and names that package.
Copying the package recalculates the access paths in the copy.
To create a remote copy, this option copies SQL statements from a package at your
local server. Therefore, you must hold the COPY privilege or its equivalent at the
local server.
collection-id
The name of the collection that contains the package to copy, as listed in
column COLLID of catalog table SYSPACKAGE.
package-id
The name of the package to copy, as listed in column NAME of catalog table
SYSPACKAGE.
COPYVER(version-id)
Determines the version of the package to copy. The default for version-id is the
empty string.
Restrictions:
v collection-id.package-id must identify a package on the local server.
v You cannot copy to a package in the same collection. If you make the copy on
the local server, collection-id. on the COPY option must not name the collection
used on the PACKAGE option.
Defaults:
Process Default value
BIND PLAN N/A
BIND PACKAGE None
REBIND PLAN N/A
REBIND PACKAGE N/A
COPY has no default. If you do not use COPY, you must use MEMBER. You
cannot use both options.
The option values of the package copied (except the values of ENABLE, DISABLE,
OWNER, and QUALIFIER) become the defaults for binding the new package. You
can override a default by choosing a new value for an option on the BIND
PACKAGE command.
Copy packages to remote servers: To copy and bind packages from DB2 UDB for
z/OS Version 8 to some other server that does not support all the new BIND
options in Version 8, use the new OPTIONS(COMMAND) option on BIND
PACKAGE COPY. Any options you do not explicitly specify on the BIND PACKAGE
subcommand are set to the server’s defaults. Using this option can prevent bind
errors when you bind and copy packages to servers other than DB2 UDB for z/OS
Version 8.
64 Command Reference
BIND and REBIND options
Determines whether to require data currency for read-only and ambiguous cursors
when the isolation level of cursor stability is in effect. It also determines whether
block fetching can be used for distributed, ambiguous cursors.
For more information about updating the current row of a cursor, block fetching, and
data currency, see Part 4 of DB2 Application Programming and SQL Guide.
(YES) Specifies that currency is required for read-only and ambiguous cursors.
DB2 acquires page or row locks to ensure data currency. Block fetching for
distributed, ambiguous cursors is inhibited.
(NO) Specifies that currency is not required for read-only and ambiguous cursors.
Block fetching for distributed, ambiguous cursors is allowed.
If your application attempts to dynamically prepare and execute a DELETE
WHERE CURRENT OF statement against an ambiguous cursor, after that
cursor is opened, use of CURRENTDATA(NO) is not recommended. You
receive a negative SQLCODE if your application attempts a DELETE
WHERE CURRENT OF statement for any of the following cursors:
v A cursor that is using block fetching
v A cursor that is using query parallelism
v A cursor that is positioned on a row that is modified by this or another
application process
Restriction for remote rebinds: You cannot use CURRENTDATA when rebinding
a package at a remote server. To change the value of CURRENTDATA, you can:
v Issue BIND REPLACE, remotely or locally.
v Free the package and issue BIND ADD, remotely or locally.
v Rebind the package locally at the location where the package resides.
Defaults:
Process Default value
BIND PLAN YES
BIND PACKAGE YES
REBIND PLAN Existing value
REBIND PACKAGE Existing value
Determines the location to connect to before running the plan. The column
CURRENTSERVER in catalog table SYSPLAN records the value of location-name.
The special register CURRENT SERVER also receives that value at the server
when the plan is allocated. When the plan runs, the requester implicitly uses a type
1 CONNECT statement to that location.
You can use CURRENTSERVER to cause a local application to use data from a
remote server without changing the application; however, using CURRENTSERVER
causes poor performance and should be avoided where possible. Avoid using
CURRENTSERVER with applications that contain explicit CONNECT statements.
The implicit type 1 CONNECT statement that is used by CURRENTSERVER
causes any explicit CONNECT statement issued in the application to be type 1,
even if the application was precompiled with the default type 2.
location-name
The name of the location to connect to. The catalog table SYSIBM.LOCATIONS
must contain this name. If the table does not exist, if the table does not contain
the DBMS, or if there are no packages at that location, warning messages
occur.
Defaults:
Process Default value
BIND PLAN Local DBMS (regardless of the name of the local
location)
BIND PACKAGE N/A
REBIND PLAN Existing value
REBIND PACKAGE N/A
Specifies which protocol to use when connecting to a remote site that is identified
by a three-part name statement.
For DRDA®, a package must be bound to each remote site that is referenced by a
three-part name statement. Specify DRDA to inform DB2 that the three-part name
statements in the plan or package are to be converted to DRDA protocol.
If you specify an option on the BIND PACKAGE command, DB2 uses that remote
access method for the package statements, regardless of the BIND PLAN option.
For remote bind, the default is the system default at the remote site.
If you specify an option on the BIND PLAN statement, that information is stored in
table SYSPLAN.
(DRDA)
DBPROTOCOL DRDA is passed on BIND PACKAGE, BIND PLAN, REBIND
PACKAGE, or REBIND PLAN invocation.
(PRIVATE)
DBPROTOCOL PRIVATE is passed on BIND PACKAGE, BIND PLAN, REBIND
66 Command Reference
BIND and REBIND options
Defaults:
Process Default value
BIND PLAN DRDA
BIND PACKAGE System default
REBIND PLAN Value that was specified the last time the plan was
bound
REBIND PACKAGE Value that was specified the last time the plan was
bound
Determines whether to defer preparation for dynamic SQL statements that refer to
remote objects, or to prepare them immediately. If you defer preparation, the
dynamic statement prepares when DB2 first encounters a statement of the type
EXECUTE, OPEN, or DESCRIBE that refers to the dynamic statement.
Defaults:
Process Default value
BIND PLAN NODEFER
BIND PACKAGE Plan value
REBIND PLAN Existing value
REBIND PACKAGE Existing value
For plans, the value of DEGREE applies only to the DBRMs bound directly to the
plan (named in the MEMBER option on BIND PLAN), and has no affect on PKLIST
names. The value has no effect on dynamic SQL statements, which use the value
of the special register CURRENT DEGREE. The value of the special register can
be changed by executing the SET CURRENT DEGREE statement.
(1) Prohibits parallel processing.
(ANY) Allows parallel processing.
Defaults:
Process Default value
BIND PLAN 1
BIND PACKAGE 1
REBIND PLAN Existing value
REBIND PACKAGE Existing value
68 Command Reference
BIND and REBIND options
(EXPLICIT)
Destroy only connections in the release pending state. This value allows you
maximum flexibility for controlling remote connections.
(AUTOMATIC)
Destroy all remote connections.
(CONDITIONAL)
Destroy all remote connections unless an open cursor defined as WITH HOLD
is associated with the connection.
Defaults:
Process Default value
BIND PLAN EXPLICIT
BIND PACKAGE N/A
REBIND PLAN Existing value
REBIND PACKAGE N/A
Determines what values apply at run time for the following dynamic SQL attributes:
v The authorization ID that is used to check authorization
v The qualifier that is used for unqualified objects
v The source for application programming options that DB2 uses to parse and
semantically verify dynamic SQL statements
v Whether dynamic SQL statements can include GRANT, REVOKE, ALTER,
CREATE, DROP, and RENAME statements
(RUN) Processes dynamic SQL statements using the standard attribute values for
dynamic SQL statements, which are collectively called run behavior:
v DB2 uses the authorization ID of the application process and the SQL
authorization ID (the value of the CURRENT SQLID special register) for
authorization checking of dynamic SQL statements.
v DB2 uses the authorization ID of the application process and the SQL
authorization ID (the value of the CURRENT SQLID special register) as
the implicit qualifier of table, view, index, and alias names.
v Dynamic SQL statements use the values of application programming
options that were specified during installation. The installation option USE
FOR DYNAMICRULES has no effect.
v GRANT, REVOKE, CREATE, ALTER, DROP, and RENAME statements
can be executed dynamically.
(BIND)
Processes dynamic SQL statements using the following attribute values,
which are collectively called bind behavior:
v DB2 uses the authorization ID of the plan or package for authorization
checking of dynamic SQL statements.
v Unqualified table, view, index, and alias names in dynamic SQL
statements are implicitly qualified with value of the bind option
QUALIFIER; if you do not specify QUALIFIER, DB2 uses the
authorization ID of the plan or package owner as the implicit qualifier.
v The attribute values that are described in “Common attribute values for
bind, define, and invoke behaviors” on page 71.
The values of the authorization ID and the qualifier for unqualified objects
are the same as those that are used for embedded or static SQL
statements.
(DEFINEBIND)
Processes dynamic SQL statements using one of two behaviors, define
behavior or bind behavior.
When the package is run as or runs under a stored procedure or
user-defined function package, DB2 processes dynamic SQL statements
using define behavior, which consists of the following attribute values:
v DB2 uses the authorization ID of the user-defined function or stored
procedure owner for authorization checking of dynamic SQL statements
in the application package.
v The default qualifier for unqualified objects is the user-defined function or
stored procedure owner.
v The attribute values that are described in “Common attribute values for
bind, define, and invoke behaviors” on page 71.
70 Command Reference
BIND and REBIND options
Common attribute values for bind, define, and invoke behavior: The following
attribute values apply to dynamic SQL statements in plans or packages that have
bind, define, or invoke behavior:
v You can execute the statement SET CURRENT SQLID in a package or plan that
is bound with any DYNAMICRULES value. However, DB2 does not use the value
of CURRENT SQLID as the authorization ID for dynamic SQL statements.
DB2 always uses the value of CURRENT SQLID as the qualifier for the
| EXPLAIN output PLAN_TABLE. (If the value of CURRENT SQLID has an alias
| on PLAN_TABLE and has the appropriate privileges, that PLAN_TABLE is
| populated.)
v If the value of installation option USE FOR DYNAMICRULES is YES, DB2 uses
the application programming default values that were specified during installation
to parse and semantically verify dynamic SQL statements. If the value of USE for
DYNAMICRULES is NO, DB2 uses the precompiler options to parse and
semantically verify dynamic SQL statements. For a list of the application
programming defaults that the USE FOR DYNAMICRULES option affects, see
Part 5 of DB2 Application Programming and SQL Guide.
v GRANT, REVOKE, CREATE, ALTER, DROP, and RENAME statements cannot
be executed dynamically.
Remote DB2 servers: For a package that uses DRDA access, DB2 sends the
DYNAMICRULES option to the DB2 server at bind time.
For a plan or package that uses DB2 private protocol access, DB2 sends a
DYNAMICRULES value of BIND or RUN to the server at run time, using the
following rules:
v If the DYNAMICRULES value with which the package is bound is BIND,
DEFINEBIND, or INVOKEBIND, DB2 sends a value of BIND to the server.
v If the DYNAMICRULES value with which the package is bound is RUN,
DEFINERUN, or INVOKERUN, DB2 sends a value of RUN to the server.
Table 13 summarizes the dynamic SQL statement attribute values for each
behavior. For more information about the dynamic SQL attributes that are affected
by the DYNAMICRULES option, see Part 5 of DB2 Application Programming and
SQL Guide.
Table 13. Definitions of dynamic SQL statement behaviors
Value for bind Value for run Value for define Value for invoke
Dynamic SQL attribute behavior behavior behavior behavior
Authorization ID Package OWNER Current SQLID User-defined function Authorization ID of
or stored procedure invoker
owner
Default qualifier for Bind OWNER or Current SQLID User-defined function Authorization ID of
unqualified objects QUALIFIER value or stored procedure invoker
owner
CURRENT SQLID Initialized to Initialized to Initialized to primary Initialized to primary
primary authid. primary authid. authid. SET SQLID is authid. SET SQLID is
SET SQLID is SET SQLID is allowed. allowed.
allowed. allowed.
Source for application As determined by Install panel As determined by the As determined by the
programming options the DSNHDECP DSNHDECP DSNHDECP DSNHDECP parameter
parameter application defaults parameter DYNRULS DYNRULS
DYNRULS
Can execute GRANT, No Yes No No
REVOKE, CREATE,
ALTER, DROP, RENAME?
Defaults:
Process Default value
BIND PLAN RUN
BIND PACKAGE Plan value
REBIND PLAN Existing value
REBIND PACKAGE Existing value
72 Command Reference
BIND and REBIND options
Determines which connections can use the plan or package. You cannot use both
DISABLE and ENABLE. For packages, DISABLE and ENABLE are valid only for
local bind operations.
ENABLE
Lists the system connection types that can use the plan or package. Connection
types not listed cannot use it.
DISABLE
Lists the system connection types that cannot use the plan or package.
Connection types not listed can use it.
With some connection types you can list connection IDs to identify specific
connections of the type to disable or enable.
If you list connection IDs as disabled, any connections not listed for the same
connection type are enabled.
If you list connection IDs as enabled, any connections not listed for the same
connection type are disabled.
A connection ID is valid only after the keyword that names its corresponding
connection type.
Connection types:
(*) Specifies all valid connection types. Use only with ENABLE.
(BATCH)
Indicates that all TSO connections are either enabled or disabled for the plan or
package.
(CICS)
Identifies the CICS Connection®. All CICS VTAM node names specified in the
CICS SIT table are either enabled or disabled for the plan or package.
(CICS) CICS(applid, ...)
Identifies the CICS VTAM node name specified in the APPLID parameter of the
CICS SIT table. The CICS VTAM node identified by applid is either enabled or
disabled for the plan or package.
(DB2CALL)
Indicates that the call attachment facility (CAF) connection is either enabled or
disabled for the plan or package.
(DLIBATCH)
Identifies the Data Language I (DL/I) Batch Support Facility connection. All
connection identifiers from the DDITV02 data set or the job name in the JCL
that the DL/I batch support system needs to have are either enabled or disabled
for the plan or package.
(DLIBATCH) DLIBATCH(connection-name, ...)
Specifies the connection identifier as from the DDITV02 data set or the job
name in the JCL that the DL/I batch support system needs to have. The DL/I
batch connection identified by connection-name is either enabled or disabled for
the plan or package.
(IMS)
Specifies that all Information Management System (IMS) connections,
DLIBATCH, IMSBMP, and IMSMPP are either enabled or disabled for the plan
or package.
(IMSBMP)
Specifies the IMS connection for the Batch Message Program (BMP) region. All
IMS BMP connections identified by the value of IMSID on the CTL parameter
EXEC are either enabled or disabled for the plan or package.
(IMSBMP) IMSBMP(imsid, ...)
Specifies the value of IMSID on the CTL parameter EXEC. The IMS BMP
connection identified by imsid is either enabled or disabled for the plan or
package.
(IMSMPP)
Specifies the IMS connection for the Message Processing Program (MPP) and
IMS Fast Path (IFP) regions. All IMS MPP connections identified by the value of
the IMSID on the CTL parameter EXEC. are either enabled or disabled for the
plan or package.
(IMSMPP) IMSMPP(imsid, ...)
Specifies the value of IMSID on the CTL parameter EXEC. The IMS MPP
connection identified by imsid is either enabled or disabled for the plan or
package.
(REMOTE)
Indicates that all remote connections are either enabled or disabled for the plan
or package.
(REMOTE) REMOTE (location-name,...,< luname>,...) (PACKAGE only)
Specifies that the remote connections identified by the following are either
enabled or disabled for the package:
location-name
Specifies the location name of a requesting DBMS that is a DB2 UDB for
z/OS subsystem.
< luname>
Specifies the logical unit name, as defined to VTAM at the server location,
of a requesting DBMS that is not a DB2 UDB for z/OS subsystem.
You must bracket a logical unit name with the less than (<) and the greater
than (>) characters to differentiate it from a location name.
(RRSAF)
Indicates that the RRS attachment facility connection is either enabled or
disabled for the plan or package.
74 Command Reference
BIND and REBIND options
Performance hint: Whenever the plan or package is allocated, DB2 must check
the connection type and connection name with the list of enabled or disabled
connections. For best performance, keep the list short.
Defaults:
Process Default value
BIND PLAN ENABLE(*)
BIND PACKAGE ENABLE(*)
REBIND PLAN Existing value
REBIND PACKAGE Existing value
Catalog record: Table SYSPKSYSTEM for packages and table SYSPLSYSTEM for
plans.
Specifies the application encoding for all host variables static statements in the plan
| or package. EBCDIC is the only valid option for a plan or package that was
| precompiled on DB2 Version 6 or earlier. ccsid is a valid option if you specified
| ccsid as the value on the install panel DSNTIPF as the system EBCDIC ccsid.
| ENCODING also affects the content of the data that is returned by the SQL
| statement DESCRIBE. DB2 will return column names, label names, or both (if
| requested) in the specified application encoding scheme. See DB2 SQL Reference
| for more information about DESCRIBE.
| For Unicode information, see the appendix about Unicode support in DB2
| Installation Guide.
Defaults: The default package application encoding scheme is not inherited from
| the plan application encoding option. The default for a package that is bound on a
| remote DB2 UDB for z/OS system is the remote server’s default application
| encoding scheme. Similarly, when a plan or package is run on a remote DB2 UDB
| for z/OS server, the specified ENCODING option is ignored. Instead, the remote
| server’s encoding scheme is used.
Process Default value
BIND PLAN The system default application encoding scheme
that was specified at installation time.
BIND PACKAGE The system default application encoding scheme
that was specified at installation time.
REBIND PLAN The value that was specified the last time that the
plan or package was bound.
REBIND PACKAGE The value that was specified the last time the plan
or package was bound.
Obtains information about how SQL statements in the package, or in the member
list of the plan, are to execute. It inserts that information into the table
owner.PLAN_TABLE. Owner can be the authorization ID of the owner of the plan or
| package. Alternatively, the authorization ID of the owner of the plan or package can
| have an alias as owner.PLAN_TABLE that points to the base table, PLAN_TABLE.
| Owner must also have the appropriate SELECT and INSERT privileges on that
| table. This option does not obtain information for statements that access remote
objects.
| PLAN_TABLE must have a base table and can have multiple aliases with the same
| table name, PLAN_TABLE, but using different authids; it cannot be a view or a
synonym. It should exist before the bind process begins.
The EXPLAIN option also populates two optional tables, if they exist:
DSN_STATEMNT_TABLE and DSN_FUNCTION_TABLE.
You can get EXPLAIN output for a statement that is embedded in a program that is
bound with EXPLAIN(NO) by embedding the SQL statement EXPLAIN in the
program. Otherwise, the value of the EXPLAIN option applies to all explainable SQL
statements in the program, and to the fullselect portion of any DECLARE CURSOR
statements.
For a description of the tables populated by the EXPLAIN option, see information
about the EXPLAIN statement in Chapter 5 of DB2 SQL Reference.
For automatic rebind: EXPLAIN(YES) is in effect if you bind the plan or package
with EXPLAIN(YES) and if the value of field EXPLAIN PROCESSING on installation
panel DSNTIPO is YES. If EXPLAIN(YES) and VALIDATE(BIND) are in effect and
PLAN_TABLE is not correct, the automatic rebind fails.
(NO) Provides no EXPLAIN information.
(YES) Inserts information in the tables populated by EXPLAIN. If
owner.PLAN_TABLE does not exist at bind time, the value of the option
VALIDATE determines the success of the bind operation.
v If the value is BIND, the bind fails.
76 Command Reference
BIND and REBIND options
v If the value is RUN, DB2 checks to see if the table exists again at run
time. If it still does not exist, the plan or package cannot run. If it does
exist, DB2 inserts information in PLAN_TABLE before the plan or
package runs.
Defaults:
Process Default value
BIND PLAN NO
BIND PACKAGE NO
REBIND PLAN Existing value
REBIND PACKAGE Existing value
Defaults:
Process Default value
BIND PLAN I
BIND PACKAGE I
REBIND PLAN I
REBIND PACKAGE I
Indicates whether immediate writes are to be done for updates that are made to
group buffer pool dependent page sets or partitions. This option is only applicable
| for data sharing environments. The IMMEDWRITE subsystem parameter has no
| effect on the IMMEDWRITE bind option at bind time. Table 14 shows the implied
| hierarchy of this option as it affects run time. The IMMEDWRITE option values are
as follows:
(NO) Specifies that normal write activity is done. Updated pages that are group
| buffer pool dependent are written at or before phase one of commit or at
the end of abort for transactions that have rolled back.
(YES) Specifies that updated pages that are group buffer pool dependent are
immediately written as soon as the buffer update completes. Updated
pages are written immediately even if the buffer is updated during forward
progress or during rollback of a transaction. Specifying this option might
impact performance.
Table 14. The implied hierarchy of the IMMEDWRITE option
IMMEDWRITE IMMEDWRI
bind option subsystem parameter Value at run time
NO NO NO
NO PH1 PH1
NO YES YES
PH1 NO PH1
PH1 PH1 PH1
PH1 YES YES
YES NO YES
YES PH1 YES
YES YES YES
| Note: The NO and PH1 options are equivalent. The PH1 option is shown for
| backward compatibility only.
78 Command Reference
BIND and REBIND options
not as noticeable for plans or packages that perform few buffer updates to
GBP-dependent pages. The following options can be considered as alternatives to
using IMMEDWRITE(YES):
v Always run the dependent transaction on the same DB2 member as the
originating transaction.
v Run the dependent transaction with ISOLATION(RR).
v Wait until the completion of phase two of commit before spawning the dependent
transaction.
v CURRENTDATA(YES) or ISOLATION(RS) can be used to solve the problem only
if the originating transaction updates columns that are not in the WHERE clause
of the dependent transaction.
Defaults:
Process Default value
BIND PLAN NO
BIND PACKAGE NO
REBIND PLAN Existing value
REBIND PACKAGE Existing value
Determines how far to isolate an application from the effects of other running
applications. For more information on isolation levels, see Improving Concurrency in
Part 5 (Volume 2) of DB2 Administration Guide.
(RR) Repeatable read. Ensures that:
v Your application does not read a row that another process has changed
until that process releases that row.
v Other processes do not change a row that your application reads until
your application commits or terminates.
(RS) Read stability. Ensures that:
v Your application does not read a row that another process has changed
until that process releases that row.
v Other processes do not change a row that satisfies the application’s
search condition until your application commits or terminates. It does
allow other application processes to insert a row, or to change a row that
did not originally satisfy the search condition.
(UR) Uncommitted read. Unlike repeatable read and cursor stability, does not
ensure anything. With the exception of LOB data, uncommitted read avoids
acquiring locks on data and allows:
v Other processes change any row your application reads during the unit
of work.
v Your application read any row that another process has changed, even if
the process has not committed the row.
You can use this option only with a read-only operation: SELECT, SELECT
INTO, or FETCH using a read-only cursor. If you specify ISOLATION(UR)
for any other operation, DB2 uses ISOLATION(CS) for that operation.
(NC) No commit. Used on packages that are bound to certain servers other than
DB2 UDB for z/OS. DB2 UDB for z/OS does not support NC. If the server
does not support this isolation level, it uses UR.
For more information about how the ISOLATION option affects locking and
concurrency, including how DB2 resolves conflicts by using the most restrictive
value when the values specified in the plan and package differ, see Part 4 of DB2
Application Programming and SQL Guide.
Defaults:
Process Default value
BIND PLAN RR
BIND PACKAGE Plan value
REBIND PLAN Existing value
REBIND PACKAGE Existing value
For REBIND PACKAGE, you cannot change ISOLATION from a specified value to
a default of the plan value by using REBIND PACKAGE. To do that, you must use
BIND PACKAGE ACTION(REPLACE).
Determines whether DB2 keeps dynamic SQL statements after commit points.
(NO) Specifies that DB2 does not keep dynamic SQL statements after commit
points.
(YES) Specifies that DB2 keeps dynamic SQL statements after commit points.
80 Command Reference
BIND and REBIND options
| If you specify KEEPDYNAMIC(YES), DDF server threads that are used to execute
| KEEPDYNAMIC(YES) packages will remain active. Active DDF server threads are
| subject to idle thread timeouts, as described in Part 2 of DB2 Installation Guide for
| install panel DSNTIPR.
Defaults:
Process Default value
BIND PLAN NO
BIND PACKAGE NO
REBIND PLAN Existing value
REBIND PACKAGE Existing value
Determines what partitioned data sets (libraries) to search for the DBRMs listed in
the MEMBER option. The libraries must be cataloged.
The bind process searches for the libraries in the order that you list them. If the
libraries do not contain some DBRM listed in the MEMBER option, and if a JCL
statement exists for DBRMLIB DD, then the process searches for the member
among the libraries that the JCL statement describes.
For BIND PACKAGE, you can specify only one library to search.
For BIND PLAN, you can specify one or more libraries to search.
Defaults:
Process Default value
BIND PLAN None
The default is to search only the libraries described by the DD statement for
DBRMLIB.
For BIND PACKAGE, you can use only one member. If you do not use MEMBER,
you must use COPY. You cannot use both options.
For BIND PLAN, you can list many members. DB2 sorts the member list in
alphabetical order. If you do not use MEMBER, you must use PKLIST.
Defaults:
Process Default value
BIND PLAN None
BIND PACKAGE None
REBIND PLAN N/A
REBIND PACKAGE N/A
Catalog record: Column NAME of table SYSPACKAGE for BIND PACKAGE, or the
table SYSDBRM for BIND PLAN.
Controls whether query optimization hints are used for static SQL.
('hint-id')
| A character string of up to 128 characters in length, which is used by the
optimizer when searching the PLAN_TABLE for rows to use as input to the
optimizer. The delimiters can only be single quotation marks (').
If 'hint-id' contains all blank characters, DB2 does not use optimization hints
for static SQL statements.
82 Command Reference
BIND and REBIND options
DB2 uses optimization hints only when optimization hints are enabled for your
system. To enable optimization hints, specify YES in the OPTIMIZATION HINTS
field of installation panel DSNTIP4.
For more information about using the OPTHINT option, see Part 5 (Volume 2) of
DB2 Administration Guide.
Defaults:
Process Default value
BIND PLAN All blanks, use normal optimization
BIND PACKAGE All blanks, use normal optimization
REBIND PLAN Existing value
REBIND PACKAGE Existing value
Defaults:
Process Default value
BIND PACKAGE COPY COMPOSITE
Determines the authorization ID of the owner of the object (plan or package). The
owner must have the privileges required to execute the SQL statements contained
in the object.
If ownership changes, all grants for privileges on the object that the previous owner
issued change to name the new owner as the grantor. The new owner has the
privileges BIND and EXECUTE on the object and grants them to the previous
owner.
You can bind or rebind only the objects for which the authorization ID has bind
privileges. If you do not specify an authorization ID, the process rebinds only the
objects for which the primary ID has bind privileges.
For remote BIND or REBIND PACKAGE only, the value of OWNER is subject to
translation when sent to the remote system.
Defaults:
Process Default value
BIND PLAN Primary ID
BIND PACKAGE Primary ID
REBIND PLAN Existing value
REBIND PACKAGE Existing value
The default owner is the primary authorization ID of the agent that runs the bind
process.
The following options identify the location, collection, package name, and version of
the package. You can identify a location and collection. For BIND, the DBRM
supplies the package ID and version ID if you use the option MEMBER, or those
IDs come from the option COPY. For REBIND, you must identify a package name,
and you can also supply a version ID.
location-name
The location of the DBMS where the package binds or rebinds and where the
description of the package resides. The location name must be defined in
catalog table SYSIBM.LOCATIONS. If that table does not exist or if the DBMS
is not in it, you receive an error message.
The default is the local DBMS.
84 Command Reference
BIND and REBIND options
collection-id or *
Specifies the collection to contain the package to bind, or that already contains
the package to rebind. There is no default.
For REBIND, you can use an asterisk (*) to rebind all local packages with the
specified package-id in all the collections for which you have bind privileges.
package-id or * (For REBIND only)
Specifies the name of the package to rebind, as listed in column NAME of
catalog table SYSPACKAGE. There is no default.
You can use an asterisk (*) to rebind all local packages in collection-id for which
you have bind privileges.
version-id or * (For REBIND only)
Specifies the version of the package to rebind, as listed in column VERSION of
catalog table SYSPACKAGE.
You can use an asterisk (*) to rebind all local versions of the specified
package-id in collection-id for which you have bind privileges.
Using simply () rebinds the version of the package that is identified by the
empty string.
If you omit version-id, the default depends on the how you specify package-id. If
you use * for package-id, then version-id defaults to *. If you explicitly provide a
value for package-id, then version-id defaults to the empty string version.
DBRMs created in releases of DB2 before Version 2 Release 3 use a version-id
of the empty string by default.
(*) (For REBIND only)
Rebinds all local DB2 packages for which the applicable authorization ID has
the BIND privilege. Specifying (*) is the same as specifying the package name
as (*.*.(*)) or (*.*). The applicable authorization ID is:
v The value of OWNER, if you use that option
v The primary authorization ID of the process running the bind, if you do not
use the option OWNER
Determines the SQL path that DB2 uses to resolve unqualified user-defined distinct
types, functions, and stored procedure names (in CALL statements).
For the PATH option, consider the following guidelines when you specify a
schema-name:
v The specified schema names are not folded to uppercase by DB2. This behavior
is different than that for schema names in SQL statements, which are folded to
uppercase before being stored in the catalog. If you do not specify these
nondelimited schema names in upper case, DB2 cannot find a match in the
catalog for those schema names.
v You can specify delimited identifiers in both mixed and uppercase characters.
The PATH keyword is mutually exclusive with the PATHDEFAULT keyword. Do not
specify both keywords in the same REBIND command.
(schema-name)
Identifies a schema.
DB2 does not validate that the specified schema actually exists at
precompile or at bind time.
You do not need to explicitly specify the SYSIBM, SYSFUN, and SYSPROC
schemas; DB2 implicitly assumes that these schemas are at the beginning
of the SQL path. DB2 adds these schemas in the order listed. If you do not
specify the SYSIBM, SYSFUN, and SYSPROC schemas, they are not
| included in the 2048-byte length.
(schema-name, ...)
Identifies a list of schemas. The same schema name should not appear
more than once in the SQL path.
The number of schemas that you can specify is limited by the length of the
| resulting SQL path, which cannot exceed 2048 bytes. To calculate the
length of the resulting SQL path:
1. Take the length of each schema.
2. Add 2 for delimiters around each schema-name in the list.
3. Add 1 for each comma after each schema. Do not add 1 for the last
schema.
USER Represents a maximum 8-byte schema-name. At bind time, DB2 includes
this 8-byte length in the total length of the list of schema names specified
for the PATH bind option. The maximum length for a list of schema names,
including comma separators, delimiters, and the 8-byte USER value, is
| 2048 bytes. If you exceed this limit, DB2 generates an error message at
bind time.
At run time, DB2 substitutes the run-time value of the USER special
register, which contains the primary authorization ID of the run-time
process, for the schema-name in the position of USER in the PATH
schema-name list.
If you specify USER in a list of schema names, do not use delimiters
around the USER keyword.
For more information about schema names, ordinary identifiers, and delimited
identifiers, see Chapter 2 of DB2 SQL Reference.
Defaults:
Process Default value
BIND PLAN “SYSIBM,” “SYSFUN,” “SYSPROC,” plan qualifier
BIND PACKAGE “SYSIBM,” “SYSFUN,” “SYSPROC,” package
qualifier
REBIND PLAN Existing value
86 Command Reference
BIND and REBIND options
| Although plan qualifier is the default value for BIND PLAN, it is not stored in the
| catalog. Instead, the catalog value is blank. The catalog value is also blank for
| package qualifier.
The PATHDEFAULT keyword is mutually exclusive with the PATH keyword. Do not
specify both keywords in the same REBIND command.
Defaults:
Process Default value
BIND PLAN N/A
BIND PACKAGE N/A
REBIND PLAN None
REBIND PACKAGE None
PKLIST determines what packages to include in the package list for the plan. The
order in which you list packages with partial identifiers determines the search order
at run time and can affect performance.
NOPKLIST is used with REBIND PLAN only. NOPKLIST determines that the plan
rebinds without a package list. If a package list already exists, NOPKLIST deletes it.
location-name or *
Names the location of the DBMS where the package resides, or defers that
choice until run time. Use either a particular location name or an asterisk (*), or
omit this part of the identifier. The default is the local DBMS.
v If you use a particular location name, then that DBMS should be defined in
catalog table SYSIBM.LOCATIONS. If that table does not exist or if the
DBMS is not in it, you receive warning messages.
v If you use an asterisk, at run time the location comes from the special
register CURRENT SERVER. DB2 checks privileges to use the SQL
statements in the package at that location.
collection-id or *
Names the collection that contains the package or defers that choice until run
time. Use either a particular collection ID or an asterisk (*). No default exists.
If you use an asterisk, then DB2 checks the privileges to use the SQL
statements that are embedded in the package at run time. At that time also,
DB2 determines the collection ID as follows:
v If the value in the special register CURRENT PACKAGESET is not blank,
then that value is the collection ID.
v If the value of CURRENT PACKAGESET is blank, DB2 skips the entry unless
it is the last entry in the package list. If it is the last or only entry, an error
message is issued.
package-id or *
Names a particular package or specifies, by the asterisk, all packages in the
collection. Because you cannot specify a version-id for the packages included in
the package list, all versions are effectively included.
Defaults:
Process Default value
BIND PLAN None
BIND PACKAGE N/A
REBIND PLAN Existing value
REBIND PACKAGE N/A
PKLIST has no default; if you do not use PKLIST, you must use MEMBER.
The default for NOPKLIST is to use the package list specified in the PKLIST option,
if any, during the current or previous bind or rebind.
88 Command Reference
BIND and REBIND options
Determines the implicit qualifier for unqualified names of tables, views, indexes, and
aliases contained in the plan or package.
(qualifier-name)
Specifies the value of the implicit qualifier. This value is not subject to
translation when sent to a remote system for BIND or REBIND PACKAGE.
Defaults:
Process Default value
BIND PLAN Owner ID
BIND PACKAGE Owner ID
REBIND PLAN Existing value
REBIND PACKAGE Existing value
The default is the owner’s authorization ID, whether you use the OWNER option or
its default.
Determines when to release resources that a program uses, either at each commit
point or when the program terminates.
(COMMIT)
Releases resources at each commit point.
(DEALLOCATE)
Releases resources only when the program terminates.
RELEASE(DEALLOCATE) has no effect on packages that are run on a DB2
server through a DRDA connection with a client system. The value also has no
effect on dynamic SQL statements, which always use RELEASE(COMMIT), with
one exception: When you use RELEASE(DEALLOCATE) and
KEEPDYNAMIC(YES), and your subsystem is installed with YES for field
CACHE DYNAMIC SQL on installation panel DSNTIP4, the
RELEASE(DEALLOCATE) option is honored for dynamic SELECT, INSERT,
UPDATE and DELETE statements.
Locks that are acquired for dynamic statements are held until one of the
following events occurs:
v The application process ends (deallocation).
v The application issues a PREPARE statement with the same statement
identifier. (Locks are released at the next commit point.)
v The statement is removed from the cache because it has not been used.
(Locks are released at the next commit point.)
For more information about how the RELEASE option affects locking and
concurrency, see Part 5 (Volume 2) of DB2 Administration Guide or Part 5 of DB2
Application Programming and SQL Guide.
Defaults:
Process Default value
BIND PLAN COMMIT
BIND PACKAGE Plan value
REBIND PLAN Existing value
REBIND PACKAGE Existing value
Specifies whether to have DB2 determine an access path at run time by using the
values of host variables, parameter markers, and special registers.
(NONE)
| Does not determine an access path at run time. You can use
| NOREOPT(VARS) as a synonym for REOPT(NONE).
(ALWAYS)
Re-determines the access path at run time each time the statement is run.
| You can use REOPT(VARS) as a synonym for REOPT(ALWAYS).
| (ONCE)
| Determines the access path for any dynamic statement only once, at the
| first run time or at the first time the statement is opened. This access path
| is used until the prepared statement is invalidated or removed from the
| dynamic statement cache and needs to be prepared again.
Usage notes:
90 Command Reference
BIND and REBIND options
| v REOPT(ONCE) is ignored if you use it with static SQL statements because DB2
| UDB for z/OS caches only dynamic statements.
| v If a dynamic statement in a plan or package that is bound with REOPT(ONCE)
| runs when dynamic statement caching is turned off, the statement runs as if
| REOPT(ONCE) is not specified.
| v You cannot use both REOPT(ONCE) and NODEFER(PREPARE).
| v You can use both REOPT(ONCE) and KEEPDYNAMIC(YES).
Defaults:
Process Default value
| BIND PLAN NONE
| BIND PACKAGE NONE
REBIND PLAN Existing value
REBIND PACKAGE Existing value
| REOPT(NONE) is the default for a package that is bound on a remote DB2 server.
Defaults:
Process Default value
BIND PLAN N/A
BIND PACKAGE NOPACKAGE
REBIND PLAN N/A
REBIND PACKAGE N/A
Because you cannot use the option SQLERROR for REBIND PACKAGE, the value
for the previous package remains in effect when you rebind that package. If you
rebind a package that uses SQLERROR(CONTINUE), those SQL statements found
in error at bind time do not rebind.
For local operations, the value of SQLRULES is used for the initial value of the SQL
special register CURRENT RULES.
Defaults:
Process Default value
BIND PLAN DB2
BIND PACKAGE N/A
REBIND PLAN Existing value
REBIND PACKAGE N/A
Determines whether to recheck, at run time, errors of the type "OBJECT NOT
FOUND" and "NOT AUTHORIZED" found during bind or rebind. The option has no
effect if all objects and needed privileges exist.
(RUN) Indicated that if not all objects or privileges exist at bind time, the process
issues warning messages, but the bind succeeds. DB2 checks existence
and authorization again at run time for SQL statements that failed those
checks during bind. The checks use the authorization ID of the plan or
package owner.
(BIND)
Indicates that if not all objects or needed privileges exist at bind time, the
process issues error messages, and does not bind or rebind the plan or
package, except that:
For BIND PACKAGE only, if you use the option
SQLERROR(CONTINUE), the bind succeeds, but the SQL statements in
it that have errors cannot execute.
Defaults:
Process Default value
BIND PLAN RUN
BIND PACKAGE RUN
92 Command Reference
BIND and REBIND options
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or a CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
CANCEL THREAD(token)
DDF THREAD( luwid ) DUMP NOBACKOUT
token
Option descriptions
THREAD (token)
Identifies a specific thread, either distributed or not, whose processing you want
to cancel. DB2 assigns a token to each thread that is unique for that DB2
subsystem, but not necessarily unique across subsystems.
The token is a one- to six-digit decimal number. You can determine what the
token is by issuing the DB2 command DISPLAY THREAD or by using an IFI
READS call for IFCID 0147 or 0148. The token can also appear after the equal
sign in DB2 messages that display an LUWID.
DDF THREAD(luwid)
Identifies distributed threads for which you want to cancel processing. luwid is a
logical unit of work identifier (LUWID), consisting of:
v A fully qualified LU network name, which consists of:
– A one- to eight-character network ID
– A period
– A one- to eight-character network LU name
© Copyright IBM Corp. 1983, 2004 95
-CANCEL THREAD (DB2)
You might have two or more distributed threads with the same LUWID. All
distributed threads with the same LUWID are canceled.
The LUWID can be determined from the DB2 DISPLAY THREAD command and
other DB2 messages.
DUMP
Provides a dump for diagnostic purposes.
| When you cancel a thread that is not currently active in DB2, DB2 performs a
| hard cancel and no dump is provided. A thread is considered to be not currently
| active in DB2 when it has left DB2 to perform application work.
NOBACKOUT
Specifies that DB2 is not to attempt to back out the data during transaction
rollback processing. Canceling the thread with NOBACKOUT leaves objects in
an inconsistent state. Do not issue this command with NOBACKOUT unless
you have a plan to resolve the data inconsistency.
Multiple NOBACKOUT requests are allowed. However, if the thread is active
and the request is accepted, subsequent requests are ignored. You can choose
to issue a subsequent request if a request fails (as indicated by message
DSNI032I). Objects that the thread modifies are recovered (backed out). If back
out processing fails, the objects are marked REFRESH PENDING (REFP) and
either RECOVER PENDING (RECP) or REBUILD PENDING (RBDP or PSRBD)
in the database exception table. Resolve the REFP status of the object by
running the RECOVER utility to recover the object to a prior point in time or by
running LOAD REPLACE on the object.
Usage notes
Canceling distributed threads: Canceling a distributed thread can cause the
thread to enter the indoubt state. Message DSNL450I is issued if the CANCEL
command causes the DDF thread to be converted from active to indoubt. DB2
releases the resources that the thread holds when the indoubt state is resolved by
automatic indoubt resolution with the coordinator, or by resolution with the
command RECOVER INDOUBT.
96 Command Reference
-CANCEL THREAD (DB2)
D NET,ID=LUND0,SCOPE=ACT
4. Issue the VTAM command VARY NET,TERM for each of the VTAM SIDs
associated with the DB2 thread. In this case, you might need to cancel only the
session ID that DISPLAY THREAD shows to be processing in VTAM
(D2D3590EA1E89822).
For more information about VTAM commands, see VTAM for MVS/ESA Operation.
TCP/IP. Use the TCP/IP DROP command to cancel the thread’s connection ID. To
do this, you need to first determine the TCP/IP connection ID that corresponds to
the thread. Depending on whether the thread is a DB2 requester or server thread,
take the following steps:
v Terminating TCP/IP connection for a requester thread:
1. Issue the DB2 command DISPLAY THREAD(*) LUWID(nnnn) DETAIL. (The
value of nnnn is the token or LUWID provided by CANCEL THREAD.)
Find the IP address and local port for the connection to the partner, as shown
in the following DISPLAY THREAD output:
#display thread(*) detail
98 Command Reference
-CANCEL THREAD (DB2)
d tcpip,,netstat,conn,ipaddr=9.112.114.103
Examples
Example 1: To cancel a non-distributed thread whose token you found through the
DISPLAY THREAD command and to produce a diagnostic dump, issue:
-CANCEL THREAD (123) DUMP
Example 2: To cancel a distributed thread whose LUWID you found through the
DISPLAY THREAD command, issue:
-CANCEL DDF THREAD (LUDALLAS.DB2SQL1.3042512B6425)
Assume that the output from -DISPLAY THREAD shows that the thread-ID and
token associated with this LUWID is 45162. You can also cancel this thread by
issuing either of the following commands:
-CANCEL DDF THREAD (45162)
-CANCEL THREAD (45162)
As in the first example, specifying DUMP with any of the commands shown in this
example causes a diagnostic dump to be produced.
Abbreviation: /CHA
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in IMS
Administration Guide: System.
Syntax
Option descriptions
SUBSYS
Deletes IMS recovery elements from one or more subsystems. You must code
one of the following subparameters:
subsystem-name
Specifies one or more subsystems, seperated by commas, from which
recovery elements will be deleted.
subsystem-name OASN schedule-number
Deletes one or more origin application schedule numbers, seperated by
commas, from one subsystem, specified by subsystem-name.
schedule-number can be a list of up to 32768 origin application schedule
numbers. The numbers are displayed using the OASN parameter of the
/DISPLAY command.
ALL
Deletes IMS recovery elements from all subsystems.
RESET
Deletes the indoubt recovery unit. The recovery unit represents an incomplete
unit of work assigned to an external subsystem as the result of an application
request.
Usage note
The preceding description of the /CHANGE command is a partial description only.
For a complete description, see IMS Command Reference.
Examples
Example 1: Reset all indoubt recovery units for subsystem DB2.
/CHA SUBSYS DB2 RESET
Example 3: Reset indoubt recovery units identified by OASN numbers 99, 685, and
2920 for subsystem DB2.
/CHA SUBSYS DB2 OASN 99 685 2920 RESET
For further information regarding the DCLGEN command and uses for its output,
see Part 2 of DB2 Application Programming and SQL Guide.
Environment
The declarations generator is executed by the DSN subcommand DCLGEN. That
subcommand can be issued from a DSN session, running in either foreground or
background mode, or it can be issued through DB2I.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v Ownership of the table or view
v SELECT privilege on the table or view
v DBADM authority on the database containing the table
v SYSADM authority
v SYSCTRL authority (catalog tables only)
Syntax
AT(location-name)
LIBRARY(library name )
(member-name) /password
ADD COBOL NAMES(prefix)
ACTION( REPLACE ) LANGUAGE( PLI )
C
COB2
IBMCOB
CPP
STRUCTURE(structure-name) APOST NO
QUOTE LABEL YES
DBCSSYMBOL( G ) YES
N DBCSDELIM( NO )
NO NO
COLSUFFIX( YES ) INDVAR( YES )
Option descriptions
TABLE
Specifies the table or view for which a declaration is generated. table-name or
view-name is the qualified or unqualified name of the table or view.
The name must follow these rules:
v If the name is a single-byte or mixed string and contains special characters
other than underscores (_), it must be enclosed between apostrophes ('). If
the language is COBOL, single-byte underscores in the name are translated
into hyphens (-) by DCLGEN. Double-byte character set (DBCS) names need
not be enclosed in apostrophes.
v If the name contains single-byte apostrophes, each one must be doubled ('').
(Some host languages do not permit apostrophes in variable names.)
A table or view name that contains a period and is not enclosed by apostrophes
is a qualified table name. The characters to the left of the period constitute the
table owner, and those to the right of the period constitute the table name. Any
table name enclosed in apostrophes is an unqualified table name. To
understand how DCLGEN determines the table name qualifier, see the
description of the OWNER option, which follows.
OWNER(owner-name)
Specifies a qualifier for the table name. owner-name is the qualifier for the table
name.
If you specify a qualified table name for the TABLE(table-name) option, and you
also specify OWNER(owner-name), the qualifier portion of table-name
supersedes owner-name as the table name qualifier. If you specify an
unqualified table name for the TABLE(table-name) option, and you do not
specify OWNER(owner-name), the SQL authorization ID is the table name
qualifier.
DCLGEN supports the use of underscore (_) as a valid character in the
owner-name keyword parameter.
Table 15 illustrates the decision process for determining the DCLGEN table
name qualifier.
Table 15. Decision process for determining the DECLGEN table name qualifier
OWNER(owner-name) OWNER(owner-name) not
Table name specified specified
TABLE(table-name) qualified table-name qualifier table-name qualifier
TABLE(table-name) owner-name SQL authorization ID
unqualified
AT(location-name)
Identifies the location of the table or view name specified in TABLE
(table-name). location-name, which can consist of 1 to 16 characters, uniquely
identifies an instance of a table or view in a network.
If you specify AT, location-name is used as the prefix for the table name, and
table-name or table-view must be a qualified name.
DCLGEN supports the use of underscore (_) as a valid character in the
location-name keyword parameter.
LIBRARY(library-name(member-name)/password)
Specifies the data set into which the declarations go. This data set must already
exist and be accessible to the declarations generator. It can be either sequential
or partitioned. password is optional.
If the library name is not enclosed within apostrophes, DCLGEN constructs the
following full data set name:
user-prefix.library-name.language.(member-name)
where:
user-prefix The user prefix of the primary authorization ID
of the transaction.
language The value of the LANGUAGE option: COBOL,
COB2, PLI, or C;
(member-name) Optional; if not used, the output goes to a
sequential data set.
ACTION
Indicates whether to add or replace the data set.
(ADD)
Adds the data set as a new member, if it does not already exist.
shift-out and shift-in characters, respectively. You must guard against possible
conflicts with names in the source program. DCLGEN allows the specified
structure name to be the same as the table or view name, but will issue a
warning message.
APOST or QUOTE
Specifies the string delimiter character used in the host language. This option is
effective only for COBOL programs.
APOST specifies the apostrophe (') as the host language string delimiter; the
SQL delimiter is the quotation mark (").
QUOTE specifies the quotation mark (") as the host language delimiter; the
SQL delimiter is the apostrophe (').
If neither APOST nor QUOTE is specified, the default is either APOST or
QUOTE for COBOL, depending on what was specified on DB2 installation panel
DSNTIPF.
The string delimiter delimits strings in host language statements. The SQL
escape character delimits table and column names in the SQL DECLARE
TABLE statement produced by DCLGEN. It is possible, by a choice made
during DB2 installation, to make both delimiters the quotation mark or both the
apostrophe.
LABEL
Indicates whether to include column labels in the output as comments. (Column
labels can be assigned by the LABEL ON statement.)
NO Omits the column labels.
YES Includes the column labels.
DBCSSYMBOL
Specifies the symbol used to denote a graphic data type in a COBOL PICTURE
clause.
(G) Graphic data is denoted using G.
(N) Graphic data is denoted using N.
DBCSDELIM
Specifies whether the DBCS table and column names in the generated
DECLARE table statement will be delimited.
(YES) DBCS table and column names will be delimited in the DCLGEN table
declaration.
(NO) DBCS table and column names will not be delimited in the DCLGEN
table declaration.
COLSUFFIX
Determines whether to form field names by attaching the column name to the
prefix given by the NAMES option.
(NO)
The column name is not used as a suffix, and field names are controlled by
| the option NAMES.
(YES)
If NAMES is specified, DCLGEN forms field names by adding column
names as a suffix to the value of NAMES. For example, if the prefix given
by NAMES is “NEW” and the column name is EMPNO, the field name is
“NEWEMPNO”.
Usage notes
Parsing of the DCLGEN command conforms to standard TSO parsing conventions.
For information about TSO command parsing, see z/OS TSO/E Programming
Services.
Comments: The output for all host languages includes comments. The leading
comment block echoes the DCLGEN subcommand that requested the declarations.
The trailing comment block indicates the number of variables declared.
Using the output: To include the DCLGEN output in an application program, use
the SQL INCLUDE statement. The same member name specified in the DCLGEN
LIBRARY parameter is specified on the INCLUDE statement.
Prompts: Online TSO will prompt for missing or incorrectly specified options.
Editing the output: It is expected that the output of DCLGEN will not meet every
need. You can freely edit the output before including it in a program. For example,
you might want to change a variable name, or include SQL escape characters.
You can edit the output to add WITH DEFAULT to NOT NULL for columns that do
not allow null values. If you edit the output, you must provide a default value.
If your column names contain embedded blanks, they will also be reflected in the
host variable declarations, and you will have to remove, or translate, any blank
characters to some other value.
COBOL and binary integers: DB2 uses the full size of binary integers. It can place
larger values than allowed in the specified number of digits in the COBOL
declaration, which can result in truncated values.
For small integers that can exceed 9999, use S9(5). For large integers that can
exceed 999999999, use S9(10) COMP-3 to obtain the decimal data type. If COBOL
is used for integers that exceed the COBOL PICTURE, specify the column as
decimal to ensure that the data types match and perform well.
COBOL and the underscore character: Because COBOL does not allow the use
of the underscore character, DCLGEN translates any underscore characters in the
table’s column names into hyphens (-) for use in the generated structure.
COBOL and DBCS: OS/VS COBOL does not support DBCS, but later versions of
COBOL (VS COBOL II and COBOL/370) do. Although DB2 accepts values outside
of the range from X'41' to X'FE', in COBOL data definition statements, both bytes of
each double-byte character in data names must be within this range. Data names
must also contain at least one DBCS character that does not have X’42’ as its first
byte.
Examples
| Example 1: This example shows the use of the DCLGEN. Issue the following
| statement from a DSN session or through DB2I:
| DCLGEN TABLE(VEMPL) -
| LIBRARY(’prefix.SRCLIB.DATA(DSN8MPEM)’) -
| LANGUAGE(PLI) -
| APOST
/*********************************************************************/
/* DCLGEN TABLE(VEMPL) - */
/* LIBRARY(’prefix.SRCLIB.DATA(DSN8MPEM)’) - */
/* LANGUAGE(PLI) - */
/* APOST */
/* ... IS THE DCLGEN COMMAND THAT MADE THE FOLLOWING STATEMENTS */
/*********************************************************************/
EXEC SQL DECLARE VEMPL TABLE
( EMPNO CHAR(6) NOT NULL,
FIRSTNME VARCHAR(12) NOT NULL,
MIDINIT CHAR(1) NOT NULL,
LASTNAME VARCHAR(15) NOT NULL,
WORKDEPT CHAR(3) NOT NULL
) ;
/*********************************************************************/
/* PLI DECLARATION FOR TABLE VEMPL */
/*********************************************************************/
DCL 1 DCLVEMPL,
5 EMPNO CHAR(6),
5 FIRSTNME CHAR(12) VAR,
5 MIDINIT CHAR(1),
5 LASTNAME CHAR(15) VAR,
5 WORKDEPT CHAR(3);
/*********************************************************************/
/* THE NUMBER OF COLUMNS DESCRIBED BY THIS DECLARATION IS 5 */
/*********************************************************************/
| Example 2: This example shows the use of NAMES and STRUCTURE. Issue the
| following statement from a DSN session or through DB2I:
| DCLGEN TABLE(VEMPL) -
| LIBRARY(’prefix.SRCLIB.DATA(DSN8MPEM)’) -
| LANGUAGE(PLI) -
| NAMES(FIELD) -
| STRUCTURE(EMPRECORD) -
| APOST
/*********************************************************************/
/* PLI DECLARATION FOR TABLE VEMPL */
/*********************************************************************/
DCL 1 EMPRECORD,
5 FIELD1 CHAR(6),
5 FIELD2 CHAR(12) VAR,
5 FIELD3 CHAR(1),
5 FIELD4 CHAR(15) VAR,
5 FIELD5 CHAR(3);
/*********************************************************************/
/* THE NUMBER OF COLUMNS DESCRIBED BY THIS DECLARATION IS 5 */
/*********************************************************************/
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in IMS
Administration Guide: System.
Syntax
Option descriptions
One of the following options is required:
SUBSYS
Identifies the subsystems to display information about.
subsystem-name, ...
Specifies one or more subsystems. See “Output” on page 114 for a
description of possible subsystem status.
ALL
Displays information about all subsystems.
OASN SUBSYS
Displays the outstanding recovery units (origin application schedule numbers, or
OASN) associated with the external subsystems. The OASN is assigned by IMS
when it schedules an application into a dependent region. That, coupled with
the IMS ID, becomes the recovery token for units of work distributed to other
subsystems.
subsystem-name, ...
Specifies one or more subsystems to display information about.
ALL
Displays the outstanding recovery units associated with all external
subsystems.
Output
The command recognition character (CRC) is displayed for each external
subsystem. Subsystem status is one of the following:
CONNECTED
An IMS control region or dependent region has successfully connected to
the external subsystem. At this point, the two systems can begin a normal
dialog.
NOT CONNECTED
The external subsystem is in an idle state. That is, either it has not been
the object of the /START SUBSYS command, or the external subsystem
initialization exit routine indicated not to connect.
CONNECT IN PROGRESS
The connection process for the specified subsystem is in progress.
STOPPED
The specified subsystem has been stopped with the /STOP SUBSYS
command. All region connections to the specified external subsystem have
been terminated.
STOP IN PROGRESS
The /STOP SUBSYS command is in progress. Before it completes
successfully, all active connections to the specified subsystem from all IMS
regions must be quiesced.
INVALID SUBSYSTEM NAME = subsystem-name
The indicated subsystem name has not been defined to the IMS subsystem
PROCLIB member. Add the subsystem definition to the subsystem member
and issue the /START SUBSYS command.
SUBSYSTEM subsystem-name NOT DEFINED BUT RECOVERY OUTSTANDING
The indicated subsystem name has not been defined to IMS in the external
subsystem PROCLIB member, but IMS still has outstanding recovery
elements from a previous execution when the name was known. To resolve
the recovery element problem, either add the indicated subsystem definition
to the external subsystem PROCLIB member and then issue the /START
SUBSYS command, or issue the /DISPLAY OASN SUBSYS command to
determine the identification of the OASNs and then manually resolve the
recovery elements by issuing the /CHANGE SUBSYS RESET command.
TERM IN PROGRESS
An internal termination of the subsystem is underway. This type of
termination was instigated by IMS abnormal condition processing, an
external subsystem exit, or the external subsystem.
CONNECTED(CONN)
An IMS control region or dependent region has successfully connected to
the external subsystem.
ACTIVE
An IMS application program has established communication with an
external subsystem.
The absence of a PSB name for a thread indicates that a connection to the external
subsystem exists, but an application program is not currently occupying the region.
The presence or absence of an LTERM name indicates whether a region is
message-driven.
Example
Display the status of connections between IMS and all subsystems.
/DISPLAY SUBSYSTEM ALL
SUBSYS CRC REGID PROGRAM LTERM STATUS
SSTR ? CONN
1 DDLTLM17 PTERM01 CONN,ACTIVE
2 DDLTLM06 PTERM02 CONN
*85202/065933*
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v ARCHIVE system privilege
v DISPLAY system privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
DISPLAY ARCHIVE
Usage note
Data sharing members: Although the command ARCHIVE LOG SCOPE(GROUP)
or ARCHIVE LOG MODE(QUIESCE) initiates archive processing for all members of
a data sharing group, the command DISPLAY ARCHIVE shows information only for
the member for which it is issued. To display input archive log information for all
members of a data sharing group, enter the command on each member.
Example
Use the following command to display tape unit information about input archive
logs.
-DISPLAY ARCHIVE
CURRENT 2 5,30
===============================
ADDR STATUS CORR-ID VOLSER DATASET_NAME
290 AVAIL ***** TAPE1 DSNCAT.ARCHLOG1.A0000033
294 PREM ***** TAPE3 DSNCAT.ARCHLOG1.A0000035
293 BUSY RECOVER2 TAPE2 DSNCAT.ARCHLOG1.A0000034
END OF DISPLAY ARCHIVE REPORT.
DSN9022I - DSNJC001 ’-DISPLAY ARCHIVE’ NORMAL COMPLETION
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v DISPLAY system privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
ACTIVE
DISPLAY BUFFERPOOL( * )
, INTERVAL
DETAIL( )
bpname *
ACTIVE ACTIVE
LIST( ) LSTATS( )
* *
*
,
DBNAME ( database-name )
name1:name2
name*
* GBPDEP( YES )
, NO
SPACENAM( space-name )
name1:name2
name*
CASTOWNR( YES )
NO
Option descriptions
(ACTIVE)
Displays the current buffer pool status for all active buffer pools.
(*) Displays the current buffer pool status for all active or inactive buffer pools.
(bpname)
Names the buffer pool for which current status is to be displayed.
v 4-KB page buffer pools are named BP0, BP1, ..., BP49.
v 8-KB page buffer pools are named BP8K0, BP8K1, ..., BP8K9.
v 16-KB page buffer pools are named BP16K0, BP16K1, ..., BP16K9.
v 32-KB page buffer pools are named BP32K, BP32K1, ..., BP32K9.
DETAIL
Produces a detail report for one or more buffer pools. If DETAIL is not specified,
a summary report is produced.
(INTERVAL)
Requests statistics accumulated since the last incremental display, or since
the buffer pool was first activated if no previous incremental display exists.
(*) Requests statistics accumulated since the buffer pool was first activated.
LIST
Lists the open index spaces and table spaces associated with the buffer pools
included in the report. Basic information is provided for non-data-sharing
systems while more detail is provided if data sharing is active.
(ACTIVE)
Restricts the list of open index spaces and table spaces to those that are
currently in use.
(*) Requests a list of all open index spaces and table spaces, whether
currently in use or not.
LSTATS
Lists data set statistics for the open index spaces and table spaces associated
with the buffer pools included in the report. The statistics displayed are
incremental since the last time they were displayed.
(ACTIVE)
Restricts the list statistics to those data sets that are currently in use.
The default is ACTIVE when LIST is not specified or if LIST is specified
with no parameter. If LIST is specified with a parameter and LSTATS has
no parameter, the parameter specified for LIST is used for LSTATS.
(*) Includes statistics for all open index spaces and table spaces, whether
currently in use or not.
DBNAME
Specifies which databases are included in the LIST display and the LSTATS
display. If you specify DBNAME without LIST, LIST(ACTIVE) is assumed.
ABBREVIATION: DBN
(database-name, ...)
Identifies one or more databases to be included in the LIST and
LSTATS displays. database-name can have any of the forms in the
following list. In the list, name1 and name2 represent strings of one- to
eight-characters. name represents a string of one- to eight-characters.
Form Displays the status of...
name1 The database name1
name1:name2 All databases with names from name1 to name2 in a
sorted list of database names.
name* All databases whose names begin with the string name
(*) Displays information on all databases that match the LIST specification.
This is the default.
SPACENAM
Specifies which table spaces or index spaces within the specified databases to
include in the LIST display and the LSTATS display. If you use SPACENAM
without DBNAME, DBNAME(*) is assumed.
ABBREVIATION: SPACE
(*) Displays information about all table spaces and index spaces of the
specified databases. This is the default.
(space-name, ...)
Identifies one or more spaces to be included in the LIST and LSTATS
displays. You can write space-name like database-name to designate:
v The name of a single table space or index space
v A range of names
v A partial name followed by a pattern-matching character
GBPDEP
Indicates whether to restrict the list of data sets to those that are group buffer
pool dependent. This option is not valid if this is a non-data sharing DB2.
(YES)
Restricts the list of page sets to those that are group buffer pool dependent
(GBP-dependent). An index space or table space is GBP-dependent if
either of these conditions are true:
v Inter-DB2 R/W interest exists in it.
v Changed pages from it exist in the group buffer pool that have not yet
been written to disk.
(NO)
Restricts the list of page sets to those that are non-group buffer pool
dependent.
CASTOWNR
Indicates whether to restrict the list of data sets to those for which this DB2
member is the castout owner. This option is not valid if this is a non-data
sharing DB2.
(YES)
Restricts the list of page sets for which this DB2 member is the castout
owner.
(NO)
Restricts the list of page sets for which this DB2 member is not the castout
owner.
Output
You can request a summary report or a detail report.
Summary report
A summary report contains the following information, as seen in “Example 1” on
page 125:
Identification
BUFFERPOOL NAME
Buffer pool external name (BP0, BP1, ..., BP49, or BP32K, BP32K1, ...,
BP32K9).
BUFFERPOOL ID
Buffer pool internal identifier (0-49, 80-89, 100-109, 120-129).
USE COUNT
Number of open table spaces or index spaces that reference this buffer
pool. (Inactive pools have a zero use count.)
| BUFFERPOOL SIZE
| User-specified buffer pool size.
BUFFERS ALLOCATED
| Number of allocated buffers in an active buffer pool.
TO BE DELETED
| Number of buffers to be deleted in an active buffer pool (because of pool
contraction).
IN-USE/UPDATED
| Number of currently active (non-stealable) buffers in the buffer pool.
| BUFFERS ACTIVE
| Number of currently active (containing data) buffers in the buffer pool. For a
| fixed buffer pool, BUFFERS ACTIVE also indicates the number of buffers
| that are fixed in real storage.
Thresholds
VP SEQUENTIAL
| Sequential steal threshold for the buffer pool.
DEFERRED WRITE
| Deferred write threshold for the buffer pool.
VERTICAL DEFERRED WRT
| Vertical deferred write threshold for the buffer pool.
PARALLEL SEQUENTIAL
| Parallel sequential threshold for the buffer pool.
ASSISTING PARALLEL SEQT
| Assisting parallel sequential threshold for the buffer pool.
| Detail report
A detail report includes all summary report information and additional buffer pool
related statistics. You can request cumulative statistics (accumulated since DB2
startup) or incremental statistics (accumulated since the last incremental display). A
sample report appears in “Example 2” on page 125. The statistics in a detail report
are grouped in the following categories:
REQUESTS
Sequential prefetch requests
PREFETCH I/O
Sequential prefetch read I/O operations
PAGES READ
Number of pages read with sequential prefetch
NO WRITE ENGINE
Number of times write processor not available for I/O operations
Examples
Example 1: A summary report is the default report if the DETAIL option is not
specified. The following example shows a summary report that can be produced by
the command:
-DISPLAY BUFFERPOOL(BP0) LIST(*) DBNAME(DSN8*)
Example 2: A detail report can be generated that includes all summary report
information and additional buffer pool related statistics. The following example
shows a detail report that can be produced by the command:
-DISPLAY BUFFERPOOL(BP0) DETAIL
Example 3: With the summary or detail report, you can list open table spaces and
index spaces associated with the buffer pool. You can also request a display of
statistics for each listed table space and index space. An example of a report
generating this information could be produced by the command:
-DISPLAY BUFFERPOOL(BP0) LIST LSTATS
In a data sharing environment, the command can be issued from any DB2
subsystem in the group that has access to the database.
Abbreviation: -DIS DB
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
No special privilege is required to issue DISPLAY DATABASE.
The DISPLAY system privilege allows you to display status information for any
database. The resulting display lists those databases for which the primary
authorization ID or any of the secondary authorization IDs has the DISPLAYDB
privilege. Error messages are produced for those databases specified over which
the set of privileges does not include one of the following privileges or authorities:
v DISPLAYDB privilege
v DISPLAY privilege
v DBMAINT authority
v DBCTRL authority
v DBADM authority
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
USE
CLAIMERS
LOCKS
LPL
WEPR
,
SPACENAM( space-name )
*
spacename1:spacename2 USE ONLY
spacename* CLAIMERS
*spacename LOCKS
*spacename* LPL
*spacestring1*spacestring2* WEPR
(1)
ONLY
, (2)
OVERVIEW
PART( integer )
integer1:integer2
50
LIMIT( integer )
*
restrict-block
AFTER ACTIVE ADVISORY ( )
,
ICOPY
AUXW
ARBDP
AREO*
Notes:
1 If you specify the ONLY option without the SPACENAM() keyword, only the
LIMIT, AFTER, and RESTRICT keywords apply.
2 The OVERVIEW keyword cannot be specified with any other keywords
except SPACENAM, LIMIT, and AFTER.
restrict block:
,
RESTRICT ( )
ACHKP
CHKP
COPY
GRECP
LPL
RBDP
RECP
REORP
RO
STOP
UT
UTRO
UTRW
UTUT
UT*
WEPR
Option descriptions
(database-name, ...)
Identifies one or more databases whose status is to be displayed.
(*) Displays information on all databases that are defined to the DB2
subsystem for which the privilege set of the process has the required
authorization.
dbname and dbstring can have any of the forms listed in Table 16 (where
dbname1 and dbname2 represent any strings of from one to eight characters,
and dbname represents any string of from one to seven characters).
Table 16. Forms of dbname and dbstring
Form Displays the status of...
dbname1:dbname2 All databases whose names are between dbname1 and dbname2
inclusive
dbname* All databases whose names begin with the string dbname
*dbname All databases whose names end with the string dbname
*dbname* All databases whose names contain the string dbname
*dbstring1*dbstring2* All databases whose names contain the strings dbstring1 and
dbstring2
SPACENAM
Specifies what space to display. If you use SPACENAM, you must also specify
the corresponding database name. If (*) is used to specify multiple databases,
SPACENAM(*) can be specified to display all objects in these databases.
Abbreviation: SPACE, SP
(space-name, ...)
Lists one or more spaces whose status is to be displayed. You can write
space-name like database-name to designate:
v The name of a single table space or index space
v A range of names
v A partial name, including a beginning or ending pattern-matching
character (*), a pattern-matching character between two strings, or any
combination of these, with the following exception. Consecutive
pattern-matching characters (*) are not allowed, and you cannot specify
two pattern-matching characters in the middle of a keyword string.
(*) Displays information about all table spaces and index spaces of the
specified database.
spacename and spacestring can have any of the forms listed in Table 17
(where spacename1 and spacename2 represent any strings of from one to
eight characters, and spacename represents any string of from one to
seven characters).
Table 17. Forms of spacename and spacestring
Form Displays the status of...
spacename1:spacename2 All table spaces or index spaces whose names are
between spacename1 and spacename2 inclusive
spacename* All table spaces or index spaces whose names begin with
the string spacename
*spacename All table spaces or index spaces whose names end with the
string spacename
*spacename* All table spaces or index spaces whose names contain the
string spacename
*spacestring1*spacestring2* All table spaces or index spaces whose names contain the
strings spacestring1 and spacestring2
USE
Displays the following information:
v The applications and subsystems of the database or space that have internal
DB2 resources allocated
v The applications and subsystems of the database or space on whose behalf
locks for the space are held or waited for
v The connection IDs, correlation IDs, and authorization IDs for all applications
allocated to spaces and partitions whose statuses are displayed
v The LUWID and location of any remote threads accessing the local database
CLAIMERS
Displays the following information:
v The claims on all table spaces, index spaces and partitions whose statuses
are displayed
v The LUWID and location of any remote threads accessing the local database
v The connection IDs, correlation IDs, and authorization IDs for all applications
allocated to spaces whose statuses are displayed
v The logical partitions that have logical claims and their associated claims
CLAIMERS overrides both LOCKS and USE. If you specify CLAIMERS, any
references to LOCKS or USE are ignored.
LOCKS
Displays the following information:
v The applications and subsystems on whose behalf locks are held, waited on,
or retained for the database or space
v The transaction locks for all table spaces, tables, index spaces and partitions
whose statuses are displayed
v The connection IDs, correlation IDs, and authorization IDs for all applications
allocated to spaces whose statuses are displayed
v The LUWID and location of any remote threads accessing the local database
v The drain locks for a resource held by running jobs
v The logical partitions that have drain locks and the drain locks that are
associated with them
v The retained locks for a resource
v The page set or partition physical locks (P-locks) for a resource
LOCKS overrides USE. If both LOCKS and USE are specified, USE is ignored.
DB2 displays tables with table locks when you specify both the LOCKS and
ONLY keywords.
PART (integer, ...)
Indicates the partition number of one or more partitions whose status is to be
displayed. The integer specified must identify a valid partition number for the
corresponding space name and database name. integer can be written to
designate one of the following values:
v A list of one or more partitions
v A range of all partition numbers that collate greater than or equal to integer1
and less than or equal to integer2
| v A combination of lists and ranges
| OVERVIEW
| Displays each object in the database on its own line, providing an easy way to
| see all objects in the database.
| OVERVIEW limits the display to only the space names and space types that
| exist in the specified databases. The number of parts is displayed for any
| partitioned spaces.
| The OVERVIEW keyword cannot be specified with any other keywords except
| SPACENAM, LIMIT, and AFTER.
LIMIT
Limits the number of messages to be displayed by the command.
(integer)
Is the maximum number of messages that are to be displayed. The default
is 50. The maximum number of messages that can be displayed is limited
by the space available.
(*) Limits the display to the space available.
AFTER
Displays the following information:
v If only a database name is used, AFTER continues the display of all other
databases whose names collate greater than that name.
v If SPACENAM and a table space or index space name are used, AFTER
continues the display to all other table spaces or index spaces in the same
database whose names collate greater than that name.
AFTER cannot be used with more than one database name, table space name,
index space name, with any pattern-matching character (*) within the database
name, or with the SPACENAM() keyword.
ACTIVE
Limits the display to table spaces or index spaces that have had internal DB2
resources allocated to applications and are in a started state or to databases
that contain such spaces.
Abbreviation: A
Default: Using neither ACTIVE nor RESTRICT displays information on all
databases defined to DB2.
RESTRICT
Limits the display to databases, table spaces, or indexes in a restricted status.
This includes those page sets that have logical page list entries. Specifying one
or more keywords further limits the display to the named objects only.
Abbreviation: RES
Use of a database is restricted if the database is in any of the following
situations:
v It is started for read-only processing.
v It is started for utility-only processing.
v It is stopped.
Use of a table space or index space is restricted if the table space or index
space is in any of the following situations:
Specify one or more of the following keywords to limit objects that are to be
listed.
ACHKP Displays objects in the auxiliary warning advisory state.
CHKP Display objects that are in CHECK-pending status.
COPY Display objects that are in COPY-pending status.
GRECP Displays objects that are in group buffer pool
RECOVER-pending status.
LPL Displays logical page list entries.
RBDP Displays index objects that are in REBUILD- or
RECOVER-pending status. This includes the restricted states
RBDP, LPL, and WEPR.
RECP Displays objects that are in RECOVER-pending status,
including the restricted states RECP, RECP*, LPL, and WEPR
(write error page range).
REORP Displays objects that are in REORG-pending status.
RO Displays objects that are in read-only mode.
STOP Displays objects that are stopped, including the restricted states
STOP, STOPE, STOPP, and LSTOP.
UT Displays objects that are in utility access mode.
UTRO Display objects that are serialized for utility access and
available for read-only access.
UTRW Display objects that are serialized for utility access and
available for read-write access.
UTUT Displays objects that are serialized for utility access and
unavailable.
UT* Displays objects that are in any utility access mode: UT, UTRW,
UTRO, or UTUT.
WEPR Displays write error page range information.
ADVISORY
Limits the display to indexes and table spaces to which read-write access is
allowed, but for which some action is recommended.
Abbreviation: ADV
Use the DISPLAY DATABASE ADVISORY command without the RESTRICT
option to determine when:
v An index space is in the informational COPY-pending (ICOPY) advisory
status.
v A base table space or LOB table space is in the auxiliary warning (AUXW)
advisory status.
Specify one or more of the following keywords to limit the objects listed.
AUXW
Displays objects that are in the auxiliary warning advisory state.
ICOPY
Displays objects that are in the informational COPY-pending advisory
state.
| ARBDP
| Displays objects that are in the advisory REBUILD-pending status.
| AREO*
| Displays objects that are in the advisory REORG-pending status.
For information about resetting an advisory status, see Part 2 of DB2 Utility
Guide and Reference.
Usage notes
Displaying DB2 catalog tables: You can always display the DB2 catalog tables.
However, if a table space in the catalog containing information about user
databases or user table spaces is stopped, those databases or table spaces cannot
be displayed. Trying to display them will cause an error. See Appendix D of DB2
SQL Reference for a list of table space names and assigned tables.
If you issue DISPLAY DATABASE LOCKS on the catalog (DSNDB06), you might
see a lock held on SYSDBASE with the correlation ID 020.DBCMD_05 or
020.DBCMD_06. This simply indicates the lock that DISPLAY DATABASE itself
needs and is normal.
Displaying restricted and advisory status objects: To display all resources that
are in restricted status, you must issue the DISPLAY DATABASE command twice.
To display table spaces and indexes in restricted status, use the SPACENAM
parameter with RESTRICT. To display databases in restricted status, do NOT use
the SPACENAM parameter. Spaces could be unavailable even if they show RW
mode if the database is in restricted status.
To display all resources that are in advisory status, issue the DISPLAY DATABASE
ADVISORY command without the RESTRICT option. For information about
resetting a restrictive or advisory status, see Part 2 of DB2 Utility Guide and
Reference.
Displaying logical partitions: If you issue DISPLAY DATABASE with the PART
parameter for a logical partition of a type 2 index, DB2 does not display physical
| claimers and physical locks in the output. Nonpartitioned indexes on partitioned
| tables are displayed with a type of 'IX' and with partition numbers displayed as 'L'
Output
Message DSNT392I status information: The status codes that are displayed by
the DISPLAY DATABASE command and their respective descriptions are as follows:
| ARBDP
| Indicates that the index should be rebuilt to improve performance and
| allows the DB2 subsystem to pick this index for index-only access.
| AREO*
| Indicates that the table space, index, or partition identified should be
| reorganized for optimal performance.
ACHKP
Indicates an error in the LOB column of the base table space. The base
table space has the auxiliary CHECK-pending restrictive status.
AREST
Indicates that an object (a table space, index space, or a physical partition
of a table space or index space) is in an advisory RESTART-pending state.
If backout activity against the object is not already underway, initiate it either
by issuing the RECOVER POSTPONED command, or by recycling the
system with the system parameter LBACKOUT=AUTO.
AUXW Either the base table space is in the auxiliary warning advisory status,
indicating an error in the LOB column, or the LOB table space is in the
auxiliary warning advisory status, indicating an invalid LOB.
CHKP The object (a table space, a partition within a table space, or an index) is in
the CHECK-pending status.
COPY The object (a table space or a partition within a table space) is in the
COPY-pending status. An image copy is required for this object.
GRECP
The object is GBP-dependent and a group buffer pool RECOVER is
pending.
ICOPY
The index space is in the informational COPY-pending advisory status.
LPL The object has entries in the logical page list.
LSTOP
The logical partition of a nonpartitioning index is stopped.
PSRBD
The entire nonpartitioning index space is in a page set REBUILD-pending
status.
Examples
Example 1: Display information about table space TBS33 in database CB3. The
USE option causes connection-name(CONNID), correlation-id(CORRID), and
authorization ID (USERID) information to be displayed.
-DISPLAY DATABASE(CB3) SPACENAM(TBS33) USE
| Example 2: Display information about table space TBS33 in database CB3. The
LOCKS option displays lock information for table spaces and tables specified;
LUWIDs and locations of any remote threads; and connection-name, correlation-id,
and authorization ID information.
-DISPLAY DATABASE(CB3) SPACENAM(TBS33) LOCKS
Example 3: Display information about table space TBS33 in database CB3. The
CLAIMERS option displays claim types and durations; LUWIDs and locations of any
remote threads; and connection-name, correlation-id, and authorization ID
information.
-DISPLAY DATABASE(CB3) SPACENAM(TBS33) CLAIMERS
Example 4: In a data sharing environment, display information about locks held for
a table space. The application that is identified as LSS001 on member DB1G has
locked partitions 1 and 2. LSS002 on member DB2G has locked partitions 1 and 3.
Partition 4 has no locks held on it.
-DISPLAY DATABASE(DSN8D51A) SPACENAM(TSPART) LOCKS
| If DB2 cannot selectively lock the partitions, it must lock all of the partitions and the
| display looks similar to the following output. The LOCKINFO field shows a value of
S, indicating that this is a table space lock. If partitions are held in different
statuses, those statuses are listed below the table space locks.
| NAME TYPE PART STATUS CONNID CORRID LOCKINFO
| -------- ---- ----- ----------------- -------- ------------ ---------
| TSPART TS LSS001 DSN2SQL H-IS,S,C
| - MEMBER NAME DB1G
| TSPART TS LSS002 DSN2SQL H-IS,S,C
| - MEMBER NAME DB2G
| TSPART TS 0001 RO H-S,PP,I
| - MEMBER NAME DB1G
| TSPART TS 0002 RW H-S,PP,I
| - MEMBER NAME DB2G
| TSPART TS 0003 RW H-S,PP,I
| - MEMBER NAME DB2G
| TSPART TS 0004 RW
Example 5: Display information about page sets in database DSNDB01 that have
entries in the logical page list. Limit the number of messages displayed to the space
available.
-DB1G DISPLAY DATABASE(DSNDB01) SPACENAM(*) LIMIT(*) LPL
DSNT397I -DB1G
| NAME TYPE PART STATUS LPL PAGES
| -------- ---- ----- ----------------- ------------------
| DBD01 TS RW,LPL,GRECP 000001,000004,00000C,000010
| ---- 000039-00003C
| SPT01 TS RW
| SCT02 TS RW
| SYSLGRNG TS RW
| SYSUTILX TS RW
| SYSLGRNX TS RW,LPL,GRECP 000000-FFFFFF
| DSNSCT02 IX RW
| DSNSPT01 IX RW
| DSNSPT02 IX RW
| DSNLUX01 IX RW
| DSNLUX02 IX RW
| DSNLLX01 IX RW
| DSNLLX02 IX RW
******* DISPLAY OF DATABASE DSNDB01 ENDED **********************
DSN9022I -DB1G DSNTDDIS ’DISPLAY DATABASE’ NORMAL COMPLETION
| Example 6: Suppose DB2 is unable to selectively lock the partitions of table space
TSPART, which is in database DSN8D81A. When you specify the following
command, two applications are accessing TSPART, and the partitions have different
statuses.
-DB1G DISPLAY DATABASE(DSN8D81A) SPACE(TSPART) PART(1,4) LOCKS
DB2 displays the locks as table space locks, as shown in the following output:
| NAME TYPE PART STATUS CONNID CORRID LOCKINFO
| -------- ---- ----- ----------------- -------- ------------ ---------
| TSPART TS LSS001 DSN2SQL H-IS,S,C
| TSPART TS LSS002 DSN2SQL H-IS,S,C
| TSPART TS 0001 RO
| TSPART TS 0004 RW
Example 7: Suppose that you have executed the ALTER TABLESPACE statement
on table space TSPART so that TSPART is now defined with LOCKPART YES.
LOCKPART YES causes DB2 to do selective partition locking on TSPART. When
you specify the following command, two applications are accessing TSPART. The
application identified by connection ID LSS001 has locked partitions 1 and 2. The
application identified by connection ID LSS002 has locked partitions 1 and 3.
-DB1G DISPLAY DATABASE(DSN8D81A) SPACE(TSPART) PART(1:4) LOCKS
DB2 displays the locks as partition locks, as shown in the following output:
| NAME TYPE PART STATUS CONNID CORRID LOCKINFO
| -------- ---- ----- ----------------- -------- ------------ ---------
| TSPART TS 0001 RO LSS001 DSN2SQL H-IS,P,C
| TSPART TS 0001 RO LSS002 DSN2SQL H-IS,P,C
| TSPART TS 0002 RW LSS001 DSN2SQL H-IS,P,C
| TSPART TS 0003 RW LSS002 DSN2SQL H-IS,P,C
| TSPART TS 0004 RW
Example 8: Display information about all table spaces and index spaces in the
range of databases from DBKD0101 to DBKD0106 that are in a restrictive status.
Limit the number of messages that are displayed to the available space.
-DISPLAY DATABASE(DBKD0101,DBKD0103) SPACENAM(*) RESTRICT LIMIT(*)
DSNT360I - ***********************************
DSNT362I - DATABASE = DBKD0101 STATUS = RW
DBD LENGTH = 4028
DSNT397I -
| NAME TYPE PART STATUS PHYERRLO PHYERRHI CATALOG PIECE
| -------- ---- ----- ----------------- -------- -------- -------- -----
| TLKD0101 TS RW,RESTP
| IUKD011A IX RW,RESTP
| IXKD011B IX RW,RESTP
Example 9: Display information about all table spaces that are in the auxiliary
warning advisory status (AUXW), and all index spaces that are in informational
COPY-pending status (ICOPY) in database DBIQUQ01. Limit the number of
messages that are displayed to the available space.
-DISPLAY DATABASE(DBIQUQ01) SPACENAM(*) LIMIT(*) ADVISORY
| Example 10: Display a list of all objects in database DB486A. This example shows
| five objects in the database. TS486A is a table space with four parts and TS486C is
| a nonpartitioned table space. IX486A is a nonpartitioned index for table space
| TS486A, IX486B is a partitioned index with four parts, and IX486C is a
| nonpartitioned index.
| -DISPLAY DATABASE(DB486A) SPACE(*) OVERVIEW
| Example 11: Display database DB486B, specifying SPACE(*) for all spaces. This
| example shows table space TS486X with partitions 1 through 6 in STOP status.
| Partition 7 is in UT and COPY status, partition 8 is in STOP status, and partitions 9
| and 10 are in RW status.
-DISPLAY DATABASE(DB486B) SPACE(*)
| Example 12: Display information about all indexes in the DBKD0101 database.
| INDEX2 contains information to be displayed at a logical level. Partitions 0001 and
| 0002 of INDEX3 are data-partitioned secondary indexes, as indicated by 'D' in the
| partition number.
| -DISPLAY DATABASE(DBKD0101) SPACENAM(INDEX*)
| Example 13: Display information about all table spaces in the DBKD0103 database
| that are in the advisory REBUILD-pending status (ARBDP) and the advisory
| REORG-status (AREO*). Limit the number of messages that are displayed to the
| available space. Assume that you specify the following command:
| -DISPLAY DATABASE(DBKD0103) SPACENAM(*) LIMIT(*) ADVISORY(ARBDP,AREO*)
| Example 14: Display information about table space DB2TSP in database DB2. The
| PART option includes both lists and ranges to display a very specific set of
| partitions. The table space underwent a single ROTATE operation before the final
| partitions were added.
| -DISPLAY DATABASE(DB2) SPACENAME(DB2TSP) PART(1,2,4:6,9,10:12)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
DISPLAY DDF
DETAIL
Option descriptions
DETAIL
Displays additional statistics and configuration information.
Output
The DISPLAY DDF command displays the following output:
STATUS The operational status of DDF.
LOCATION The location name of DDF.
LUNAME The fully qualified LUNAME of DDF.
GENERICLU The fully qualified generic LUNAME of DDF.
IPADDR The IP address of DDF.
TCPPORT The SQL listener port used by DDF.
Examples
Example 1: The following command is used to display a DDF detail report where
DDF has not yet been started:
#display ddf detail
Example 2: The following command is used to display a DDF report, with no detail,
where DDF is started:
#display ddf
Example 3: The following command is used to display a DDF detail report where
DDF is started:
#display ddf detail
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
| Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To run this command, you must use a privilege set of the process that includes one
of the following authorities for each function:
v Ownership of the function
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
(*.*) LOCAL
SCOPE ( GROUP )
,
( schema.specific-function-name )
schema.partial-name*
Option descriptions
schema.specific-function-name
Displays information for the specific named function in the specified schema.
You cannot specify a function name as you can in SQL; you must use the
specific name. If a specific name was not specified on the CREATE FUNCTION
statement, query SYSIBM.SYSROUTINES for the correct specific name:
SELECT SPECIFICNAME, PARM_COUNT
FROM SYSIBM.SYSROUTINES
WHERE NAME=’function_name’
AND SCHEMA=’schema_name’;
Usage notes
If you do not specify a partial or specific function name, DB2 displays information
for all functions that DB2 applications have accessed since the DB2 subsystem was
started.
This command does not apply to built-in functions or user-defined functions that are
sourced on another function.
Output
This command displays one line of output for each function that a DB2 application
has accessed.
Information returned by this command reflects a dynamic status. By the time DB2
displays the information, the status might have changed.
Message DSNX971I lists a range of functions that are stopped because a STOP
FUNCTION SPECIFIC command included a partial name with the pattern-matching
character (*). See Chapter 78, “-STOP FUNCTION SPECIFIC (DB2),” on page 387
for more information.
Examples
Example 1: Display information about functions in the PAYROLL schema and the
HRPROD schema.
-DISPLAY FUNCTION SPECIFIC(PAYROLL.*, HRPROD.*)
------ SCHEMA=PAYROLL
FUNCTION STATUS ACTIVE QUED MAXQ TIMEOUT FAIL WLM_ENV
PAYRFNC1 STARTED 0 0 1 0 0 WLMENV1
PAYRFNC2 STOPQUE 0 5 5 3 0 WLMENV1
PAYRFNC3 STARTED 2 0 6 0 0 WLMENV1
USERFNC4 STOPREJ 0 0 1 0 0 WLMENV3
------ SCHEMA=HRPROD
FUNCTION STATUS ACTIVE QUED MAXQ TIMEOUT FAIL WLM_ENV
HRFNC1 STARTED 0 0 1 0 0 WLMENV2
HRFNC2 STOPREJ 0 0 1 0 0 WLMENV2
DSNX9DIS DISPLAY FUNCTION SPECIFIC REPORT COMPLETE
DSN9022I = DSNX9COM ’-DISPLAY FUNC’ NORMAL COMPLETION
------ SCHEMA=PAYROLL
FUNCTION STATUS ACTIVE QUED MAXQ TIMEOUT FAIL WLM_ENV
USERFNC2 STOPQUE 0 5 5 3 0 WLMENV3
USERFNC4 STOPREJ 0 0 1 0 0 WLMENV3
DSNX9DIS DISPLAY FUNCTION SPECIFIC REPORT COMPLETE
DSN9022I = DSNX9COM ’-DISPLAY FUNC’ NORMAL COMPLETION
| Example 3: Display information about all functions that are in the SYSADM schema
| that DB2 applications have accessed. Assume that the STOP FUNCTION
| SPECIFIC(SYSADM.FN*) ACTION(QUEUE) command is in effect at the time you
| issue the following command:
| -DISPLAY FUNCTION SPECIFIC(SYSADM.*)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
DISPLAY GROUP
DETAIL
Option descriptions
DETAIL
Displays information about the parallelism coordinator and parallelism assistant.
| If the DB2 data sharing group is in enabling new-function mode, DISPLAY
| GROUP DETAIL lists catalog and directory table spaces along with their status.
Usage notes
Member status: Message DSN7106I includes information about the XCF status of
the members (STATUS in the display output). The status can be ACTIVE,
QUIESCED, or FAILED.
ACTIVE indicates that the DB2 subsystem is active, and FAILED indicates that it is
failed. A QUIESCED status results from a STOP DB2 command and consists of
several subcategories:
QUIESCED
Indicates a normal quiesced state, as the result of a normal STOP DB2
command.
Q Q (quiesced) can be paired with one or more of the following letters:
I Indoubt or postponed abort units of recovery (URs) are outstanding.
This means that retained locks are held.
C A castout error occured. The last updater of the page set or
partition could not write from the coupling facility to disk.
Ensure that no connectivity problems exist between the coupling
facility and the processor before restarting DB2.
R Retained information is needed for DB2 to perform
resynchronization with one or more remote locations.
When DB2 is restarted, this resynchronization occurs.
ACTIVE
Indicates a normal active state without conditions.
A The member is active, but with the additional conditions. A (active) can be
paired with the following letter:
I Indoubt or postponed abort units of recovery (URs) are outstanding.
This indicates that retained locks are held.
Output
DISPLAY GROUP command output: The DISPLAY GROUP command displays
the following output:
*** BEGIN
The name of the DB2 group
DB2 MEMBER
The names of the DB2 group members
ID The IDs of the DB2 group members
SUBSYS
The subsystem names of the DB2 group members
CMDPREF
The command prefix for each member
STATUS
The status of each member (ACTIVE, QUIESCED with or without additional
conditions, or FAILED)
SYSTEM NAME
The names of the z/OS system where the member is running, or was last
running in cases when the member status is QUIESCED or FAILED
LVL A string of three numeric characters that list the following information:
v DB2 version
v DB2 release
v DB2 modification level
IRLM SUBSYS
The name of the IRLM subsystem to which the DB2 member is connected
IRLMPROC
The procedure names of the connected IRLM
SCA The SCA structure size in KB and the percentage currently in use
LOCK1
The LOCK1 structure size in KB.
The display also shows the following lock information:
v The maximum number of lock entries possible for the lock table and how
many of those lock entries are currently in use. This number is an
approximate value.
v The maximum number of modify lock list entries and how many of those
list entries are currently in use.
For more information about the lock table and the list of modify locks, see
Chapter 6 of DB2 Data Sharing: Planning and Administration.
PARALLELISM COORDINATOR
Indicates whether this DB2 member can coordinate parallel processing.
PARALLELISM ASSISTANT
Indicates whether this DB2 member can assist with parallel processing.
If the output indicates that either the lock structure or SCA are 0 % in use, it does
not mean that the structure is empty. It could mean that the structure is very large
and that the number of locks held or the number of records in the SCA is less than
1 %.
Examples
Example 1: The following sample output for a data sharing group can be generated
by using the DISPLAY GROUP command:
-DB1A DISPLAY GROUP
Example 3: You can obtain more information about the data sharing group, as
shown in the following example, using the DISPLAY GROUP command with
DETAIL option:
-DB1A DISPLAY GROUP DETAIL
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
DISPLAY GROUPBUFFERPOOL
*
,
( gbpname )
structure-name
* MDETAIL
TYPE( GCONN ) INTERVAL
MCONN ( )
NOCACHE *
GDETAIL NO
INTERVAL CONNLIST( YES )
( )
*
Option descriptions
(*) Displays the group buffer pool status for all group buffer pools.
(gbpname)
Names the group buffer pool for which status is to be displayed.
v 4-KB group buffer pools are named GBP0, GBP1, ..., GBP49.
v 8-KB group buffer pools are named GBP8K0, GBP8K1, ... , GBP8K9.
v 16-KB group buffer pools are named GBP16K0, GBP16K1, ... , GBP16K9.
v 32-KB group buffer pools are named GBP32K, GBP32K1, ... , GBP32K9.
(structure-name)
Names the backing coupling facility structure for the group buffer pool. The
coupling facility structure name has the following format:
groupname_gbpname
where groupname is the DB2 data sharing group name and the underscore (_)
separates groupname and gbpname.
TYPE
Indicates the type of group buffer pools (among those that are specified) for
which information is displayed.
(*) All group buffer pools are specified. This is the default.
(GCONN)
Group buffer pools that are currently connected to any member of the data
sharing group. The connection can be “active” or “failed-persistent”.
(MCONN)
Group buffer pools that are currently connected to the member to which the
command is directed.
(NOCACHE)
Group buffer pools that have the GBPCACHE attribute set to NO.
MDETAIL
Shows a detailed statistical report for the specified group buffer pools, reflecting
the member’s activity for each group buffer pool. If the member to which the
command is directed has never been actively connected to the group buffer
pool, no detail report is shown.
(INTERVAL)
Shows incremental statistics. The values displayed are accumulated since
the last MDETAIL(INTERVAL) report for this member, if there was one. This
is the default.
(*) Shows cumulative statistics. The values displayed are accumulated since
this member first connected to the group buffer pool.
GDETAIL
Shows a detailed statistical report for the specified group buffer pools, reflecting
the activity of the entire group for each group buffer pool. If the member to
which the command is directed is not actively connected to the group buffer
pool, no detail report is shown.
(INTERVAL)
Shows incremental statistics. The values displayed are accumulated since
the last GDETAIL(INTERVAL) report, if there was one. This is the default.
(*) Shows cumulative statistics. The values displayed are accumulated since
the group buffer pool was most recently allocated or re-allocated.
CONNLIST
Specifies whether a connection list report is shown for the specified group
buffer pools, listing the connection names of the subsystems that are currently
connected to the group buffer pools and their connection status.
(NO)
Do not show the connection list report.
(YES)
Show the connection list report.
Output
The DISPLAY GROUPBUFFERPOOL command can produce the following the
three report types:
v A summary report
v A group detail report
v A member detail report
Summary report
You can display summary information about group buffer pools. The report indicates
whether this DB2 subsystem is actively connected to the group buffer pools for
which you requested information. The summary report also shows the following
information:
| allocated. If the group buffer pool is duplexed, this is the coupling facility
| name associated with the primary group buffer pool.
| CFLEVEL
| Indicates the level of the coupling facility in which the group buffer pool is
| allocated. If the group buffer pool is duplexed, this is the coupling facility
| level associated with the primary group buffer pool.
| Both the operational and actual levels of the coupling facility are shown.
| The operational level indicates the capabilities of the coupling facility from
| the DB2 subsystem perspective. The actual level is the level as displayed
| by the z/OS D CF command.
LAST GROUP BUFFER POOL CHECKPOINT
Indicates the date and time of the last group buffer pool checkpoint, the
LRSN that was recorded at that checkpoint, and the member name of the
group buffer pool structure owner.
CHANGED PAGES
Indicates the number of changed pages that are written to the
secondary group buffer pool. If the group buffer pool has been
duplexed for the entire reporting interval, this number approximates
the CHANGED PAGES counter that is reported in message
DSNB786I for the primary group buffer pool. The counts might not
be exactly the same, due to timing periods for gathering the counter
information for display or previous transaction failures that might
have occurred.
FAILED DUE TO LACK OF STORAGE
Indicates the number of writes to the secondary group buffer pool
that failed due to a lack of storage.
CHANGED PAGES SNAPSHOT VALUE
Indicates the number of changed pages that are currently cached in
the secondary group buffer pool. This number approximates the
CHANGED PAGES SNAPSHOT VALUE for the primary group
buffer pool, but is probably not identical due to the asynchronous
nature of gathering statistics for the two different coupling facility
structures.
v When the first DB2 member opens the object for GBPCACHE
ALL objects.
READ STORAGE STATS
The number of times that DB2 requested statistics information from
the group buffer pool. This number should be relatively low. It is
issued once per group buffer pool checkpoint by the group buffer
pool structure owner. It is also issued for DISPLAY
GROUPBUFFERPOOL GDETAIL requests and to record IFCID
0254.
DUPLEXING STATISTICS FOR GBP0-SEC
This section of the output lists details of other interactions that this DB2 has
with this group buffer pool.
CHANGED PAGES
Indicates the number of changed pages written to the secondary
group buffer pool. This number approximates the sum of the
synchronous writes of changed pages to the primary group buffer
pool and the asynchronous writes of changed pages to the primary
group buffer pool. The counts might not be exactly the same, due to
timing periods for gathering the counter information for display or
previous transaction failures that might have occurred.
FAILED DUE TO LACK OF STORAGE
Indicates the number of writes to the secondary group buffer pool
that failed due to a lack of storage.
COMPLETION CHECKS SUSPENDED
Indicates the number of times DB2 checked for the completion of
the write of a changed page to the secondary group buffer pool, but
the write had not yet completed; DB2 suspends the execution unit
until the write to the secondary group buffer pool completes.
DELETE NAME LIST
Indicates the number of DELETE NAME LIST requests to delete a set of
pages from the secondary group buffer pool that have just been cast out to
disk from the primary group buffer pool.
READ CASTOUT STATISTICS
Indicates the number of READ CASTOUT STATITICS requests to check for
orphaned data entries in the secondary group buffer pool. The DB2 member
that is the group buffer pool structure owner periodically issues these
requests to determine whether garbage collection is necessary.
DELETE NAME
Indicates the number of DELETE NAME requests to delete orphaned data
entries from the secondary group buffer pool. The DB2 member that is the
group buffer pool structure owner issues these requests if it determines that
garbage collection is necessary.
Examples
Example 1: This is an example of a summary report that can be produced by the
following command:
-DISPLAY GROUPBUFFERPOOL(GBP29)
Message DSNB799I is displayed if the group buffer pool is duplexed and the
secondary group buffer pool is currently allocated. If a secondary group buffer pool
is not allocated, message DSNB799I is not included in the output.
Example 2: Assume you want a summary report about group buffer pool 29
(GBP29), including all connections to that group buffer pool. Enter the following
command:
-DISPLAY GROUPBUFFERPOOL(GBP29) CONNLIST(YES)
Example 3: This example shows a group detail report that is produced by the
following command:
-DISPLAY GROUPBUFFERPOOL(GBP29) GDETAIL(*)
Message DSNB762I is displayed in the output only if the secondary group buffer
pool is allocated.
Example 4: This example shows the member detail section from the report that is
produced by the following command:
Messages DSNB764I and DSNB793I are displayed in the output only if the
secondary group buffer pool is allocated.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
DISPLAY LOCATION
* DETAIL
,
( location-name )
partial-location*
<luname>
ipaddr
Option descriptions
(*) Displays information for all remote locations.
(location-name)
| Lists one or more location names, separated by commas.
Because DB2 does not receive a location name from requesters that are not
DB2 UDB for z/OS subsystems, you can enter the LUNAME or IP address of
such a requester. Refer to the option descriptions for the <luname> and (ipaddr)
options for more information about using the LUNAME or IP address to specify
a requester that is not a BD2 for z/OS subsystem.
(partial-location*)
Selects all location names that begin with the string partial-location and can end
with any string, including the empty string. For example, LOCATION(ABC*)
selects all location names that begin with the string 'ABC'.
<luname>
Requests information about the remote clients that are connected to DDF
through the remote SNA LU that is specified. Enclose the LU name in the
less-than (<) and greater-than (>) symbols. For example, DISPLAY
LOCATION(<LULA>) displays information about a remote location (that is not
DB2 UDB for z/OS) with the LU name of LULA.
You can use an asterisk (*) when specifying an LU name in the same manner
as previously described for specifying a partial-location name. For example,
DISPLAY LOCATION(<LULA*) selects all remote locations (that are not DB2
UDB for z/OS) with an LU name that begins with the string 'LULA'.
(ipaddr)
Requests information about the clients that are connected to DDF through the
remote TCP/IP host. Enter the IP address in the form nnn.nnn.nnn.nnn. For
example, DISPLAY LOCATION(124.63.51.17) displays information about clients
at the remote TCP/IP host whose dotted decimal IP address is 124.63.51.17.
DETAIL
Displays additional information about conversation activity for DB2 system
threads, as shown in “Example 2” on page 171.
Output
The DISPLAY LOCATION command displays the following output:
LOCATION The LOCATION of the remote system.
PRDID The product identifier (PRDID) of the remote system. The PRDID is
displayed in the form nnnvvrrm, where:
nnn The database product
vv The product version
rr The product release
m The product modification level
LINKNAME The address (LU name or IP address) of the remote system.
REQUESTERS
The number of active threads from the local subsystem that are
accessing the remote system.
SERVERS The number of threads from the remote system that are accessing
the local subsystem.
CONVERSATIONS
The total number of conversations or sockets related to the partner
system.
Examples
Example 1: Display information about threads and conversations with specific
remote locations, using the following command:
-DISPLAY LOCATION(SAN_JOSE,SAN_FRANCISCO)
Example 2: Display information about threads and conversations with all remote
locations. Additionally, display detail conversation information about DB2 system
threads that communicate with other locations. This is an example of the output
generated by the following command:
-DISPLAY LOCATION DETAIL
Example 3: Display information for a DB2 system that is connected to the following
DRDA partners:
v A non-z/OS server named DRDALOC via TCP/IP.
v Several TCP/IP clients from the same TCP/IP host as the DRDALOC server.
v A DB2 for z/OS server named DB2SERV via SNA.
DISPLAY LOCATION(*)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
DISPLAY LOG
Usage notes
Information provided by the DISPLAY LOG command: You can use the
DISPLAY LOG command to view the current LOGLOAD setting, including
information about the current active log data sets and status of the offload task. You
can obtain additional information about log data sets and checkpoint information by
using the Print Log Map utility (DSNJU004). For more information about the Print
Log Map utility, see Part 3 of DB2 Utility Guide and Reference.
Examples
Example 1: Display log information and status of the offload task.
-DISPLAY LOG
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or a CICS terminal, or a program using the
instrumentation facility interface (IFI).
Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To run this command, you must use a privilege set of the process that includes one
of the following privileges or authorities:
v Ownership of the stored procedure
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
(*.*)
DISPLAY PROCEDURE
,
( schema.procedure-name )
schema.partial-name*
procedure-name
partial-name*
|
LOCAL
SCOPE ( GROUP )
Option descriptions
(*.*)
Displays information for all stored procedures in all schemas that DB2
applications have accessed since DB2 was started.
(schema.procedure-name)
Displays the specified stored procedure in the specified schema.
(schema.partial-name*)
Displays a set of stored procedures in the specified schema that DB2
applications have accessed since DB2 was started. The names of all
procedures in the set begin with partial-name and can end with any string,
including the empty string. For example, PAYROLL.ABC* displays information
for all stored procedure names beginning with ABC in the PAYROLL schema.
(procedure-name)
Displays one or more specific stored procedure names in the SYSPROC
schema. If no procedures are named, DB2 displays information for all stored
procedures that have been accessed by DB2 applications.
(partial-name*)
Displays information for a set of stored procedures in the SYSPROC schema
that DB2 applications have accessed since DB2 was started. The names of all
procedures in the set begin with partial-name and can end with any string,
including the empty string. For example, ABC* displays information for all stored
procedures in the SYSPROC schema with names that begin with ABC.
SCOPE
Specifies the scope of the command.
(LOCAL)
Specify to display information about procedures on the local member only.
(GROUP)
Specify to display information about procedures on all members of the data
sharing group.
Output
Sample output: The DISPLAY PROCEDURE command generates output similar to
the following output:
| DSNX940I = DSNX9DIS DISPLAY PROCEDURE REPORT FOLLOWS -
|
| PROCEDURE STATUS ACTIVE QUED MAXQ TIME FAIL WLM_ENV
| APPL1 STARTED 1 0 0 0 1 SANDBOX
| APPL2 STARTED 1 0 0 0 0 SANDBOX
| APPL2 STARTED 0 1 2 0 0 SANDBOX
| APPL5 STOPREJ 0 0 0 0 0 SANDBOX
| APPL6 STOPABN 0 0 0 0 0 SANDBOX
| PROC1 STOPQUE 0 0 0 0 0 SANDBOX
|
| DSNX9DIS DISPLAY PROCEDURE REPORT COMPLETE
| DSN9022I = DSNX9COM ’-DISPLAY PROC’ NORMAL COMPLETION
Message DSNX943I lists a range of procedures that are stopped because a STOP
PROCEDURE command included a partial name with a pattern-matching character
(*), as in the following example:
-STOP PROCEDURE(ABC*)
Examples
Example 1: Display information about all stored procedures that have been
accessed by DB2 applications.
-DISPLAY PROCEDURE
------ SCHEMA=SYSPROC
PROCEDURE STATUS ACTIVE QUED MAXQ TIMEOUT FAIL WLM_ENV
USERPRC2 STOPQUE 0 5 5 3 0 SANDBOX
USERPRC4 STOPREJ 0 0 1 0 0 SANDBOX
DSNX9DIS DISPLAY PROCEDURE REPORT COMPLETE
DSN9022I = DSNX9COM ’-DISPLAY PROC’ NORMAL COMPLETION
------ SCHEMA=PAYROLL
PROCEDURE STATUS ACTIVE QUED MAXQ TIMEOUT FAIL WLM_ENV
PAYPRC1 STARTED 0 0 1 0 0 PAYROLL
PAYPRC2 STOPQUE 0 5 5 3 0 PAYROLL
PAYPRC3 STARTED 2 0 6 0 0 PAYROLL
USERPRC4 STOPREJ 0 0 1 0 0 SANDBOX
------ SCHEMA=HRPROD
PROCEDURE STATUS ACTIVE QUED MAXQ TIMEOUT FAIL WLM_ENV
HRPRC1 STARTED 0 0 1 0 0 HRPROCS
HRPRC2 STOPREJ 0 0 1 0 0 HRPROCS
DSNX9DIS DISPLAY PROCEDURE REPORT COMPLETE
DSN9022I = DSNX9COM ’-DISPLAY PROC’ NORMAL COMPLETION
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
DISPLAY RLIMIT
Example
Display the current status of the resource limit facility.
-DISPLAY RLIMIT
If the resource limit facility (RLF) is inactive, the following output is generated:
DSNT701I - RESOURCE LIMIT FACILITY IS INACTIVE
DSN9022I - DSNTCDIS ’DISPLAY RLIMIT’ NORMAL COMPLETION
If the RLF is active, the value of field RESOURCE AUTHID on panel DSNTIPP is
SYSADM, and the resource limit specification table with
RLST NAME SUFFIX = 03 was started, the following output is generated:
DSNT700I = SYSADM.DSNRLST03 IS THE ACTIVE RESOURCE LIMIT
SPECIFICATION TABLE
DSN9022I = DSNTCDIS ’DISPLAY RLIMIT’ NORMAL COMPLETION
Distributed threads are those threads that have a connection with a remote location
(active or inactive) or that had a connection with a remote location (indoubt). An
allied thread and a parallel task thread can be distributed or non-distributed; a
database access thread is always distributed.
The DISPLAY THREAD command allows you to select the type of information you
want to display by using one or more of the following criteria:
v Active threads, inactive threads, indoubt threads, postponed threads, or the set of
active, indoubt, and postponed threads (see the descriptions under the TYPE
option for more information)
v Allied threads, including those threads that are associated with the address
spaces whose connection names are specified
v Distributed threads, including those threads that are associated with a specific
remote location
v Detailed information about connections with remote locations
v A specific logical unit of work ID (LUWID)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
DISPLAY THREAD ( )
,
connection-name
partial-connection*
*
LOCAL
SCOPE ( GROUP )
ACTIVE
TYPE( INDOUBT )
*
INACTIVE
POSTPONED
, DETAIL
LOCATION( location-name )
partial-location*
*
,
LUWID( luwid )
partial-luwid*
token
,
RRSURID( rrs-urid )
*
Option descriptions
Only under certain conditions, as described in the following lists, are any of the
following options required.
If you do not specify either (connection-name) or (*), the following rules apply:
v If the command is issued from a DSN session under TSO, a DB2I panel (DB2
COMMANDS), or an IMS or CICS terminal, the connection name is inherited
from the associated address space.
v If the command is not issued from one of those environments, the following rules
apply:
– If you do not specify either LOCATION or LUWID, processing terminates with
a DSNV413I message.
– If you do specify LOCATION or LUWID, only distributed threads of the type
selected by the TYPE option are displayed.
– When you explicitly specify location-name, only distributed threads of the type
selected by the TYPE option that either have (active or inactive threads) or
had (indoubt threads) a connection with the specified location are displayed.
(connection-name, ...)
Lists one or more connection names (of 1 to 8 characters each). Allied threads
are selected only from the address spaces associated with those connection
names. The LOCATION option can restrict what is displayed:
v If you specify LOCATION(*), only distributed threads of the type specified in
the TYPE option are displayed.
v When you explicitly specify location-name, only distributed threads of the
specified type that either have or had a connection with the specified location
are displayed.
(partial-connection*, ...)
Selects the connections that begin with the string partial-connection and can
end with any string, including the empty string. For example, DISPLAY
THREAD(CICS*,IMS*) selects all connection names that begin with the string
’CICS’ or ’IMS’. The LOCATION option can restrict the display exactly the same
way as previously described for location-name.
(*)
Displays all threads in all address spaces attached to DB2 and all database
access threads of the types specified in the TYPE option. The LOCATION
option can restrict what is displayed:
v If you specify LOCATION(*), only distributed threads are displayed.
v When you explicitly specify location-name, only distributed threads that either
have (active or inactive threads) or had (indoubt threads) a connection with
the specified location are displayed.
The default is to display only the connections that are associated with the
transaction manager from which the command was entered.
| SCOPE
| Specifies the scope of the command.
| (LOCAL)
| Displays threads on only the current member.
| (GROUP)
| Displays all threads on the data sharing group.
TYPE
Tells the type of thread to display.
Abbreviation: T
(ACTIVE)
Displays only active threads. An active allied thread is connected to DB2 via
TSO, BATCH, IMS, CICS or CAF. An active database access thread is
connected via VTAM to another system and is performing work on behalf of
that system. If, during command processing, an active thread becomes
indoubt, it can appear twice—once as active and once as indoubt.
Abbreviation: A
The information that is produced by ACTIVE can be useful for debugging
purposes, especially messages DSNV403I and DSNV404I; the contents of
those messages are described in Part 2 of DB2 Messages and Codes.
(INDOUBT)
Displays only indoubt threads.
An indoubt thread is a participant in a two-phase commit protocol that has
completed the first phase of commit, and has then lost communication with
the commit coordinator and does not know whether to commit or roll back
the updates that have been made.
The indoubt thread information that is displayed includes threads for which
DB2 has a coordinator role, a participant role, or both coordinator and
participant roles.
The commit coordinator for an allied thread is either a transaction manager
(for example, IMS or CICS) or z/OS RRS for threads that use RRSAF. The
commit coordinator for a database access thread is a requester at a remote
system.
Indoubt threads hold locks on all resources that were updated.
Abbreviation: I
(*) Displays active, indoubt, and postponed threads.
(INACTIVE)
Displays only inactive threads. An inactive thread is a database access
thread that is connected via VTAM to another system and is idle, waiting for
a new unit of work to begin from that system.
Abbreviation: INA
Use qualifiers such as complete location names or LUWIDs with this option.
When there are large numbers of inactive database access threads,
unqualified display requests can temporarily change the DB2 working set,
which can temporarily affect the performance of active threads.
(POSTPONED)
Displays information about units of work whose back-out processing has
been postponed.
Abbreviation: P
After you have identified postponed threads, use the RECOVER
POSTPONED command, described on page 303, to complete backout
processing for the postponed units of work.
LOCATION(location-name, ...)
Limits the display to distributed threads as described.
Abbreviation: LOC
location-name
Displays only distributed threads of the specified type that either have
(active or inactive threads) or had (indoubt threads) a remote connection
with the specified location-name.
DB2 does not receive a location name from requesters that are not DB2
UDB for z/OS subsystems. To display information about a requester that is
not a DB2 UDB for z/OS subsystem, enter its LU name or IP address.
Enclose the LU name in the less-than (<) and greater-than (>) symbols.
Enter the IP address in the form nnn.nnn.nnn.nnn. For example, the
following command displays information about a remote location (that is not
DB2 UDB for z/OS) with the LU name of LULA:
-DISPLAY THREAD (*) LOCATION (<LULA>)
Usage notes
Formatted report for distributed threads: The series of messages, DSNV444I
through DSNV446I, augment the formatted report for DISPLAY THREAD TYPE
(ACTIVE or INACTIVE) for distributed threads. Refer to these messages in Part 2 of
DB2 Messages and Codes for an explanation of the formatted report.
Threads using private protocol and DRDA access: A database access thread
that is connected to a requester can also be connected to another database server
location using DB2 private protocol access or DRDA access. In this case, DB2
issues message DSNV445I for the requester, and message DSNV444I and zero or
more DSNV446I messages for the remote server connections. In this case, the
database access thread acts as an intermediate database server.
Showing parallel tasks: The DISPLAY THREAD command shows parallel tasks by
using a status type of PT. The parallel tasks are displayed immediately after the
originating task. If the thread has a status of PT, the connection name contains
blanks if the thread of the originating task is running on the same DB2 subsystem.
This shows that these parallel tasks are related to the originating task. If the parallel
task is running on a DB2 subsystem that is different from the subsystem that runs
the originating task, the connection name is shown and the entry is followed by
message DSNV443I.
| Displaying the XID: If the DISPLAY THREAD command is issued with the TYPE
| ACTIVE and DETAIL options, or with the TYPE INDOUBT option, message
| DSNV440I displays the contents of the XID. The contents of the XID are displayed
| as a hexadecimal value.
The XID is displayed in the DISPLAY THREAD TYPE INDOUBT report if the
indoubt transaction is XID related.
Output
Table 18 on page 189 shows sample DISPLAY THREAD commands and the types
of output they generate. Numbers in each row refer to the descriptions at the
bottom of the table. The DETAIL keyword is not included because it affects only the
amount of information displayed about a distributed thread.
Table 18. Sample DISPLAY THREAD commands (continued). The following output is
generated when commands are issued from different environments with different TYPE
specifications. (Specifying TYPE(*) displays the equivalent output of both TYPE(ACTIVE) and
TYPE(INDOUBT) in one report.)
Environment
where the
command is
issued Command ACTIVE INDOUBT INACTIVE
Description of display that is generated:
1. Allied threads of the specified TYPE with the connection name.
2. No threads (inactive threads are database access threads and have no inherited
connection name).
3. Distributed allied threads of the specified TYPE with the connection name.
4. Distributed allied threads of the specified TYPE with the connection name and a
distributed connection = location-name.
5. The threads of the specified TYPE that have LUWID = luwid or token.
6. Message DSNV413I is displayed to indicate an error.
7. All threads (both allied and database access) of the specified TYPE.
8. All inactive database access threads.
9. All distributed threads (both allied and database access) of the specified TYPE.
10. All distributed threads (both allied and database access threads) of the specified TYPE
with a distributed connection = location-name.
11. All inactive database access threads with a distributed connection = location-name.
12. Database access threads of the specified TYPE with the connection name.
13. Database access threads of the specified TYPE with the connection name and a
distributed connection = location-name.
14. A thread of the specified TYPE with the connection name and LUWID = luwid or token.
15. Messages DSNV407 and DSNV408 also display coordinator’s TCP/IP resync port
number; message DSNV446 also displays the participant’s TCP/IP resync port number.
| 16. Message DSNV440I displays the contents (in hexadecimal representation) of the remote
| client’s XID for distributed threads of the specified TYPE that are associated with an XA
| transaction manager coordinator.
Rx Receive
Ax Allocation
Dx Deallocation
Cx Change number of sessions (CNOS) processing
Xx Exchange Log name processing
blank Not in one of the preceding states
| If you specify the DETAIL keyword for active, inactive, or indoubt threads, DB2 also
| displays message DSNV441I, which displays accounting suffix information as a
| character string. DB2 will recognize accounting information, and display suffix
| information that originates from the following systems:
| v DB2 UDB for z/OS systems
| v Any system where the accounting information matches the format that is
| described in DSNSQMDA.QMDASQLI, which includes the product ID prefixes
| JCC (DB2 Universal JDBC driver) and SQL (DB2 Universal Database for Linux,
| UNIX, and Windows).
| If you specify the DETAIL option for active threads, DB2 also displays message
| DSNV440I, which displays the contents (in hexadecimal representation) of the
| remote client’s XID.
Examples
Example 1: The output of the command DISPLAY THREAD shows a token for
every thread, distributed or not. This example shows the token for an allied thread
that is not distributed. The token is 123. You can use the thread’s token as the
parameter in the CANCEL THREAD command.
-DISPLAY THREAD(*) DETAIL
Example 3: In this example, a system at Site 1 has a TSO application and an IMS
application. The system at Site 1 fails after DB2 commits the TSO application, but
before the commit decision has been communicated to the participant subsystems
at Site 2 and Site 3. The failure occurs before IMS has communicated the commit
or rollback decision to the Site 1 DB2 subsystem. The DISPLAY THREAD
commands are issued after the Site 1 DB2 subsystem restarts but before reconnect
with IMS. DISPLAY THREAD commands that are issued at each location show
output similar to the following output:
The following DISPLAY THREAD command is issued at Site 3 (where both ACTIVE
and INDOUBT threads are displayed):
-DISPLAY THREAD(*) TYPE(*) DETAIL
Example 4: This example shows a thread executing within a stored procedure and
a thread waiting for a stored procedure to be scheduled. Assume that an application
makes a call to stored procedure PROC1 and then to stored procedure PROC2.
PROC2 is in a STOP QUEUE state.
The output for PROC1 while it is executing shows a status of SP in the ST column,
which indicates that a thread is executing within a stored procedure:
-DISPLAY THREAD(*)
The output for PROC2, while it is queued, shows a status of SW in the ST column,
which indicates that a thread is waiting for a stored procedure to be scheduled:
-DISPLAY THREAD(*)
Example 6: This example shows the detail report for a DB2 client that uses TCP/IP
to access a remote DRDA server.
-DISPLAY THREAD(*) LOCATION(*)
Example 7: This example shows the detail report for a DB2 server that is accessed
by a DRDA client using TCP/IP.
DISPLAY THREAD(*) LOCATION(*)
Example 8: This example shows information about units of work whose back-out
processing has been postponed.
-DISPLAY THREAD (*) TYPE (POSTPONED)
Example 9: This example shows the token for a thread that is executing a
user-defined function. The token is 18.
-DISPLAY THREAD(*) DETAIL
Example 10: This example shows information about a thread that is involved in an
RRS unit of recovery.
-DISPLAY THREAD(*) RRSURID(*)
Example 11: This example shows information about a thread where DB2 is the
coordinator for an indoubt RRS unit of recovery. DB2 has committed the thread but
has not been able to resolve the RRS UR with RRS.
-DISPLAY THREAD(*) TYPE(I) RRSURID(*)
| Example 12: This example shows the XID for an active thread that is associated
| with an XA transaction manager:
| -DISPLAY THREAD(*) DETAIL
An additional option to this command and additional values for a few options of this
command are not described here. They are intended for service and use under the
direction of IBM support personnel. For details, see DB2 Diagnosis Guide and
Reference.
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
| Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v DISPLAY privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
*
DISPLAY TRACE ( )
PERFM
ACCTG
STAT
AUDIT
MONITOR
destination block constraint block DETAIL(output-type)
|
COMMENT(string) LOCAL
SCOPE ( GROUP )
destination block:
DEST( GTF )
SMF
SRV
OPn
constraint block:
* *
, ,
* *
, ,
*
,
LOCATION( location-name )
<luname>
nnn.nnn.nnn.nnn
Option descriptions
None of the options are required. The command DISPLAY TRACE lists all active
traces. Each option that is used, except TNO, limits the effect of the command to
active traces that were started using the same option, either explicitly or by default,
with exactly the same parameter values. For example, the following command lists
only the active traces that were started using the options PERFM and CLASS (1,2);
it does not list, for example, any trace started using CLASS(1).
-DISPLAY TRACE (PERFM) CLASS (1,2)
(*) Does not limit the list of traces. The default is (*).
The CLASS option cannot be used with DISPLAY TRACE (*).
Each of the following keywords limits the list to traces of the corresponding type.
For further descriptions of each type, see Chapter 73, “-START TRACE (DB2),” on
page 361.
Type (Abbrev) Description
PERFM (P) Performance records of specific events
ACCTG (A) Accounting records for each transaction
STAT (S) Statistical data
AUDIT (AU) Audit data
MONITOR (MON) Monitor data
DETAIL(output-type)
Limits the information that a trace displays based on the output type specified
within parentheses.
The possible values for output-type are:
1 Display summary trace information: TRACE NUMBER, TYPE, CLASS,
DEST
See Chapter 73, “-START TRACE (DB2),” on page 361 for a list of allowable
destinations for each trace type.
PLAN(plan-name, ...)
Limits the list to traces started for particular application plans. Up to eight plan
names can be used. If more than one name is used, only one value can be
used for AUTHID, TNO, and LOCATION. Do not use this option with STAT.
The default is PLAN(*), which does not limit the list.
AUTHID(authorization-id, ...)
Limits the list to traces started for particular authorization identifiers. Up to eight
identifiers can be used. If more than one identifier is used, only one value can
be used for PLAN, TNO, and LOCATION. Do not use this option with STAT.
The default is AUTHID(*), which does not limit the list.
CLASS(integer, ...)
Limits the list to traces started for particular classes. For descriptions of the
allowable classes, see Chapter 73, “-START TRACE (DB2),” on page 361.
The default is CLASS(*), which does not limit the list.
TNO(integer, ...)
Limits the list to particular traces, identified by their trace numbers (1 to 32, 01
to 09). Up to eight trace numbers can be used. If more than one number is
used, only one value each for PLAN, AUTHID, and LOCATION can be used.
The default is TNO(*), which does not limit the list.
LOCATION(location-name, ...)
Limits the list to traces started for threads that have a distributed relationship
with the specified location.
(location-name)
The location names that you supply are the 1- to 16-character identifiers
assigned to the DB2 subsystem whose traces you want to display. Supplying an
* as the location name indicates that the trace display must include all traces
started with any location name qualifier.
You can specify up to eight location names. If you specify more than one
location name, you can only specify one value each for PLAN, AUTHID, and
TNO.
LOCATION cannot be specified when you choose a statistics trace.
Requesters other than DB2 UDB for z/OS: DB2 does not receive a location
name from requesters that are not DB2 for z/OS subsystems. To display
information about a requester that is not a DB2 UDB for z/OS subsystem, enter
its LU name, enclosed in the less-than (<) and greater-than (>) symbols. For
example, the following command displays information about a remote location
with the LU name of LULA:
-DISPLAY TRACE (*) LOCATION (<LULA>)
DB2 uses the < LU name> notation in messages displaying information about
requesters that are not DB2 UDB for z/OS subsystems.
Examples
Example 1: List all traces that have the generalized trace facility as their only
destination.
-DISPLAY TRACE (*) DEST (GTF)
Example 2: List the trace started for Example 2 of the START TRACE command,
which is shown on page 202.
-DISPLAY TRACE (ACCTG) PLAN (DSN8BC81)
COMMENT (’ACCTG TRACE FOR DSN8BC81’)
Example 4: List all active audit traces for threads that are connected to the DB2
subsystem with location name USIBMSTODB23.
-DISPLAY TRACE (AUDIT) LOCATION (USIBMSTODB23)
Example 5: Output from the DISPLAY TRACE command is a set of messages that
look similar to the following messages:
- 10.26.34 -DISPLAY TRACE
- 10.26.34 STC 21 DSNW127I - CURRENT TRACE ACTIVITY IS -
- TNO TYPE CLASS DEST QUAL
- 01 STAT 01 SMF NO
- 02 ACCTG 01 SMF YES
- 03 PERFM 01,02,03 GTF YES
- 04 AUDIT 01,02,03,04, SMF YES
- 04 06,07
- 05 MON 01,02,03 OP1 NO
- *********END OF DISPLAY TRACE SUMMARY DATA*********
- 10.26.34 STC 21 DSN9022I - DSNWVCM1 ’-DISPLAY TRACE’ NORMAL COMPLETION
The output from the command consists of informational messages only. One set of
messages is returned for each job identified by the command. For utility jobs in a
data sharing group, the output shows the member name of the system on which
each utility job is running.
The status from the display represents the current status, except in a data sharing
group when the utility is running on a member other than the one from which the
command is issued. In that case, the status is current as of the last checkpoint.
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Data sharing scope: Group or member, depending on which option you choose
Authorization
None is required.
Syntax
,
MEMBER( member-name )
Option descriptions
Use at least one of the following options but do not use the same option more than
once.
(utility-id)
Identifies a single job by its utility identifier, the value given for the UID
parameter when the job was created.
If utility-id was created by the DSNU CLIST by default, it has the form of
tso-userid.control-file-name. For a list of values for control-file-name, see the
description of the UID parameter for the DSNU command procedure (CLIST) in
DB2 Utility Guide and Reference.
If utility-id was omitted when the utility job was created, utility-id has the form
userid.jobname.
(partial-utility-id*)
Identifies a set of utility jobs. A status message is shown for each utility
identifier that begins with the characters of partial-utility-id.
For example, -DISPLAY UTILITY(ABCD*) shows the status of every utility job
known to DB2 whose identifier begins with the characters ABCD.
(*) Shows the status of all utility jobs known to DB2, including jobs currently
running in a data sharing group.
MEMBER (member-name, ...)
Restricts the display for the identified utility jobs to specific members of the data
sharing group. The default is to display utility jobs running on any member. In a
non-data-sharing environment, the option is ignored.
One set of messages is returned for each job identified by the command.
Usage notes
DISPLAY status: The status displayed in the returned message is the status at the
time the DB2 utility function received the command. Execution has proceeded,
therefore the current state of the utility can be different from the state reported. For
instance, the DISPLAY UTILITY command can indicate that a particular utility
identifier is active, but, when the message is received by the requester, the utility
job step could have terminated so that the utility identifier is no longer known to
DB2.
Output
The output from the DISPLAY UTILITY command consists of informational
messages only.
LONGLOG
Indicates either CONTINUE, TERM, or DRAIN according to the most
recently specified value of LONGLOG.
DELAY
Indicates the number of seconds according to the most recently specified
value of DELAY.
Output during LOG phase of REORG with SHRLEVEL CHANGE: During the
LOG phase of REORG with SHRLEVEL CHANGE, the output of DISPLAY UTILITY
now includes the additional information found in message DSNU383I, as shown in
“Example 4” on page 206.
CURRENT ITERATION NUMBER
Indicates the current iteration number.
WRITE ACCESS ALLOWED IN CURRENT ITERATION
Indicates “YES” or “NO” according to whether write access is allowed in the
current iteration of log processing.
ITERATION BEFORE PREVIOUS ITERATION
Indicates the ELAPSED TIME so far, and the NUMBER OF LOG
RECORDS PROCESSED in the iteration. Their value is zero if the current
iteration number is one or two.
PREVIOUS ITERATION
Indicates the ELAPSED TIME and the NUMBER OF LOG RECORDS
PROCESSED for the previous iteration. Their value is zero if the current
iteration number is one.
CURRENT ITERATION:
Indicates the ESTIMATED ELAPSED TIME, the ACTUAL ELAPSED TIME
SO FAR and the ACTUAL NUMBER OF LOG RECORDS BEING
PROCESSED.
CURRENT ESTIMATE FOR NEXT ITERATION
For the next iteration, indicates the currently ELAPSED TIME and the
currently estimated NUMBER OF LOG RECORDS TO BE PROCESSED.
Examples
Example 1: Display status information for all utility jobs currently known to DB2.
-DISPLAY UTILITY (*)
Example 2: Display the status of utilities jobs on all members of the data sharing
group.
-DB1G DISPLAY UTILITY (*)
The following output, which shows utility jobs on members DB1G and DB2G, is
generated:
DSNU100I -DB1G DSNUGDIS USER = SAMPID
MEMBER = DB1G
UTILID = RUNTS
PROCESSING UTILITY STATEMENT 1
UTILITY = RUNSTATS
PHASE = RUNSTATS COUNT = 0
STATUS = STOPPED
DSNU100I -DB1G DSNUGDIS USER = SAMPID
MEMBER = DB2G
UTILID = CHKIX1
PROCESSING UTILITY STATEMENT 8
UTILITY = CHECK
PHASE = UNLOAD COUNT = 0
STATUS = STOPPED
DSN9022I -DB1G DSNUGCC ’-DB1G DISPLAY UTILITY’ NORMAL COMPLETION
Example 4: This shows output from the following DISPLAY UTILITY command:
-DB1G DISPLAY UTILITY(*)
DSNU105I -DB1G DSNUGDIS - USERID = SYSADM 973
MEMBER = DB1G
UTILID = REORGCP
PROCESSING UTILITY STATEMENT 1
UTILITY = REORG
PHASE = LOG COUNT = 0
STATUS = ACTIVE
DSNU347I -DB1G DSNUGDIS - 974
DEADLINE = NONE
DSNU384I -DB1G DSNUGDIS - 975
MAXRO = DEFER
LONGLOG = CONTINUE
DELAY = 1200 SECONDS
DSNU383I -DB1G DSNUGDIS - CURRENT ITERATION NUMBER = 4 976
WRITE ACCESS ALLOWED IN THIS ITERATION = YES
ITERATION BEFORE PREVIOUS ITERATION:
ELAPSED TIME = 00:00:00
NUMBER OF LOG RECORDS PROCESSED = 0
PREVIOUS ITERATION:
ELAPSED TIME = 00:00:00
NUMBER OF LOG RECORDS PROCESSED = 0
CURRENT ITERATION:
ESTIMATED ELAPSED TIME = 00:00:00
ACTUAL ELAPSED TIME SO FAR = 00:00:00
ACTUAL NUMBER OF LOG RECORDS BEING PROCESSED = 0
CURRENT ESTIMATE FOR NEXT ITERATION:
During a DSN session, you can enter DB2 commands or comments. DB2
commands must start with a hyphen (-). Comments must start with an asterisk (*).
During a DSN session, you can also issue TSO commands, except for FREE, RUN,
TEST, and TIME. To use TSO TEST to debug an application program, run it with
the DSN command; for example:
TEST ’prefix.SDSNLOAD(DSN)’ CP
The ABEND subcommand is used for diagnostic purposes only, and is intended to
be used only under the direction of IBM Software Support. Use it only when
diagnosing a problem with DSN or DB2. Percent commands are not recognized
during a DSN session, they are only supported by the TSO command processor.
Environment
A DSN session runs under TSO in either foreground or background mode. When
you run it in background mode, you are not prompted for corrections or additional
required information.
You can also start a DSN session from a CLIST running in either foreground or
background mode.
Authorization
None is required for the DSN command, but authorization is required for most
subcommands.
Syntax
DSN
DSN 0
SYSTEM( subsystem-name ) RETRY( integer )
group-attachment-name
TEST(integer) YES
GROUP( )
NO
Option descriptions
None of the following options are required.
SYSTEM
(subsystem-name)
Specifies the name of the DB2 subsystem.
(group-attachment-name)
Specifies the group attachment name of the data sharing group.
Usage notes
Beginning a DSN session: Issue the DSN command to begin a DSN session,
which allows you to enter DSN subcommands. The following rules govern the
session:
v In foreground operation, you are prompted for input by the prompt string DSN at
the terminal. In background mode, your input is read from the SYSTSIN data set.
v Except for delimited table names in the DCLGEN command, input in lowercase
letters is changed to uppercase.
v If duplicate keywords of any subcommand are specified, only the last of these
keywords is processed. For example, if both MEMBER(dbrm-member-name1)
and MEMBER(dbrm-member-name2) are specified with BIND PLAN, DB2
receives only the latter, MEMBER(dbrm-member-name2).
v If ATTENTION (PA1) is pressed during a DSN session, and PROMPT is specified
in the TSO user profile, message DSNE005 appears: EXECUTION IS
INTERRUPTED, ENTER C TO CANCEL, OR ANY OTHER REPLY TO RESUME THE
subcommand SUBCOMMAND.
If you enter C, the current subcommand is canceled and the current DB2
connection terminates; a new one is established, and another DSN prompt
appears. Any other reply, except ATTENTION, causes the current subcommand
to continue from the point at which it was interrupted.
If a DSN session is started from a CLIST, or a CLIST is executed under DSN,
CONTROL PROMPT must be specified in the CLIST in order to receive message
DSNE005.
v After a command is processed during a DSN session, you are prompted for
input. That cycle continues until you end the session.
v You can end the session by doing one of the following:
– Issue the END subcommand. Control is passed to TSO.
– Press ATTENTION and respond to the message by pressing ATTENTION
again.
– Issue another DSN command. The old session ends and a new one begins.
DSN return code processing: At the end of a DSN session, register 15 contains
the highest value used by any DSN subcommand in the session or by any program
run using the RUN subcommand. Your run-time environment might format that
value as a return code. The value does not, however, originate in DSN.
Examples
Example 1: Start a DSN session. If the attempt to connect to DB2 fails, up to five
retries (at 30 second intervals) will be made.
DSN SYSTEM (DB2) RETRY (5)
Example 2: Start a DSN session, run a program, and then end the session and
return to TSO.
TSO prompt : READY
USER enters: DSN SYS (SSTR)
DSN prompt : DSN
USER enters: RUN PROGRAM (MYPROG)
DSN prompt : DSN
USER enters: END
TSO prompt : READY
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires the appropriate level of CICS authority, as described in the
appropriate CICS Transaction Server for z/OS CICS-RACF Security Guide or CICS
Transaction Server for z/OS Operations and Utilities Guide.
Entering the DSNC command requires no privileges from DB2 security. For a
description of the privileges required to issue a DB2 command using the DSNC
command, see the command’s description.
Syntax
DSNC db2-command
destination
Option descriptions
destination
Identifies another terminal to receive display information. It must be a valid
terminal that is defined to CICS and supported by CICS basic mapping support
(BMS).
db2-command
Specifies the exact DB2 command that you want to enter from a CICS terminal.
It must be preceded by a hyphen.
Usage note
Screen scrolling: The CICS SIT table keyword SKRxxxx can be used to support
the scrolling of DSNC DB2 commands from your terminal. For further information
regarding the SIT keywords and parameters, see CICS Transaction Server for z/OS
System Definition Guide.
Example
Example: Issue the DB2 command DISPLAY THREAD from a CICS terminal.
DSNC -DISPLAY THREAD
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
appropriate CICS Transaction Server for z/OS CICS-RACF Security Guide.
Syntax
Option description
plan-name
Specifies a valid application plan.
Usage notes
Preventing creation of threads: The command DSNC DISCONNECT does not
prevent threads from being created on behalf of transactions. The command only
causes currently connected threads to be terminated as soon as they are not being
used by a transaction. To interrupt a transaction and cancel a thread faster, you can
use the DB2 command CANCEL THREAD. For details, see Chapter 16, “-CANCEL
THREAD (DB2),” on page 95.
You can stop the transactions associated with a particular plan ID in CICS with the
| MAXACTIVE setting for TRANCLASS. This prevents new instances of the
transaction from causing a re-creation of a thread.
Alternative for protected threads: You might want to deallocate a plan for
rebinding or for running a utility against the database. If you are using a protected
thread, use DSNC MODIFY rather than DSNC DISCONNECT. Modify the THRDA
value of the plan to zero to send all the threads to the pool. The protected thread
will terminate on its own within 60 seconds and DISCONNECT is unnecessary.
Example
Disconnect active threads for PLAN1.
DSNC DISCONNECT PLAN1
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
CICS Transaction Server for z/OS CICS-RACF Security Guide or CICS Transaction
Server for z/OS Operations and Utilities Guide.
Syntax
Option descriptions
PLAN plan-name
Displays information about transactions by plan name.
plan-name is a valid plan name for which information is displayed.
Default: If you do not specify plan-name (or if you specify an asterisk, *),
| information is displayed for all active transactions.
TRANSACTION transaction-id
Displays information about transactions by transaction ID.
Abbreviation: TRAN
| transaction-id is a valid transaction ID for which information is displayed.
Default: If you do not specify a transaction ID, information is displayed for all
| active transactions.
STATISTICS
| Displays one line of the statistical counters that are associated with each
| DB2ENTRY. The counters correspond to the usage of the available connections
of the CICS attachment facility to DB2.
Abbreviation: STAT
If you issue this command from CICS while the CICS attachment facility is
active but the DB2 subsystem is not, CICS produces a statistics display with no
obvious indication that the DB2 subsystem is not operational. Message
| DFHDB2037 appears in the CICS message log to indicate that the attachment
facility is waiting for DB2 to start.
For a description of the output produced by this parameter, see Part 4 (Volume
1) of DB2 Administration Guide.
destination
Specifies the identifier of another terminal that is to receive the requested
display information. It must be a valid terminal that is defined to CICS and
supported by CICS basic mapping support (BMS).
Usage notes
Entering parameters: Because the optional destination is sometimes preceded by
an optional plan name or transaction ID in the command, each parameter must be
unique and separately identifiable as either a name or a terminal identifier. If only
one parameter is entered, it is first checked to see whether it is a plan name or a
transaction ID, and it is then checked as a destination. To use a character string
that is both a plan name or transaction ID and also a valid terminal identifier, you
must use both the name and destination parameters to display the desired
information at the desired terminal.
Output
| For each created thread, the output for the DSNC DISPLAY (PLAN or
| TRANSACTION) command, as seen in ″Example 2,″ on page on page 220,
| displays the following information:
| DB2ENTRY The name of the DB2ENTRY, *POOL for the pool, or *COMMAND
| for DSNC command calls.
| S The status field. A status of A indicates the thread is active within a
| unit of work. A status of I indicates that a protected thread is waiting
| for work.
| PLAN The plan that is associated with the thread. Command threads have
| no plan.
| PRI –AUTH The primary authorization ID for the thread.
| SEC –AUTH The secondary authorization ID (if any) for the thread.
| CORRELATION
| The 12-byte thread correlation ID in the form of eeeettttnnnn, where
| eeee is either COMD, POOL, or ENTR, indicating a command,
| pool, or DB2ENTRY thread; tttt is the transaction ID; nnnn is a
| unique number.
| If the thread is active within a unit of work, its CICS transaction name (TRAN), task
| number (TASK), and CICS local unit of work ID (UOW-ID) are also displayed.
Examples
| Example 1: This command displays information about all active threads. The
display information is to be sent to another terminal designated as MTO2.
DSNC DISP PLAN * MTO2
| Example 2: This example shows the output for the DSNC DISPLAY (PLAN or
| TRANSACTION) command.
| DFHDB2013 07/09/98 15:26:47 IYK4Z2G1 DISPLAY REPORT FOLLOWS FOR THREADS
| ACCESSING DB2 DB3A
|
| DB2ENTRY S PLAN PRI-AUTH SEC-AUTH CORRELATION TRAN TASK UOW-ID
| *POOL A TESTC05 JTILLI1 POOLXC050001 XC05 01208 AEEEC03-1ACDCE00
| XC06 A TESTC06 JTILLI1 ENTRXC060003 XC06 01215 AEEEC04-2F8EFE01
| XP05 A TESTP05 JTILLI1 ENTRXP050002 XP05 01209 AEEEC03-35230C00
| XP05 I TESTP05 JTILLI1 ENTRXP050004
| DFHDB2020 07/09/98 15:26:47 IYK4Z2G1 THE DISPLAY COMMAND IS COMPLETE.
Example 3: This command displays statistical counters that are associated with
| DB2ENTRY.
DSNC DISP STAT
Example 4: This example shows the output for the DSNC DISPLAY STATISTICS
command:
| DFHDB2014 07/09/98 14:35:45 IYK4Z2G1 STATISTICS REPORT FOLLOWS
| -----COMMITS-----
| DB2ENTRY PLAN CALLS AUTHS W/P HIGH ABORTS 1-PHASE 2-PHASE
| *COMMAND 1 1 1 1 0 0 0
| *POOL POOL 0 0 0 0 0 0 0
| XC01 DSNXC01 22 1 11 2 0 7 5
| XC02 DSNXC02 0 0 0 0 0 0 0
| XA81 DSNA81 0 0 0 0 0 0 0
| XCD4 DSNCED4 0 0 0 0 0 0 0
| XP03 DSNTP03 1 1 0 1 0 1 0
| XA20 DSNTA20 1 1 0 1 0 0 1
| XA88 ******** 0 0 0 0 0 0 0
| DFHDB2020 07/09/98 15:45:27 IYKA4z2G1 THE DISPLAY COMMAND IS COMPLETE
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
appropriate CICS Transaction Server for z/OS CICS-RACF Security Guide or CICS
Transaction Server for z/OS Operations and Utilities Guide.
Syntax
Option descriptions
DESTINATION
| Specifies that the MSGQUEUE parameter of the DB2CONN is to be changed,
replacing the old destination ID with the new destination ID.
Abbreviation: DEST
old
| Specifies any destination ID that is currently active in the MSGQUEUE of
| the DB2CONN.
new
Specifies a new destination identifier. CICS verifies the new destination to
ensure that it is an existing transient data entry in the destination control
table.
TRANSACTION
Specifies that the maximum active thread value that is associated with the
specified transaction or group is to be modified.
Abbreviation: TRAN
transaction-id
Specifies a valid transaction identifier.
Usage notes
Protected threads: If you increase the active thread value by using the command
| DSNC MODIFY TRANSACTION, the attributes of the DB2ENTRY are used.
Issuing DSNC MODIFY TRANSACTION to increase the total number of threads that
are permitted allows creation of unprotected threads. For example, assume
| PROTECTNUM(2) and THREADLIM(2). If the total number of permitted threads
increases, the additional threads are unprotected.
The command DSNC MODIFY TRANSACTION can also allow creation of protected
| threads. If PROTECTNUM(2) and THREADLIM(2) and you modify the thread limit
| to 1, one of the protected threads is eliminated. If the thread limit is then modified
| back to 2, the thread that is re-created is protected.
Examples
| Example 1: Change the specification of the MSGQUEUE parameter in the
| DB2CONN from MTO1 to MTO2.
DSNC MODIFY DESTINATION MTO1 MTO2
| Example 4: Change the thread limit of the DB2ENTRY that is used by the
| transaction XP05 to 8.
| DSNC MODIFY TRANSACTION XP05 8
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
appropriate CICS Transaction Server for z/OS CICS-RACF Security Guide or CICS
Transaction Server for z/OS Operations and Utilities Guide.
Syntax
QUIESCE
DSNC STOP FORCE
Option descriptions
QUIESCE
Specifies that the CICS attachment facility is to be stopped after CICS
transactions that are currently running terminate.
Abbreviation: Q
FORCE
Specifies that the CICS attachment facility is to be stopped immediately by
forcing disconnection with DB2, regardless of any transactions that are running.
Usage notes
Requirements for restarting: Using FORCE can leave threads in an indoubt
situation. Restarting requires reconnection of CICS and DB2 to resolve any indoubt
situations. In a data sharing environment, resolution of indoubt situations requires
that the CICS be reconnected to the same DB2 member.
Output destinations: Output from the command DSNC STOP is sent to the
| requesting terminal, which remains locked until shutdown is complete.
Example
Stop the CICS attachment facility.
DSNC STOP FORCE
Environment
This command can be issued only from a CICS terminal.
Authorization
This command requires an appropriate level of CICS authority, as described in the
appropriate CICS Transaction Server for z/OS CICS-RACF Security Guide or CICS
Transaction Server for z/OS Operations and Utilities Guide.
Syntax
|
| DSNC STRT
ssid
|
Option description
ssid
| Specifies the subsystem ID (SSID) that is to override the ID that is specified in
| the CICS DB2CONN.
| Default: The DB2ID that is specified in the last installed DB2CONN. If the
| DB2CONN contains a blank DB2ID, the default is the SSID that is specified in
| the CICS INTIPARM parameter.
Usage note
Output destinations: Output from the DSNC START command is sent to the
| requesting terminal. If no DB2CONN is installed when you issue DSNC STRT, error
| message DFHDB2031 is sent to the terminal.
Examples
| Example 1: Start the CICS attachment facility.
| DSNC STRT
| Example 2: Start the CICS attachment facility. Override the SSID that is specified
| in the DB2CONN with DB2P.
| DSNC STRT DB2P
DSNH processing is a sequential process that can include any of the actions listed
in Table 19 referred to by the two-letter step name:
Table 19. DSNH actions and the corresponding step names
For invoking the... Use step name
PL/I macro processor MP
DB2 precompiler PC
CICS command language translator TR
DSN BIND PLAN subcommand for binding a plan BI
DSN BIND PACKAGE subcommand for binding a package BP
Compiler or assembler for your program CO
A C compiler prelink utility for including compile-time parameters PL
Link-editor to produce an executable load module LE
DSN RUN subcommand to execute the program RU
Note: The step names are used in the heading of Table 21 on page 228.
Individual steps or a sequence of steps can be performed, and you can end the
process at any point you choose. Any steps in the process that are skipped must
have previously been completed successfully by DSNH. For guidance in preparing
an application program to run, refer to DB2 Application Programming and SQL
Guide. Refer to Table 1 on page 21 for a description of the DSN BIND
subcommands.
Environment
The DSNH CLIST can run in TSO foreground or in batch under the TSO terminal
monitor program. DB2I uses the DSNH CLIST on the precompiler panel to control
program preparation. You can pass DSNH parameters from DB2I panels on the
″Other options″ lines.
Authorization
See Chapter 13, “BIND PACKAGE (DSN),” on page 49 for a description of the
privileges necessary to bind a package.
See Chapter 14, “BIND PLAN (DSN),” on page 55 for a description of the privileges
necessary to bind a plan.
See Chapter 59, “RUN (DSN),” on page 311 for a description of the privileges
necessary to run a plan.
Syntax
DSNH INPUT(data-set-name)
clist-parameter
Notation of CLIST parameters for the BIND PLAN and BIND PACKAGE steps:
Many parameters of BIND PLAN and of BIND PACKAGE provide the same function
and are spelled alike. CLIST parameters for BIND PLAN and BIND PACKAGE are
differentiated from general parameters and from each other by prefixes. A
parameter name prefixed by the letter B applies to the BIND PLAN subcommand; a
parameter name prefixed by the letter P applies to BIND PACKAGE. Table 20
shows the possible variations for a single parameter name.
Table 20. DSNH CLIST prefixing rules
Parameter value Function or subcommand Example
parameter If no prefix is specified, the parameter applies to DBRMLIB
a single function or subcommand.
B/parameter The prefix B is used to indicate that this variation B/DBRMLIB
of the parameter applies only to the BIND PLAN
step.
P/parameter The prefix P is used to indicate that this variation P/DBRMLIB
of the parameter applies only to the BIND
PACKAGE step.
In Table 21, a prefix is separated from the DB2 parameter name by a slash (/).
Refer to Table 19 on page 227 for an explanation of the two-letter step names.
Table 21. Summary of DSNH CLIST parameters
OPTIONS MP PC TR BI BP CO PL LE RU
ACQUIRE Y *
P/ACTION Y Y
ASMLIB Y
ASMLOAD Y
P/BDMEM Y Y
P/BIND Y Y
The only parameter that is required on the DSNH statement is INPUT; the others
are optional. In Table 22:
v Parameter values must be enclosed between parentheses.
v Parameter values need not be enclosed between apostrophes, except in either of
the following cases:
– If the value is a list of tokens with separators, the value must be enclosed
between apostrophes.
– If the value is a data set name, your user identifier is added as a prefix. To
avoid the prefix, enclose the data set name between sets of three
apostrophes.
v Most parameter values that are data set names (dsname) cannot include
member names. Exceptions are noted in the parameter descriptions.
v Underlined values are defaults. Default names can be changed to names specific
to your site when DB2 is installed.
Table 22. General DSNH CLIST parameters
Parameter Value Comments
ASMLIB dsname Specifies a data set to be used as the standard MACLIB for High Level
Assembler.
LIST displays TSO commands after substitution for symbols and before
command execution.
DBRMLIB DEFAULT Specifies the partitioned data set, and an optional member name, that
dsname(member) contains the DBRM library and member name that is used during the DB2
NONE precompile step. Because you can specify individual DBRM member and
library names during each individual phase, you must use the DBRMLIB
parameter and associated prefixes to identify a specific phase.
DBRMLIB specifies the DBRM library and member that is defined on the
DBRMLIB DD statement during DB2 precompiler processing.
DEFAULT indicates that the same DBRM library data set that is defined for
the DB2 precompiler process (DBRMLIB(parameter)) is also used on the
LIBRARY(dsname) subcommand keyword. If the precompiler DBRMLIB is
not specified, the default generated DBRMLIB library that is based on the
INPUT data set name is used.
member is obtained from the data set member name that is specified on the
DSNH INPUT parameter or from the data set name as follows:
Given INPUT(outname.DBRM(dbrmmem)):
– outname.DBRM(dbrmmem) - If the member name is specified
– outname.DBRM(dbrm) - If no member name is specified
The default is the value of the DECIMAL POINT field, set on the DB2
APPLICATION PROGRAMMING DEFAULTS panel during installation.
DELIMIT DEFAULT Specifies the APOST or QUOTE precompiler option to indicate the string
APOST delimiter that is used within host language statements. DELIMIT is effective
QUOTE only for COBOL programs; APOST is forced for all other programs.
DEFAULT designates the value chosen during installation for the STRING
DELIMITER field on the APPLICATION PROGRAMMING DEFAULTS panel.
APOST specifies the apostrophe as the string delimiter for host language
statements.
QUOTE specifies a quotation mark as the string delimiter for host language
statements.
ENTRY entry-name Specifies the entry point that is assigned by the linkage editor.
The default depends on the host language and the value of RUN.
v For the PL/I language, the ENTRY value default is:
– NONE if the RUN value is CICS
– PLISTART for any other RUN value.
v For assembler language, the ENTRY value default is DLITASM if the
RUN value is IMS.
v For COBOL, the ENTRY value default is DLITCBL if the RUN value is
IMS.
v For any other language, the ENTRY value default is NONE (no specified
entry point) for any RUN value.
FLAG I Specifies the messages that you want to see. Use one of the following
C values to show messages of the corresponding types:
E I All informational, warning, error, and completion messages
W W Only warning, error, and completion messages
E Only error and completion messages
C Only completion messages
FORTLIB dsname Specifies the linkage editor include library that is to be used for Fortran
routines.
The default is the value of the LANGUAGE DEFAULT field, set on the DB2
APPLICATION PROGRAMMING DEFAULTS panel during installation.
IMSPRE prefix Specifies the prefix for RESLIB, which is used for routines that are to be
included by the linkage editor for IMS.
YES indicates that the linkage editor is to be executed. The DSNHLI entry
point from the precompiler is directed to the appropriate language interface
module that is specified by the RUN parameter.
The LLIB and LnLIB libraries are concatenated with the XLIB library and the
linkage editor include libraries for the specific host language. Object and
load module libraries must not be mixed in this concatenation.
The default plan name is the first of the following available choices defined
in the INPUT data set:
v DBRM member name
v Leftmost qualifier
This parameter can apply to IBMCOB that also has a prelink step. Whether
the prelink step applies to C or IBMCOB is determined by the choice of
values C, CPP, or IBMCOB for the HOST parameter.
Descriptions of the prelink process for C and IBMCOB are presented in their
respective language publications.
dsname specifies a data set that is to be used for the output. Do not
enclose dsname between apostrophes. The current user profile is prefixed to
dsname. The following suffixes are also added:
v SYSCPRT.LIST for PL/I macro listings (these listings are overwritten by
the compiler listings)
v PCLIST for precompiler listings
v CXLIST for CICS command translator listings
v LIST for compiler listings
The PRINT parameter is ignored for the compile step when HOST(CPP)
is specified.
v SYSOUT.PRELLIST for C prelink utility listings
v LINKLIST for link-edit listings
LEAVE sends output to the specified print data set. You can allocate the
print data set in one of the following ways:
v Dynamically
v In the JCL that is used to run the DSNH CLIST (if in batch mode)
v With the TSO ALLOCATE command (before running DSNH)
The default is 8.
LEAVE gets input from SYSIN if the only steps taken are LINK and RUN.
LEAVE gets input from FT05F001 if the language is Fortran. Do not use
LEAVE in any other case.
LEAVE sends output to SYSPRINT if the only steps taken are LINK and
RUN. LEAVE sends output to FT06F001 if the language is Fortran. Do not
use LEAVE in any other case.
The default, DB2, indicates that SQL statements are to be interpreted and
syntax is to be checked for use by DB2 UDB for z/OS. SQL(DB2) is the
recommended mode for DRDA access when the server is a DB2 subsystem.
ALL indicates that SQL statements are to be interpreted for use by database
management systems that are not DB2 UDB for z/OS. SQL syntax checking
is deferred until bind time so that the remote location can bind the resulting
DBRM. When SQL(ALL) is in effect, the precompiler issues an informational
message if SAA® reserved words are used as identifiers. SQL(ALL) is the
recommended mode if you have written your application to be executed in a
environment that is not DB2 UDB for z/OS.
This parameter is effective only for COBOL. For PL/I, Fortran, and
assembler language programs, the precompiler forces the APOSTSQL
option.
DEFAULT designates the value that is chosen during installation for the SQL
STRING DELIMITER field on the APPLICATION PROGRAMMING
DEFAULTS panel.
APOSTSQL specifies that the string delimiter is the apostrophe (') and the
escape character is the quotation mark (").
QUOTESQL specifies that the string delimiter is the quotation mark (") and
the escape character is the apostrophe (').
SQLFLAG IBM or SAA Specifies the standard that is to be used to check the syntax of SQL
STD or 86 statements. Deviations from the standard are flagged by informational
ssname messages that are written to the precompiler output listing.
qualifier
IBM or SAA specifies the use of the IBM SQL Version 2 syntax.
ssname specifies full semantics checking for catalog access using the
specified DB2 subsystem name. If ssname is not specified, only syntax
checking is performed.
dsname specifies a data set that is to be used for terminal output. Do not
enclose dsname between apostrophes. The following suffixes are added to
dsname:
v PCTERM for precompiler output
v LIST for compiler output
VERSION version-id Specifies the name of the version ID for the program and associated DBRM
AUTO during the DB2 precompile step.
AUTO specifies that the consistency token is used to generate the version
ID. If the consistency token is a timestamp, the timestamp is converted into
ISO character format and used as the version identifier.
The default in any other mode is the UADS unit name for the current TSO
user.
WSECSPAC integer Specifies the amount of secondary space to allocate for work data sets, in
the units given by SPACEUN.
Usage notes
CICS translator: Do not use CICS translator options in the source language for
assembler programs; pass the options to the translator with the CICSOPT option.
Several COBOL options require DD statements that are not provided by the DSNH
CLIST, as shown in Table 25.
Table 25. COBOL options that require additional DD statements
Option Statements required for...
CDECK SYSPUNCH
COUNT SYSCOUNT, SYSDBG, SYSDBOUT, SYSUT5, a debug file
DECK SYSPUNCH
DUMP SYSABEND, SYSDUMP, or SYSUDUMP
FDECK SYSPUNCH
FLOW SYSCOUNT, SYSDBG, SYSDBOUT, SYSUT5, a debug file
LVL SYSUT6
COBOL parameters: The BUF and SIZE parameters passed to the COBOL
compiler might need to be changed.
COPTION: Do not use the COPTION parameter to specify values for the
LINECOUNT, SOURCE, TERM, and XREF compiler options; use the DSNH
LINECOUNT, SOURCE, TERM, and XREF keywords.
Fortran and PL/I considerations: Variable-format input records are not supported.
Library limits: At most, eight bind libraries, four precompile libraries, four compile
libraries, and four link-edit libraries can exist.
Link-edit:
v DSNH cannot process programs that need additional link-edit control statements
and cannot link-edit programs that use the call attachment facility.
v You cannot use the NOLOAD and SYNTAX link-edit options.
NONE is a reserved word: NONE cannot be the name of an input or a load library,
or the value of the string passed with PARMS.
SQL host variables: You must explicitly define SQL host variables.
SYSPROC: If compilation is done, the SYSPROC data set must include the DB2
CLIST library.
WORKUNIT parameter: You must use the WORKUNIT parameter when running
the DSNH CLIST in batch mode. This insures that the temporary and intermediate
data sets are allocated to the correct devices.
Examples
Example 1: Precompile, bind, compile, link-edit, and run the COBOL program in
data set prefix.SDSNSAMP(DSN8BC4).
v The compiler load module is in SYS1.LINKLIB (IKFCBL00).
Example 2: Precompile, bind, compile, and link-edit the program in data set
prefix.SDSNSAMP.PLI(DSN8BP4).
v The program is written in PL/I; the macro pass is not needed.
v The PL/I compiler options MAP and LIST are to be used.
v Additional load modules to be included are in prefix.RUNLIB.LOAD and
prefix.SDSNSAMP.
v The PL/I optimizing compiler load module is in library SYS2.LINKLIB(IEL0AA).
v The DB2 subsystem identifier is SSTR.
v The load module is put into the data set prefix.RUNLIB.LOAD(DSN8BC4).
v Printed output is sent to the following data sets:
Output Data set
Precompiler listings prefix.PROG.PCLIST
Compiler listings prefix.PROG.LIST
Link-edit listings prefix.PROG.LINKLIST
v The plan name is DSN8BC81 for the bind and run.
v The DCLGEN data from prefix.SRCLIB.DATA is required for the precompile.
DSNH INPUT(’prefix.SDSNSAMP(DSN8BP4)’’) -
HOST(PLI) MACRO(NO) -
COPTION (’MAP LIST’) -
LLIB(’prefix.RUNLIB.LOAD’’) -
L2LIB(’prefix.SDSNSAMP’’) -
PLILOAD(’SYS2.LINKLIB(IEL0AA)’’) -
SYSTEM(SSTR) -
LOAD(’prefix.RUNLIB.LOAD’’) -
PRINT(PROG) -
PLAN(DSN8BC81) -
PLIB(’prefix.SRCLIB.DATA’’)
The COPTION parameters are enclosed between single apostrophes so that they
are passed by TSO as a single parameter. If a single token is being passed as a
parameter, no apostrophes are needed. That same rule applies to the PARMS and
CICSOPT parameters.
If a data set name is being passed as a parameter, and you want TSO to add your
user prefix, no apostrophes are needed. If the usual TSO prefixing and suffixing
must not be performed, the data set name must be enclosed between sets of three
apostrophes if the CLIST is executed implicitly, and sets of six apostrophes if the
CLIST is executed explicitly.
The user prefix for that example is prefix; if it had been SMITH, the listing data set
names would be as shown in the preceding example, except that SMITH would be
used as the first level qualifier. For example, the compiler listings would have gone
to SMITH.PROG.LIST.
Environment
This subcommand originates from a TSO input stream when DSN is running in
either background or foreground mode.
Authorization
None is required.
Syntax
END
Usage note
Ending the DSN session in batch or foreground: In batch, if END is not found in
the SYSIN stream, /* or // ends the DSN session. From the foreground, pressing
the ATTENTION key twice ends the DSN session.
Example
End the DSN session and return to TSO.
TSO prompt : READY
USER enters: DSN SYS (SSTR)
DSN prompt : DSN
USER enters: RUN PROGRAM (MYPROG)
DSN prompt : DSN
USER enters: END
TSO prompt : READY
The FREE PACKAGE subcommand deletes corresponding table entries from the
catalog tables. Authorization for a package name is removed only when no more
versions of the package exist. After a version of a package has been freed, that
package name is then available for use in a BIND PACKAGE subcommand to
create a new package.
The FREE PACKAGE subcommand does not proceed until all currently running
applications using the package finish running.
Environment
You can enter this subcommand from DB2I, or from a DSN session under TSO that
is running in either foreground or background.
Authorization
To execute this subcommand, you must use a privilege set of the process that
includes one of the following privileges or authorities:
v Ownership of the package
v BINDAGENT privilege granted by the owner of the package
v SYSCTRL authority
v SYSADM authority
v PACKADM authority for the collection or for all collections
The BIND privilege on a package is not sufficient to allow a user to free a package.
Syntax
FREE PACKAGE
( collection-id . package-id )
location-name. * * .( )
version-id
*
*
I
FLAG( W )
E
C
Option descriptions
location-name
Specifies the location of the DBMS where the package is to be freed. The
location name must be defined in the SYSIBM.LOCATIONS table. If this table
does not exist or the DBMS is not found, you receive an error message. If the
location name is specified, the name of the local DB2 subsystem must be
defined. See Part 3 of DB2 Installation Guide for information on how to define a
location name within SYSIBM.LOCATIONS.
The default is the local DB2 subsystem if you omit location-name.
collection-id or (*)
Identifies the collection of the package to be freed. There is no default.
You can use an asterisk (*) to free all local packages with the specified
package-id in all the collections that you are authorized to free. (You cannot use
the * to free remote packages.)
package-id or (*)
Identifies the package to be freed. There is no default.
You can use an asterisk (*) to free all local packages in collection-id that you
are authorized to free. (You cannot use the * to free remote packages.)
version-id or (*)
Identifies the version of the package to be freed.
You can use an asterisk (*) to free all local packages in the collection-id and
package-id that you are authorized to free. (You cannot use the * to free remote
packages.)
If you specify () for version-id, the empty string is used for the version ID.
If you omit the version-id, the default depends on how you specify package-id. If
you use * for package-id, version-id defaults to *. If you provide an explicit value
for package-id, version-id defaults to an empty string.
DBRMs created before DB2 Version 2 Release 3 use an empty string for
version-id by default.
(*)
Frees all local DB2 packages that you are authorized to free.
Specifying (*) is equivalent to specifying the package name as (*.*.(*)) or (*.*).
FLAG
Indicates what messages you want the system to display. Use one of the
following values to show messages of the corresponding types.
(I) All: informational, warning, error, and completion messages.
(W) Only warning, error, and completion messages.
(E) Only error and completion messages.
(C) Only completion messages.
Usage notes
Freeing multiple packages: If you free multiple packages with this subcommand,
each successful free is committed before freeing the next package.
Freeing trigger packages: You cannot free a trigger package using the FREE
PACKAGE subcommand.
For more information about dropping triggers, see Chapter 5 of DB2 SQL
Reference.
Examples
Example 1: Free version newver of the package TEST.DSN8BC81 located at
USIBMSTODB22. Generate only warning, error, and completion messages (not
informational messages).
FREE PACKAGE (USIBMSTODB22.TEST.DSN8BC81.(newver)) FLAG(W)
Example 2: Free all packages at the local server in the collection named
TESTCOLLECTION.
FREE PACKAGE (TESTCOLLECTION.*)
The FREE PLAN subcommand deletes corresponding table entries from the
SYSIBM.SYSPLAN catalog tables. All authorization against an application plan
name is dropped. The application plan name is then available for use in a BIND
PLAN subcommand to create a new package.
The FREE PLAN subcommand does not proceed until all currently executing
applications using that plan finish executing.
For additional information on plans, see Part 5 of DB2 Application Programming and
SQL Guide.
Environment
You can enter this subcommand from DB2I, or from a DSN session under TSO that
is running in either foreground or background.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v Ownership of the plan
v BIND privilege on the plan
v BINDAGENT privilege granted by the plan owner
v SYSCTRL authority
v SYSADM authority
Syntax
Option descriptions
(plan-name, ...)
Lists the names of one or more plans you want to free.
(*) Frees all application plans over which you have BIND authority. Be careful
when using this form of the command.
FLAG
Indicates what messages you want the system to display. Use one of the values
listed to show messages of the corresponding types.
(I) All: informational, warning, error, and completion messages.
(W) Only warning, error, and completion messages.
(E) Only error and completion messages.
(C) Only completion messages.
Usage notes
Freeing multiple plans: If you free multiple plans with this subcommand, each
successful free is committed before freeing the next plan.
If an error occurs on a certain plan specified explicitly in a list or implicitly with (*),
FREE PLAN terminates for that plan and continues with the next plan to be
processed.
Example
Free plan DSN8BC81 from DB2. Generate only warning, error, and completion
messages (not informational messages).
FREE PLAN (DSN8BC81) FLAG (W)
Abbreviation: F
Environment
This command can be issued only from a z/OS console.
Authorization
The command requires an appropriate level of operating system authority, as
described in z/OS MVS System Commands.
Syntax
DUMP
MODIFY irlmproc,ABEND,
NODUMP
Option descriptions
Parameters must be separated by commas with no spaces.
irlmproc
Specifies the procedure name of the IRLM that is to be terminated.
DUMP
Specifies that IRLM is to terminate abnormally with a U2020 abend. A system
dump is taken to the SYS1.DUMPxx data set. IRLM does not de-register from
ARM.
NODUMP
Specifies that IRLM is to FORCE the DBMS off and terminate normally without
generating a dump. All DBMS work is quiesced and IRLM stops itself.
| NODUMP requires that IRLM be functioning normally. Do not use this option if
| IRLM appears to be hung.
A second invocation causes IRLM to terminate abnormally with a U2020 abend;
no dump is taken.
Usage notes
Terminating IRLM: If any difficulties occur when terminating IRLM, see “Usage
note” on page 391
Deregistering IRLM: You can use the NODUMP option to deregister IRLM before
stopping it. This action prevents the automatic restart manager from immediately
trying to restart IRLM.
Example
Enter the following command on a z/OS system console:
F KRLM001,ABEND
The default is dump. If you do not want a dump, you must specify the following
command:
F KRLM001,ABEND,NODUMP
If IRLM detects a delay in the child-lock propagation process, it retries the XES
calls in order to recover. Use the MODIFY irlmproc, DIAG command under the
direction of IBM Software Support if this situation occurs.
Abbreviation: F
Environment
This command can be issued only from a z/OS console.
Authorization
The command requires an appropriate level of operating system authority, as
described in z/OS MVS System Commands.
Syntax
|
Option descriptions
Parameters must be separated by commas, with no spaces.
irlmproc
Specifies the procedure name of the IRLM instance that is to be diagnosed.
DIAG
Specifies that this is a diagnostic dump.
DELAY
Directs IRLM to generate a dump the first time it detects that child lock
propagation to the coupling facility is taking longer than 45 seconds. The dump
is placed in the SYS1.DUMPxx data set.
PLOCK
Directs IRLM to generate a dump the first time it detects that P-lock negotiation
is taking longer than two minutes. Dumps of the IRLM and DB2 address spaces
are placed in the SYS1.DUMPxx data set.
ALL
Directs IRLM to generate diagnostic dumps for IRLM or DBMS subsystems in a
data sharing group for the following unusual conditions:
© Copyright IBM Corp. 1983, 2004 265
MODIFY irlmproc,DIAG (z/OS IRLM)
Usage note
| The MODIFY irlmproc,DIAG command should be used only under the direction of
| IBM Software Support.
This command is active for only one incident per IRLM, that is, after an IRLM
instance detects the delay and initiates the dump. You can initiate one dump per
IRLM in the group. You must re-enter the command to initiate another dump. Be
aware that when you enter this command for one member of the data sharing
group, any member that detects the delay initiates a dump.
The irlmproc identifies the procedure name for IRLM. If multiple IRLM instances
exist in the same system, each procedure must have a unique name.
Example
Issue this command to initiate one diagnostic dump for the IR21PROC IRLM
subsystem. The dump occurs once, after the propagation of child locks takes longer
than 45 seconds.
MODIFY IR21PROC,DIAG,DELAY
Abbreviation: F
Environment
This command can be issued only from a z/OS console.
Authorization
The command requires an appropriate level of operating system authority, as
described in z/OS MVS System Commands.
Syntax
MODIFY irlmproc,PURGE,db2name
Option descriptions
Use commas with no spaces to separate parameters.
irlmproc
Specifies the IRLM that is to process the command.
db2name
Specifies the DB2 name, as displayed by the STATUS command.
Usage notes
DB2 subsystem inactive: The DB2 subsystem which owns the retained locks must
be inactive or else this command fails.
Example
Example: Enter the following command on a z/OS system console:
F IR21I,PURGE,DB2A
Abbreviation: F
Environment
This command can be issued only from a z/OS console.
| Data sharing scope: Group or Member, depending on whether you specify the
| DEADLOCK or LTE options.
Authorization
The command requires an appropriate level of operating system authority, as
described in z/OS MVS System Commands.
Syntax
Option descriptions
Use commas with no spaces to separate parameters.
irlmproc
Specifies the IRLM that is to process the command.
SET
| Sets the following values for this IRLM:
| DEADLOCK=nnnn
| Specifies the number, in milliseconds, indicating how often the local
| deadlock processing is scheduled. nnnn must be a number from 100
| through 5000 milliseconds. If a member of a sysplex group and all
| IRLMs are not enabled for subsecond deadlock processing, message
| DXR106E is issued.
| LTE=nnnn
| Specifies the number of lock table entries that are to be specified on
the next connect to the XCF lock structure. nnnn must be a number
from 0 through 1024, and it must be an even power of 2. Each
| increment in value represents 1 048 576 LTE entries. Note that this
parameter is used for data sharing only.
| PVT=nnnn
| Specifies the upper limit of private storage that is used for locks. nnnn
| must be a four digit number from 1 through 1800. You can specify this
| value in megabytes or gigabytes by specifying M (for megabytes) or G
| (for gigabytes) after the value, as follows, nnnnM or nnnnG. IRLM
| monitors the amount of private storage used for locks. If the specified
| limit is reached, new lock requests will be rejected unless they are
| must complete. If the specified value is out of range or if IRLM’s use
| of private storage is already larger than the specified value, the
| command is rejected with message DXR106E. No reserve for must
| complete locks is calculated from the specified PVT= value.
TIMEOUT=nnnn,subsystem-name
| Requests that IRLM dynamically set the timeout value, in seconds, for
the specified subsystem. nnnn must be a number from 1 through 3600.
subsystem-name is the DB2 subsystem name, as displayed by the
MODIFY irlmproc,STATUS command.
TRACE=nnn
Requests that IRLM dynamically set the maximum number of 64 KB
trace buffers per trace type to the value you specify in nnn. nnn must
be a number from 10 through 255. If you specify a value outside of this
range, IRLM automatically adjusts the value to a value within the range.
The default is 10.
This value is used only when the external CTRACE writer is not active.
The trace buffers are allocated from extended common storage area
(ECSA).
IRLM does not immediately acquire the number of trace buffers you set
using this command; IRLM allocates buffers as needed, not to exceed
the number of buffers you specify. If the number of trace buffers that
you set is less than the number of currently allocated buffers, IRLM
brings the number within your specified range by releasing the oldest
| buffers at the end of the next deadlock cycle.
Usage notes
Effect of an IRLM restart: The values you set using the MODIFY irlmproc,SET
command do not persist through a stop and restart of IRLM. The number of trace
buffers for each trace type returns to the default value of 10.
| Effect of the LTE parameter: If this IRLM is not connected to the group, but a
valid value is specified, a message is issued stating that the value is set, but the
value is not sent to any other member. If the member is already in the group, the
value is sent to the Global Deadlock Manager (GDM) for IRLM, to be broadcast to
all other members. If the GDM does not have the code applied, no response
message is issued on any member. If the GDM has the code, all members with the
applied code issue the response message as the command is processed. This
value is used if the IRLM is the first to join the data sharing group, causing structure
allocation, or the value is used during a REBUILD. If any IRLM joins later, it does
not have the updated value. If multiple MODIFY commands are issued on the same
or multiple IRLMs, some response messages might be missing. The last response
message that is issued identifies the value to be used on the next CONNECT.
| The number of lock table entries in the group is determined by the first IRLM to
| connect to the group during initial structure allocation or during REBUILD.
| If an attempt is made to use a nonzero value from either option number 1 or 2, and
that value is too large for the structure size that is returned on the QUERY, the
value from the next option in the sequence is used instead.
Examples
Example 1: Enter the following command on a z/OS system console:
F IR21PROC,SET,TRACE=20
| F IR21I,SET,DEADLOCK=1000
Abbreviation: F
Environment
This command can be issued only from a z/OS console.
Data sharing scope: Member or group, depending on which option you choose
Authorization
The command requires an appropriate level of z/OS authority, as described in z/OS
MVS System Commands.
Syntax
,irlmx
MODIFY irlmproc,STATUS
,ALLD
,ALLI
,MAINT
,STOR
,TRACE
Option descriptions
irlmproc
Specifies the IRLM that is to process the command.
irlmx
Specifies which IRLM’s status is to be displayed. irlmx is the concatenation of
the IRLM subsystem name and IRLM member ID as specified in the IRLM
startup procedure (DB2 installation panel DSNTIPI). An example is DJ2A2 (the
member ID is 2).
ALLD
Requests the DB2 subsystem name and status of a DB2 that is identified to an
IRLM. In a data sharing group, this command lists information about all DB2
subsystems that are currently identified to an IRLM, assuming that the IRLM on
which the command is issued is connected to the data sharing group. You can
determine if the IRLM is connected by issuing a MODIFY irlmproc,STATUS
command and checking that the output shows SCOPE=GLOBAL.
If a DB2 is down and holds retained locks, that DB2 is also displayed. However,
the IRLM that is displayed with that DB2 can vary depending on several
circumstances:
v Normally, it is the last IRLM to which the DB2 subsystem identified.
v If a rebuild of the lock structure occurred after the retained locks were
created, the IRLM with the lowest member ID at the time the rebuild occurred
is displayed.
v If a group restart is occurring and one DB2 subsystem is recovering on
behalf of another DB2 subsystem, the IRLM that is displayed is the one
associated with the DB2 subsystem doing the peer recovery. For example, if
DB1A is doing a peer recovery of DB2A, the display might show the following
information:
NAME STATUS ... IRLM_NAME
DB1A UP IRLA
DB2A DOWN IRLA
ALLI
Requests the IRLM subsystem name, ID, status, and service level. In a data
sharing group, this command lists information about all IRLM subsystems in the
data sharing group, assuming that the IRLM on which the command is issued is
connected to the data sharing group. You can determine if the IRLM is
connected by issuing a MODIFY irlmproc,STATUS command and checking that
the output shows SCOPE=GLOBAL.
If an IRLM is down, it is displayed only if its associated DB2 subsystem is down
and holds retained locks. The IRLM that is displayed can vary depending on
several circumstances:
v Normally, it is the last IRLM to which the DB2 subsystem identified.
v If a rebuild of the lock structure occurred after the retained locks were
created, the IRLM with the lowest member ID at the time the rebuild occurred
is displayed.
v If the failed DB2 subsystem had recovery done on its behalf by another DB2
subsystem, the IRLM that is displayed is the one associated with the DB2
subsystem that did the peer recovery.
MAINT
For this IRLM only, displays the maintenance levels of IRLM load module
CSECTS in a two-column format.
STOR
| For this IRLM only, displays the current and maximum allocation for CSA,
| ECSA, and private extended storage.
TRACE
Requests information about IRLM subcomponent trace types. Information
includes whether a subcomponent trace type is active, how many trace buffers
are used by the trace, and whether the component trace external writer is active
for the trace.
Usage notes
Messages: If irlmx is not specified, or if this IRLM is in a non-data-sharing
environment, message DXR101I is issued. That message lists each subsystem
connected to the IRLM specified by irlmx, with an indication as to whether the
connection is active.
Examples
Example 1: Enter on the z/OS system console:
MODIFY IRTPROC,STATUS
Explanation: The operator on the z/OS system has requested information about the
DB2 systems connected to the IRLM identified by the IRLM procedure named
IRTPROC.
If the IRLM is SCOPE=GLOBAL on the irlmproc and is not connected to any group,
the status message shows:
DXR101I IR21001 STATUS SCOPE=DISCON
Example 2: Assume that you have a data sharing group. Enter the following
command on a system console:
| MODIFY DB1GIRLM,STATUS,ALLD
| Explanation: The output shows all the DB2 subsystems that are connected to
| IRLMs in this data sharing group (the group to which the IRLM processing the
| request belongs). Other information includes:
| STATUS
| Indicates the status of the DB2 subsystem:
| UP The value UP in the STATUS field indicates that the DB2
| subsystem is active.
| DOWN The value DOWN in the STATUS field indicates that the
| DB2 subsystem is failed. All modify type locks held by this
| DB2 subsystem have been retained by IRLM. The DB2
| subsystem is known to be down only if it holds retained
| locks.
| SYSFAIL The value SYSFAIL in the STATUS field indicates that the
| IRLM that this DB2 subsystem is identified to is
| disconnected from the data sharing group. All modify type
| lock that are held by this DB2 subsystem are retained by
| IRLM. The DB2 subsystem is known to be SYSFAIL only if
| it holds retained locks.
| RET_LKS
| The number of retained locks that are owned by this DB2 subsystem.
| IRLMID
| The ID of the IRLM to which this DB2 subsystem is identified.
| IRLM_NAME
| The name of the IRLM to which this DB2 subsystem is identified.
| IRLM_LEVL
| The IRLM release and function level that this DB2 subsystem requested on
| the identify to IRLM. This is in the form of r.fff.
| Explanation: This output shows information similar to the output that is shown in
| example 1, but this command specifies a specific IRLM in the data sharing group.
Example 4: Again, assume data sharing is in effect. Enter the following command
on the system console:
| MODIFY DB1GIRLM,STATUS,ALLI
Explanation: The output shows the IRLMs that are participating in this data sharing
group (the group which includes the IRLM processing the request). Other
information includes:
STATUS
The value “UP” in the STATUS field indicates that the IRLM is active.
STATUS shows “DOWN” if the IRLM is failed. An IRLM is known to be
“DOWN” only if the DB2 subsystem that was identified to it holds retained
locks. This connection between a failed DB2 subsystem and IRLM is lost
after a REBUILD or a group restart.
LEVEL
| The current IRLM release and function level in the form of r.fff.
SERVICE
| The IRLM service or release that corresponds to the release and function
| level that is given in ″LEVEL″.
MIN_LEVEL
The minimum IRLM function level with which this IRLM can coexist.
MIN_SERVICE
The IRLM service or release that corresponds to the function level given in
″MIN-LEVEL.″
| Explanation: The output shows information only for the specified IRLM. The group
function level that is shown is the function level for the specified IRLM. Refer to
Example 3 on page 276 for additional information about interpreting output.
Explanation: The example shows that current storage allocated for IRLM is 1877
KB, and the greatest amount that has been allocated since the last time IRLM was
started is also 1877KB. The storage for the locking structures (RHB and RLB) is
contained within IRLM private storage. Use the following information to interpret the
display output:
PC Displays the current value for the PC option of the IRLM startup
procedure. For DB2 Version 8, this value will always be YES.
| PVT Displays the current amount of private storage that is used for locks
| (the above-the-bar storage total). The PVT value is 1737 MB in this
| example.
| LTE The number of lock table entries that were available in the coupling
| facility the last time this IRLM was connected to the group. Each
| unit consists of 1 048 576 entries. If LTE is less than one unit, the
| value will be zero.
| LTEW Displays the lock table entry width. The LTEW is 8 in this example.
| RLE The number of record table entries that were available in the
| coupling facility the last time this IRLM was connected to the group.
| RLEUSE The number of RLE that are in use in the coupling facility at the
| time you issue the MODIFY command. If the IRLM is disconnected
| from the CF, this number represents the RLE that were in use when
| the IRLM last updated prior to DISCONNECT.
Chapter 49. MODIFY irlmproc,STATUS (z/OS IRLM) 277
MODIFY irlmproc,STATUS (z/OS IRLM)
| CSA USE CSA USE is unused in DB2 Version 8 and is displayed for
| compatibility reasons only.
CUR Shows the total current CSA and ECSA usage. In this case, the
current usage (CUR) is 1877 KB, and the high water mark (HWM)
is also 1877 KB. The accountable storage is a subset of this total
storage.
ACCNT The ACCNT row of the report is a breakdown of lock control block
structures and their storage use.
T-1 Type one structures are for resources. In this case, it shows
that one storage segment is held for a total of 192 KB.
T-2 Type two structures are for all resource requests after the
first request for a specific resource. This example shows
that one storage segment is held for a total of 36 KB.
T-3 Type three structures are for requesters or work units that
are waiting for or hold resources. This example shows that
one storage segment is held for a total of 4 KB.
PROC and MISC rows
These rows contain usage information for private storage that is
used to process DBMS requests. Use this information under the
guidance of IBM Software Support for diagnosing problems.
For more information, see the explanation of message DXR100I in DB2 Messages
and Codes.
Explanation: This example shows that the storage currently allocated for IRLM
tracing is 256 KB, the maximum number of trace buffers allowed per trace type is
set to 10, and the external CTRACE writer is not active. For more information about
the trace types, see Chapter 85, “TRACE CT (z/OS IRLM),” on page 411.
Use the z/OS TRACE CT command, described in Chapter 85, “TRACE CT (z/OS
IRLM),” on page 411 to activate or deactivate traces. You cannot turn off the EXP
and INT traces. The XIT (for data sharing), EXP, and INT traces are automatically
activated when you start IRLM. All traces are automatically activated with
IRLMPROC TRACE=YES.
The trace size for each buffer is 64 KB. Use the MODIFY irlmproc,SET,TRACE=nnn
command on page 269 to change the maximum number of trace buffers.
Explanation: The output shows the maintenance levels of IRLM load module
CSECTS in a two-column format.
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Traces started by a IFI/IFC program: Before you modify an active trace, ensure
that an IFI application program or the IFC Selective Dump utility (DSN1SDMP) did
not start the trace. If you modify a trace started by DSN1SDMP, the DSN1SDMP
utility abnormally terminates. When DSN1SDMP terminates, it stops the trace. This
stop could interfere with the MODIFY TRACE command, which stops and restarts
the trace.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v TRACE privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
*
,
*
,
IFCID( ifcid_nbr )
COMMENT(string)
Option descriptions
TRACE
| Determines which IFCIDs are started. Table 26 lists each trace type, its
| abbreviation, and a brief description of each type. For more information about
each trace type, refer to Chapter 73, “-START TRACE (DB2),” on page 361.
Table 26. Trace types
Type Abbreviation Description
PERFM P Performance records of specific events
ACCTG A Accounting records for each transaction
STAT S Statistical data
AUDIT AU Audit data
MONITOR MON Monitor data
One additional trace type is not described here. It is intended for service and is
to be used under the direction of IBM Software Support. For details, see DB2
Diagnosis Guide and Reference.
CLASS(integer, ...)
Limits the list to IFCIDs started for specified classes.
Abbreviation: C
integer is a class to which the list of IFCIDs started is limited. For descriptions
of the allowable classes, see Chapter 73, “-START TRACE (DB2),” on page
361.
The default is CLASS(*), which starts all default IFCID classes.
TNO(integer)
Specifies the particular trace to be modified, identified by its trace number (1 to
32, 01 to 09). You can specify only one trace number. TNO is a required option
for the MODIFY TRACE command.
No default exists for the TNO keyword.
Example
Change trace number six so that it collects only statistics and accounting data. You
can define CLASS(30) at your site.
-MODIFY TRACE(S) IFCID(1,2,3) TNO(6) CLASS(30)
COMMENT (’STATS AND ACCOUNTING ON’)
REBIND PACKAGE is generally faster and more economical than BIND PACKAGE.
You should use BIND PACKAGE with the ACTION(REPLACE) option under the
following conditions:
v When you change the SQL statements
v When you recompile the program
v When you have previously run BIND PACKAGE with the
SQLERROR(CONTINUE) option
For more information about using REBIND PACKAGE, see Part 5 of DB2
Application Programming and SQL Guide.
Environment
You can use REBIND PACKAGE through DB2I, or enter the REBIND PACKAGE
subcommand from a DSN session running in foreground or background.
Authorization
The package owner must have authorization to execute all SQL statements
embedded in the package for REBIND PACKAGE to build a package without
producing error messages. For VALIDATE(BIND), DB2 verifies the authorization at
bind time. For VALIDATE(RUN), DB2 verifies the authorization initially at bind time,
but if the authorization check fails, DB2 rechecks it at run time.
For additional information about the authorization required to execute BIND PLAN,
see Part 5 (Volume 2) of DB2 Administration Guide.
Syntax
REBIND PACKAGE
( . collection-id . package-id . )
location-name * * ( )
version-id
*
*
OWNER(authorization-id) QUALIFIER(qualifier-name) CURRENTDATA( YES )
NO
DBPROTOCOL( DRDA ) DEFER(PREPARE) DEGREE( 1 )
PRIVATE NODEFER(PREPARE) ANY
DYNAMICRULES( RUN ) ENCODING( ASCII ) EXPLAIN( YES )
BIND EBCDIC NO
DEFINE UNICODE
INVOKE ccsid
I IMMEDWRITE( NO ) ISOLATION( RR ) NO
FLAG( W ) YES RS KEEPDYNAMIC( YES )
E CS
C UR
NC
|
(1) OPTHINT(’hint-id’) ,
NONE
(2) PATH( schema-name )
REOPT( ALWAYS ) USER
ONCE
(3) RELEASE( COMMIT ) VALIDATE( RUN )
PATHDEFAULT DEALLOCATE BIND
Notes:
1 NOREOPT(VARS) can be specified as a synonym of REOPT(NONE)
2 REOPT(VARS) can be specified as a synonym of REOPT(ALWAYS)
3 The PATHDEFAULT keyword is mutually exclusive with the PATH keyword.
Do not specify both keywords in the same REBIND command.
enable-block:
,
ENABLE ( BATCH )
DISABLE DLIBATCH ,
DB2CALL
CICS DLIBATCH( connection-name )
IMS ,
IMSBMP
IMSMPP CICS( applid )
REMOTE ,
RRSAF
ENABLE(*) IMSBMP( imsid )
,
IMSMPP( imsid )
,
REMOTE( location-name )
<luname>
Option descriptions
For descriptions of the options shown in the syntax diagram, refer to Chapter 15,
“BIND and REBIND options,” on page 61.
Usage note
If you rebind multiple packages, DB2 commits each successful rebind before
rebinding the next package.
Example
Rebind packages TEST.DSN8BC81.(MAY_VERSION) and
PRODUCTION.DSN8BC81.(DEC_VERSION), both of which are located at the local
location USIBMSTODB22. The packages can run only from the CICS or the
DLIBATCH environments if the connection ID is CON2. This replaces the CON1
that is specified on the BIND PACKAGE command.
REBIND PACKAGE (USIBMSTODB22.TEST.DSN8BC81.(MAY_VERSION),
USIBMSTODB22.PRODUCTION.DSN8BC81.(DEC_VERSION)) -
ENABLE (CICS,DLIBATCH) CICS (CON2)
REBIND PLAN is generally faster and more economical than BIND PLAN. But if
you change the SQL statements or recompile a program, you should use BIND
PLAN with the option ACTION(REPLACE).
For more information about using REBIND PLAN, refer to Part 5 of DB2 Application
Programming and SQL Guide.
Environment
You can use REBIND PLAN through DB2I, or enter the REBIND PLAN
subcommand from a DSN session running in foreground or background.
Authorization
The plan owner must have authorization to execute all SQL statements embedded
in the plan for REBIND PLAN to build a plan without producing error messages. For
VALIDATE(BIND), DB2 verifies the authorization at bind time. For VALIDATE(RUN),
DB2 initially verifies the authorization at bind time, but if the authorization check
fails, DB2 rechecks it again at run time. If you use the PKLIST keyword, you must
have EXECUTE authority for the packages or collections specified on PKLIST.
Syntax
NODEFER(PREPARE) ACQUIRE( USE ) CACHESIZE(decimal-value) CURRENTDATA( NO )
DEFER(PREPARE) ALLOCATE YES
CURRENTSERVER(location-name) DBPROTOCOL( DRDA ) DEGREE( 1 ) DISCONNECT( EXPLICIT )
PRIVATE ANY AUTOMATIC
CONDITIONAL
DYNAMICRULES( RUN ) ENCODING( ASCII ) EXPLAIN( NO ) I
BIND EBCDIC YES FLAG( W )
UNICODE E
ccsid C
|
IMMEDWRITE( NO ) ISOLATION( RR ) NO NONE (1)
YES RS KEEPDYNAMIC( YES ) REOPT( ALWAYS (2) )
CS ONCE
UR
OPTHINT(’hint-id’) , PATHDEFAULT (3) RELEASE( COMMIT )
DEALLOCATE
PATH( schema-name )
USER
SQLRULES( DB2 ) VALIDATE( RUN )
STD BIND
Notes:
1. REOPT(VARS) can be specified as a synonym of REOPT(ALWAYS)
2. NOREOPT(VARS) can be specified as a synonym of REOPT(NONE)
3. The PATHDEFAULT keyword is mutually exclusive with the PATH keyword. Do
not specify both keywords in the same REBIND command.
enable-block:
,
ENABLE ( BATCH )
DISABLE DLIBATCH ,
DB2CALL
CICS DLIBATCH( connection-name )
IMS ,
IMSBMP
IMSMPP CICS( applid )
RRSAF ,
ENABLE(*)
IMSBMP( imsid )
,
IMSMPP( imsid )
pklist-block:
,
Option descriptions
For descriptions of the options shown in the syntax diagram, refer to Chapter 15,
“BIND and REBIND options,” on page 61.
Usage note
If you rebind multiple plans, DB2 commits each successful rebind before rebinding
the next plan.
Example
Rebind plan DSN8BC81 to enable DB2 to take advantage of a newly created index.
Use FLAG(W) to issue warning, error, and completion messages, but not
informational messages. Use VALIDATE(BIND) to point out any error conditions
during the bind process. Use ISOLATION(CS) to prevent other applications from
changing the database values that this application uses only while the application is
using them. This isolation level protects changed values until the application
commits or terminates. Omit the OWNER keyword to leave the plan’s owner
authorization ID the same. Omit the ENABLE or DISABLE keywords to use the
connections previously defined for the plan.
REBIND PLAN (DSN8BC81) -
FLAG (W) -
VALIDATE (BIND) -
ISOLATION (CS)
If the rebind is successful, the trigger package is marked valid. When REBIND
TRIGGER PACKAGE(*) is issued, the rebind will affect all trigger packages that the
issuer is authorized to rebind. Trigger packages cannot be rebound remotely. The
location name is permitted when specifying the package name on a REBIND
TRIGGER PACKAGE subcommand. However, the location name must not refer to a
remote location.
For more information about using REBIND TRIGGER PACKAGE, see Part 5 of DB2
Application Programming and SQL Guide.
Environment
You can use REBIND TRIGGER PACKAGE through DB2I, or enter the REBIND
TRIGGER PACKAGE subcommand from a DSN session that is running in
foreground or background.
Authorization
To build a package without producing error messages, the package owner must
have authorization to execute all SQL statements that are embedded in the
package for REBIND TRIGGER PACKAGE.
To execute this subcommand, you must use a privilege set of the process that
includes one of the following privileges or authorities:
v Ownership of the trigger package
v BIND privilege on the trigger package
v BINDAGENT privilege from the owner of the trigger package
v PACKADM authority on the collection or on all collections
v SYSADM authority
v SYSCTRL authority
When the trigger package is bound, the privileges of the current authorization ID
are used when checking authority to bind statements within the triggered action. On
REBIND TRIGGER PACKAGE, you need one of the following privileges or
authorities:
v Ownership of the package
v BIND privilege on the package
v BINDAGENT privilege granted from owner
v PACKADM authority
v SYSADM authority
v SYSCTRL authority
Syntax
( collection-id . package-id )
location-name. * *
CURRENTDATA( YES ) EXPLAIN( YES ) I
NO NO FLAG( W )
E
C
IMMEDWRITE( NO ) ISOLATION( RR )
YES RS
CS
UR
NC
RELEASE( COMMIT )
DEALLOCATE
Option descriptions
TRIGGER PACKAGE
Determines what trigger package or packages to rebind.
The following options identify the location, collection, and package name of the
package. You can identify a location and collection. For REBIND TRIGGER, you
must identify a trigger package name.
location-name
Identifies the current local location. Remote rebind of a trigger package is
not allowed. location-name is the location of the DBMS where the package
rebinds and where the description of the package resides.
The default is the local DBMS.
collection-id or *
Identifies the schema-name that already contains the trigger package to
rebind. No default exists.
For REBIND TRIGGER, you can use an asterisk (*) to rebind all local
packages with the specified package-id in all the collections for which you
have bind privileges.
package-id or *
Identifies the name of the trigger package to rebind, as listed in the NAME
column of the SYSPACKAGE catalog table. No default exists.
You can use the pattern-matching character (*) to rebind all local triggers in
collection-id for which you have bind privileges.
For descriptions of the options that are shown in the syntax diagram, see
Chapter 15, “BIND and REBIND options,” on page 61.
For more information about specifying schema names and trigger packages for the
REBIND TRIGGER PACKAGE command, see Part 4 of DB2 Application
Programming and SQL Guide.
Usage notes
Restrictions on trigger packages: A trigger package can be explicitly rebound, but
it cannot be explicitly bound using the BIND PACKAGE subcommand.
A trigger package cannot be copied, and it can only be rebound locally. Remote
rebind of a trigger package is not allowed.
Output
REBIND TRIGGER PACKAGE updates the COLLID and NAME columns in the
SYSPACKAGE catalog table.
Example
Issue the following command to rebind trigger package TRIG1 in the ADMF001
collection of packages:
REBIND TRIGGER PACKAGE (ADMF001.TRIG1);
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v BSDS privilege
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
RECOVER BSDS
Usage note
Using RECOVER BSDS following a BSDS I/O error: For a detailed description of
the steps you must take to reestablish dual BSDS mode after a BSDS I/O error
occurs, see Part 4 (Volume 1) of DB2 Administration Guide.
Example
Reestablish dual BSDS mode.
-RECOVER BSDS
This command should only be used when automatic resolution will not work. The
commit coordinator must determine the commit or abort decision.
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v RECOVER privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
ID( correlation-id )
*
,
NID( network-id )
,
LUWID( luwid )
token
Option descriptions
(connection-name)
Specifies a one- to eight-character connection name. Allied threads (including
those that are distributed) that belong to the connection name are recovered.
This parameter is ignored if LUWID is specified.
The default is the connection name from which you enter the command. If you
enter this command from a z/OS console, and you are recovering an allied
thread using the ID or NID parameter, you must supply a connection name; no
default connection name is available.
ACTION
Specifies whether to commit or cancel the indoubt thread. If there are any
downstream participants for which the local thread is the coordinator, the
commit or abort decision is propagated to these participants.
Abbreviation: ACT
(COMMIT)
Commits the thread.
(ABORT)
Cancels the thread.
ID(correlation-id, ...)
Specifies whether to recover a specific allied thread or all allied threads
(including those that are distributed) that are associated with the connection
name.
correlation-id
Is the correlation ID (1 to 12 characters) of a specific thread that is to be
recovered. If you use more than one correlation ID, separate the IDs with
commas.
Do not use a correlation ID that is associated with more than one network
ID. Instead, use the NID option.
(*) Recovers all indoubt threads that are associated with the connection name.
Even threads that have the same correlation ID are resolved.
NID(network-id, ...)
Specifies threads to recover based on their network IDs.
network-id is a network ID that is associated with an individual thread. You can
use more than one network ID for the same connection name.
For IMS and CICS connections, a network ID is specified as net-node.number,
which is 3 to 25 characters in length.
v net-node is the network-node name of the system that originated the unit of
work. net-node is one to eight characters in length.
v number is a unique number within the system of origin. number is 1 to 16
characters in length.
Usage note
When to use a network ID: A network-id is not normally needed, because a
correlation-id can identify indoubt threads. However, if the correlation-id is not
unique, network-id must be used. You do not need a network-id if you specify a
LUWID.
If you specify a thread in the command that is part of a global transaction, the
command is executed against all threads that are in the global transaction. See
DB2 Administration Guide for an explanation of global transactions.
Examples
Example 1: Recover indoubt allied threads. Schedule a commit for all threads that
are associated with the connection name from which the command is entered.
-RECOVER INDOUBT ACTION(COMMIT) ID(*)
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), or an IMS or CICS terminal.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v RECOVER privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
RECOVER POSTPONED
CANCEL
Option descriptions
CANCEL
Specify to stop DB2 processing of all postponed abort units of recovery
immediately. Cancelling postponed abort units of recovery leaves objects in an
inconsistent state.
Objects that the postponed units of recovery modify are recovered (backed out).
If back out processing fails, the objects are marked as REFRESH PENDING
(REFP) and either RECOVER PENDING (RECP) or REBUILD PENDING
(RBDP or PSRBD) in the database exception table. Resolve the REFP status of
the object by running the RECOVER utility to recover the object to a prior point
in time or by running LOAD REPLACE on the object.
Usage note
Recovery action: Recovery (rollback) action is always taken for all POSTPONED
ABORT units of recovery.
Output
The output from RECOVER POSTPONED consists of informational messages only.
Example
Issue the following command to recover postponed-abort units of recovery.
-RECOVER POSTPONED
If postponed-abort units of recovery are found, output that is similar to the following
output is generated:
DSNV435I - RESOLUTION OF POSTPONED ABORT URS HAS BEEN SCHEDULED
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.IPKD013A PART 00000004.
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.TPKD0103 PART 00000004.
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.IXKD013C PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.IUKD013B PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.IPKD013A PART 00000002.
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0103.TPKD0103 PART 00000002.
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0101.IXKD011C PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0101.IXKD011B PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0101.IUKD011A PART (n/a).
DSNI024I - DSNIARPL BACKOUT PROCESSING HAS COMPLETED
FOR PAGESET DBKD0101.TLKD0101 PART (n/a).
DSN9022I - DSNVRP ’RECOVER POSTPONED’ NORMAL COMPLETION
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
Option descriptions
(luname)
Specifies the real VTAM LU name of the partner whose generic LU name
mapping is to be purged. The NETID of this partner LU must be the same as
the local DB2 NETID.
(netid.luname)
Specifies that the VTAM shared memory information that is associated with the
specified NETID and LUNAME is purged.
(*) Purges the VTAM shared memory information for all partners of this DB2
subsystem. This command option should only be used if you are planning to
remove this DB2 subsystem from the DB2 group.
Usage notes
The following conditions must be satisfied for the RESET GENERICLU command to
be successful:
v DDF must be started.
v No VTAM sessions can be active to the partner LU that is specified on the
command.
v DB2 must not have any indoubt thread resolution information associated with the
specified partner LU.
Examples
Example 1: Purge the VTAM generic name mapping that is associated with partner
NET1.USER5LU.
-DB2A RESET GENERICLU(NET1.USER5LU)
Example 2: Purge the VTAM generic name mappings for all LUs that are partners
of this DB2 subsystem. Use this version of the command only when removing this
DB2 subsystem from the data sharing group.
-DB2A RESET GENERICLU(*)
This command must be used to purge indoubt thread information in the following
situations:
v For threads where DB2 has a coordinator responsibility that it cannot fulfill
because of participant cold start, sync point protocol errors, or indoubt resolution
protocol errors.
v For threads that were indoubt but were resolved with the RECOVER INDOUBT
command, and subsequent resynchronization with the coordinator shows
heuristic damage.
The RESET column of a display thread report for indoubt threads indicates
whether information in the report must be purged with this command.
This command can also be used to purge indoubt thread information for threads
where:
v DB2 has a coordinator responsibility even when no errors have been detected
that preclude automatic resolution with the participants. The FORCE keyword
must be specified to purge this information. Resynchronization with affected
participants is not performed.
v DB2 has a participant responsibility even when no errors have been detected
that preclude automatic resolution with the coordinator. Resynchronization with
the coordinator will not be performed.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v RECOVER privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
LOCATION( location-name )
,
IPADDR( nnn.nnn.nnn.nnn:port )
* FORCE
,
LUWID( luwid )
token LOCATION(location-name)
Option descriptions
LUNAME(luname, ...)
Purges all qualifying indoubt information that pertains to the specified LUNAME.
luname
Is expressed as a one- to eight-character name. If you use more than one
LUNAME, separate each name with a comma.
(*) Purges indoubt information for all SNA locations.
FORCE
Forces the purging of coordinator and participant indoubt resolution
responsibility even when no errors that preclude automatic resolution have been
detected. FORCE can be used in conjunction with IPADDR or LUNAME.
Purging resynchronization information when no errors that preclude automatic
resynchronization have been detected simulates a cold start. Thus, no
connections can exist between DB2 and the named partner when this command
is executed. After you run the FORCE option, the next connection with the
named partner location will be a cold start connection. If a connection with the
named partner exists at the time this command is run, the command fails with
message DSNL448I.
FORCE can be used to bypass warm start connectivity problems when errors
that are occurring in the recovery log name exchange result in the partner
refusing the connection attempt.
LOCATION(location-name, ...)
Purges all qualifying indoubt information that pertains to the named location.
location-name is expressed as a 1- to 16-character name, which identifies the
partner, whether it is a requester or server. If the partner is not a DB2 UDB for
z/OS subsystem, the location name can be expressed as one of the following
formats:
v A one- to eight-character luname, as defined to VTAM at the server location.
This name must be enclosed in the less-than (<) and the greater-than (>)
characters to distinguish it from a DB2 location name.
Output
The response from this command includes any of the messages from DSNL440I
through DSNL449I.
Usage notes
Purging participant indoubt information: Use caution when you specify the
FORCE option to purge participant indoubt information. Normally, after the use of
the RECOVER INDOUBT command, automatic resolution with the coordinator
determines if heuristic damage has occurred. This detection is lost if RESET
INDOUBT is used before automatic resolution with the coordinator can be achieved.
Purging coordinator indoubt information: Use caution when you specify the
FORCE option to purge coordinator indoubt information when no errors are
precluding automatic resolution. When the information is purged, any participant
that is indoubt is forced to use a heuristic decision process to resolve the indoubt
logical unit of work.
Environment
This subcommand can be issued under the DSN command processor running in
either foreground or background mode, or it can be issued by using the DB2I RUN
panel.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v EXECUTE privilege on the plan
v Ownership of the plan
v SYSADM authority
To run an application, the plan must be enabled for your local server. Any
associated packages from which you execute statements must also be enabled.
Syntax
RUN PROGRAM(program-name)
PLAN(plan-name)
CP PLAN(plan-name)
LIBRARY(library-name) PARMS(parameter-string)
Option descriptions
Use at least one of the two following clauses, but do not use the same clause
twice.
PROGRAM (program-name)
Identifies the program that you want to run.
CP
Directs input to the user’s command processor, and causes a prompt to be
issued: ENTER TSO COMMAND. This is useful for running command processors and
debugging programs (for example, COBTEST).
Processing the specified TSO command creates a new task control structure
under which the TSO command executes. All application programs that are
initiated from this TSO command session also execute under the same task
structure, and must establish a new connection to DB2 if they use SQL
requests.
When the TSO command completes, the new task structure is terminated, and
control is returned to the original DB2 connection and task structure established
by the DSN command.
Later TSO commands can be issued directly from the DSN session, or through
the RUN subcommand with the CP option.
PLAN(plan-name)
Is optional after the PROGRAM option, but required after the CP option.
plan-name is the name of the application plan for the program.
When PROGRAM is used, the default plan name is program-name.
LIBRARY(library-name)
Specifies the name of the data set that contains the program to be run.
If library-name is not specified, normal z/OS library searching is used. The data
sets that are specified in the STEPLIB DD statements are first searched for the
entry point name of the program. If STEPLIB is not present, the data sets that
are specified in the JOBLIB DD statements are searched. If the entry point
name is not found there, the link list is searched.
Subprograms: Normal z/OS library searching is always used for any
subprograms that is loaded by the main program. If the subprograms reside in
the same library as the main program, the library-name must also be defined for
the normal z/OS search pattern (STEPLIB, JOBLIB, link list). If a library that is
defined in that way contains both the main program and any loaded
subprograms, you do not need to use the LIBRARY option.
PARMS(parameter-string)
parameter-string is a list of parameters that are to be passed to your application
program. Separate items in the list with commas, blanks, or both, and enclose
the list between apostrophes. If the list contains apostrophes, represent each
apostrophe by using two consecutive apostrophes. The list is passed as a
varying-length character string of 1- to 100-decimal characters.
For Assembler: Use a list of the form 'program parameters'. There are no
run-time parameters.
No run-time or application parameter validation is performed by the RUN
subcommand on the parameter-string that is passed to your application
program. All specified parameter values are assumed to adhere to the
parameter syntax and format criteria defined by the language in which the
application program is written.
For C: Use a list of the form A/B, where A represents a list of run-time options,
and B represents a list of parameters for the C application program. If run-time
options are not needed, write the list in the form /B. If the NOEXECOPS
run-time option is in effect, omit the “/”.
For COBOL: If Language Environment is not the run-time environment, use a
list of the form B/A, where B represents a list of parameters for the COBOL
application program, and A represents a list of run-time options. If program
parameters are not needed, write the list in the form of /A.
If Language Environment is the run-time environment, use a list of the form A/B,
where A represents a list of run-time options, and B represents a list of
parameters for the COBOL application program. If run-time options are not
needed, write the list in the form of /B. For compatibility, Language Environment
provides the CBLOPTS run-time option. When CBLOPT(YES) is specified in
CEEDOPT or CEEUOPT and the main routine is COBOL, specify the list in the
form of B/A, the same form as when the run-time environment is not Language
Environment. CBLOPT(NO) is the default.
For Fortran: Use a list of the form A/B, where A represents a list of Fortran
run-time options and B represents a list of parameters for the Fortran
application program. If Fortran run-time options are not needed, write the list in
the form of B or /B. The second form must be used if a slash is present within
the program arguments. If only Fortran run-time options are present, write the
list in the form of A/.
For PL/I: Use a list of the form A/B, where A represents a list of run-time
options, and B represents a list of parameters for the PL/I application program.
If run-time options are not needed, write the list in the form /B. If the PL/I
NOEXECOPS procedure option is specified, omit the “/”. An informational
system message is issued if you omit the slash, or if the value that is passed to
the PL/I run-time package is not valid.
Usage note
Multitasking restriction: When running a program that uses a multitasking
environment, the first task to issue an SQL statement must issue all subsequent
SQL calls. That is, only one task in a multitasking environment can issue SQL calls.
This task must be a subtask of, or running at the same TCB level as, the DSN main
program.
Examples
Example 1: Run application program DSN8BC4. The application plan has the same
name. The program is in library 'prefix.RUNLIB.LOAD'.
DSN SYSTEM (DSN)
RUN PROGRAM (DSN8BC4) LIB (’prefix.RUNLIB.LOAD’)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v ARCHIVE privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
SET ARCHIVE
COUNT (integer) TIME( minutes )
,seconds
,seconds
1440
NOLIMIT
DEFAULT
Option descriptions
The following options override the READ TAPE UNITS(COUNT) and DEALLC
PERIOD TIME subsystem parameters that are specified during installation.
COUNT(integer)
Specifies the maximum number of tape units that can be dedicated to reading
archive logs. This value affects the number of concurrent reads that are allowed
for unique archive data sets that reside on tapes.
integer can range from 1 to 99.
v If the number that you specify is greater than the current specification, the
maximum number of tape units allowable for reading archive logs increases.
v If the number that you specify is less than the current specification, tape units
that are not being used are immediately deallocated to adjust to the new
COUNT value. Active (or premounted) tape units remain allocated; only tape
units that are inactive are candidates for deallocation because of a lowered
COUNT value.
TIME
Specifies the length of time during which an allocated archive read tape unit is
allowed to remain unused before it is deallocated.
(minutes)
Specifies the maximum number of minutes.
minutes must be an integer between 0 and 1439.
(seconds)
Specifies the maximum number of seconds.
seconds must be an integer between 1 and 59.
(NOLIMIT) or (1440)
Indicates that the tape unit will never be deallocated. Specifying
TIME(1440) is equivalent to TIME(NOLIMIT). The seconds specification is
not allowed when you specify that TIME is 1440.
DEFAULT
Resets the COUNT and TIME parameters back to the values that were
specified during DB2 installation.
Usage notes
Archive tape reading performance: To achieve the best performance for reading
archive tapes, specify the maximum values that are allowed (within system
constraints) for both the COUNT and TIME options.
Output
The response from this command includes any of the messages from DSNJ334I
through DSNJ337I.
Examples
Example 1: Allocate two tape units that can remain unused for 30 seconds before
they are deallocated.
-SET ARCHIVE COUNT(2) TIME(,30)
Example 2: Allocate four tape units that can remain unused for 2 minutes before
they are deallocated.
-SET ARCHIVE COUNT(4) TIME(2)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program that uses
the instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v ARCHIVE privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
Option descriptions
The following option overrides the LOGLOAD subsystem parameter that is specified
in the CHECKPOINT FREQ field on install panel DSNTIPN.
LOGLOAD(integer)
Specifies the number of log records that DB2 writes between the start of
successive checkpoints. You can specify a value of 0 to initiate a system
checkpoint without modifying the current LOGLOAD value.
integer can be 0, or within the range from 200 to 16000000.
CHKTIME(integer)
Specifies the number of minutes between the start of successive checkpoints.
This option overrides log records that are specified by installation options or the
LOGLOAD option that are based on checkpoint frequency.
integer can be any integer value from 0 to 60. Specifying 0 starts a system
checkpoint immediately without modifying the checkpoint frequency.
SUSPEND
Specify to suspend logging and update activity for the current DB2 subsystem
until SET LOG RESUME is issued. DB2 externalizes unwritten log buffers,
takes a system checkpoint (in non-data-sharing environments), updates the
BSDS with the high-written RBA, and then suspends the update activity.
Message DSNJ372I is issued and remains on the console until update activity
resumes.
| SUSPEND quiesces the writes for 32-KB pages and the data set extensions for
| all page sizes. If a 32-KB page write is in progress when you take volume-level
| copies of your data, SUSPEND prevents an inconsistent copy of a 32-KB page
| when the copy of your data is restored. If a data set extension is in progress,
| SUSPEND prevents inconsistencies between the VSAM catalog and the DB2
| data set when the copy of your data is restored.
This option is not allowed when the ARCHIVE LOG or STOP DB2 commands
activate a system quiesce. Update activity remains suspended until SET LOG
RESUME or STOP DB2 is issued. (Also, when logging is suspended, do not
issue the ARCHIVE LOG command without also specifying CANCEL
OFFLOAD.)
Recommendation: Do not keep log activity suspended during periods of high
activity or for long periods of time. Suspending update activity can cause
timing-related events such as lock timeouts or DB2 and IRLM diagnostic
dumps.
RESUME
Specify to resume logging and update activity for the current DB2 subsystem
| and to remove the message DSNJ372I from the console. Resumes 32-KB page
| writes and data set extensions for pages of all sizes.
Recommendation: Issue this command from a z/OS console or from the install
SYSADM ID to avoid possible contention during command authorization
checking. When logging is suspended by the SET LOG SUSPEND command,
the contention that is generated by holding the log-write latch can cause
command-authorization checking to hang until logging resumes.
Usage notes
How LOGLOAD and CHKTIME values affect DB2 performance: LOGLOAD and
CHKTIME values can affect the amount of time needed to restart DB2 after
abnormal termination. A large value for either option can result in lengthy restart
times. A low value can result in DB2 taking excessive checkpoints. However, when
you specify LOGLOAD(0) or CHKTIME(0), the checkpoint request is synchronous
when issued from a batch job, and it is asynchronous when issued from a z/OS or
TSO console.
Use the DISPLAY LOG command to display the current LOGLOAD setting.
The value that you specify for LOGLOAD or CHKTIME is reset to the value
specified in the subsystem parameter when DB2 is restarted. If you load a different
value by issuing the command SET SYSPARM, the new value is used.
When to suspend logging: Specify SET LOG SUSPEND before making a remote
copy of the entire database and logs for a system-level, point-in-time recovery or
disaster recovery. You can make remote copies with peer-to-peer remote recovery
(PPRC) and FlashCopy®. Suspending logging to make a remote copy of the
database lets you avoid quiescing update activity. Read-only activity continues while
logging is suspended.
The backup that is made between the SET LOG SUSPEND and the SET LOG
RESUME window might contain uncommitted data. If you must restore the entire
DB2 subsystem to the time when the log was suspended, restore the entire
database and logs from the backup, and then restart DB2 to recover the entire DB2
subsystem to a consistent state. For details, see Part 4 (Volume 1) of DB2
Administration Guide.
Examples
Example 1: Initiate a system checkpoint without modifying the current LOGLOAD
value.
-SET LOG LOGLOAD(0)
Example 2: Modify the system checkpoint interval to every 150000 log records.
-SET LOG LOGLOAD(150000)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program that uses
the instrumentation facility interface (IFI).
Authorization
| To execute this command, you must use a privilege set of the process that includes
| one of the following authorities:
| v SYSOPR authority
| v SYSCTRL authority
| v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
Option descriptions
LOAD(load-module-name)
Specifies the name of the load module to load into storage. The default load
module is DSNZPARM.
RELOAD
Reloads the last named subsystem parameter load module into storage.
STARTUP
Resets loaded parameters to their startup values.
Usage notes
To update the subsystem parameters on a subsystem, follow these steps:
1. Run through the installation process in Update mode.
2. Produce a new subsystem parameter load module.
3. Issue the SET SYSPARM command.
Examples
Example 1: Change from DSNZPARM to ADMPARM1.
-SET SYSPARM LOAD(ADMPARM1)
Example 3: Reload the subsystem parameters that the DB2 subsystem loaded at
startup.
-SET SYSPARM STARTUP
Environment
You can use this subcommand only under ISPF. You can issue it from ISPF option
6, or from a CLIST.
Authorization
None is required.
Syntax
SPUFI
Usage notes
SPUFI session: The SPUFI subcommand runs SPUFI and presents the SPUFI
panel as the start of a SPUFI session. For a description of the panel and
instructions on using SPUFI, see Part 1 of DB2 Application Programming and SQL
Guide.
In the SPUFI session, you can access the CURRENT SPUFI DEFAULTS panel.
You can change DB2I defaults by splitting the screen and accessing the DB2I
DEFAULTS panel, or by changing the defaults before starting the SPUFI session.
SPUFI panel variables: The SPUFI panel variables you enter after invoking SPUFI
directly with the DSN command are not saved in the same place. Panel variables,
therefore, vary depending on whether you execute the facility directly, or through
DB2I.
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in the
IMS Administration Guide: System.
In addition, the set of privileges held by the primary authorization ID or any of the
secondary authorization IDs must include the authority to enter the DB2 command
that follows /SSR. For a description of the privileges required to issue a DB2
command, see the description of the appropriate DB2 command in this book.
Syntax
/SSR subsystem-command
Option description
subsystem-command
Specifies a valid subsystem command. The first character following /SSR must
be the subsystem recognition character of the subsystem to which the
| command is to be directed (in this case DB2). The IMS subsystem recognition
| character is defined in the IMS SSM member for the external subsystem.
Usage note
Routing the command: IMS uses the command recognition character (CRC) to
determine which external subsystem, in this case DB2, receives the command. The
only action taken by IMS is to route the command to the appropriate subsystem.
The following information is only a partial description of the /START command. For
a complete description, see IMS Command Reference.
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in the
IMS Administration Guide: System.
Syntax
/START
,
SUBSYS subsystem-name
SUBSYS ALL
Option descriptions
SUBSYS
Specifies one or more names of external subsystems to be connected to IMS,
or all external subsystems.
subsystem-name, ...
Identifies one or more names of external subsystems to be connected to
IMS.
ALL
Indicates that all external subsystems are to be connected to IMS.
Usage note
Inactive entries: The copy in main storage of the external subsystem PROCLIB
entry is refreshed as part of /START command function when that entry is not active
(that is, when the connection does not exist). This allows the installation to stop the
subsystem connection, change the specifications in the PROCLIB entry, and restart
the subsystem connection without bringing down IMS.
In a data sharing environment, the command can be issued from any DB2
subsystem in the group that has access to the specified database.
Abbreviation: -STA DB
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v STARTDB privilege
v DBMAINT authority
v DBCTRL authority
v DBADM authority
v SYSCTRL authority
v SYSADM authority
When you are using a privilege set that does not contain the STARTDB privilege for
a specified database, DB2 issues an error message.
All specified databases with the STARTDB privilege included in the privilege set of
the process are started.
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Table space DBD01 in database DSNDB01 and table spaces and index spaces in
database DSNDB06 are required to check the authorization for using the START
DATABASE command. If a table space or index space required for this
authorization check is stopped, or is unavailable because it is in LPL or GRECP
status, installation SYSADM authority is required to start any database, table space,
or index space, including the ones required for the authorization check. Installation
SYSOPR authority can also start DSNDB06 but only when the object is in LPL or
GRECP status and if the access mode is not changed.
Syntax
,
SPACENAM( space-name )
* ,
spacename1:spacename2
spacename* PART( integer )
*spacename integer1:integer2
*spacename*
*spacestring1*spacestring2*
RW
ACCESS( RO )
UT
FORCE
Option descriptions
(database-name, ...)
Specifies the name of a database, or a database for the table spaces or index
spaces that are to be started. If you use more than one name, separate names
in the list with commas.
(*) Starts all databases for which the privilege set of the process has at least
dbname and dbstring can have any of the forms in the following list (where
dbname1 and dbname2 represent any 1- to 8-character string, and dbname
represents any 1- to 7-character string):
Form Starts
dbname1:dbname2 All databases whose names are greater than or
equal to dbname1 and less than or equal to
dbname2
dbname* All databases whose names begin with the
string dbname
*dbname All databases whose names end with the string
dbname
*dbname* All databases whose names contain the string
dbname
*dbstring1*dbstring2* All databases whose names contain the strings
dbstring1 and dbstring2
SPACENAM
Specifies the particular table spaces or indexes within the database that are to
be started. If you use ACCESS(FORCE), you must use SPACENAM with a list
of table space and index names.
Abbreviation: SPACE, SP
(space-name, ...)
Specifies the name of a table space or index space that is to be started.
You can use a list of several names of table spaces and index spaces.
Separate names in the list with commas.
You can specify space-name like database-name to designate:
v The name of a single table space or index space
v A range of names
v A partial name, including a beginning or ending pattern-matching
character (*)
v Two strings separated by a pattern-matching character (*)
v Any combination of the previous items in this list, with the following
exceptions. Consecutive pattern-matching characters (*) are not allowed,
and you cannot specify two pattern-matching characters (*) in the middle
of a keyword string.
spacename and spacestring can have any of the forms in the following list
(where spacename1 and spacename2 represent any 1- to 8-character
string, and spacename represents any 1- to 7-character string):
The PART option is valid with partitioned table spaces, partitioned indexes,
and nonpartitioned type 2 indexes of partitioned table spaces. If you specify
PART with a nonpartitioned table space or index on a nonpartitioned table
space, you receive an error message, and the nonpartitioned space is not
started.
ACCESS
| Specifies whether the objects that are started are in read/write, read only, or
| utility only status. Also forces access to objects that are in unavailable status.
Abbreviation: ACC
(RW)
Allows programs to read from and write to the specified databases, table
spaces, indexes, or partitions.
(RO)
Allows programs to only read from the specified databases, table spaces,
| indexes, or partitions. Any programs attempting to write to the specified
| objects will not succeed. Do not use this option for a database for declared
temporary tables (databases created with the AS TEMP option).
(UT)
Allows only DB2 online utilities to access the specified databases, table
spaces, indexes, or partitions.
(FORCE)
Resets any indications that a table space, index, or partition is unavailable
because of pages in the logical page list, pending-deferred restarts,
write-error ranges, read-only accesses, or utility controls. FORCE also
resets the CHECK-pending, COPY-pending, and RECOVER-pending states.
Full access to the data is forced. FORCE cannot be used to reset the
restart-pending (RESTP) state.
When using ACCESS(FORCE), you must use a single database name, the
SPACENAM option, and an explicit list of table space and index names.
You cannot use any range or combination of pattern-matching characters
(*), including DATABASE (*) or SPACENAM (*).
A utility-restrictive state is reset (and the utility is terminated) only if all of
the target objects are reset with this command. To identify which objects are
target objects of the utility, use the DISPLAY DATABASE command, or run
| the DIAGNOSE utility with the DISPLAY SYSUTIL option. The DIAGNOSE
| utility should be used only under the direction of IBM Software Support.
| Note: ACCESS(FORCE) will not successfully complete if the object you are
| trying to force was placed in a utility-read-only (UTRO), utility-read-write
| (UTRW), or utility-utility (UTUT) state by a utility running in a previous
| release of DB2. If this situation is encountered, DB2 issues message
| DSNI041I. To reset the restrictive state, you must terminate the utility using
| the release of DB2 in which it was started.
A table space or index space that is started with ACCESS(FORCE) might
be in an inconsistent state. See “Usage notes” for further instructions.
Usage notes
Data sets offline: Disk packs that contain partitions, table spaces, or indexes, do
not necessarily need to be online when a database is started. Packs must,
however, be online when partitions, table spaces, or indexes are first referred to. If
they are not online, an error in opening occurs.
Table spaces and indexes explicitly stopped: If table spaces and indexes are
stopped explicitly (using the STOP DATABASE command with the SPACENAM
option), they must be started explicitly. Starting the database does not start table
spaces or indexes that have been explicitly stopped.
Effect on objects marked with GRECP or with LPL entries: If a table space,
partition, or index is in the group buffer pool RECOVER pending (GRECP) status,
or if it has pages in the logical page list (LPL), the START DATABASE command
begins recovery of the object. You must specify the SPACENAM option and
ACCESS (RW) or (RO).
If the object is stopped when the command is issued, then the START DATABASE
command both starts the object and clears the GRECP or LPL status. If the
GRECP or LPL recovery action cannot complete, the object is still started.
If any table space or index space that is required to check command authority is
unavailable, Installation SYSADM or Installation SYSOPR authority will be required
to issue the START DATABASE command. See “Authorization” on page 331 for
more details.
When recovering objects that are in GRECP or LPL status, avoid using
pattern-matching characters (*) for both the database name and the space name.
Multiple START DATABASE(dbname) SPACENAM(*) commands running in parallel
should complete faster than one START DATABASE(*) SPACENAM(*) command.
If you use pattern-matching characters (*) for both the database name and space
name, you must have DBMAINT authority and ensure that the catalog and directory
databases have already been explicitly started in the following order:
-START DATABASE(DSNDB01) SPACENAM(*)
-START DATABASE(DSNDB06) SPACENAM(*)
Although not recommended, you can start an object using START DATABASE
ACCESS(FORCE). That deletes all LPL and write error page range entries without
recovering the pages. It also clears the GRECP status.
When starting a LOB table space defined as LOG NO and either in GRECP or
having pages in the LPL, the LOB table space will be placed in the AUXW state
and the LOB will be invalidated if DB2 detects that log records required for LPL
recovery are missing due to the LOG NO attribute.
If an object has retained locks (that is, a member of a DB2 data sharing group has
failed and the locks it held on the object are retained in the lock structure), START
DATABASE ACCESS (FORCE) is not allowed.
Do not start table spaces or index spaces for defined temporary tables with RO or
UT access. You can start a temporary file database with UT access to
accommodate the REPAIR DBD utility.
Starting a LOB table space: The START DATABASE command can be used to
start LOB table spaces and indexes on auxiliary tables. LOB table spaces are
started independently of the base table space with which the LOB table space is
associated.
Examples
Example 1: Start table space DSN8S81E in database DSN8D81A. Recover the
table space if it is in GRECP status or recover the pages on the LPL if one exists.
-START DATABASE (DSN8D81A) SPACENAM (DSN8S81E)
Example 2: Start all databases (except DSNDB01, DSNDB06, and work file
databases) for which you have authority. Recovery for any objects with GRECP or
LPL status is not performed.
Example 3: Start the third and fourth partitions of table space DSN8S81E in
database DSN8D81A for read-only access. Recover the partitions if they are in
GRECP status or recover the pages on the LPL if one exists.
-START DATABASE (DSN8D81A) SPACENAM (DSN8S81E) PART (3,4) ACCESS (RO)
Example 4: Start all table spaces that begin with ″T″ and end with the string
″IQUA03″ in database DBIQUA01 for read and write access.
-START DATABASE (DBIQUA01) SPACENAM (T*IQUA03) ACCESS (RW)
The effect of restarting the system can be controlled by a conditional restart control
record, which you create by using the DSNJU003 (change log inventory) utility. For
more details about the effects, see “Usage notes” on page 340 and the description
of the DSNJU003 utility in DB2 Utility Guide and Reference.
Environment
This command can be issued only from a z/OS console. The name of the DB2
subsystem is determined by the command prefix. For example, -START indicates
that the DB2 subsystem to be started is the one with '-' as the command prefix.
The command is rejected if the DB2 subsystem is already active. The restart
recovery status of DB2 resources is determined from the prior DB2 shutdown
status.
Authorization
None is required. However, the command can be executed only from a z/OS
console with the START command capability. See z/OS MVS System Commands.
Syntax
START DB2
DSNZPARM *
PARM( module name ) ACCESS( MAINT )
NO MSTR(jcl-substitution)
LIGHT( YES )
DBM1(jcl-substitution) DIST(jcl-substitution)
Option descriptions
None of the following options are required.
PARM(module-name)
Specifies the load module that contains the DB2 subsystem parameters.
module-name is the name of a load module that is provided by the installation.
Usage notes
Command prefix: If your installation has more than one DB2 subsystem, you must
define more than one command prefix.
Light restart with ARM: To enable a light restart in an ARM environment, you must
code an ARM policy for DB2 and IRLM.
The following example shows an ARM policy for DB2, where the element name is
the DB2 data sharing group name and member name concatenated. For example,
DSNDB0GDB1G.
ELEMENT(elementname)
The following example shows an ARM policy for IRLM, where the element name is
the IRLM group name and the ID concatenated. For example, DXRDB0GDJ1G001.
ELEMENT(elementname)
RESTART_METHOD(SYSTERM,STC,’cmdprfx S irlmproc’)
The element name that DB2 uses is the DB2 data sharing group name and
member name concatenated. For example, DSNDB0GDB1G.F
Endless wait during start: The start operation might begin and fail to complete, if
the system services address space starts and the database services address space
cannot start. If a seemingly endless wait occurs, cancel the system services
address space from the console, and check both startup procedures for JCL errors.
Examples
Example 1: Start the DB2 subsystem.
-START DB2
Example 2: Start the DB2 subsystem, and provide a new value for the REGION
parameter in the startup procedure for the system services address space.
-START DB2 MSTR(’REGION=6000K’)
Example 3: Start the DB2 subsystem. Assuming that the EXEC statement of the
JCL that executes the startup procedure for the system services address space
uses the symbol RGN, provide a value for that symbol.
-START DB2 MSTR(’RGN=6000K’)
Example 4: DB2 subsystems DB1G and DB2G are members of a data sharing
group. Both were installed with a command prefix scope of STARTED. Start DB1G
and DB2G by routing the appropriate commands to the z/OS system on which they
are to be started, MVS1 and MVS2.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
START DDF
Usage note
The START DDF command activates the DDF interface to VTAM and TCP/IP. When
this command is issued after STOP DDF MODE(SUSPEND), suspended threads
are resumed and DDF activity continues.
Example
Start the distributed data facility.
-START DDF
You do not need to issue the START FUNCTION SPECIFIC command when
defining a new function to DB2. DB2 automatically starts the new function on the
first SQL statement that invokes the new function.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel, an IMS or CICS terminal, or a program that uses the instrumentation
facility interface (IFI).
| Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities for each function:
v Ownership of the function
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
|
| (*.*)
| START FUNCTION SPECIFIC
,
( schema.specific-function-name )
schema.partial-name*
| LOCAL
| SCOPE ( GROUP )
|
Option descriptions
* (asterisk)(*.*)
Starts all functions in all schemas. This is the default.
(schema.specific-function-name)
Starts the specific function name in the schema. You cannot specify a function
name in the same way that you do in SQL; you must use the specific name. If a
specific name was not specified on the CREATE FUNCTION statement, query
SYSIBM.SYSROUTINES for the correct specific name:
SELECT SPECIFICNAME, PARM_COUNT
FROM SYSIBM.SYSROUTINES
WHERE NAME=’function_name’
AND SCHEMA=’schema_name’;
Usage notes
Language Environment in the WLM-established stored procedure address
space: The START FUNCTION SPECIFIC command does not refresh the
Language Environment in the WLM-established stored procedure address space.
You must issue the WLM command. For example, if you need to refresh the
Language Environment to get new copies of user-defined function load modules,
issue the following WLM command:
VARY WLM, APPLENV=applenv,REFRESH
Examples
Example 1: Start all functions.
-START FUNCTION SPECIFIC
Example 2: Start functions USERFN1 and USERFN2. If any requests are queued
for these functions, the functions are executed.
-START FUNCTION SPECIFIC(PAYROLL.USERFN1,PAYROLL.USERFN2)
Environment
This command can be issued only from a z/OS console.
Authorization
The command requires an appropriate level of operating system authority, as
described in z/OS MVS System Commands.
Syntax
| ,
START irlmproc,
DEADLOK=’iiii,kkkk’
IRLMGRP=’irlm-group-name’
IRLMID=n
IRLMNM=irlmname
LOCKTABL=irlmltnm
LTE=nnnn
MAXCSA=
MAXUSRS=nnn
PC=
PGPROT= YES
NO
SCOPE= LOCAL
GLOBAL
NODISCON
TRACE= NO
YES
Option descriptions
irlmproc
Specifies the procedure name of the IRLM to be started.
iiii Is a one- to four-digit number from 1 to 9999 that specifies the length in
seconds of the IRLM local deadlock-detection interval. Any value from 1 to
9999 can be specified, but if the value is greater than 5, IRLM uses 5.
kkkk
Is a one- to four-digit number from 1 to 9999 that specifies the number of
local deadlock cycles that must expire before global deadlock detection is
performed. Any value from 1 to 9999 can be specified but IRLM uses 1.
The recommended value is 1.
nnn must be a one- to two-digit number from 1 to 32. The default is 7. The
recommended value is 7 or less.
Examples
| Example: This command starts the IRLM with a lock table storage size of 64 MB,
| assuming a width of 2-bytes for each lock table entry.
You do not need to issue START PROCEDURE when you define a new stored
procedure to DB2. DB2 automatically activates the new definition when it first
receives an SQL CALL statement for the new procedure.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
| Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v Ownership of the stored procedure
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
|
| (*.*)
| START PROCEDURE
,
( schema.procedure-name )
schema.partial-name*
procedure-name
partial-name*
| LOCAL
| SCOPE ( GROUP )
|
Option descriptions
(*.*)
Marks all stored procedures in all schemas as available to be called.
(schema.procedure-name)
Starts the specified stored procedure in the specified schema.
(schema.partial-name*)
Starts a set of stored procedures in the specified schema. The names of all
procedures in the set begin with partial-name and can end with any string,
including the empty string. For example, PAYROLL.ABC* starts all stored
procedures with names that begin with ABC in the PAYROLL schema.
procedure-name
Marks one or more specific stored procedures as available to be called.
partial-name*
Marks a set of stored procedures in the SYSPROC schema as available to be
called. The names of all procedures in the set begin with partial-name and can
end with any string, including the empty string. For example, ABC* starts all
stored procedure names that begin with ABC in the SYSPROC schema.
SCOPE
Specifies the scope of the command.
| (LOCAL)
| Starts the specified stored procedures in only the local members.
| (GROUP)
| Starts the specified stored procedures in all members of the data sharing
| group.
Usage notes
Errors in a definition of a stored procedure: Errors are detected at create time
for a stored procedure. See CREATE PROCEDURE in Chapter 5 of DB2 SQL
Reference for more information.
Examples
Example 1: Start all stored procedures.
-START PROCEDURE
You can issue START RLIMIT even if the resource limit facility is already active.
The resource limit specification table that you identify is used for new threads, and
existing threads continue to be subject to the limits in the table that was active at
the time they were created.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
START RLIMIT
ID=id
Option description
The following keyword is optional.
ID=id
Identifies the resource limit specification table for the governor to use.
id is the one or two identification character that is specified when the table is
created. See Part 5 (Volume 2) of DB2 Administration Guide for more
information about resource limit specification tables.
The full name of the table is authid.DSNRLSTid, where authid is the value that
is specified in field RESOURCE AUTHID on installation panel DSNTIPP.
The default ID is the value that is specified in field RLST NAME SUFFIX on
installation panel DSNTIPO.
Example
Start the resource limit facility.
-START RLIMIT ID=01
An additional option for this command and additional values for a few other options
exist. This additional information is intended for service and use under the direction
of IBM Software Support. For details, see DB2 Diagnosis Guide and Reference.
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
| Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v TRACE privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
|
|
| LOCAL
SCOPE ( GROUP )
|
destination block:
DEST( GTF )
SMF
SRV
OPn
OPX
constraint block:
* * *
, , ,
*
, ,
(1) *
IFCID( ifcid ) BUFSIZE( k_bytes ) TDATA( CORRELATION )
TRACE
CPU
DISTRIBUTED
LOCATION( * )
,
location-name
<luname>
ipaddr
Notes:
1 Allows you to specify trace events in addition to the IFCIDs activated by the CLASS option. For
details, see the description of IFCID( ifcid, ...) on page 368.
Option descriptions
You must specify a trace type.
The options PERFM, ACCTG, STAT, AUDIT, and MONITOR identify the type of
trace that is started.
(PERFM)
Specifies a trace that is intended for performance analysis and tuning. This
trace includes records of specific events in the system.
Abbreviation: P
(ACCTG)
Specifies a trace that is intended to be used in accounting for a particular
program or authorization ID. This trace includes records that are written for
each thread.
Abbreviation: A
(STAT)
Specifies a trace that collects statistical data that is broadcast by various
components of DB2, at time intervals that can be chosen during installation.
Abbreviation: S
LOCATION cannot be specified when you choose a statistics trace.
(AUDIT)
Specifies a trace that collects audit data from various components of DB2.
Abbreviation: AU
(MONITOR)
Specifies a trace that collects monitor data. This option makes trace data
available to DB2 monitor application programs.
Abbreviation: MON
| SCOPE
| Specifies the scope of the command.
| (LOCAL)
| Specify to display information about procedures on the local member only.
| (GROUP)
| Specify to display information about procedures on all members of the data
| sharing group.
COMMENT(string)
Gives a comment that is reproduced in the trace output (except in the resident
trace tables). This option can be used to record why the command was issued.
string is any character string; it must be enclosed between apostrophes if it
includes a blank, comma, or special character.
DEST
Specifies where the trace output is to be recorded. You can use more than one
value, but do not use the same value twice. If you do not specify a value, the
trace output is sent to the default destination shown in Table 31.
If the specified destination is not active or becomes inactive after you issue the
START TRACE command, you receive message DSNW133I, which indicates
that the trace data is lost. This applies for destinations GTF, SRV, and SMF. You
also receive this message for destinations OPn and OPX if START TRACE is
not issued by an application program.
Abbreviation: D
The allowable values and the default value depend on the type of trace started,
as shown Table 31:
Table 31. Allowable destinations for each trace type
Type GTF SMF SRV OPn OPX
PERFM Default Allowed Allowed Allowed Allowed
ACCTG Allowed Default Allowed Allowed Allowed
All traces to an OPX destination must be stopped before the buffer is marked
as not in use. Traces that are started to an OPX buffer that was formerly in use
write over the storage any previous traces had set.
TRACE
Places a trace header on the record.
Abbreviation: TRA
CPU
Places a CPU header on the record. The CPU header contains the current
processor time for the z/OS TCB or SRB executing.
DISTRIBUTED
Places a distributed header on the record.
Abbreviation: DIST
LOCATION(location-name, ...)
Introduces a list of specific location names for which trace information is
gathered. The use of the LOCATION option precludes tracing threads that have
no distributed data relationship. LOCATION cannot be specified when you want
to start a statistics trace.
location-name
Identifies the DB2 subsystems whose distributed threads you want to trace.
Activates the DB2 trace for the remote TCP/IP or SNA location that you
specify by location-name.
You can specify up to eight locations; a separate trace is started for each
one. You can specify only one location if you use more than one plan name
or authorization ID.
<luname>
Activates the DB2 trace for the remote clients that are connected to DDF
through the remote SNA LU name that you specified in luname.
ipaddr
Activates the DB2 trace for the remote clients that are connected to DDF
through the remote TCP/IP host.nnn.nnn.nnnis the dotted decimal IP
address.
(*) Indicates that you want to start trace events that occur under distributed
threads regardless of which location they are connected to. Specifying the
local location name is equivalent to specifying LOCATION(*).
Clients other than DB2 UDB for z/OS: DB2 UDB for z/OS does not
receive a location name from clients that are not DB2 UDB for z/OS
subsystems. To start a trace for a client that is not a DB2 UDB for z/OS
subsystem, enter its LUNAME or IP address. Enclose the LUNAME by the
less-than (<) and greater-than (>) symbols. Enter the IP address in the form
nnn.nnn.nnn.nnn. For example, to start a trace for a client with the
LUNAME of LULA, enter the following command:
-START TRACE (PERFM) CLASS (*) LOCATION (<LULA>)
To start a trace for a client with the IP address of 123.34.101.98, enter the
following command:
-START TRACE (PERFM) CLASS (*) LOCATION (123.34.101.98)
Usage notes
Number of traces: If you use one or no values for PLAN, AUTHID, or LOCATION,
the START TRACE command starts a single trace. If you use multiple values for
PLAN, AUTHID, or LOCATION, the command starts a trace for each plan,
authorization ID, or location. There can be up to 32 traces going at one time. If a
START TRACE command is entered from the console or from the DB2I panels to
an OPn or an OPX destination, message DSNW133I is issued to indicate trace data
lost.
Using the options PLAN, AUTHID, or LOCATION when starting monitor trace class
1 has no effect on the amount of data returned on IFI READS requests. See
Appendix E (Volume 2) of DB2 Administration Guide for more information on
qualifying monitor trace class 1 IFCIDs.
Using the options PLAN, AUTHID, or LOCATION has no effect when starting either
accounting or monitor trace classes 2, 5, or 7.
Stopping and starting DB2: If DB2 is stopped and started after you have started a
trace, the trace is not restarted automatically.
| If a trace is started with SCOPE(GROUP), and a new member joins the data
| sharing group after the trace is started, the new member also writes the trace data
| that is specified by the START TRACE command.
| Starting a trace with SCOPE(GROUP) can generate large amounts of trace data, so
| you might need to increase the size of the return area in your monitor program to
| hold the extra data.
Examples
Example 1: Start a performance trace for threads with remote activity to location
USIBMSTODB21. Only activate IFCIDs 44 (lock suspends) and 54 (lock
contention). Trace class 30 is available for installation use.
-START TRACE (PERFM)
DEST(GTF)
LOCATION(USIBMSTODB21)
CLASS(30)
IFCID(44)
Example 2: Start an accounting trace for plan DSN8BC81. Write records to SMF
(that will happen by default). Include a comment to identify the trace.
-START TRACE (ACCTG)
PLAN (DSN8BC81)
COMMENT (’ACCTG TRACE FOR DSN8BC81’)
Example 3: Start the statistics trace. Write records to SMF (by default).
-START TRACE=S
The following is only a partial description of the /STOP command. For a complete
description, see IMS Command Reference.
Environment
This command can be issued only from an IMS terminal.
Authorization
This command requires an appropriate level of IMS authority, as described in the
IMS Administration Guide: System.
Syntax
Option descriptions
SUBSYS
Specifies whether connection is to be stopped for one or more names of
external subsystems presently connected to IMS, or for all of them.
subsystem-name, ...
Specifies one or more names of external subsystems whose connection to
IMS is to be stopped.
ALL
Indicates that connection is to be stopped for all external subsystems
presently connected to IMS.
Usage note
When to use /STOP: The /STOP command allows application programs currently
accessing external resources to complete normally. When all applications have
terminated, the connection to the external subsystem is also terminated. A /START
command must be issued to reestablish the connection.
The /STOP command can also be used to stop the subsystem connection in order
to change the specifications in the external subsystem’s PROCLIB member entry.
The /START command then refreshes the copy in main storage of the PROCLIB
entry with the modified entry.
When used to stop a logical partition of a secondary index, the command does not
close any data sets that are associated with the index.
In a data sharing environment, the command applies to every member of the data
sharing group. If a GBP-dependent object is stopped with the command STOP
DATABASE, DB2 performs the necessary processing to make the object no longer
GBP-dependent.
Abbreviation: -STO DB
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v STOPDB privilege
v DBMAINT authority
v DBCTRL authority
v DBADM authority
v SYSCTRL authority
v SYSADM authority
Error messages are produced for those specified databases for which this set does
not have the STOPDB privilege.
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Database DSNDB06 contains the table spaces and index spaces that are required
to check authorization. If you stop any table space or index space that is required
for the START DATABASE authorization check, installation SYSADM authority is
required to restart it.
Syntax
,
SPACENAM( space-name )
* ,
spacename1:spacename2
spacename* PART( integer )
*spacename integer1:integer2
*spacename*
*spacestring1*spacestring2*
AT(COMMIT)
Option descriptions
One of the following two options is required.
(database-name, ...)
Specifies the names of the database, or database for the table spaces or index
spaces to stop. If you use more than one name, separate names in the list by
commas.
(*) Stops all databases for which the privilege set of the process has at least
DBMAINT authority or STOPDB privilege.
However, DSNDB01, DSNDB06, and work file databases, such as
DSNDB07, can be stopped only by specifying them explicitly (for example,
STOP DATABASE(DSNDB01)).
dbname and dbstring can have any of the forms in the following list (where
dbname1 and dbname2 represent any strings of from 1 to 8 characters, and
dbname represents any string of from 1 to 7 characters):
Form Stops...
dbname1:dbname2 All databases whose names collate greater
than or equal to dbname1 and less than or
equal to dbname2
dbname* All databases whose names begin with the
string dbname
*dbname All databases whose names end with the string
dbname
*dbname* All databases whose names contain the string
dbname
*dbstring1*dbstring2* All databases whose names contain the strings
dbstring1 and dbstring2
SPACENAM(space-name, ...)
Indicates names of table spaces or indexes within the specified database to
stop.
Abbreviation: SPACE, SP
space-name
Is the name of one or more table spaces or index spaces to stop.
You can write space-name like database-name to designate:
v The name of a single table space or index space
v A range of names
v A partial name, including a beginning or ending pattern-matching
character (*), pattern-matching character between two strings, or any
combination of these uses. Consecutive pattern-matching characters (*)
are not allowed, and you cannot specify two pattern-matching characters
in the middle of a keyword string.
See “Usage notes” on page 378 for instructions on how to start a table
space or index space again.
(*) Stops all table spaces and indexes of the specified database.
spacename and spacestring can have any of the forms in the following list
(where spacename1 and spacename2 represent any strings of from 1 to 8
characters, and spacename represents any string of from 1 to 7
characters):
Form Displays the status of...
spacename1:spacename2 All table spaces or index spaces whose
names collate greater than or equal to
spacename1 and less than or equal to
spacename2
spacename* All table spaces or index spaces whose
names begin with the string spacename
*spacename All table spaces or index spaces whose
names end with the string spacename
*spacename* All table spaces or index spaces whose
names contain the string spacename
Usage notes
Explicitly stopped databases: If table spaces and indexes are stopped explicitly
(using the STOP DATABASE command with the SPACENAM option), they must be
started explicitly using the START DATABASE command. Starting the database
does not start table spaces or indexes that have been stopped explicitly.
Stopped table spaces, indexes, and partitions: Table spaces, indexes, and
partitions are physically closed when the STOP DATABASE command is issued,
except for logical partitions of a nonpartitioning index of a partitioned table space.
Index spaces for declared temporary tables cannot be stopped or started.
Operation in TSO, z/OS, and batch: When the STOP DATABASE command is
issued from a TSO or a z/OS console, the command operates asynchronously to
keep the terminal free. When the command is issued from a batch job, it operates
synchronously in case later steps depend on the database being stopped. The
STOP DATABASE command drains work in progress on the database before
stopping it. If it cannot get the drain locks on the first request, it repeatedly tries
again. The command fails if it times out more than 15 times trying to get the locks
or if a serious deadlock situation occurs.
Ensuring that all databases are stopped: When the STOP DATABASE command
is processing asynchronously, message DSN9022I might be issued before the
command completes. Message DSNT736I is issued to indicate that the
asynchronous processing of the STOP DATABASE command is complete.
Use the DISPLAY DATABASE command to check the stopped status of table
spaces and indexes in a database. A status of STOPP indicates that the object is in
the process of being stopped. A status of STOP indicates that the stop has
completed and the object is in a stopped state. An object is not stopped until all
currently active threads accessing the object are quiesced.
An object might remain in the STOP pending (STOPP) status if the STOP
DATABASE command does not successfully complete processing.
| Stopping the communication database and the resource limit database: If the
communication database (CDB) and the resource limit database (RLST) are active,
they cannot be stopped. Those databases are active when created and are
activated by DB2. For more information on the CDB, see Part 3 of DB2 Installation
Guide. For more information about the RLST, see Part 5 (Volume 2) of DB2
Administration Guide.
Stopping DSNDB01: If you try to stop the DSNDB01 database while an application
plan or package is executing, you might receive a time out because of locking
contention on DSNDB01. This is most likely to occur when an application plan or
package is executing for the first time since DB2 was started, or if the skeleton
cursor table (SKCT) for the plan or the skeleton package table (SKPT) for the
package was swapped out of the EDM pool.
After a disk failure: Issuing the STOP DATABASE command before interrupting
the I/O interface between the failed device and DB2 can result in incomplete I/O
requests. To prevent this hang situation, create an interruption either by forcing the
device offline using the z/OS command VARY with the FORCE option, or by setting
the I/O timing interval for the device before any failures. You can set the I/O timing
interval through the IECIOSxx z/OS parmlib member or by issuing the z/OS
command:
SETIOS MIH,DEV=dddd,IOTIMING=mm:ss
Stopping a LOB table space: The STOP DATABASE command can be used to
stop LOB table spaces and indexes on auxiliary tables. LOB table spaces are
stopped independently of the base table space with which the LOB table space is
associated.
The following table summarizes the locking used by the STOP DATABASE
command.
Table 34. Locking used by the STOP DATABASE command
Command Table space type Locks acquired
STOP AT COMMIT Partitioned PART IX mass delete lock. Drain-all on partitions
specified.
IX mass delete lock. Drain-all on all partitions.
Nonpartitioned IX mass delete lock. Drain-all on table space.
STOP Partitioned PART X-lock partitions specified. Drain-all on partitions
specified.
X-lock all partitions. Drain-all on all partitions.
Nonpartitioned X-lock table space. Drain-all on table space.
Examples
Example 1: Stop table space DSN8S81E in database DSN8D81A and close the
data sets that belong to that table space.
-STOP DATABASE(DSN8D81A) SPACENAM(DSN8S81E)
Example 2: Stop all databases (except DSNDB01, DSNDB06, and work file
databases)
-STOP DATABASE(*)
Example 3: Stop all databases (except DSNDB01, DSNDB06, and work file
databases) when all jobs release their claims and all utilities release their drain
locks.
-STOP DATABASE(*) AT(COMMIT)
Example 5: Stop all table spaces with names that begin with "T" and end with the
"IQUA03" string in database DSN8D81A.
-STOP DATABASE(DSN8D81A) SPACENAM(T*IQUA03)
Output similar to the following output indicates that the command completed
successfully:
DSN9022I - DSNTDDIS ’STOP DATABASE’ NORMAL COMPLETION
DSNT736I - ASYNCHRONOUS STOP DATABASE COMMAND HAS
COMPLETED FOR COMMAND: STOP DB(DSN8D81A) SPACE(T*IQUA03)
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v STOPALL privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
QUIESCE
STOP DB2 MODE( FORCE )
YES
CASTOUT( NO )
Option descriptions
MODE
Indicates whether currently executing programs will be allowed to complete. For
the effects of this option on distributed threads, see the description of the
MODE option of Chapter 77, “-STOP DDF (DB2),” on page 383.
(QUIESCE)
Allows currently executing programs to complete processing. No new
program is allowed to start.
(FORCE)
Terminates currently executing programs, including utilities. No new
program is allowed to start. MODE(FORCE) probably causes indoubt
situations. Some tasks, such as stored procedures tasks and DB2 service
tasks, terminate abnormally. When they terminate abnormally, you might
see dumps and messages from these failures.
CASTOUT
Specifies whether the DB2 member performs castout processing for the page
sets or partitions for which the member was last updated. The CASTOUT option
only applies in a data sharing environment.
YES
Allow group buffer pool castout processing.
NO
Skip group buffer pool castout processing.
Usage notes
MODE(QUIESCE): If MODE(QUIESCE) is used, all connected address spaces
must terminate all connections before the DB2 subsystem stops. The system
operator can tell whether any connections remain by using the DISPLAY THREAD
command, and can cancel them by using the DB2 CANCEL command or z/OS
commands.
With CASTOUT(NO), the DB2 member shuts down with QC status, as displayed by
the DISPLAY GROUP command, which indicates that the member quiesced with
some castout processing not completed. A retained page set or partition P-lock is
held in IX state for each object for which the DB2 member was the last updater.
Also, group buffer pool connections enter a failed-persistent state.
Example
Example 1: Stop the DB2 subsystem. Allow currently active programs to complete.
Do not allow new programs to identify to DB2.
-STOP DB2 MODE (QUIESCE)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
QUIESCE
STOP DDF MODE( )
FORCE
SUSPEND CANCEL(n)
WAIT(n)
Option descriptions
MODE
Indicates whether currently executing active distributed threads are allowed to
complete.
(QUIESCE)
Allows active distributed threads that are using DDF to complete normally
and terminates only inactive distributed threads. If DDF THREADS ACTIVE
was specified during DB2 installation, all DDF threads are active threads.
(FORCE)
Terminates all currently executing distributed threads.
Some tasks, such as stored procedures tasks and DB2 service tasks,
terminate abnormally. When they terminate abnormally, you might see
dumps and messages resulting from these failures.
(SUSPEND)
Suspends all DDF threads by:
v Keeping inactive DDF threads inactive until a subsequent START DDF
command is issued
v Terminating all DDF pool threads
v Preventing inbound DDF work from starting
Usage notes
MODE(QUIESCE): If MODE(QUIESCE) is used, all distributed activity must
complete before DDF stops. The operator can tell whether any distributed threads
remain by using DISPLAY THREAD with the LOCATION option. To cancel
distributed threads that are preventing DDF from stopping, see “Usage notes” on
page 96 for CANCEL THREAD, or use STOP DDF MODE(FORCE).
If any applications are updating remote servers that use two-phase commit,
MODE(FORCE) might result in indoubt threads at each server.
Table 35 on page 385 summarizes the actions that DB2 takes when START DDF,
STOP DDF, START DB2, and STOP DB2 commands are issued with different DDF
states.
Examples
Example 1: Stop the distributed data facility (MODE QUIESCE).
-STOP DDF
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
| Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities for each function:
v Ownership of the function
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
|
| (*.*)
| STOP FUNCTION SPECIFIC
,
( schema.specific-function-name )
schema.partial-name*
|
| QUEUE LOCAL
ACTION ( REJECT ) SCOPE ( GROUP )
Option descriptions
(*.*)
Stops access to all functions, including functions that DB2 applications have not
yet accessed.
If no functions are named, all functions are stopped.
schema.specific-function-name
Stops one specific function name. You cannot specify a function name as you
can in SQL; you must use the specific name. If a specific name was not
specified on the CREATE FUNCTION statement, query
SYSIBM.SYSROUTINES for the correct specific name:
SELECT SPECIFICNAME, PARM_COUNT
FROM SYSIBM.SYSROUTINES
WHERE NAME=’function_name’
AND SCHEMA=’schema_name’;
| SCOPE
| Specifies the scope of the command.
| (LOCAL)
| Specify to stop the function on the local member only.
| (GROUP)
| Specify to stop the function on all members of the data sharing group.
Usage notes
Limitations of STOP FUNCTION SPECIFIC: STOP FUNCTION SPECIFIC is only
applicable to external functions that run in the WLM application environment. STOP
FUNCTION SPECIFIC cannot stop a built-in function or a user-defined function
sourced on another function.
Examples
Example 1: Stop access to all functions. While the STOP FUNCTION SPECIFIC
command is in effect, DB2 queues all attempts to execute functions.
-STOP FUNCTION SPECIFIC ACTION(QUEUE)
Example 2: Stop access to all functions. While the STOP FUNCTION SPECIFIC
command is in effect, DB2 rejects attempts to execute functions.
-STOP FUNCTION SPECIFIC ACTION(REJECT)
Abbreviation: P
Environment
This command can be issued only from a z/OS console.
Authorization
The command requires an appropriate level of operating system authority, as
described in z/OS MVS System Commands.
Syntax
STOP irlmproc
Option description
irlmproc
Identifies the procedure name for the IRLM to be stopped.
Usage note
Terminating the IRLM: If IRLM does not shut down normally, issue the MODIFY
irlmproc,ABEND command to terminate the IRLM abnormally. If outstanding DB2
requests are in process and IRLM does not terminate, use the z/OS CANCEL
command. If all other means of removing the subsystem fail, issue the z/OS
FORCE CANCEL command:
F irlmproc,ABEND,DUMP
Example
Enter the following command on the system console:
P KRLM1
In a data sharing environment: You cannot issue the STOP irlmproc command to
| IRLM in a data sharing group until no DB2 subsystems are identified to that IRLM
and the IRLM issues the following messages:
DXR136I IR21 HAS DISCONNECTED FROM THE DATA SHARING GROUP
If the DB2 established stored procedure address space is connected to DB2, z/OS
stops it based on the syntax of the STOP PROCEDURE command.
DB2 implicitly issues the command STOP PROCEDURE ACTION(REJECT) for any
stored procedure that exceeds the maximum abend count. That count is set by the
MAX ABEND COUNT field of installation panel DSNTIPX.
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
| Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v Ownership of the stored procedure
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
|
| (*.*)
| STOP PROCEDURE
,
( schema.procedure-name )
schema.partial-name*
procedure-name
partial-name*
|
| QUEUE LOCAL
ACTION ( REJECT ) SCOPE ( GROUP )
Option descriptions
(*.*)
Stops access to all stored procedures in all schemas, including procedure
definitions that have not yet been accessed by DB2 applications. The
DB2-established stored procedures address space terminates after active work
is complete.
(schema.procedure-name)
Identifies the fully-qualified procedure name that is to be stopped.
(schema.partial-name*)
Stops a set of stored procedures in the specified schema. The names of all
procedures in the set begin with partial-name and can end with any string,
including the empty string. For example, PAYROLL.* stops all stored procedures
in the PAYROLL schema.
procedure-name
Identifies one or more specific stored procedure names to be stopped. The
procedure name is implicitly qualified with the SYSPROC schema name.
partial-name*
Stops a set of stored procedures within the SYSPROC schema. The names of
all procedures in the set begin with partial-name and can end with any string,
including the empty string. For example, ABC* stops all stored procedures with
names that begin with ABC.
ACTION
Indicates what to do with a CALL statement that is received while the procedure
is stopped. If STOP PROCEDURE is issued more than once for a given
procedure, the action taken is determined by the ACTION option on the most
recent command.
(QUEUE)
Queues the request until either:
v The wait exceeds the installation timeout value, or
v The stored procedure is started by the command START
PROCEDURE.
(REJECT)
Rejects the request
| SCOPE
| Specifies the scope of the command.
| (LOCAL)
| Specify to stop the procedure on the local member only.
| (GROUP)
| Specify to stop the procedure on all members of the data sharing group.
Usage notes
Permanently disabling a stored procedure: A stopped procedure does not remain
stopped if DB2 is stopped and restarted. To disable a stored procedure
permanently, you can:
v Drop the procedure using the DROP PROCEDURE statement. See Chapter 5 of
DB2 SQL Reference for more information.
v Use an ALTER PROCEDURE statement.
v Rename or delete the z/OS load module.
Examples
Example 1: Stop access to all stored procedures, and terminate the DB2 stored
procedures address space. While the STOP PROCEDURE command is in effect,
attempts to execute stored procedures are queued.
-STOP PROCEDURE ACTION(QUEUE)
DSNX947I - DSNX9SP2 STOP PROCEDURE SUCCESSFUL FOR *.*
DSN9022I - DSNX9COM ’-STOP PROC’ NORMAL COMPLETION
Example 2: Stop access to all stored procedures, and terminate the DB2 stored
procedures address space. While the STOP PROCEDURE command is in effect,
attempts to execute stored procedures are rejected.
-STOP PROCEDURE ACTION(REJECT)
DSNX947I - DSNX9SP2 STOP PROCEDURE SUCCESSFUL FOR *.*
DSN9022I - DSNX9COM ’-STOP PROC’ NORMAL COMPLETION
Example 3: Stop stored procedures USERPRC1 and USERPRC3. While the STOP
PROCEDURE command is in effect, attempts to execute these stored procedure
are queued.
-STOP PROCEDURE(USERPRC1,USERPRC3)
DSNX947I - DSNX9SP2 STOP PROCEDURE SUCCESSFUL FOR USERPRC1
DSNX947I - DSNX9SP2 STOP PROCEDURE SUCCESSFUL FOR USERPRC3
DSN9022I - DSNX9COM ’-STOP PROC’ NORMAL COMPLETION
Example 4: Stop stored procedures USERPRC1 and USERPRC3. While the STOP
PROCEDURE command is in effect, attempts to execute these stored procedure
are rejected.
-STOP PROCEDURE(USERPRC1,USERPRC3) ACTION(REJECT)
Environment
This command can be issued from a z/OS console, a DSN session under TSO, a
DB2I panel (DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following authorities:
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
STOP RLIMIT
Example
Stop the resource limit facility.
-STOP RLIMIT
One additional option to this command and additional values for a few other options
exist. This additional information is intended for service and use under the direction
of IBM Software Support. For details, see DB2 Diagnosis Guide and Reference.
Environment
This command can be issued from a z/OS console, a DSN session, a DB2I panel
(DB2 COMMANDS), an IMS or CICS terminal, or a program using the
instrumentation facility interface (IFI).
| Data sharing scope: Group or local, depending on the value of the SCOPE option.
Authorization
To execute this command, you must use a privilege set of the process that includes
one of the following privileges or authorities:
v TRACE privilege
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
Syntax
|
|
| COMMENT(string) LOCAL
SCOPE( GROUP )
|
destination block:
DEST( )
GTF
SMF
SRV
OPn
constraint block:
* *
, ,
* *
, ,
location-name
<luname>
ipaddr
Option descriptions
| For additional descriptions of each of the following trace types, see Chapter 73,
| “-START TRACE (DB2),” on page 361.
| (PERFM)
| Specify to stop a trace that is intended for performance analysis and tuning.
| Abbreviation: P
| (ACCTG)
| Specify to stop an accounting trace.
| Abbreviation: A
| (STAT)
| Specify to stop a trace that collects statistical data. The LOCATION option
| cannot be specified when you choose a statistics trace.
| Abbreviation: S
| (AUDIT)
| Specify to stop a trace that collects audit data from various components of DB2.
| Abbreviation: AU
| (MONITOR)
| Specify to stop a trace that collects monitor data.
| Abbreviation: MON
| (*) Specify to stop all trace activity. See “Usage notes” on page 402 for information
| about using STOP TRACE (*) with traces that use monitor trace class 6.
| SCOPE
| Specifies the scope of the command.
| (LOCAL)
| Stops the trace only on the local DB2 subsystem.
| (GROUP)
| Stops the trace on all members of a data sharing group.
COMMENT(string)
Gives a comment that is reproduced in the trace output record for the STOP
TRACE command (except in the resident trace tables).
string is any SQL string; it must be enclosed between apostrophes if it includes
a blank, comma, or special character.
DEST
Limits stopping to traces started for particular destinations. You can use more
than one value, but do not use the same value twice. If you do not specify a
value for DEST, DB2 does not use destination to limit which traces to stop.
Abbreviation: D
Possible values and their meanings are:
Value Trace destination
GTF The generalized trace facility
SMF The System Management Facility
SRV An exit to a user-written routine
OPn A specific destination. n can be a value from 1 to 8
See Chapter 73, “-START TRACE (DB2),” on page 361 for a list of allowable
destinations for each trace type.
PLAN(plan-name, ...)
Limits stopping to traces started for particular application plans. You can use up
to eight plan names. If you use more than one name, you can use only one
value for AUTHID, TNO, and LOCATION. Do not use this option with STAT.
The default is PLAN(*), which does not limit the command.
AUTHID(authorization-id, ...)
Limits stopping to traces started for particular authorization identifiers. You can
use up to eight identifiers. If you use more than one identifier, you can use only
one value for PLAN, TNO, and LOCATION. Do not use this option with STAT.
The default is AUTHID(*), which does not limit the command.
CLASS(integer, ...)
Limits stopping to traces started for particular classes. For descriptions of the
allowable classes, see Chapter 73, “-START TRACE (DB2),” on page 361. You
cannot specify a class if you did not specify a trace type.
Abbreviation: C
The default is CLASS(*), which does not limit the command.
TNO(integer, ...)
Limits stopping to particular traces, identified by their trace numbers (1 to 32, 01
to 09). You can use up to eight trace numbers. If you use more than one
number, you can use only one value each for PLAN, AUTHID, and LOCATION.
Requesters other than DB2 UDB for z/OS: DB2 does not receive a location
name from requesters that are not DB2. To display information about a
requester that is not a DB2 UDB for z/OS subsystem, enter its LUNAME,
enclosed by the less-than (<) and greater-than (>) symbols. For example, to
display information about a requester with the LUNAME of LULA, enter the
following command:
-STOP TRACE (*) LOCATION (<LULA>)
Usage notes
| Stopping specific traces: Each option that you use, except TNO, limits the effect
| of the command to active traces that were started using the same option, either
| explicitly or by default, with exactly the same parameter values. For example, the
| following command stops only the active traces that were started using the options
| PERFM and CLASS (1,2):
| -STOP TRACE (PERFM) CLASS (1,2)
| This command does not stop, for example, any trace started using CLASS(1).
| You must specify a trace type or an asterisk. For example, the following command
| stops all active traces:
| -STOP TRACE (*)
| Traces that use monitor trace class 6: When stopping trace classes, a special
| circumstance occurs if monitor trace class 6 is active. Monitor trace class 6 enables
| and disables data propagation. To avoid accidentally stopping this trace class, the
| commands STOP TRACE(*) and STOP TRACE(MON) CLASS(*) fail if monitor trace
| class 6 is active.
| To stop monitor trace class 6, you must explicitly specify it as one of the arguments
| of the CLASS option of the STOP TRACE command, including any other monitor
| trace classes that were started with monitor trace class 6. For example, if monitor
| trace class 6 was started with the command START TRACE(MON) CLASS(1,3,6),
| the following command stops it:
| -STOP TRACE(MON) CLASS(1,3,6)
| In the case where monitor trace class 6 was started with the command START
| TRACE(MON) CLASS(*), you must explicitly specify all 32 monitor trace classes to
| have monitor trace class 6 stopped:
| -STOP TRACE(MON) CLASS(1,2,3,4,5,6,...32)
| However, if monitor trace class 6 is not active the STOP TRACE(*) command stops
| all active traces.
Traces started by a IFI/IFC program: Before you stop an active trace, ensure that
an IFI application program or the IFC Selective Dump utility (DSN1SDMP) did not
start the trace. If you stop a trace started by DSN1SDMP, the DSN1SDMP utility
abnormally terminates.
Examples
Example 1: Stop all traces that have the generalized trace facility as their only
destination.
-STOP TRACE (*) DEST (GTF)
Example 2: Stop an accounting trace of all threads between the local and
USIBMSTODB21 DB2 subsystems for plan DSN8BC81. Include a comment.
-STOP TRACE (ACCTG)
PLAN (DSN8BC81)
LOCATION (USIBMSTODB21)
COMMENT(’ACCTG TRACE FOR DSN8BC81’)
Environment
This command can be issued from a z/OS console, a DSN session, DB2I panels
DB2 COMMANDS and DB2 UTILITIES, an IMS or CICS terminal, or a program
using the instrumentation facility interface (IFI).
Data sharing scope: Group or member. The utility is implicitly of group scope when
the utility is stopped. For release dependency information, see DB2 Data Sharing:
Planning and Administration.
Authorization
To execute this command, you must use the primary or some secondary
authorization ID of the process that originally submitted the utility job, or you must
use a privilege set of the process that includes one of the following authorities:
v DBMAINT authority
v DBCTRL authority
v DBADM authority
v SYSOPR authority
v SYSCTRL authority
v SYSADM authority
The utilities DIAGNOSE, REPORT, and STOSPACE can be terminated only by the
job submitter or by a holder of SYSOPR, SYSCTRL, or SYSADM authority.
| DB2 commands that are issued from a logged-on z/OS console or TSO SDSF can
| be checked by DB2 authorization using primary and secondary authorization IDs.
For users with DBMAINT, DBCTRL, or DBADM authority, the command takes effect
only when DB2 can determine that the user has sufficient authority over each object
that the utility job accesses.
Database DSNDB06 contains the table spaces and index spaces that are required
to check authorization. If a table or index space that is required for authorization
checking is affected by a utility that you need to terminate, installation SYSADM
authority is required to terminate that utility.
Syntax
Option descriptions
One of the following parameters must be specified.
(utility-id)
Is the utility identifier, or the UID parameter used when creating the utility job
step.
If utility-id was created by the DSNU CLIST by default, it has the form
tso-userid.control-file-name. For the control file name that is associated with
each utility, see the description of the DSNU utility in DB2 Utility Guide and
Reference.
If utility-id was created by default by the EXEC statement invoking DSNUTILB,
then the token has the form userid.jobname.
(partial-utility-id*)
Terminates every utility job that begins with partial-utility-id. For example, TERM
UTILITY(ABCD*) terminates every utility job step whose utility identifier begins
with the letters ABCD. If you have a two-part utility ID, such as ABCD.EFGH,
TERM UTILITY(ABCD*) also terminates that utility.
(*) Terminates every utility job step known to DB2 for which you are authorized.
Usage notes
Restarting utilities: A terminated utility job step cannot be restarted. You must
resubmit the step as a new utility job.
What happens to particular utilities: In some cases, terminating a utility job can
leave work in an undesirable state, requiring special processing before the job can
be resubmitted. The following list describes the effects of TERM UTILITY on jobs
for each of the utilities:
Utility Special effects of the TERM UTILITY command
| CATENFM None.
CATMAINT Places indexes in REBUILD-pending status.
CHECK DATA Table spaces remain in CHECK-pending status.
CHECK INDEX None.
CHECK LOB Places LOB table spaces and indexes in the utility
read-only (UTRO) state.
COPY Inserts “T” record in SYSIBM.SYSCOPY. When you
run COPY, COPY does not allow an incremental
image copy if the “T” record exists.
DIAGNOSE None.
LOAD See DB2 Utility Guide and Reference for the effect
of TERM on the LOAD utility phases.
MERGECOPY None.
MODIFY RECOVERY None.
MODIFY STATISTICS None.
QUIESCE None.
REBUILD INDEX Places the object that is being rebuilt in
REBUILD-pending status.
RECOVER Places the object that is being recovered in
RECOVER-pending status.
REORG INDEX See DB2 Utility Guide and Reference for the effect
of TERM on the REORG INDEX utility phases.
REORG TABLESPACE See DB2 Utility Guide and Reference for the effect
of TERM on the REORG TABLESPACE utility
phases.
REPAIR None.
REPORT None.
RUNSTATS None.
STOSPACE None.
UNLOAD The output data set remains incomplete until you
restart the utility job or delete the data set.
Examples
Example 1: Terminate all utility jobs for which you are authorized.
-TERM UTILITY (*)
Example 2: Terminate all utility jobs whose utility ID begins with SMITH.
-TERM UTILITY
(SMITH*)
Abbreviation: /TRA
Environment
This command can be issued only from an IMS terminal.
Authorization
To enter this command, users must have passed the IMS security check, as
described in IMS Administration Guide: System.
The syntax diagram includes only those parameters that DB2 users need to know.
For a diagram with the complete syntax of this command, see IMS Command
Reference.
Syntax
/TRACE SET ON
OFF ALL NOLOG
TABLE SUBS OPTION LOG
Option descriptions
The option descriptions for the /TRACE command are described in IMS Command
Reference; however, this section provides information about the two parameters
that are especially important for DB2 users.
SUBS
Indicates that the external subsystem trace table (containing information about
every interaction with DB2) is to be enabled or disabled. SET ON TABLE SUBS
enables the DB2 trace facility, and SET OFF TABLE SUBS disables it.
If nothing is specified with the TABLE keyword, then the default is ALL; ALL
includes SUBS, as well as other trace tables.
LOG
Specifies that traced data is to be written to the IMS system log. Because IMS
has a tracing mechanism that writes trace entries to the IMS system log, it is
important that DB2 users specify SET ON and TABLE OPTION LOG.
Otherwise, the trace information that IMS provides will not be available unless a
control region dump occurs.
Examples
Example 1: This command starts IMS tracing and:
v Enables the DB2 trace
v Writes IMS trace tables to the IMS log before they wrap.
/TRACE SET ON TABLE SUBS OPTION LOG
Environment
This command can be issued only from a z/OS console.
Authorization
This command requires an appropriate level of operating system authority, as
described in z/OS MVS System Commands.
The syntax diagram and option descriptions for this command are purposely
incomplete. Options that are not shown are described in z/OS MVS System
Commands.
Syntax
| ,WRAP
TRACE CT, WTRSTART=parmlibmem
,NOWRAP
WTRSTOP=jobname
ON, COMP=irlmssnm
,SUB=( DBM )
EXP
INT
SLM
XCF
XIT
OFF
Option descriptions
CT
Specifies the component trace. (Do not use other trace options available on the
z/OS TRACE command).
WTRSTART=parmlibmem
Identifies the member that contains source JCL. That JCL executes the
CTRACE writer and defines the data set to which it writes the trace buffers.
This member can be a procedure cataloged in SYS1.PROCLIB or a job.
WRAP
Specifies that when the system reaches the end of the group of data
sets, it writes over the oldest data at the beginning of the first data set
in the group. The system uses only the primary extents of the data sets.
© Copyright IBM Corp. 1983, 2004 411
TRACE CT (z/OS IRLM)
NOWRAP
Specifies that the system stops writing to the data sets when they are
all full. The system uses the primary and secondary extents of the data
sets.
WTRSTOP=jobname
Stops the CTRACE writer for a trace that is running. The system also
closes the data sets that the writer used.
jobname identifies the trace, either by:
v Member name, if the source JCL is a procedure
v Job name, if that appears on a JOB statement in the source JCL
ON
Turns on the trace.
| COMP=irlmssnm
Gives the IRLM subsystem name.
SUB=subname
Specifies the type of sublevel trace. Traces INT, EXP, and XIT are
ON by default. You cannot turn off traces INT and EXP. If you do
not specify a subname on the TRACE command, the trace is
performed on all subnames that you control. Specifying one
subname restricts the traces to that trace plus the EXP and INT
traces.
Use: To trace:
DBM Interactions with the identified DBMS
EXP Any exception condition
INT Member and group events outside normal locking activity
SLM Interactions with the z/OS locking component
XCF All interactions with z/OS cross-system coupling services
XIT Only asynchronous interactions with the z/OS locking
component
OFF
Turns off the trace. If IRLM is connected to a CTRACE writer for the
component trace, the system disconnects it.
Usage notes
Include the IRLM load module in the z/OS link list: This command uses z/OS
component trace services. Include the IRLM load module DXRRL183, which
contains a routine for stopping and starting, in the z/OS link list.
| The z/OS DISPLAY TRACE command output is incorrect for IRLM unless you use
| TRACE CT commands to inform z/OS of the TRACE status. IRLM initializes it’s own
| traces and writes them in CTRACE format, but IRLM has no interface to z/OS to
| inform it of the status. If you want to know the true status of the traces without
| using TRACE CT commands to inform z/OS, use the MODIFY
| irlmproc,STATUS,TRACE command.
Setting the number of trace buffers: To set the number of trace buffers used by
traces, use the z/OS MODIFY irlmproc,SET command, on page 269.
Sample procedure for the CTRACE writer: This procedure identifies the data set
| to which the next sample procedure writes data. The external trace writer must be
| executed at the same or higher dispatch priority as IRLM. This allows the I/O to
| keep up with the filling of the trace buffers.
//CTWTR PROC
// EXEC PGM=ITTTRCWR
//TRCOUT01 DD DSNAME=SYS1.WTR1,DISP=OLD
//TRCOUT02 DD DSNAME=SYS1.WTR2,DISP=OLD
Sample procedure to start and stop a DBM trace to the CTRACE writer: After
you enter the command TRACE CT,WTRSTART, turn the trace on and connect the
writer, using the WTR parameter in the reply for the command TRACE CT.
TRACE CT,WTRSTART=CTWTR
| TRACE
. CT,ON,COMP=IRLM,SUB=(DBM)
.
.
. (z/OS asks for a reply)
.
.
R 15,WTR=CTWTR,END
| TRACE
. CT,OFF,COMP=IRLM,SUB=(DBM)
.
.
(Wait to make sure trace buffers are externalized.)
TRACE CT,WTRSTOP=CTWTR
Impact of setting TRACE CT ON: Each active subname type requires up to 0.7
MB of ECSA. Because IRLM initializes its own traces when it starts, the DISPLAY
TRACE command shows that all traces are off. After you issue the TRACE ON
command, the reports are accurate except for the two subname types, INT and
EXT, which cannot be turned off.
The most rewarding task associated with a database management system is asking
questions of it and getting answers, the task called end use. Other tasks are also
necessary—defining the parameters of the system, putting the data in place, and so
on. The tasks that are associated with DB2 are grouped into the following major
categories (but supplemental information relating to all of the following tasks for new
releases of DB2 can be found in DB2 Release Planning Guide
Installation: If you are involved with DB2 only to install the system, DB2 Installation
Guide might be all you need.
If you will be using data sharing capabilities you also need DB2 Data Sharing:
Planning and Administration, which describes installation considerations for data
sharing.
End use: End users issue SQL statements to retrieve data. They can also insert,
update, or delete data, with SQL statements. They might need an introduction to
SQL, detailed instructions for using SPUFI, and an alphabetized reference to the
types of SQL statements. This information is found in DB2 Application Programming
and SQL Guide, and DB2 SQL Reference.
End users can also issue SQL statements through the DB2 Query Management
Facility (QMF) or some other program, and the library for that licensed program
might provide all the instruction or reference material they need. For a list of the
titles in the DB2 QMF library, see the bibliography at the end of this book.
Application programming: Some users access DB2 without knowing it, using
programs that contain SQL statements. DB2 application programmers write those
programs. Because they write SQL statements, they need the same resources that
end users do.
The material needed for writing a host program containing SQL is in DB2
Application Programming and SQL Guide and in DB2 Application Programming
Guide and Reference for Java. The material needed for writing applications that use
If you will be working in a distributed environment, you will need DB2 Reference for
Remote DRDA Requesters and Servers.
If you will be using the RACF access control module for DB2 authorization
checking, you will need DB2 RACF Access Control Module Guide.
If you are involved with DB2 only to design the database, or plan operational
procedures, you need DB2 Administration Guide. If you also want to carry out your
own plans by creating DB2 objects, granting privileges, running utility jobs, and so
on, you also need:
v DB2 SQL Reference, which describes the SQL statements you use to create,
alter, and drop objects and grant and revoke privileges
v DB2 Utility Guide and Reference, which explains how to run utilities
v DB2 Command Reference, which explains how to run commands
If you will be using data sharing, you need DB2 Data Sharing: Planning and
Administration, which describes how to plan for and implement data sharing.
Diagnosis: Diagnosticians detect and describe errors in the DB2 program. They
might also recommend or apply a remedy. The documentation for this task is in
DB2 Diagnosis Guide and Reference and DB2 Messages and Codes.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may be
used instead. However, it is the user’s responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you any
license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785
U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
IBM World Trade Asia Corporation
Licensing
2-31 Roppongi 3-chome, Minato-ku
Tokyo 106-0032, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION ″AS IS″ WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply to
you.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those
Web sites. The materials at those Web sites are not part of the materials for this
IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes
appropriate without incurring any obligation to you.
The licensed program described in this document and all licensed material available
for it are provided by IBM under terms of the IBM Customer Agreement, IBM
International Program License Agreement, or any equivalent agreement between
us.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Trademarks
The following terms are trademarks of International Business Machines Corporation
in the United States, other countries, or both:
AT ibm.com
BookManager IMS
C/370 iSeries
CICS Language Environment
CICS Connection MVS
DataPropagator OpenEdition
DB2 OS/390
DB2 Universal Database Parallel Sysplex
DFSMSdfp PR/SM
DFSMSdss QMF
DFSMShsm RACF
Distributed Relational Database Redbooks
Architecture SAA
DRDA SOM
Enterprise Storage Server System Object Model
ES/3090 System/390
eServer TotalStorage
FlashCopy VTAM
IBM WebSphere
IBM Registry z/OS
Java and all Java-based trademarks and logos are trademarks of Sun
Microsystems, Inc. in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Notices 427
428 Command Reference
Glossary
The following terms and abbreviations are defined after trigger. A trigger that is defined with the trigger
as they are used in the DB2 library. activation time AFTER.
APPL. A VTAM network definition statement that is authorized program analysis report (APAR). A
used to define DB2 to VTAM as an application program report of a problem that is caused by a suspected
that uses SNA LU 6.2 protocols. defect in a current release of an IBM supplied program.
application. A program or set of programs that authorized program facility (APF). A facility that
performs a task; for example, a payroll application. permits the identification of programs that are
authorized to use restricted functions.
application-directed connection. A connection that
an application manages using the SQL CONNECT | automatic query rewrite. A process that examines an
statement. | SQL statement that refers to one or more base tables,
| and, if appropriate, rewrites the query so that it performs
application plan. The control structure that is | better. This process can also determine whether to
produced during the bind process. DB2 uses the | rewrite a query so that it refers to one or more
application plan to process SQL statements that it | materialized query tables that are derived from the
encounters during statement execution. | source tables.
application process. The unit to which resources and auxiliary index. An index on an auxiliary table in
locks are allocated. An application process involves the which each index entry refers to a LOB.
execution of one or more programs.
auxiliary table. A table that stores columns outside
application programming interface (API). A the table in which they are defined. Contrast with base
functional interface that is supplied by the operating table.
system or by a separately orderable licensed program
that allows an application program that is written in a
high-level language to use specific data or functions of B
the operating system or licensed program.
backout. The process of undoing uncommitted
application requester. The component on a remote changes that an application process made. This might
system that generates DRDA requests for data on be necessary in the event of a failure on the part of an
behalf of an application. An application requester application process, or as a result of a deadlock
accesses a DB2 database server using the DRDA situation.
application-directed protocol.
backward log recovery. The fourth and final phase of
application server. The target of a request from a restart processing during which DB2 scans the log in a
remote application. In the DB2 environment, the backward direction to apply UNDO log records for all
application server function is provided by the distributed aborted changes.
data facility and is used to access DB2 data from
remote applications. base table. (1) A table that is created by the SQL
CREATE TABLE statement and that holds persistent
archive log. The portion of the DB2 log that contains data. Contrast with result table and temporary table.
log records that have been copied from the active log. (2) A table containing a LOB column definition. The
actual LOB column data is not stored with the base
ASCII. An encoding scheme that is used to represent
table. The base table contains a row identifier for each
strings in many environments, typically on PCs and
row and an indicator column for each of its LOB
workstations. Contrast with EBCDIC and Unicode.
columns. Contrast with auxiliary table.
| ASID. Address space identifier. base table space. A table space that contains base
attachment facility. An interface between DB2 and tables.
TSO, IMS, CICS, or batch address spaces. An
basic predicate. A predicate that compares two
attachment facility allows application programs to
values.
access DB2.
basic sequential access method (BSAM). An access
attribute. A characteristic of an entity. For example, in
method for storing or retrieving data blocks in a
database design, the phone number of an employee is
continuous sequence, using either a sequential-access
one of that employee’s attributes.
or a direct-access device.
authorization ID. A string that can be verified for
| batch message processing program. In IMS, an
connection to DB2 and to which a set of privileges is
| application program that can perform batch-type
allowed. It can represent an individual, an organizational
| processing online and can access the IMS input and
group, or a function, but DB2 does not determine this
| output message queues.
representation.
before trigger. A trigger that is defined with the trigger buffer pool. Main storage that is reserved to satisfy
activation time BEFORE. the buffering requirements for one or more table spaces
or indexes.
binary integer. A basic data type that can be further
classified as small integer or large integer. built-in data type. A data type that IBM supplies.
Among the built-in data types for DB2 UDB for z/OS are
binary large object (BLOB). A sequence of bytes string, numeric, ROWID, and datetime. Contrast with
where the size of the value ranges from 0 bytes to distinct type.
2 GB−1. Such a string does not have an associated
CCSID. built-in function. A function that DB2 supplies.
Contrast with user-defined function.
binary string. A sequence of bytes that is not
associated with a CCSID. For example, the BLOB data business dimension. A category of data, such as
type is a binary string. products or time periods, that an organization might
want to analyze.
bind. The process by which the output from the SQL
precompiler is converted to a usable control structure,
often called an access plan, application plan, or C
package. During this process, access paths to the data
are selected and some authorization checking is cache structure. A coupling facility structure that
performed. The types of bind are: stores data that can be available to all members of a
automatic bind. (More correctly, automatic rebind) A Sysplex. A DB2 data sharing group uses cache
process by which SQL statements are bound structures as group buffer pools.
automatically (without a user issuing a BIND
CAF. Call attachment facility.
command) when an application process begins
execution and the bound application plan or call attachment facility (CAF). A DB2 attachment
package it requires is not valid. facility for application programs that run in TSO or z/OS
dynamic bind. A process by which SQL statements batch. The CAF is an alternative to the DSN command
are bound as they are entered. processor and provides greater control over the
incremental bind. A process by which SQL execution environment.
statements are bound during the execution of an
application process. call-level interface (CLI). A callable application
static bind. A process by which SQL statements are programming interface (API) for database access, which
bound after they have been precompiled. All static is an alternative to using embedded SQL. In contrast to
SQL statements are prepared for execution at the embedded SQL, DB2 ODBC (which is based on the CLI
same time. architecture) does not require the user to precompile or
bind applications, but instead provides a standard set of
bit data. Data that is character type CHAR or functions to process SQL statements and related
VARCHAR and is not associated with a coded character services at run time.
set.
cascade delete. The way in which DB2 enforces
BLOB. Binary large object. referential constraints when it deletes all descendent
rows of a deleted parent row.
block fetch. A capability in which DB2 can retrieve, or
fetch, a large set of rows together. Using block fetch CASE expression. An expression that is selected
can significantly reduce the number of messages that based on the evaluation of one or more conditions.
are being sent across the network. Block fetch applies
only to cursors that do not update data. cast function. A function that is used to convert
instances of a (source) data type into instances of a
BMP. Batch Message Processing (IMS). See batch different (target) data type. In general, a cast function
message processing program. has the name of the target data type. It has one single
argument whose type is the source data type; its return
bootstrap data set (BSDS). A VSAM data set that
type is the target data type.
contains name and status information for DB2, as well
as RBA range specifications, for all active and archive castout. The DB2 process of writing changed pages
log data sets. It also contains passwords for the DB2 from a group buffer pool to disk.
directory and catalog, and lists of conditional restart and
checkpoint records. castout owner. The DB2 member that is responsible
for casting out a particular page set or partition.
BSAM. Basic sequential access method.
catalog. In DB2, a collection of tables that contains
BSDS. Bootstrap data set. descriptions of objects such as tables, views, and
indexes.
Glossary 431
catalog table • closed application
catalog table. Any table in the DB2 catalog. | statements because of rows that violate referential
| constraints, check constraints, or both.
CCSID. Coded character set identifier.
checkpoint. A point at which DB2 records internal
CDB. Communications database. status information on the DB2 log; the recovery process
uses this information if DB2 abnormally terminates.
CDRA. Character Data Representation Architecture.
| child lock. For explicit hierarchical locking, a lock that
CEC. Central electronic complex. See central | is held on either a table, page, row, or a large object
processor complex. | (LOB). Each child lock has a parent lock. See also
| parent lock.
central electronic complex (CEC). See central
processor complex. CI. Control interval.
central processor (CP). The part of the computer that | CICS. Represents (in this publication): CICS
contains the sequencing and processing facilities for | Transaction Server for z/OS: Customer Information
instruction execution, initial program load, and other | Control System Transaction Server for z/OS.
machine operations.
CICS attachment facility. A DB2 subcomponent that
central processor complex (CPC). A physical uses the z/OS subsystem interface (SSI) and
collection of hardware (such as an ES/3090™) that cross-storage linkage to process requests from CICS to
consists of main storage, one or more central DB2 and to coordinate resource commitment.
processors, timers, and channels.
CIDF. Control interval definition field.
| CFRM. Coupling facility resource management.
claim. A notification to DB2 that an object is being
CFRM policy. A declaration by a z/OS administrator accessed. Claims prevent drains from occurring until the
regarding the allocation rules for a coupling facility claim is released, which usually occurs at a commit
structure. point. Contrast with drain.
character conversion. The process of changing claim class. A specific type of object access that can
characters from one encoding scheme to another. be one of the following isolation levels:
Cursor stability (CS)
Character Data Representation Architecture
Repeatable read (RR)
(CDRA). An architecture that is used to achieve
Write
consistent representation, processing, and interchange
of string data. claim count. A count of the number of agents that are
accessing an object.
character large object (CLOB). A sequence of bytes
representing single-byte characters or a mixture of class of service. A VTAM term for a list of routes
single- and double-byte characters where the size of the through a network, arranged in an order of preference
value can be up to 2 GB−1. In general, character large for their use.
object values are used whenever a character string
might exceed the limits of the VARCHAR type. class word. A single word that indicates the nature of
a data attribute. For example, the class word PROJ
character set. A defined set of characters. indicates that the attribute identifies a project.
character string. A sequence of bytes that represent clause. In SQL, a distinct part of a statement, such as
bit data, single-byte characters, or a mixture of a SELECT clause or a WHERE clause.
single-byte and multibyte characters.
CLI. Call- level interface.
check constraint. A user-defined constraint that
specifies the values that specific columns of a base client. See requester.
table can contain.
CLIST. Command list. A language for performing TSO
check integrity. The condition that exists when each tasks.
row in a table conforms to the check constraints that are
defined on that table. Maintaining check integrity CLOB. Character large object.
requires DB2 to enforce check constraints on operations
that add or change data. closed application. An application that requires
exclusive use of certain statements on certain DB2
| check pending. A state of a table space or partition objects, so that the objects are managed solely through
| that prevents its use by some utilities and by some SQL the application’s external interface.
CLPA. Create link pack area. command recognition character (CRC). A character
that permits a z/OS console operator or an IMS
| clustering index. An index that determines how rows subsystem user to route DB2 commands to specific
| are physically ordered (clustered) in a table space. If a DB2 subsystems.
| clustering index on a partitioned table is not a
| partitioning index, the rows are ordered in cluster command scope. The scope of command operation in
| sequence within each data partition instead of spanning a data sharing group. If a command has member scope,
| partitions. Prior to Version 8 of DB2 UDB for z/OS, the the command displays information only from the one
| partitioning index was required to be the clustering member or affects only non-shared resources that are
| index. owned locally by that member. If a command has group
scope, the command displays information from all
coded character set. A set of unambiguous rules that members, affects non-shared resources that are owned
establish a character set and the one-to-one locally by all members, displays information on sharable
relationships between the characters of the set and their resources, or affects sharable resources.
coded representations.
commit. The operation that ends a unit of work by
coded character set identifier (CCSID). A 16-bit releasing locks so that the database changes that are
number that uniquely identifies a coded representation made by that unit of work can be perceived by other
of graphic characters. It designates an encoding processes.
scheme identifier and one or more pairs consisting of a
character set identifier and an associated code page commit point. A point in time when data is considered
identifier. consistent.
code page. (1) A set of assignments of characters to committed phase. The second phase of the multisite
code points. In EBCDIC, for example, the character 'A' update process that requests all participants to commit
is assigned code point X'C1' (2) , and character 'B' is the effects of the logical unit of work.
assigned code point X'C2'. Within a code page, each
code point has only one specific meaning. common service area (CSA). In z/OS, a part of the
common area that contains data areas that are
code point. In CDRA, a unique bit pattern that addressable by all address spaces.
represents a character in a code page.
communications database (CDB). A set of tables in
coexistence. During migration, the period of time in the DB2 catalog that are used to establish
which two releases exist in the same data sharing conversations with remote database management
group. systems.
cold start. A process by which DB2 restarts without comparison operator. A token (such as =, >, or <)
processing any log records. Contrast with warm start. that is used to specify a relationship between two
values.
collection. A group of packages that have the same
qualifier. composite key. An ordered set of key columns of the
same table.
column. The vertical component of a table. A column
has a name and a particular data type (for example, compression dictionary. The dictionary that controls
character, decimal, or integer). the process of compression and decompression. This
dictionary is created from the data in the table space or
column function. An operation that derives its result table space partition.
by using values from one or more rows. Contrast with
scalar function. concurrency. The shared use of resources by more
than one application process at the same time.
"come from" checking. An LU 6.2 security option
that defines a list of authorization IDs that are allowed conditional restart. A DB2 restart that is directed by a
to connect to DB2 from a partner LU. user-defined conditional restart control record (CRCR).
Glossary 433
connection declaration clause • coupling facility resource management
connection declaration clause. In SQLJ, a statement | copy pool. A named set of SMS storage groups that
that declares a connection to a data source. | contains data that is to be copied collectively. A copy
| pool is an SMS construct that lets you define which
connection handle. The data object containing | storage groups are to be copied by using FlashCopy
information that is associated with a connection that | functions. HSM determines which volumes belong to a
DB2 ODBC manages. This includes general status | copy pool.
information, transaction status, and diagnostic
information. | copy target. A named set of SMS storage groups that
| are to be used as containers for copy pool volume
connection ID. An identifier that is supplied by the | copies. A copy target is an SMS construct that lets you
attachment facility and that is associated with a specific | define which storage groups are to be used as
address space connection. | containers for volumes that are copied by using
| FlashCopy functions.
consistency token. A timestamp that is used to
generate the version identifier for an application. See | copy version. A point-in-time FlashCopy copy that is
also version. | managed by HSM. Each copy pool has a version
| parameter that specifies how many copy versions are
constant. A language element that specifies an | maintained on disk.
unchanging value. Constants are classified as string
constants or numeric constants. Contrast with variable. correlated columns. A relationship between the value
of one column and the value of another column.
constraint. A rule that limits the values that can be
inserted, deleted, or updated in a table. See referential correlated subquery. A subquery (part of a WHERE
constraint, check constraint, and unique constraint. or HAVING clause) that is applied to a row or group of
rows of a table or view that is named in an outer
context. The application’s logical connection to the subselect statement.
data source and associated internal DB2 ODBC
connection information that allows the application to correlation ID. An identifier that is associated with a
direct its operations to a data source. A DB2 ODBC specific thread. In TSO, it is either an authorization ID
context represents a DB2 thread. or the job name.
contracting conversion. A process that occurs when correlation name. An identifier that designates a
the length of a converted string is smaller than that of table, a view, or individual rows of a table or view within
the source string. For example, this process occurs a single SQL statement. It can be defined in any FROM
when an EBCDIC mixed-data string that contains DBCS clause or in the first clause of an UPDATE or DELETE
characters is converted to ASCII mixed data; the statement.
converted string is shorter because of the removal of
the shift codes. cost category. A category into which DB2 places cost
estimates for SQL statements at the time the statement
control interval (CI). A fixed-length area or disk in is bound. A cost estimate can be placed in either of the
which VSAM stores records and creates distributed free following cost categories:
space. Also, in a key-sequenced data set or file, the set v A: Indicates that DB2 had enough information to
of records that an entry in the sequence-set index make a cost estimate without using default values.
record points to. The control interval is the unit of v B: Indicates that some condition exists for which DB2
information that VSAM transmits to or from disk. A was forced to use default values for its estimate.
control interval always includes an integral number of
physical records. The cost category is externalized in the
COST_CATEGORY column of the
control interval definition field (CIDF). In VSAM, a DSN_STATEMNT_TABLE when a statement is
field that is located in the 4 bytes at the end of each explained.
control interval; it describes the free space, if any, in the
control interval. coupling facility. A special PR/SM™ LPAR logical
partition that runs the coupling facility control program
conversation. Communication, which is based on LU and provides high-speed caching, list processing, and
6.2 or Advanced Program-to-Program Communication locking functions in a Parallel Sysplex®.
(APPC), between an application and a remote
transaction program over an SNA logical unit-to-logical | coupling facility resource management. A
unit (LU-LU) session that allows communication while | component of z/OS that provides the services to
processing a transaction. | manage coupling facility resources in a Parallel Sysplex.
| This management includes the enforcement of CFRM
coordinator. The system component that coordinates | policies to ensure that the coupling facility and structure
the commit or rollback of a unit of work that includes | requirements are satisfied.
work that is done on one or more other systems.
CP. Central processor. current status rebuild. The second phase of restart
processing during which the status of the subsystem is
CPC. Central processor complex. reconstructed from information on the log.
C++ member. A data object or function in a structure, cursor. A named control structure that an application
union, or class. program uses to point to a single row or multiple rows
within some ordered set of rows of a result table. A
C++ member function. An operator or function that is cursor can be used to retrieve, update, or delete rows
declared as a member of a class. A member function from a result table.
has access to the private and protected data members
and to the member functions of objects in its class. cursor sensitivity. The degree to which database
Member functions are also called methods. updates are visible to the subsequent FETCH
statements in a cursor. A cursor can be sensitive to
C++ object. (1) A region of storage. An object is changes that are made with positioned update and
created when a variable is defined or a new function is delete statements specifying the name of that cursor. A
invoked. (2) An instance of a class. cursor can also be sensitive to changes that are made
with searched update or delete statements, or with
CRC. Command recognition character.
cursors other than this cursor. These changes can be
CRCR. Conditional restart control record. See also made by this application process or by another
conditional restart. application process.
create link pack area (CLPA). An option that is used cursor stability (CS). The isolation level that provides
during IPL to initialize the link pack pageable area. maximum concurrency without the ability to read
uncommitted data. With cursor stability, a unit of work
created temporary table. A table that holds temporary holds locks only on its uncommitted changes and on the
data and is defined with the SQL statement CREATE current row of each of its cursors.
GLOBAL TEMPORARY TABLE. Information about
created temporary tables is stored in the DB2 catalog, cursor table (CT). The copy of the skeleton cursor
so this kind of table is persistent and can be shared table that is used by an executing application process.
across application processes. Contrast with declared
cycle. A set of tables that can be ordered so that each
temporary table. See also temporary table.
table is a descendent of the one before it, and the first
cross-memory linkage. A method for invoking a table is a descendent of the last table. A self-referencing
program in a different address space. The invocation is table is a cycle with a single member.
synchronous with respect to the caller.
Glossary 435
database descriptor (DBD) • DBD
| SQL statements are not modified and are sent data mining. The process of collecting critical
| unchanged to the database server. business information from a data warehouse, correlating
it, and uncovering associations, patterns, and trends.
| database descriptor (DBD). An internal
| representation of a DB2 database definition, which data partition. A VSAM data set that is contained
| reflects the data definition that is in the DB2 catalog. within a partitioned table space.
| The objects that are defined in a database descriptor
| are table spaces, tables, indexes, index spaces, data-partitioned secondary index (DPSI). A
| relationships, check constraints, and triggers. A DBD secondary index that is partitioned. The index is
| also contains information about accessing tables in the partitioned according to the underlying data.
| database.
data sharing. The ability of two or more DB2
database exception status. An indication that subsystems to directly access and change a single set
something is wrong with a database. All members of a of data.
data sharing group must know and share the exception
status of databases. data sharing group. A collection of one or more DB2
subsystems that directly access and change the same
| database identifier (DBID). An internal identifier of the data while maintaining data integrity.
| database.
data sharing member. A DB2 subsystem that is
database management system (DBMS). A software assigned by XCF services to a data sharing group.
system that controls the creation, organization, and
modification of a database and the access to the data data source. A local or remote relational or
that is stored within it. non-relational data manager that is capable of
supporting data access via an ODBC driver that
database request module (DBRM). A data set supports the ODBC APIs. In the case of DB2 UDB for
member that is created by the DB2 precompiler and that z/OS, the data sources are always relational database
contains information about SQL statements. DBRMs are managers.
used in the bind process.
| data space. In releases prior to DB2 UDB for z/OS,
database server. The target of a request from a local | Version 8, a range of up to 2 GB of contiguous virtual
application or an intermediate database server. In the | storage addresses that a program can directly
DB2 environment, the database server function is | manipulate. Unlike an address space, a data space can
provided by the distributed data facility to access DB2 | hold only data; it does not contain common areas,
data from local applications, or from a remote database | system data, or programs.
server that acts as an intermediate database server.
data type. An attribute of columns, literals, host
data currency. The state in which data that is variables, special registers, and the results of functions
retrieved into a host variable in your program is a copy and expressions.
of data in the base table.
data warehouse. A system that provides critical
data definition name (ddname). The name of a data business information to an organization. The data
definition (DD) statement that corresponds to a data warehouse system cleanses the data for accuracy and
control block containing the same name. currency, and then presents the data to decision makers
so that they can interpret and use it effectively and
data dictionary. A repository of information about an efficiently.
organization’s application programs, databases, logical
data models, users, and authorizations. A data date. A three-part value that designates a day, month,
dictionary can be manual or automated. and year.
data-driven business rules. Constraints on particular date duration. A decimal integer that represents a
data values that exist as a result of requirements of the number of years, months, and days.
business.
datetime value. A value of the data type DATE, TIME,
Data Language/I (DL/I). The IMS data manipulation or TIMESTAMP.
language; a common high-level interface between a
user application and IMS. DBA. Database administrator.
data mart. A small data warehouse that applies to a DBCLOB. Double-byte character large object.
single department or team. See also data warehouse.
DBCS. Double-byte character set.
DBRM. Database request module. deferred embedded SQL. SQL statements that are
neither fully static nor fully dynamic. Like static
DB2 catalog. Tables that are maintained by DB2 and statements, they are embedded within an application,
contain descriptions of DB2 objects, such as tables, but like dynamic statements, they are prepared during
views, and indexes. the execution of the application.
DB2 command. An instruction to the DB2 subsystem deferred write. The process of asynchronously writing
that a user enters to start or stop DB2, to display changed data pages to disk.
information on current users, to start or stop databases,
to display information on the status of databases, and degree of parallelism. The number of concurrently
so on. executed operations that are initiated to process a
query.
DB2 for VSE & VM. The IBM DB2 relational database
management system for the VSE and VM operating delete-connected. A table that is a dependent of table
systems. P or a dependent of a table to which delete operations
from table P cascade.
DB2I. DB2 Interactive.
delete hole. The location on which a cursor is
DB2 Interactive (DB2I). The DB2 facility that provides positioned when a row in a result table is refetched and
for the execution of SQL statements, DB2 (operator) the row no longer exists on the base table, because
commands, programmer commands, and utility another cursor deleted the row between the time the
invocation. cursor first included the row in the result table and the
time the cursor tried to refetch it.
DB2I Kanji Feature. The tape that contains the panels
and jobs that allow a site to display DB2I panels in delete rule. The rule that tells DB2 what to do to a
Kanji. dependent row when a parent row is deleted. For each
relationship, the rule might be CASCADE, RESTRICT,
DB2 PM. DB2 Performance Monitor.
SET NULL, or NO ACTION.
DB2 thread. The DB2 structure that describes an
delete trigger. A trigger that is defined with the
application’s connection, traces its progress, processes
triggering SQL operation DELETE.
resource functions, and delimits its accessibility to DB2
resources and services. delimited identifier. A sequence of characters that are
enclosed within double quotation marks ("). The
DCLGEN. Declarations generator.
sequence must consist of a letter followed by zero or
DDF. Distributed data facility. more characters, each of which is a letter, digit, or the
underscore character (_).
ddname. Data definition name.
delimiter token. A string constant, a delimited
deadlock. Unresolvable contention for the use of a identifier, an operator symbol, or any of the special
resource, such as a table or an index. characters that are shown in DB2 syntax diagrams.
declarations generator (DCLGEN). A subcomponent denormalization. A key step in the task of building a
of DB2 that generates SQL table declarations and physical relational database design. Denormalization is
COBOL, C, or PL/I data structure declarations that the intentional duplication of columns in multiple tables,
conform to the table. The declarations are generated and the consequence is increased data redundancy.
from DB2 system catalog information. DCLGEN is also Denormalization is sometimes necessary to minimize
a DSN subcommand. performance problems. Contrast with normalization.
declared temporary table. A table that holds dependent. An object (row, table, or table space) that
temporary data and is defined with the SQL statement has at least one parent. The object is also said to be a
DECLARE GLOBAL TEMPORARY TABLE. Information dependent (row, table, or table space) of its parent. See
about declared temporary tables is not stored in the also parent row, parent table, parent table space.
DB2 catalog, so this kind of table is not persistent and
can be used only by the application process that issued dependent row. A row that contains a foreign key that
the DECLARE statement. Contrast with created matches the value of a primary key in the parent row.
temporary table. See also temporary table.
dependent table. A table that is a dependent in at
least one referential constraint.
Glossary 437
DES-based authenticator • DRDA access
directory. The DB2 system database that contains downstream. The set of nodes in the syncpoint tree
internal objects such as database descriptors and that is connected to the local DBMS as a participant in
skeleton cursor tables. the execution of a two-phase commit.
distinct type. A user-defined data type that is | DPSI. Data-partitioned secondary index.
internally represented as an existing type (its source
type), but is considered to be a separate and drain. The act of acquiring a locked resource by
incompatible type for semantic purposes. quiescing access to that object.
distributed data. Data that resides on a DBMS other drain lock. A lock on a claim class that prevents a
than the local system. claim from occurring.
distributed data facility (DDF). A set of DB2 DRDA. Distributed Relational Database Architecture.
components through which DB2 communicates with
another relational database management system. DRDA access. An open method of accessing
distributed data that you can use to can connect to
another database server to execute packages that were
previously bound at the server location. You use the
SQL CONNECT statement or an SQL statement with a encoding scheme. A set of rules to represent
three-part name to identify the server. Contrast with character data (ASCII, EBCDIC, or Unicode).
private protocol access.
entity. A significant object of interest to an
DSN. (1) The default DB2 subsystem name. (2) The organization.
name of the TSO command processor of DB2. (3) The
first three characters of DB2 module and macro names. enumerated list. A set of DB2 objects that are defined
with a LISTDEF utility control statement in which
duration. A number that represents an interval of time. pattern-matching characters (*, %, _ or ?) are not used.
See also date duration, labeled duration, and time
duration. environment. A collection of names of logical and
physical resources that are used to support the
| dynamic cursor. A named control structure that an performance of a function.
| application program uses to change the size of the
| result table and the order of its rows after the cursor is environment handle. In DB2 ODBC, the data object
| opened. Contrast with static cursor. that contains global information regarding the state of
the application. An environment handle must be
dynamic dump. A dump that is issued during the allocated before a connection handle can be allocated.
execution of a program, usually under the control of that Only one environment handle can be allocated per
program. application.
dynamic SQL. SQL statements that are prepared and EOM. End of memory.
executed within an application program while the
program is executing. In dynamic SQL, the SQL source EOT. End of task.
is contained in host language variables rather than
being coded into the application program. The SQL equijoin. A join operation in which the join-condition
statement can change several times during the has the form expression = expression.
application program’s execution.
error page range. A range of pages that are
| dynamic statement cache pool. A cache, located considered to be physically damaged. DB2 does not
| above the 2-GB storage line, that holds dynamic allow users to access any pages that fall within this
| statements. range.
| EB. See exabyte. ESMT. External subsystem module table (in IMS).
EBCDIC. Extended binary coded decimal interchange EUR. IBM European Standards.
code. An encoding scheme that is used to represent
character data in the z/OS, VM, VSE, and iSeries™
| exabyte. For processor, real and virtual storage
environments. Contrast with ASCII and Unicode.
| capacities and channel volume:
| 1 152 921 504 606 846 976 bytes or 260.
e-business. The transformation of key business
exception table. A table that holds rows that violate
processes through the use of Internet technologies.
referential constraints or check constraints that the
| EDM pool. A pool of main storage that is used for CHECK DATA utility finds.
| database descriptors, application plans, authorization
exclusive lock. A lock that prevents concurrently
| cache, application packages.
executing application processes from reading or
EID. Event identifier. changing data. Contrast with share lock.
embedded SQL. SQL statements that are coded executable statement. An SQL statement that can be
within an application program. See static SQL. embedded in an application program, dynamically
prepared and executed, or issued interactively.
enclave. In Language Environment , an independent
collection of routines, one of which is designated as the execution context. In SQLJ, a Java object that can
main routine. An enclave is similar to a program or run be used to control the execution of SQL statements.
unit.
Glossary 439
exit routine • forest
forget. In a two-phase commit operation, (1) the vote function signature. The logical concatenation of a
that is sent to the prepare phase when the participant fully qualified function name with the data types of all of
has not modified any data. The forget vote allows a its parameters.
participant to release locks and forget about the logical
unit of work. This is also referred to as the read-only
vote. (2) The response to the committed request in the
G
second phase of the operation.
GB. Gigabyte (1 073 741 824 bytes).
forward log recovery. The third phase of restart
GBP. Group buffer pool.
processing during which DB2 processes the log in a
forward direction to apply all REDO log records. GBP-dependent. The status of a page set or page set
partition that is dependent on the group buffer pool.
free space. The total amount of unused space in a
Either read/write interest is active among DB2
page; that is, the space that is not used to store records
subsystems for this page set, or the page set has
or control information is free space.
changed pages in the group buffer pool that have not
full outer join. The result of a join operation that yet been cast out to disk.
includes the matched rows of both tables that are being
generalized trace facility (GTF). A z/OS service
joined and preserves the unmatched rows of both
program that records significant system events such as
tables. See also join.
I/O interrupts, SVC interrupts, program interrupts, or
fullselect. A subselect, a values-clause, or a number external interrupts.
of both that are combined by set operators. Fullselect
generic resource name. A name that VTAM uses to
specifies a result table. If UNION is not used, the result
represent several application programs that provide the
of the fullselect is the result of the specified subselect.
same function in order to handle session distribution
| fully escaped mapping. A mapping from an SQL and balancing in a Sysplex environment.
| identifier to an XML name when the SQL identifier is a
getpage. An operation in which DB2 accesses a data
| column name.
page.
function. A mapping, which is embodied as a program
global lock. A lock that provides concurrency control
(the function body) that is invocable by means of zero
within and among DB2 subsystems. The scope of the
or more input values (arguments) to a single value (the
lock is across all DB2 subsystems of a data sharing
result). See also column function and scalar function.
group.
Functions can be user-defined, built-in, or generated by
DB2. (See also built-in function, cast function, external global lock contention. Conflicts on locking requests
function, sourced function, SQL function, and between different DB2 members of a data sharing group
user-defined function.) when those members are trying to serialize shared
resources.
function definer. The authorization ID of the owner of
the schema of the function that is specified in the governor. See resource limit facility.
CREATE FUNCTION statement.
graphic string. A sequence of DBCS characters.
function implementer. The authorization ID of the
owner of the function program and function package. gross lock. The shared, update, or exclusive mode
locks on a table, partition, or table space.
function package. A package that results from binding
the DBRM for a function program. group buffer pool (GBP). A coupling facility cache
structure that is used by a data sharing group to cache
function package owner. The authorization ID of the data and to ensure that the data is consistent for all
user who binds the function program’s DBRM into a members.
function package.
group buffer pool duplexing. The ability to write data
function resolution. The process, internal to the to two instances of a group buffer pool structure: a
DBMS, by which a function invocation is bound to a primary group buffer pool and a secondary group buffer
particular function instance. This process uses the pool. z/OS publications refer to these instances as the
function name, the data types of the arguments, and a "old" (for primary) and "new" (for secondary) structures.
list of the applicable schema names (called the SQL
path) to make the selection. This process is sometimes group level. The release level of a data sharing
called function selection. group, which is established when the first member
migrates to a new release.
function selection. See function resolution.
Glossary 441
group name • IMS
group name. The z/OS XCF identifier for a data | host variable array. An array of elements, each of
sharing group. | which corresponds to a value for a column. The
| dimension of the array determines the maximum
group restart. A restart of at least one member of a | number of rows for which the array can be used.
data sharing group after the loss of either locks or the
shared communications area. HSM. Hierarchical storage manager.
heuristic decision. A decision that forces indoubt identify. A request that an attachment service program
resolution at a participant by means other than in an address space that is separate from DB2 issues
automatic resynchronization between coordinator and thorough the z/OS subsystem interface to inform DB2 of
participant. its existence and to initiate the process of becoming
connected to DB2.
| hole. A row of the result table that cannot be accessed
| because of a delete or an update that has been identity column. A column that provides a way for
| performed on the row. See also delete hole and update DB2 to automatically generate a numeric value for each
| hole. row. The generated values are unique if cycling is not
used. Identity columns are defined with the AS
home address space. The area of storage that z/OS IDENTITY clause. Uniqueness of values can be
currently recognizes as dispatched. ensured by defining a unique index that contains only
the identity column. A table can have no more than one
host. The set of programs and resources that are identity column.
available on a given TCP/IP instance.
IFCID. Instrumentation facility component identifier.
host expression. A Java variable or expression that is
referenced by SQL clauses in an SQLJ application IFI. Instrumentation facility interface.
program.
IFI call. An invocation of the instrumentation facility
host identifier. A name that is declared in the host interface (IFI) by means of one of its defined functions.
program.
IFP. IMS Fast Path.
host language. A programming language in which you
can embed SQL statements. image copy. An exact reproduction of all or part of a
table space. DB2 provides utility programs to make full
host program. An application program that is written image copies (to copy the entire table space) or
in a host language and that contains embedded SQL incremental image copies (to copy only those pages
statements. that have been modified since the last image copy).
host structure. In an application program, a structure implied forget. In the presumed-abort protocol, an
that is referenced by embedded SQL statements. implied response of forget to the second-phase
committed request from the coordinator. The response
host variable. In an application program, an is implied when the participant responds to any
application variable that is referenced by embedded subsequent request from the coordinator.
SQL statements.
IMS. Information Management System.
IMS attachment facility. A DB2 subcomponent that indoubt resolution. The process of resolving the
uses z/OS subsystem interface (SSI) protocols and status of an indoubt logical unit of work to either the
cross-memory linkage to process requests from IMS to committed or the rollback state.
DB2 and to coordinate resource commitment.
inflight. A status of a unit of recovery. If DB2 fails
IMS DB. Information Management System Database. before its unit of recovery completes phase 1 of the
commit process, it merely backs out the updates of its
IMS TM. Information Management System Transaction unit of recovery at restart. These units of recovery are
Manager. termed inflight.
in-abort. A status of a unit of recovery. If DB2 fails inheritance. The passing downstream of class
after a unit of recovery begins to be rolled back, but resources or attributes from a parent class in the class
before the process is completed, DB2 continues to back hierarchy to a child class.
out the changes during restart.
initialization file. For DB2 ODBC applications, a file
in-commit. A status of a unit of recovery. If DB2 fails containing values that can be set to adjust the
after beginning its phase 2 commit processing, it performance of the database manager.
"knows," when restarted, that changes made to data are
consistent. Such units of recovery are termed in-commit. inline copy. A copy that is produced by the LOAD or
REORG utility. The data set that the inline copy
independent. An object (row, table, or table space) produces is logically equivalent to a full image copy that
that is neither a parent nor a dependent of another is produced by running the COPY utility with read-only
object. access (SHRLEVEL REFERENCE).
index. A set of pointers that are logically ordered by inner join. The result of a join operation that includes
the values of a key. Indexes can provide faster access only the matched rows of both tables that are being
to data and can enforce uniqueness on the rows in a joined. See also join.
table.
inoperative package. A package that cannot be used
| index-controlled partitioning. A type of partitioning in because one or more user-defined functions or
| which partition boundaries for a partitioned table are procedures that the package depends on were dropped.
| controlled by values that are specified on the CREATE Such a package must be explicitly rebound. Contrast
| INDEX statement. Partition limits are saved in the with invalid package.
| LIMITKEY column of the SYSIBM.SYSINDEXPART
| catalog table. | insensitive cursor. A cursor that is not sensitive to
| inserts, updates, or deletes that are made to the
index key. The set of columns in a table that is used | underlying rows of a result table after the result table
to determine the order of index entries. | has been materialized.
index partition. A VSAM data set that is contained insert trigger. A trigger that is defined with the
within a partitioning index space. triggering SQL operation INSERT.
index space. A page set that is used to store the install. The process of preparing a DB2 subsystem to
entries of one index. operate as a z/OS subsystem.
indicator column. A 4-byte value that is stored in a installation verification scenario. A sequence of
base table in place of a LOB column. operations that exercises the main DB2 functions and
tests whether DB2 was correctly installed.
indicator variable. A variable that is used to represent
the null value in an application program. If the value for instrumentation facility component identifier
the selected column is null, a negative value is placed (IFCID). A value that names and identifies a trace
in the indicator variable. record of an event that can be traced. As a parameter
on the START TRACE and MODIFY TRACE
indoubt. A status of a unit of recovery. If DB2 fails commands, it specifies that the corresponding event is
after it has finished its phase 1 commit processing and to be traced.
before it has started phase 2, only the commit
coordinator knows if an individual unit of recovery is to instrumentation facility interface (IFI). A
be committed or rolled back. At emergency restart, if programming interface that enables programs to obtain
DB2 lacks the information it needs to make this online trace data about DB2, to submit DB2 commands,
decision, the status of the unit of recovery is indoubt and to pass data to DB2.
until DB2 obtains this information from the coordinator.
More than one unit of recovery can be indoubt at
restart.
Glossary 443
Interactive System Productivity Facility (ISPF) • Kerberos ticket
Interactive System Productivity Facility (ISPF). An iterator. In SQLJ, an object that contains the result set
IBM licensed program that provides interactive dialog of a query. An iterator is equivalent to a cursor in other
services in a z/OS environment. host languages.
inter-DB2 R/W interest. A property of data in a table iterator declaration clause. In SQLJ, a statement that
space, index, or partition that has been opened by more generates an iterator declaration class. An iterator is an
than one member of a data sharing group and that has object of an iterator declaration class.
been opened for writing by at least one of those
members.
J
intermediate database server. The target of a
request from a local application or a remote application | Japanese Industrial Standard. An encoding scheme
requester that is forwarded to another database server. | that is used to process Japanese characters.
In the DB2 environment, the remote request is
| JAR. Java Archive.
forwarded transparently to another database server if
the object that is referenced by a three-part name does Java Archive (JAR). A file format that is used for
not reference the local location. aggregating many files into a single file.
internationalization. The support for an encoding JCL. Job control language.
scheme that is able to represent the code points of
characters from many different geographies and JDBC. A Sun Microsystems database application
languages. To support all geographies, the Unicode programming interface (API) for Java that allows
standard requires more than 1 byte to represent a programs to access database management systems by
single character. See also Unicode. using callable SQL. JDBC does not require the use of
an SQL preprocessor. In addition, JDBC provides an
internal resource lock manager (IRLM). A z/OS architecture that lets users add modules called
subsystem that DB2 uses to control communication and database drivers, which link the application to their
database locking. choice of database management systems at run time.
| International Organization for Standardization. An JES. Job Entry Subsystem.
| international body charged with creating standards to
| facilitate the exchange of goods and services as well as JIS. Japanese Industrial Standard.
| cooperation in intellectual, scientific, technological, and
| economic activity. job control language (JCL). A control language that
is used to identify a job to an operating system and to
invalid package. A package that depends on an describe the job’s requirements.
object (other than a user-defined function) that is
dropped. Such a package is implicitly rebound on Job Entry Subsystem (JES). An IBM licensed
invocation. Contrast with inoperative package. program that receives jobs into the system and
processes all output data that is produced by the jobs.
invariant character set. (1) A character set, such as
the syntactic character set, whose code point join. A relational operation that allows retrieval of data
assignments do not change from code page to code from two or more tables based on matching column
page. (2) A minimum set of characters that is available values. See also equijoin, full outer join, inner join, left
as part of all character sets. outer join, outer join, and right outer join.
ISO. International Organization for Standardization. Kerberos. A network authentication protocol that is
designed to provide strong authentication for
isolation level. The degree to which a unit of work is client/server applications by using secret-key
isolated from the updating operations of other units of cryptography.
work. See also cursor stability, read stability, repeatable
read, and uncommitted read. Kerberos ticket. A transparent application mechanism
that transmits the identity of an initiating principal to its
ISPF. Interactive System Productivity Facility. target. A simple ticket contains the principal’s identity, a
session key, a timestamp, and other information, which
ISPF/PDF. Interactive System Productivity is sealed using the target’s secret key.
Facility/Program Development Facility.
key. A column or an ordered collection of columns that list. A type of object, which DB2 utilities can process,
is identified in the description of a table, index, or that identifies multiple table spaces, multiple index
referential constraint. The same column can be part of spaces, or both. A list is defined with the LISTDEF utility
more than one key. control statement.
key-sequenced data set (KSDS). A VSAM file or data list structure. A coupling facility structure that lets
set whose records are loaded in key sequence and data be shared and manipulated as elements of a
controlled by an index. queue.
keyword. In SQL, a name that identifies an option that LLE. Load list element.
is used in an SQL statement.
L-lock. Logical lock.
KSDS. Key-sequenced data set.
| load list element. A z/OS control block that controls
| the loading and deleting of a particular load module
L | based on entry point names.
labeled duration. A number that represents a duration load module. A program unit that is suitable for
of years, months, days, hours, minutes, seconds, or loading into main storage for execution. The output of a
microseconds. linkage editor.
latch. A DB2 internal mechanism for controlling LOB table space. A table space in an auxiliary table
concurrent events or the use of system resources. that contains all the data for a particular LOB column in
the related base table.
LCID. Log control interval definition.
local. A way of referring to any object that the local
LDS. Linear data set. DB2 subsystem maintains. A local table, for example, is
a table that is maintained by the local DB2 subsystem.
leaf page. A page that contains pairs of keys and Contrast with remote.
RIDs and that points to actual data. Contrast with
nonleaf page. locale. The definition of a subset of a user’s
environment that combines a CCSID and characters
left outer join. The result of a join operation that that are defined for a specific language and country.
includes the matched rows of both tables that are being
joined, and that preserves the unmatched rows of the local lock. A lock that provides intra-DB2 concurrency
first table. See also join. control, but not inter-DB2 concurrency control; that is, its
scope is a single DB2.
limit key. The highest value of the index key for a
partition. local subsystem. The unique relational DBMS to
which the user or application program is directly
linear data set (LDS). A VSAM data set that contains connected (in the case of DB2, by one of the DB2
data but no control information. A linear data set can be attachment facilities).
accessed as a byte-addressable string in virtual storage.
| location. The unique name of a database server. An
linkage editor. A computer program for creating load | application uses the location name to access a DB2
modules from one or more object modules or load | database server. A database alias can be used to
modules by resolving cross references among the | override the location name when accessing a remote
modules and, if necessary, adjusting addresses. | server.
link-edit. The action of creating a loadable computer | location alias. Another name by which a database
program using a linkage editor. | server identifies itself in the network. Applications can
| use this name to access a DB2 database server.
Glossary 445
lock • LUW
lock. A means of controlling concurrent events or logically complete. A state in which the concurrent
access to data. DB2 locking is performed by the IRLM. copy process is finished with the initialization of the
target objects that are being copied. The target objects
lock duration. The interval over which a DB2 lock is are available for update.
held.
logical page list (LPL). A list of pages that are in
lock escalation. The promotion of a lock from a row, error and that cannot be referenced by applications until
page, or LOB lock to a table space lock because the the pages are recovered. The page is in logical error
number of page locks that are concurrently held on a because the actual media (coupling facility or disk)
given resource exceeds a preset limit. might not contain any errors. Usually a connection to
the media has been lost.
locking. The process by which the integrity of data is
ensured. Locking prevents concurrent users from logical partition. A set of key or RID pairs in a
accessing inconsistent data. nonpartitioning index that are associated with a
particular partition.
lock mode. A representation for the type of access
that concurrently running programs can have to a logical recovery pending (LRECP). The state in
resource that a DB2 lock is holding. which the data and the index keys that reference the
data are inconsistent.
lock object. The resource that is controlled by a DB2
lock. logical unit (LU). An access point through which an
application program accesses the SNA network in order
lock promotion. The process of changing the size or to communicate with another application program.
mode of a DB2 lock to a higher, more restrictive level.
logical unit of work (LUW). The processing that a
lock size. The amount of data that is controlled by a program performs between synchronization points.
DB2 lock on table data; the value can be a row, a page,
a LOB, a partition, a table, or a table space. logical unit of work identifier (LUWID). A name that
uniquely identifies a thread within a network. This name
lock structure. A coupling facility data structure that is consists of a fully-qualified LU network name, an LUW
composed of a series of lock entries to support shared instance number, and an LUW sequence number.
and exclusive locking for logical resources.
log initialization. The first phase of restart processing
log. A collection of records that describe the events during which DB2 attempts to locate the current end of
that occur during DB2 execution and that indicate their the log.
sequence. The information thus recorded is used for
recovery in the event of a failure during DB2 execution. log record header (LRH). A prefix, in every logical
record, that contains control information.
| log control interval definition. A suffix of the physical
| log record that tells how record segments are placed in log record sequence number (LRSN). A unique
| the physical control interval. identifier for a log record that is associated with a data
sharing member. DB2 uses the LRSN for recovery in
logical claim. A claim on a logical partition of a the data sharing environment.
nonpartitioning index.
log truncation. A process by which an explicit starting
logical data modeling. The process of documenting RBA is established. This RBA is the point at which the
the comprehensive business information requirements in next byte of log data is to be written.
an accurate and consistent format. Data modeling is the
first task of designing a database. LPL. Logical page list.
logical drain. A drain on a logical partition of a LRECP. Logical recovery pending.
nonpartitioning index.
LRH. Log record header.
logical index partition. The set of all keys that
reference the same data partition. LRSN. Log record sequence number.
logical lock (L-lock). The lock type that transactions LU. Logical unit.
use to control intra- and inter-DB2 data concurrency
between transactions. Contrast with physical lock LU name. Logical unit name, which is the name by
(P-lock). which VTAM refers to a node in a network. Contrast
with location name.
LUWID. Logical unit of work identifier. modeling database. A DB2 database that you create
on your workstation that you use to model a DB2 UDB
for z/OS subsystem, which can then be evaluated by
M the Index Advisor.
mapping table. A table that the REORG utility uses to mode name. A VTAM name for the collection of
map the associations of the RIDs of data records in the physical and logical characteristics and attributes of a
original copy and in the shadow copy. This table is session.
created by the user.
modify locks. An L-lock or P-lock with a MODIFY
mass delete. The deletion of all rows of a table. attribute. A list of these active locks is kept at all times
in the coupling facility lock structure. If the requesting
master terminal. The IMS logical terminal that has
DB2 subsystem fails, that DB2 subsystem’s modify
complete control of IMS resources during online
locks are converted to retained locks.
operations.
MPP. Message processing program (in IMS).
master terminal operator (MTO). See master
terminal. MTO. Master terminal operator.
materialize. (1) The process of putting rows from a multibyte character set (MBCS). A character set that
view or nested table expression into a work file for represents single characters with more than a single
additional processing by a query. byte. Contrast with single-byte character set and
(2) The placement of a LOB value into contiguous double-byte character set. See also Unicode.
storage. Because LOB values can be very large, DB2
avoids materializing LOB data until doing so becomes multidimensional analysis. The process of assessing
absolutely necessary. and evaluating an enterprise on more than one level.
| materialized query table. A table that is used to Multiple Virtual Storage. An element of the z/OS
| contain information that is derived and can be operating system. This element is also called the Base
| summarized from one or more source tables. Control Program (BCP).
MB. Megabyte (1 048 576 bytes). multisite update. Distributed relational database
processing in which data is updated in more than one
MBCS. Multibyte character set. UTF-8 is an example location within a single unit of work.
of an MBCS. Characters in UTF-8 can range from 1 to
4 bytes in DB2. multithreading. Multiple TCBs that are executing one
copy of DB2 ODBC code concurrently (sharing a
member name. The z/OS XCF identifier for a processor) or in parallel (on separate central
particular DB2 subsystem in a data sharing group. processors).
menu. A displayed list of available functions for must-complete. A state during DB2 processing in
selection by the operator. A menu is sometimes called a which the entire operation must be completed to
menu panel. maintain data integrity.
| metalanguage. A language that is used to create mutex. Pthread mutual exclusion; a lock. A Pthread
| other specialized languages. mutex variable is used as a locking mechanism to allow
serialization of critical sections of code by temporarily
migration. The process of converting a subsystem blocking the execution of all but one thread.
with a previous release of DB2 to an updated or current
release. In this process, you can acquire the functions | MVS. See Multiple Virtual Storage.
of the updated or current release without losing the data
that you created on the previous release.
N
mixed data string. A character string that can contain
both single-byte and double-byte characters. negotiable lock. A lock whose mode can be
downgraded, by agreement among contending users, to
MLPA. Modified link pack area. be compatible to all. A physical lock is an example of a
negotiable lock.
MODEENT. A VTAM macro instruction that associates
a logon mode name with a set of parameters nested table expression. A fullselect in a FROM
representing session protocols. A set of MODEENT clause (surrounded by parentheses).
macro instructions defines a logon mode table.
Glossary 447
network identifier (NID) • overloaded function
NRE. Network recovery element. originating task. In a parallel group, the primary agent
that receives data from other execution units (referred to
NUL. The null character (’\0’), which is represented by as parallel tasks) that are executing portions of the
the value X'00'. In C, this character denotes the end of query in parallel.
a string.
OS/390. Operating System/390®.
null. A special value that indicates the absence of
information. OS/390 OpenEdition® Distributed Computing
Environment (OS/390 OE DCE). A set of technologies
NULLIF. A scalar function that evaluates two passed that are provided by the Open Software Foundation to
expressions, returning either NULL if the arguments are implement distributed computing.
equal or the value of the first argument if they are not.
outer join. The result of a join operation that includes
null-terminated host variable. A varying-length host the matched rows of both tables that are being joined
variable in which the end of the data is indicated by a and preserves some or all of the unmatched rows of the
null terminator. tables that are being joined. See also join.
null terminator. In C, the value that indicates the end overloaded function. A function name for which
of a string. For EBCDIC, ASCII, and Unicode UTF-8 multiple function instances exist.
strings, the null terminator is a single-byte value (X'00').
For Unicode UCS-2 (wide) strings, the null terminator is
a double-byte value (X'0000').
Glossary 449
partitioning index • primary authorization ID
| partitioning index. An index in which the leftmost policy. See CFRM policy.
| columns are the partitioning columns of the table. The
| index can be partitioned or nonpartitioned. Portable Operating System Interface (POSIX). The
IEEE operating system interface standard, which
| partition pruning. The removal from consideration of defines the Pthread standard of threading. See also
| inapplicable partitions through setting up predicates in a Pthread.
| query on a partitioned table to access only certain
| partitions to satisfy the query. POSIX. Portable Operating System Interface.
partner logical unit. An access point in the SNA postponed abort UR. A unit of recovery that was
network that is connected to the local DB2 subsystem inflight or in-abort, was interrupted by system failure or
by way of a VTAM conversation. cancellation, and did not complete backout during
restart.
path. See SQL path.
PPT. (1) Processing program table (in CICS). (2)
PCT. Program control table (in CICS). Program properties table (in z/OS).
PDS. Partitioned data set. precision. In SQL, the total number of digits in a
decimal number (called the size in the C language). In
piece. A data set of a nonpartitioned page set. the C language, the number of digits to the right of the
decimal point (called the scale in SQL). The DB2 library
physical claim. A claim on an entire nonpartitioning uses the SQL terms.
index.
precompilation. A processing of application programs
physical consistency. The state of a page that is not containing SQL statements that takes place before
in a partially changed state. compilation. SQL statements are replaced with
statements that are recognized by the host language
physical drain. A drain on an entire nonpartitioning
compiler. Output from this precompilation includes
index.
source code that can be submitted to the compiler and
physical lock (P-lock). A type of lock that DB2 the database request module (DBRM) that is input to
acquires to provide consistency of data that is cached in the bind process.
different DB2 subsystems. Physical locks are used only
predicate. An element of a search condition that
in data sharing environments. Contrast with logical lock
expresses or implies a comparison operation.
(L-lock).
prefix. A code at the beginning of a message or
physical lock contention. Conflicting states of the
record.
requesters for a physical lock. See also negotiable lock.
preformat. The process of preparing a VSAM ESDS
physically complete. The state in which the
for DB2 use, by writing specific data patterns.
concurrent copy process is completed and the output
data set has been created. prepare. The first phase of a two-phase commit
process in which all participants are requested to
plan. See application plan.
prepare for commit.
plan allocation. The process of allocating DB2
prepared SQL statement. A named object that is the
resources to a plan in preparation for execution.
executable form of an SQL statement that has been
plan member. The bound copy of a DBRM that is processed by the PREPARE statement.
identified in the member clause.
presumed-abort. An optimization of the
plan name. The name of an application plan. presumed-nothing two-phase commit protocol that
reduces the number of recovery log records, the
plan segmentation. The dividing of each plan into duration of state maintenance, and the number of
sections. When a section is needed, it is independently messages between coordinator and participant. The
brought into the EDM pool. optimization also modifies the indoubt resolution
responsibility.
P-lock. Physical lock.
presumed-nothing. The standard two-phase commit
PLT. Program list table (in CICS). protocol that defines coordinator and participant
responsibilities, relative to logical unit of work states,
point of consistency. A time when all recoverable recovery logging, and indoubt resolution.
data that an application accesses is consistent with
other data. The term point of consistency is primary authorization ID. The authorization ID that is
synonymous with sync point or commit point. used to identify the application process to DB2.
primary group buffer pool. For a duplexed group program temporary fix (PTF). A solution or bypass of
buffer pool, the structure that is used to maintain the a problem that is diagnosed as a result of a defect in a
coherency of cached data. This structure is used for current unaltered release of a licensed program. An
page registration and cross-invalidation. The z/OS authorized program analysis report (APAR) fix is
equivalent is old structure. Compare with secondary corrective service for an existing problem. A PTF is
group buffer pool. preventive service for problems that might be
encountered by other users of the product. A PTF is
primary index. An index that enforces the uniqueness temporary, because a permanent fix is usually not
of a primary key. incorporated into the product until its next release.
primary key. In a relational database, a unique, protected conversation. A VTAM conversation that
nonnull key that is part of the definition of a table. A supports two-phase commit flows.
table cannot be defined as a parent unless it has a
unique key or primary key. PSRCP. Page set recovery pending.
principal. An entity that can communicate securely PTF. Program temporary fix.
with another entity. In Kerberos, principals are
represented as entries in the Kerberos registry database Pthread. The POSIX threading standard model for
and include users, servers, computers, and others. splitting an application into subtasks. The Pthread
standard includes functions for creating threads,
principal name. The name by which a principal is terminating threads, synchronizing threads through
known to the DCE security services. locking, and other thread control facilities.
private protocol connection. A DB2 private query. A component of certain SQL statements that
connection of the application process. See also private specifies a result table.
connection.
query block. The part of a query that is represented
privilege. The capability of performing a specific by one of the FROM clauses. Each FROM clause can
function, sometimes on a specific object. The types of have multiple query blocks, depending on DB2’s internal
privileges are: processing of the query.
explicit privileges, which have names and are held
query CP parallelism. Parallel execution of a single
as the result of SQL GRANT and REVOKE
query, which is accomplished by using multiple tasks.
statements. For example, the SELECT privilege.
See also Sysplex query parallelism.
implicit privileges, which accompany the ownership
of an object, such as the privilege to drop a query I/O parallelism. Parallel access of data, which
synonym that one owns, or the holding of an is accomplished by triggering multiple I/O requests
authority, such as the privilege of SYSADM authority within a single query.
to terminate any utility job.
queued sequential access method (QSAM). An
privilege set. For the installation SYSADM ID, the set extended version of the basic sequential access method
of all possible privileges. For any other authorization ID, (BSAM). When this method is used, a queue of data
the set of all privileges that are recorded for that ID in blocks is formed. Input data blocks await processing,
the DB2 catalog. and output data blocks await transfer to auxiliary
storage or to an output device.
process. In DB2, the unit to which DB2 allocates
resources and locks. Sometimes called an application quiesce point. A point at which data is consistent as a
process, a process involves the execution of one or result of running the DB2 QUIESCE utility.
more programs. The execution of an SQL statement is
always associated with some process. The means of quiesced member state. A state of a member of a
initiating and terminating a process are dependent on data sharing group. An active member becomes
the environment. quiesced when a STOP DB2 command takes effect
without a failure. If the member’s task, address space,
program. A single, compilable collection of executable or z/OS system fails before the command takes effect,
statements in a programming language. the member state is failed.
Glossary 451
RACF • referential integrity
RCT. Resource control table (in CICS attachment recovery log. A collection of records that describes
facility). the events that occur during DB2 execution and
indicates their sequence. The recorded information is
RDB. Relational database. used for recovery in the event of a failure during DB2
execution.
RDBMS. Relational database management system.
recovery manager. (1) A subcomponent that supplies
RDBNAM. Relational database name. coordination services that control the interaction of DB2
resource managers during commit, abort, checkpoint,
RDF. Record definition field. and restart processes. The recovery manager also
supports the recovery mechanisms of other subsystems
read stability (RS). An isolation level that is similar to
(for example, IMS) by acting as a participant in the
repeatable read but does not completely isolate an
other subsystem’s process for protecting data that has
application process from all other concurrently executing
reached a point of consistency. (2) A coordinator or a
application processes. Under level RS, an application
participant (or both), in the execution of a two-phase
that issues the same query more than once might read
commit, that can access a recovery log that maintains
additional rows that were inserted and committed by a
the state of the logical unit of work and names the
concurrently executing application process.
immediate upstream coordinator and downstream
rebind. The creation of a new application plan for an participants.
application program that has been bound previously. If,
recovery pending (RECP). A condition that prevents
for example, you have added an index for a table that
SQL access to a table space that needs to be
your application accesses, you must rebind the
recovered.
application in order to take advantage of that index.
recovery token. An identifier for an element that is
rebuild. The process of reallocating a coupling facility
used in recovery (for example, NID or URID).
structure. For the shared communications area (SCA)
and lock structure, the structure is repopulated; for the RECP. Recovery pending.
group buffer pool, changed pages are usually cast out
to disk, and the new structure is populated only with redo. A state of a unit of recovery that indicates that
changed pages that were not successfully cast out. changes are to be reapplied to the disk media to ensure
data integrity.
RECFM. Record format.
reentrant. Executable code that can reside in storage
record. The storage representation of a row or other as one shared copy for all threads. Reentrant code is
data. not self-modifying and provides separate storage areas
for each thread. Reentrancy is a compiler and operating
record identifier (RID). A unique identifier that DB2
system concept, and reentrancy alone is not enough to
uses internally to identify a row of data in a table.
guarantee logically consistent results when
Compare with row ID.
multithreading. See also threadsafe.
| record identifier (RID) pool. An area of main storage referential constraint. The requirement that nonnull
| that is used for sorting record identifiers during values of a designated foreign key are valid only if they
| list-prefetch processing. equal values of the primary key of a designated table.
record length. The sum of the length of all the
referential integrity. The state of a database in which
columns in a table, which is the length of the data as it
all values of all foreign keys are valid. Maintaining
is physically stored in the database. Records can be
referential integrity requires the enforcement of
fixed length or varying length, depending on how the
referential constraints on all operations that change the
columns are defined. If all columns are fixed-length
data in a table on which the referential constraints are
columns, the record is a fixed-length record. If one or
defined.
more columns are varying-length columns, the record is
a varying-length column.
referential structure. A set of tables and relationships reoptimization, DB2 uses the values of host variables,
that includes at least one table and, for every table in parameter markers, or special registers.
the set, all the relationships in which that table
participates and all the tables to which it is related. REORG pending (REORP). A condition that restricts
SQL access and most utility access to an object that
| refresh age. The time duration between the current must be reorganized.
| time and the time during which a materialized query
| table was last refreshed. REORP. REORG pending.
registry. See registry database. repeatable read (RR). The isolation level that provides
maximum protection from other executing application
registry database. A database of security information programs. When an application program executes with
about principals, groups, organizations, accounts, and repeatable read protection, rows that the program
security policies. references cannot be changed by other programs until
the program reaches a commit point.
relational database (RDB). A database that can be
perceived as a set of tables and manipulated in repeating group. A situation in which an entity
accordance with the relational model of data. includes multiple attributes that are inherently the same.
The presence of a repeating group violates the
relational database management system (RDBMS). requirement of first normal form. In an entity that
A collection of hardware and software that organizes satisfies the requirement of first normal form, each
and provides access to a relational database. attribute is independent and unique in its meaning and
its name. See also normalization.
relational database name (RDBNAM). A unique
identifier for an RDBMS within a network. In DB2, this replay detection mechanism. A method that allows a
must be the value in the LOCATION column of table principal to detect whether a request is a valid request
SYSIBM.LOCATIONS in the CDB. DB2 publications from a source that can be trusted or whether an
refer to the name of another RDBMS as a LOCATION untrustworthy entity has captured information from a
value or a location name. previous exchange and is replaying the information
exchange to gain access to the principal.
relationship. A defined connection between the rows
of a table or the rows of two tables. A relationship is the request commit. The vote that is submitted to the
internal representation of a referential constraint. prepare phase if the participant has modified data and
is prepared to commit or roll back.
relative byte address (RBA). The offset of a data
record or control interval from the beginning of the requester. The source of a request to access data at
storage space that is allocated to the data set or file to a remote server. In the DB2 environment, the requester
which it belongs. function is provided by the distributed data facility.
remigration. The process of returning to a current resource. The object of a lock or claim, which could
release of DB2 following a fallback to a previous be a table space, an index space, a data partition, an
release. This procedure constitutes another migration index partition, or a logical partition.
process.
resource allocation. The part of plan allocation that
remote. Any object that is maintained by a remote deals specifically with the database resources.
DB2 subsystem (that is, by a DB2 subsystem other than
the local one). A remote view, for example, is a view resource control table (RCT). A construct of the
that is maintained by a remote DB2 subsystem. CICS attachment facility, created by site-provided macro
Contrast with local. parameters, that defines authorization and access
attributes for transactions or transaction groups.
remote attach request. A request by a remote
location to attach to the local DB2 subsystem. resource definition online. A CICS feature that you
Specifically, the request that is sent is an SNA Function use to define CICS resources online without assembling
Management Header 5. tables.
remote subsystem. Any relational DBMS, except the resource limit facility (RLF). A portion of DB2 code
local subsystem, with which the user or application can that prevents dynamic manipulative SQL statements
communicate. The subsystem need not be remote in from exceeding specified time limits. The resource limit
any physical sense, and might even operate on the facility is sometimes called the governor.
same processor under the same z/OS system.
resource limit specification table (RLST). A
reoptimization. The DB2 process of reconsidering the site-defined table that specifies the limits to be enforced
access path of an SQL statement at run time; during by the resource limit facility.
Glossary 453
resource manager • scale
resource manager. (1) A function that is responsible row. The horizontal component of a table. A row
for managing a particular resource and that guarantees consists of a sequence of values, one for each column
the consistency of all updates made to recoverable of the table.
resources within a logical unit of work. The resource
that is being managed can be physical (for example, ROWID. Row identifier.
disk or main storage) or logical (for example, a
particular type of system service). (2) A participant, in row identifier (ROWID). A value that uniquely
the execution of a two-phase commit, that has identifies a row. This value is stored with the row and
recoverable resources that could have been modified. never changes.
The resource manager has access to a recovery log so
row lock. A lock on a single row of data.
that it can commit or roll back the effects of the logical
unit of work to the recoverable resources. | rowset. A set of rows for which a cursor position is
| established.
restart pending (RESTP). A restrictive state of a page
set or partition that indicates that restart (backout) work | rowset cursor. A cursor that is defined so that one or
needs to be performed on the object. All access to the | more rows can be returned as a rowset for a single
page set or partition is denied except for access by the: | FETCH statement, and the cursor is positioned on the
v RECOVER POSTPONED command | set of rows that is fetched.
v Automatic online backout (which DB2 invokes after
restart if the system parameter LBACKOUT=AUTO) | rowset-positioned access. The ability to retrieve
| multiple rows from a single FETCH statement.
RESTP. Restart pending.
| row-positioned access. The ability to retrieve a single
result set. The set of rows that a stored procedure | row from a single FETCH statement.
returns to a client application.
row trigger. A trigger that is defined with the trigger
result set locator. A 4-byte value that DB2 uses to granularity FOR EACH ROW.
uniquely identify a query result set that a stored
procedure returns. RRE. Residual recovery entry (in IMS).
result table. The set of rows that are specified by a RRSAF. Recoverable Resource Manager Services
SELECT statement. attachment facility.
retained lock. A MODIFY lock that a DB2 subsystem RS. Read stability.
was holding at the time of a subsystem failure. The lock
is retained in the coupling facility lock structure across a RTT. Resource translation table.
DB2 failure.
RURE. Restart URE.
RID. Record identifier.
| schema. (1) The organization or structure of a self-referencing table. A table with a self-referencing
| database. (2) A logical grouping for user-defined constraint.
| functions, distinct types, triggers, and stored
| procedures. When an object of one of these types is | sensitive cursor. A cursor that is sensitive to changes
| created, it is assigned to one schema, which is | that are made to the database after the result table has
| determined by the name of the object. For example, the | been materialized.
| following statement creates a distinct type T in schema
| C: | sequence. A user-defined object that generates a
| sequence of numeric values according to user
| CREATE DISTINCT TYPE C.T ... | specifications.
scrollability. The ability to use a cursor to fetch in sequential data set. A non-DB2 data set whose
either a forward or backward direction. The FETCH records are organized on the basis of their successive
statement supports multiple fetch orientations to indicate physical positions, such as on magnetic tape. Several of
the new position of the cursor. See also fetch the DB2 database utilities require sequential data sets.
orientation.
sequential prefetch. A mechanism that triggers
scrollable cursor. A cursor that can be moved in both consecutive asynchronous I/O operations. Pages are
a forward and a backward direction. fetched before they are required, and several pages are
read with a single I/O operation.
SDWA. System diagnostic work area.
serial cursor. A cursor that can be moved only in a
search condition. A criterion for selecting rows from a
forward direction.
table. A search condition consists of one or more
predicates. serialized profile. A Java object that contains SQL
statements and descriptions of host variables. The
secondary authorization ID. An authorization ID that
SQLJ translator produces a serialized profile for each
has been associated with a primary authorization ID by
connection context.
an authorization exit routine.
server. The target of a request from a remote
secondary group buffer pool. For a duplexed group
requester. In the DB2 environment, the server function
buffer pool, the structure that is used to back up
is provided by the distributed data facility, which is used
changed pages that are written to the primary group
to access DB2 data from remote applications.
buffer pool. No page registration or cross-invalidation
occurs using the secondary group buffer pool. The z/OS server-side programming. A method for adding DB2
equivalent is new structure. data into dynamic Web pages.
| secondary index. A nonpartitioning index on a service class. An eight-character identifier that is
| partitioned table. used by the z/OS Workload Manager to associate user
performance goals with a particular DDF thread or
section. The segment of a plan or package that
stored procedure. A service class is also used to
contains the executable structures for a single SQL
classify work on parallelism assistants.
statement. For most SQL statements, one section in the
plan exists for each SQL statement in the source service request block. A unit of work that is
program. However, for cursor-related statements, the scheduled to execute in another address space.
DECLARE, OPEN, FETCH, and CLOSE statements
reference the same section because they each refer to session. A link between two nodes in a VTAM
the SELECT statement that is named in the DECLARE network.
CURSOR statement. SQL statements such as COMMIT,
ROLLBACK, and some SET statements do not use a session protocols. The available set of SNA
section. communication requests and responses.
segment. A group of pages that holds rows of a single shared communications area (SCA). A coupling
table. See also segmented table space. facility list structure that a DB2 data sharing group uses
for inter-DB2 communication.
segmented table space. A table space that is divided
into equal-sized groups of pages called segments. share lock. A lock that prevents concurrently
Segments are assigned to tables so that rows of executing application processes from changing data, but
different tables are never stored in the same segment. not from reading data. Contrast with exclusive lock.
self-referencing constraint. A referential constraint shift-in character. A special control character (X'0F')
that defines a relationship in which a table is a that is used in EBCDIC systems to denote that the
dependent of itself. subsequent bytes represent SBCS characters. See also
shift-out character.
Glossary 455
shift-out character • SQL path
shift-out character. A special control character (X'0E') | source table. A table that can be a base table, a view,
that is used in EBCDIC systems to denote that the | a table expression, or a user-defined table function.
subsequent bytes, up to the next shift-in control
character, represent DBCS characters. See also shift-in source type. An existing type that DB2 uses to
character. internally represent a distinct type.
sign-on. A request that is made on behalf of an space. A sequence of one or more blank characters.
individual CICS or IMS application process by an
attachment facility to enable DB2 to verify that it is special register. A storage area that DB2 defines for
authorized to use DB2 resources. an application process to use for storing information that
can be referenced in SQL statements. Examples of
simple page set. A nonpartitioned page set. A simple special registers are USER and CURRENT DATE.
page set initially consists of a single data set (page set
piece). If and when that data set is extended to 2 GB, specific function name. A particular user-defined
another data set is created, and so on, up to a total of function that is known to the database manager by its
32 data sets. DB2 considers the data sets to be a single specific name. Many specific user-defined functions can
contiguous linear address space containing a maximum have the same function name. When a user-defined
of 64 GB. Data is stored in the next available location function is defined to the database, every function is
within this address space without regard to any assigned a specific name that is unique within its
partitioning scheme. schema. Either the user can provide this name, or a
default name is used.
simple table space. A table space that is neither
partitioned nor segmented. SPUFI. SQL Processor Using File Input.
single-byte character set (SBCS). A set of characters SQL. Structured Query Language.
in which each character is represented by a single byte.
SQL authorization ID (SQL ID). The authorization ID
Contrast with double-byte character set or multibyte
that is used for checking dynamic SQL statements in
character set.
some situations.
single-precision floating point number. A 32-bit
SQLCA. SQL communication area.
approximate representation of a real number.
SQL communication area (SQLCA). A structure that
size. In the C language, the total number of digits in a
is used to provide an application program with
decimal number (called the precision in SQL). The DB2
information about the execution of its SQL statements.
library uses the SQL term.
SQL connection. An association between an
SMF. System Management Facilities.
application process and a local or remote application
SMP/E. System Modification Program/Extended. server or database server.
SNA. Systems Network Architecture. SQL descriptor area (SQLDA). A structure that
describes input variables, output variables, or the
SNA network. The part of a network that conforms to columns of a result table.
the formats and protocols of Systems Network
Architecture (SNA). SQL escape character. The symbol that is used to
enclose an SQL delimited identifier. This symbol is the
socket. A callable TCP/IP programming interface that double quotation mark ("). See also escape character.
TCP/IP network applications use to communicate with
remote TCP/IP partners. SQL function. A user-defined function in which the
CREATE FUNCTION statement contains the source
sourced function. A function that is implemented by code. The source code is a single SQL expression that
another built-in or user-defined function that is already evaluates to a single value. The SQL user-defined
known to the database manager. This function can be a function can return only one parameter.
scalar function or a column (aggregating) function; it
returns a single value from a set of values (for example, SQL ID. SQL authorization ID.
MAX or AVG). Contrast with built-in function, external
SQLJ. Structured Query Language (SQL) that is
function, and SQL function.
embedded in the Java programming language.
source program. A set of host language statements
SQL path. An ordered list of schema names that are
and SQL statements that is processed by an SQL
used in the resolution of unqualified references to
precompiler.
user-defined functions, distinct types, and stored
procedures. In dynamic SQL, the current path is found statement trigger. A trigger that is defined with the
in the CURRENT PATH special register. In static SQL, it trigger granularity FOR EACH STATEMENT.
is defined in the PATH bind option.
| static cursor. A named control structure that does not
SQL procedure. A user-written program that can be | change the size of the result table or the order of its
invoked with the SQL CALL statement. Contrast with | rows after an application opens the cursor. Contrast with
external procedure. | dynamic cursor.
SQL processing conversation. Any conversation that static SQL. SQL statements, embedded within a
requires access of DB2 data, either through an program, that are prepared during the program
application or by dynamic query requests. preparation process (before the program is executed).
After being prepared, the SQL statement does not
SQL Processor Using File Input (SPUFI). A facility of change (although values of host variables that are
the TSO attachment subcomponent that enables the specified by the statement might change).
DB2I user to execute SQL statements without
embedding them in an application program. storage group. A named set of disks on which DB2
data can be stored.
SQL return code. Either SQLCODE or SQLSTATE.
stored procedure. A user-written application program
SQL routine. A user-defined function or stored that can be invoked through the use of the SQL CALL
procedure that is based on code that is written in SQL. statement.
SQL statement coprocessor. An alternative to the string. See character string or graphic string.
DB2 precompiler that lets the user process SQL
statements at compile time. The user invokes an SQL strong typing. A process that guarantees that only
statement coprocessor by specifying a compiler option. user-defined functions and operations that are defined
on a distinct type can be applied to that type. For
SQL string delimiter. A symbol that is used to example, you cannot directly compare two currency
enclose an SQL string constant. The SQL string types, such as Canadian dollars and U.S. dollars. But
delimiter is the apostrophe ('), except in COBOL you can provide a user-defined function to convert one
applications, where the user assigns the symbol, which currency to the other and then do the comparison.
is either an apostrophe or a double quotation mark (").
structure. (1) A name that refers collectively to
SRB. Service request block. different types of DB2 objects, such as tables,
databases, views, indexes, and table spaces. (2) A
SSI. Subsystem interface (in z/OS). construct that uses z/OS to map and manage storage
on a coupling facility. See also cache structure, list
SSM. Subsystem member (in IMS).
structure, or lock structure.
stand-alone. An attribute of a program that means
Structured Query Language (SQL). A standardized
that it is capable of executing separately from DB2,
language for defining and manipulating data in a
without using DB2 services.
relational database.
star join. A method of joining a dimension column of a
structure owner. In relation to group buffer pools, the
fact table to the key column of the corresponding
DB2 member that is responsible for the following
dimension table. See also join, dimension, and star
activities:
schema.
v Coordinating rebuild, checkpoint, and damage
star schema. The combination of a fact table (which assessment processing
contains most of the data) and a number of dimension v Monitoring the group buffer pool threshold and
tables. See also star join, dimension, and dimension notifying castout owners when the threshold has
table. been reached
statement handle. In DB2 ODBC, the data object that subcomponent. A group of closely related DB2
contains information about an SQL statement that is modules that work together to provide a general
managed by DB2 ODBC. This includes information such function.
as dynamic arguments, bindings for dynamic arguments
and columns, cursor information, result values, and subject table. The table for which a trigger is created.
status information. Each statement handle is associated When the defined triggering event occurs on this table,
with the connection handle. the trigger is activated.
statement string. For a dynamic SQL statement, the subpage. The unit into which a physical index page
character string form of the statement. can be divided.
Glossary 457
subquery • table space
subquery. A SELECT statement within the WHERE or system agent. A work request that DB2 creates
HAVING clause of another SQL statement; a nested internally such as prefetch processing, deferred writes,
SQL statement. and service tasks.
subselect. That form of a query that does not include system conversation. The conversation that two DB2
an ORDER BY clause, an UPDATE clause, or UNION subsystems must establish to process system
operators. messages before any distributed processing can begin.
substitution character. A unique character that is system diagnostic work area (SDWA). The data that
substituted during character conversion for any is recorded in a SYS1.LOGREC entry that describes a
characters in the source program that do not have a program or hardware error.
match in the target coding representation.
system-directed connection. A connection that a
subsystem. A distinct instance of a relational relational DBMS manages by processing SQL
database management system (RDBMS). statements with three-part names.
surrogate pair. A coded representation for a single System Modification Program/Extended (SMP/E). A
character that consists of a sequence of two 16-bit code z/OS tool for making software changes in programming
units, in which the first value of the pair is a systems (such as DB2) and for controlling those
high-surrogate code unit in the range U+D800 through changes.
U+DBFF, and the second value is a low-surrogate code
unit in the range U+DC00 through U+DFFF. Surrogate Systems Network Architecture (SNA). The
pairs provide an extension mechanism for encoding description of the logical structure, formats, protocols,
917 476 characters without requiring the use of 32-bit and operational sequences for transmitting information
characters. through and controlling the configuration and operation
of networks.
SVC dump. A dump that is issued when a z/OS or a
DB2 functional recovery routine detects an error. SYS1.DUMPxx data set. A data set that contains a
system dump (in z/OS).
sync point. See commit point.
SYS1.LOGREC. A service aid that contains important
syncpoint tree. The tree of recovery managers and information about program and hardware errors (in
resource managers that are involved in a logical unit of z/OS).
work, starting with the recovery manager, that make the
final commit decision.
T
synonym. In SQL, an alternative name for a table or
view. Synonyms can be used to refer only to objects at table. A named data object consisting of a specific
the subsystem in which the synonym is defined. number of columns and some number of unordered
rows. See also base table or temporary table.
syntactic character set. A set of 81 graphic
characters that are registered in the IBM registry as | table-controlled partitioning. A type of partitioning in
character set 00640. This set was originally | which partition boundaries for a partitioned table are
recommended to the programming language community | controlled by values that are defined in the CREATE
to be used for syntactic purposes toward maximizing | TABLE statement. Partition limits are saved in the
portability and interchangeability across systems and | LIMITKEY_INTERNAL column of the
country boundaries. It is contained in most of the | SYSIBM.SYSTABLEPART catalog table.
primary registered character sets, with a few exceptions.
table function. A function that receives a set of
See also invariant character set.
arguments and returns a table to the SQL statement
Sysplex. See Parallel Sysplex. that references the function. A table function can be
referenced only in the FROM clause of a subselect.
Sysplex query parallelism. Parallel execution of a
single query that is accomplished by using multiple table locator. A mechanism that allows access to
tasks on more than one DB2 subsystem. See also trigger transition tables in the FROM clause of SELECT
query CP parallelism. statements, in the subselect of INSERT statements, or
from within user-defined functions. A table locator is a
system administrator. The person at a computer fullword integer value that represents a transition table.
installation who designs, controls, and manages the use
of the computer system. table space. A page set that is used to store the
records in one or more tables.
table space set. A set of table spaces and partitions time duration. A decimal integer that represents a
that should be recovered together for one of these number of hours, minutes, and seconds.
reasons:
v Each of them contains a table that is a parent or timeout. Abnormal termination of either the DB2
descendent of a table in one of the others. subsystem or of an application because of the
v The set contains a base table and associated unavailability of resources. Installation specifications are
auxiliary tables. set to determine both the amount of time DB2 is to wait
for IRLM services after starting, and the amount of time
A table space set can contain both types of IRLM is to wait if a resource that an application
relationships. requests is unavailable. If either of these time
specifications is exceeded, a timeout is declared.
task control block (TCB). A z/OS control block that is
used to communicate information about tasks within an Time-Sharing Option (TSO). An option in MVS that
address space that are connected to DB2. See also provides interactive time sharing from remote terminals.
address space connection.
timestamp. A seven-part value that consists of a date
TB. Terabyte (1 099 511 627 776 bytes). and time. The timestamp is expressed in years, months,
days, hours, minutes, seconds, and microseconds.
TCB. Task control block (in z/OS).
TMP. Terminal Monitor Program.
TCP/IP. A network communication protocol that
computer systems use to exchange information across to-do. A state of a unit of recovery that indicates that
telecommunication links. the unit of recovery’s changes to recoverable DB2
resources are indoubt and must either be applied to the
TCP/IP port. A 2-byte value that identifies an end user
disk media or backed out, as determined by the commit
or a TCP/IP network application within a TCP/IP host.
coordinator.
template. A DB2 utilities output data set descriptor that
trace. A DB2 facility that provides the ability to monitor
is used for dynamic allocation. A template is defined by
and collect DB2 monitoring, auditing, performance,
the TEMPLATE utility control statement.
accounting, statistics, and serviceability (global) data.
temporary table. A table that holds temporary data.
transaction lock. A lock that is used to control
Temporary tables are useful for holding or sorting
concurrent execution of SQL statements.
intermediate results from queries that contain a large
number of rows. The two types of temporary table, transaction program name. In SNA LU 6.2
which are created by different SQL statements, are the conversations, the name of the program at the remote
created temporary table and the declared temporary logical unit that is to be the other half of the
table. Contrast with result table. See also created conversation.
temporary table and declared temporary table.
| transient XML data type. A data type for XML values
Terminal Monitor Program (TMP). A program that | that exists only during query processing.
provides an interface between terminal users and
command processors and has access to many system transition table. A temporary table that contains all
services (in z/OS). the affected rows of the subject table in their state
before or after the triggering event occurs. Triggered
thread. The DB2 structure that describes an SQL statements in the trigger definition can reference
application’s connection, traces its progress, processes the table of changed rows in the old state or the new
resource functions, and delimits its accessibility to DB2 state.
resources and services. Most DB2 functions execute
under a thread structure. See also allied thread and transition variable. A variable that contains a column
database access thread. value of the affected row of the subject table in its state
before or after the triggering event occurs. Triggered
threadsafe. A characteristic of code that allows SQL statements in the trigger definition can reference
multithreading both by providing private storage areas the set of old values or the set of new values.
for each thread, and by properly serializing shared
(global) storage areas. | tree structure. A data structure that represents entities
| in nodes, with a most one parent node for each node,
three-part name. The full name of a table, view, or | and with only one root node.
alias. It consists of a location name, authorization ID,
and an object name, separated by a period. trigger. A set of SQL statements that are stored in a
DB2 database and executed when a certain event
time. A three-part value that designates a time of day occurs in a DB2 table.
in hours, minutes, and seconds.
Glossary 459
trigger activation • unit of recovery
trigger activation. The process that occurs when the typed parameter marker. A parameter marker that is
trigger event that is defined in a trigger definition is specified along with its target data type. It has the
executed. Trigger activation consists of the evaluation of general form:
the triggered action condition and conditional execution CAST(? AS data-type)
of the triggered SQL statements.
type 1 indexes. Indexes that were created by a
trigger activation time. An indication in the trigger release of DB2 before DB2 Version 4 or that are
definition of whether the trigger should be activated specified as type 1 indexes in Version 4. Contrast with
before or after the triggered event. type 2 indexes. As of Version 8, type 1 indexes are no
longer supported.
trigger body. The set of SQL statements that is
executed when a trigger is activated and its triggered type 2 indexes. Indexes that are created on a release
action condition evaluates to true. A trigger body is also of DB2 after Version 7 or that are specified as type 2
called triggered SQL statements. indexes in Version 4 or later.
trigger cascading. The process that occurs when the
triggered action of a trigger causes the activation of U
another trigger.
UCS-2. Universal Character Set, coded in 2 octets,
triggered action. The SQL logic that is performed which means that characters are represented in 16-bits
when a trigger is activated. The triggered action per character.
consists of an optional triggered action condition and a
set of triggered SQL statements that are executed only UDF. User-defined function.
if the condition evaluates to true.
UDT. User-defined data type. In DB2 UDB for z/OS,
triggered action condition. An optional part of the the term distinct type is used instead of user-defined
triggered action. This Boolean condition appears as a data type. See distinct type.
WHEN clause and specifies a condition that DB2
evaluates to determine if the triggered SQL statements uncommitted read (UR). The isolation level that
should be executed. allows an application to read uncommitted data.
triggered SQL statements. The set of SQL underlying view. The view on which another view is
statements that is executed when a trigger is activated directly or indirectly defined.
and its triggered action condition evaluates to true.
Triggered SQL statements are also called the trigger undo. A state of a unit of recovery that indicates that
body. the changes that the unit of recovery made to
recoverable DB2 resources must be backed out.
trigger granularity. A characteristic of a trigger, which
determines whether the trigger is activated: Unicode. A standard that parallels the ISO-10646
v Only once for the triggering SQL statement standard. Several implementations of the Unicode
v Once for each row that the SQL statement modifies standard exist, all of which have the ability to represent
a large percentage of the characters that are contained
triggering event. The specified operation in a trigger in the many scripts that are used throughout the world.
definition that causes the activation of that trigger. The
triggering event is comprised of a triggering operation uniform resource locator (URL). A Web address,
(INSERT, UPDATE, or DELETE) and a subject table on which offers a way of naming and locating specific items
which the operation is performed. on the Web.
triggering SQL operation. The SQL operation that union. An SQL operation that combines the results of
causes a trigger to be activated when performed on the two SELECT statements. Unions are often used to
subject table. merge lists of values that are obtained from several
tables.
trigger package. A package that is created when a
CREATE TRIGGER statement is executed. The unique constraint. An SQL rule that no two values in
package is executed when the trigger is activated. a primary key, or in the key of a unique index, can be
the same.
TSO. Time-Sharing Option.
unique index. An index that ensures that no identical
TSO attachment facility. A DB2 facility consisting of key values are stored in a column or a set of columns in
the DSN command processor and DB2I. Applications a table.
that are not written for the CICS or IMS environments
can run under the TSO attachment facility. unit of recovery. A recoverable sequence of
operations within a single resource manager, such as
an instance of DB2. Contrast with unit of work.
unit of recovery identifier (URID). The LOGRBA of user view. In logical data modeling, a model or
the first log record for a unit of recovery. The URID also representation of critical information that the business
appears in all subsequent log records for that unit of requires.
recovery.
UTF-8. Unicode Transformation Format, 8-bit encoding
unit of work. A recoverable sequence of operations form, which is designed for ease of use with existing
within an application process. At any time, an ASCII-based systems. The CCSID value for data in
application process is a single unit of work, but the life UTF-8 format is 1208. DB2 UDB for z/OS supports
of an application process can involve many units of UTF-8 in mixed data fields.
work as a result of commit or rollback operations. In a
multisite update operation, a single unit of work can UTF-16. Unicode Transformation Format, 16-bit
include several units of recovery. Contrast with unit of encoding form, which is designed to provide code
recovery. values for over a million characters and a superset of
UCS-2. The CCSID value for data in UTF-16 format is
Universal Unique Identifier (UUID). An identifier that 1200. DB2 UDB for z/OS supports UTF-16 in graphic
is immutable and unique across time and space (in data fields.
z/OS).
UUID. Universal Unique Identifier.
unlock. The act of releasing an object or system
resource that was previously locked and returning it to
general availability within DB2.
V
untyped parameter marker. A parameter marker that value. The smallest unit of data that is manipulated in
is specified without its target data type. It has the form SQL.
of a single question mark (?).
variable. A data element that specifies a value that
updatability. The ability of a cursor to perform can be changed. A COBOL elementary data item is an
positioned updates and deletes. The updatability of a example of a variable. Contrast with constant.
cursor can be influenced by the SELECT statement and
variant function. See nondeterministic function.
the cursor sensitivity option that is specified on the
DECLARE CURSOR statement. varying-length string. A character or graphic string
whose length varies within set limits. Contrast with
update hole. The location on which a cursor is
fixed-length string.
positioned when a row in a result table is fetched again
and the new values no longer satisfy the search version. A member of a set of similar programs,
condition. DB2 marks a row in the result table as an DBRMs, packages, or LOBs.
update hole when an update to the corresponding row A version of a program is the source code that is
in the database causes that row to no longer qualify for produced by precompiling the program. The program
the result table. version is identified by the program name and a
timestamp (consistency token).
update trigger. A trigger that is defined with the
A version of a DBRM is the DBRM that is produced
triggering SQL operation UPDATE.
by precompiling a program. The DBRM version is
upstream. The node in the syncpoint tree that is identified by the same program name and timestamp
responsible, in addition to other recovery or resource as a corresponding program version.
managers, for coordinating the execution of a two-phase A version of a package is the result of binding a
commit. DBRM within a particular database system. The
package version is identified by the same program
UR. Uncommitted read. name and consistency token as the DBRM.
A version of a LOB is a copy of a LOB value at a
URE. Unit of recovery element. point in time. The version number for a LOB is
stored in the auxiliary index entry for the LOB.
URID . Unit of recovery identifier.
view. An alternative representation of data from one or
URL. Uniform resource locator. more tables. A view can include all or some of the
columns that are contained in tables on which it is
user-defined data type (UDT). See distinct type.
defined.
user-defined function (UDF). A function that is
view check option. An option that specifies whether
defined to DB2 by using the CREATE FUNCTION
every row that is inserted or updated through a view
statement and that can be referenced thereafter in SQL
must conform to the definition of that view. A view check
statements. A user-defined function can be an external
option can be specified with the WITH CASCADED
function, a sourced function, or an SQL function.
Contrast with built-in function.
Glossary 461
Virtual Storage Access Method (VSAM) • z/OS Distributed Computing Environment (z/OS
DCE)
CHECK OPTION, WITH CHECK OPTION, or WITH | XML node. The smallest unit of valid, complete
LOCAL CHECK OPTION clauses of the CREATE VIEW | structure in a document. For example, a node can
statement. | represent an element, an attribute, or a text string.
Virtual Storage Access Method (VSAM). An access | XML publishing functions. Functions that return XML
method for direct or sequential processing of fixed- and | values from SQL values.
varying-length records on disk devices. The records in a
VSAM data set or file can be organized in logical X/Open. An independent, worldwide open systems
sequence by a key field (key sequence), in the physical organization that is supported by most of the world’s
sequence in which they are written on the data set or largest information systems suppliers, user
file (entry-sequence), or by relative-record number (in organizations, and software companies. X/Open's goal
z/OS). is to increase the portability of applications by
combining existing and emerging standards.
Virtual Telecommunications Access Method
(VTAM). An IBM licensed program that controls XRF. Extended recovery facility.
communication and the flow of data in an SNA network
(in z/OS). Z
| volatile table. A table for which SQL operations
| z/OS. An operating system for the eServer™ product
| choose index access whenever possible.
| line that supports 64-bit real and virtual storage.
VSAM. Virtual Storage Access Method.
z/OS Distributed Computing Environment (z/OS
VTAM. Virtual Telecommunication Access Method (in DCE). A set of technologies that are provided by the
z/OS). Open Software Foundation to implement distributed
computing.
W
warm start. The normal DB2 restart process, which
involves reading and processing log records so that
data that is under the control of DB2 is consistent.
Contrast with cold start.
X
XCF. See cross-system coupling facility.
Bibliography 465
v z/OS DFSMSdss Storage Administration eServer zSeries®
Reference, SC35-0424 v IBM eServer zSeries Processor
v z/OS DFSMShsm Managing Your Own Data, Resource/System Manager Planning Guide,
SC35-0420 SB10-7033
v z/OS DFSMSdfp: Using DFSMSdfp in the z/OS
Environment, SC26-7473 Fortran: VS Fortran
v z/OS DFSMSdfp Diagnosis Reference, v VS Fortran Version 2: Language and Library
GY27-7618 Reference, SC26-4221
v z/OS DFSMS: Implementing System-Managed v VS Fortran Version 2: Programming Guide for
Storage, SC27-7407 CMS and MVS, SC26-4222
v z/OS DFSMS: Macro Instructions for Data Sets,
SC26-7408 High Level Assembler
v z/OS DFSMS: Managing Catalogs, SC26-7409 v High Level Assembler for MVS and VM and
v z/OS DFSMS: Program Management, VSE Language Reference, SC26-4940
SA22-7643 v High Level Assembler for MVS and VM and
v z/OS MVS Program Management: Advanced VSE Programmer's Guide, SC26-4941
Facilities, SA22-7644
v z/OS DFSMSdfp Storage Administration ICSF
Reference, SC26-7402 v z/OS ICSF Overview, SA22-7519
v z/OS DFSMS: Using Data Sets, SC26-7410 v Integrated Cryptographic Service Facility
v DFSMS/MVS: Using Advanced Services , Administrator's Guide, SA22-7521
SC26-7400
v DFSMS/MVS: Utilities, SC26-7414 IMS Version 8
Bibliography 467
v IBM TCP/IP for MVS: Planning and Migration v z/OS DCE Administration Guide, SC24-5904
Guide, SC31-7189 v z/OS DCE Introduction, GC24-5911
v z/OS DCE Messages and Codes, SC24-5912
TotalStorage® Enterprise Storage Server v z/OS Information Roadmap, SA22-7500
v RAMAC Virtual Array: Implementing v z/OS Introduction and Release Guide,
Peer-to-Peer Remote Copy, SG24-5680 GA22-7502
v Enterprise Storage Server Introduction and v z/OS JES2 Initialization and Tuning Guide,
Planning, GC26-7444 SA22-7532
v IBM RAMAC Virtual Array, SG24-6424 v z/OS JES3 Initialization and Tuning Guide,
SA22-7549
Unicode v z/OS Language Environment Concepts Guide,
v z/OS Support for Unicode: Using Conversion SA22-7567
Services, SA22-7649 v z/OS Language Environment Customization,
SA22-7564
Information about Unicode, the Unicode v z/OS Language Environment Debugging Guide,
consortium, the Unicode standard, and standards GA22-7560
conformance requirements is available at v z/OS Language Environment Programming
www.unicode.org Guide, SA22-7561
v z/OS Language Environment Programming
VTAM Reference, SA22-7562
v Planning for NetView, NCP, and VTAM, v z/OS Managed System Infrastructure for Setup
SC31-8063 User's Guide, SC33-7985
v VTAM for MVS/ESA Diagnosis, LY43-0078 v z/OS MVS Diagnosis: Procedures, GA22-7587
v VTAM for MVS/ESA Messages and Codes, v z/OS MVS Diagnosis: Reference, GA22-7588
GC31-8369 v z/OS MVS Diagnosis: Tools and Service Aids,
v VTAM for MVS/ESA Network Implementation GA22-7589
Guide, SC31-8370 v z/OS MVS Initialization and Tuning Guide,
v VTAM for MVS/ESA Operation, SC31-8372 SA22-7591
v VTAM for MVS/ESA Programming, SC31-8373 v z/OS MVS Initialization and Tuning Reference,
v VTAM for MVS/ESA Programming for LU 6.2, SA22-7592
SC31-8374 v z/OS MVS Installation Exits, SA22-7593
v VTAM for MVS/ESA Resource Definition v z/OS MVS JCL Reference, SA22-7597
Reference, SC31-8377 v z/OS MVS JCL User's Guide, SA22-7598
v z/OS MVS Planning: Global Resource
WebSphere® family Serialization, SA22-7600
v WebSphere MQ Integrator Broker: v z/OS MVS Planning: Operations, SA22-7601
Administration Guide, SC34-6171 v z/OS MVS Planning: Workload Management,
v WebSphere MQ Integrator Broker for z/OS: SA22-7602
Customization and Administration Guide, v z/OS MVS Programming: Assembler Services
SC34-6175 Guide, SA22-7605
v WebSphere MQ Integrator Broker: Introduction v z/OS MVS Programming: Assembler Services
and Planning, GC34-5599 Reference, Volumes 1 and 2, SA22-7606 and
v WebSphere MQ Integrator Broker: Using the SA22-7607
Control Center, SC34-6168 v z/OS MVS Programming: Authorized Assembler
Services Guide, SA22-7608
z/Architecture™ v z/OS MVS Programming: Authorized Assembler
v z/Architecture Principles of Operation, Services Reference Volumes 1-4, SA22-7609,
SA22-7832 SA22-7610, SA22-7611, and SA22-7612
v z/OS MVS Programming: Callable Services for
z/OS High-Level Languages, SA22-7613
v z/OS C/C++ Programming Guide, SC09-4765 v z/OS MVS Programming: Extended
v z/OS C/C++ Run-Time Library Reference, Addressability Guide, SA22-7614
SA22-7821 v z/OS MVS Programming: Sysplex Services
v z/OS C/C++ User's Guide, SC09-4767 Guide, SA22-7617
v z/OS Communications Server: IP Configuration v z/OS MVS Programming: Sysplex Services
Guide, SC31-8875 Reference, SA22-7618
Bibliography 469
470 Command Reference
Index
Special characters AFTER option of DISPLAY DATABASE command 134
ALL keyword of MODIFY irlmproc,DIAG command 265
, (comma) in DB2 commands 10
ALLD option of MODIFY irlmproc,STATUS command of
: (colon) in DB2 commands 10
z/OS 273
’ (apostrophe) in DB2 commands 10
ALLI option of MODIFY irlmproc,STATUS command of
″ (quotation mark) in DB2 commands 10
z/OS 274
( ) (parentheses) in DB2 commands 10
ALTER BUFFERPOOL command
* (asterisk)
description 29
DISPLAY THREAD command 185
example 33
FREE PACKAGE command 259
option descriptions 30
in DB2 commands 11
ALTER GROUPBUFFERPOOL command
REBIND PACKAGE command 85
description 35
*.* (asterisk)
example 38
DISPLAY PROCEDURE command 176
option descriptions 35
START PROCEDURE command 356
ALTER UTILITY command
STOP FUNCTION SPECIFIC command 388
description 39
STOP PROCEDURE command 394
example 41
= (equal sign) in DB2 commands 10
ambiguous cursor 65
APOST option
DCLGEN subcommand 107
A DSNH command 237
ABEND subcommand of DSN 209 APOSTSQL option of DSNH command 243
ACCESS option application package
START DATABASE command 334 See package
START DB2 command 340 application plan
accounting binding 55
See also ACCTG option deleting 261
audit trace, class descriptions 366 maximum size 5
trace rebinding, changing plans 289
displaying 197 application program
starting 361 START command 329
stopping 399 testing 209
ACCTG option application program, preparing for DSNH CLIST
DISPLAY TRACE command 199 processing 227
MODIFY TRACE command 282 ARCHIVE LOG command
START TRACE command 363 description 43
STOP TRACE command 400 example 47
ACQUIRE option option descriptions 44
BIND PLAN subcommand 61 ASMLIB option of DSNH command 232
DSNH command 245 ASMLOAD option of DSNH command 232
REBIND PLAN subcommand 61 asterisk (*.*)
ACTION option DISPLAY PROCEDURE command 176
BIND PACKAGE subcommand 62 START PROCEDURE command 356
BIND PLAN subcommand 62 STOP FUNCTION SPECIFIC command 388
DCLGEN subcommand 105 STOP PROCEDURE command 394
DSNH command 245 asterisk (*)
RECOVER INDOUBT command 300 DISPLAY THREAD command 185
STOP FUNCTION SPECIFIC command 388 FREE PACKAGE command 259
STOP PROCEDURE command 394 in DB2 commands 11
ACTIVE option REBIND PACKAGE command 85
DISPLAY BUFFERPOOL command 120 AT option of DCLGEN subcommand 105
DISPLAY DATABASE command 134 AT(COMMIT) option of STOP DATABASE
DISPLAY THREAD command 185 command 378
ADD option AUDIT option
DCLGEN subcommand 105 DISPLAY TRACE command 199
DSNH command 248 MODIFY TRACE command 282
ADVISORY option of DISPLAY DATABASE START TRACE command 363
command 135 STOP TRACE command 400
Index 473
DB2 commands (continued) DCLGEN subcommand of DSN (continued)
ALTER UTILITY 39 description 103
ARCHIVE LOG 43 example 109
CANCEL THREAD 95 forming field names 107
DISPLAY ARCHIVE 117 option descriptions 104
DISPLAY BUFFERPOOL 119 DDF (distributed data facility), displaying 145
DISPLAY DATABASE 129 DEADLINE option of ALTER UTILITY command 40
DISPLAY DDF 145 DEADLOK option of START irlmproc command 349
DISPLAY GROUP 151 DECARTH option of DSNH command 236
DISPLAY GROUPBUFFERPOOL 157 DECIMAL
DISPLAY LOCATION 169 option of DSNH command 237
DISPLAY LOG 173 declarations
DISPLAY PROCEDURE 175 See DCLGEN subcommand of DSN
DISPLAY RLIMIT 181 DEFAULT option of SET ARCHIVE command 316
DISPLAY THREAD 183 DEFER
DISPLAY TRACE 197 option of BIND PLAN subcommand 67
DISPLAY UTILITY 203 DEFER option
MODIFY TRACE 281 BIND PACKAGE subcommand 67
RECOVER BSDS 297 BIND PLAN subcommand 67
RECOVER INDOUBT 299, 302 DSNH command 246, 247
RECOVER POSTPONED 303 REBIND PACKAGE subcommand 67
RESET INDOUBT 307 REBIND PLAN subcommand 67
SET SYSPARM 323 degree of parallel processing 68
START DATABASE 331 DEGREE option
START DB2 339 BIND PACKAGE subcommand 68
START DDF 343 BIND PLAN subcommand 68
START FUNCTION SPECIFIC 345 DSNH command 246
START PROCEDURE 355 REBIND PACKAGE subcommand 68
START RLIMIT 359 REBIND PLAN subcommand 68
START TRACE 361 DELAY
STOP DATABASE 375 keyword of MODIFY irlmproc,DIAG command 265
STOP DB2 381 DELAY option of ALTER UTILITY command 41
STOP DDF 383 deleting, IMS units of recovery 101
STOP FUNCTION SPECIFIC 387 DELIMIT option of DSNH command 237
STOP PROCEDURE 393 deregistering IRLM 264
STOP RLIMIT 397 DEST option
STOP TRACE 399 DISPLAY TRACE command 200
TERM UTILITY 405 START TRACE command 363
completion messages 23 STOP TRACE command 401
description of 10 DESTINATION option of DSNC MODIFY
DISPLAY FUNCTION SPECIFIC 147 command 221
entering from supported environments 21 DETAIL option
scope 13 DISPLAY BUFFERPOOL command 120
separator 10 DISPLAY GROUP command 151
DB2 precompiler 10 DISPLAY LOCATION command 170
DBM1 option of START DB2 command 340 DISPLAY THREAD command 187
DBPROTOCOL option DISPLAY TRACE command 199
BIND PACKAGE subcommand 66 detail report of DISPLAY BUFFERPOOL
BIND PLAN subcommand 66 command 123
DSNH command 246 DIAG keyword of MODIFY irlmproc,DIAG
REBIND PACKAGE subcommand 66 command 265
REBIND PLAN subcommand 66 DIAGNOSE utility, TERM command effects 406
DBRM (database request module) diagnostic dumps, IRLM 265
BIND PLAN subcommand 82 DISABLE option
maximum number in plan 5 BIND PACKAGE subcommand 73
DBRMLIB option of DSNH command 236 BIND PLAN subcommand 73
DCLGEN (declarations generator) DSNH command 247
See DCLGEN subcommand of DSN REBIND PACKAGE subcommand 73
DCLGEN subcommand of DSN REBIND PLAN subcommand 73
See also DSN command of TSO disabling a function permanently 389
declaring an indicator variable array 108
Index 475
DSNC MODIFY command of CICS EXPLAIN option (continued)
description 221 DSNH command 247, 250
example 222 REBIND PACKAGE subcommand 76
option descriptions 221 REBIND PLAN subcommand 76
DSNC STOP command of CICS REBIND TRIGGER PACKAGE subcommand 76
description 223 extended MCS consoles, DB2 support of 22
example 223
option descriptions 223
DSNC STRT command of CICS F
description 225 FLAG option
example 225 BIND PACKAGE subcommand 77
option descriptions 225 BIND PLAN subcommand 77
DSNDB01 database, authority needed to start 332 DSNH command 237, 247
DSNDB06 database, authority needed to start 332 FREE PACKAGE subcommand 259
DSNH command of TSO FREE PLAN subcommand 262
data set names 232 REBIND PACKAGE subcommand 77
description 227 REBIND PLAN subcommand 77
example 252 REBIND TRIGGER PACKAGE subcommand 77
option descriptions 228 FORCE option
DSNHDECP DSNC STOP command 223
list of parameters 417 RESET INDOUBT command 308
DSNZPARM START DATABASE command 335
list of parameters 417 STOP DB2 command 381
option of START DB2 command 339 STOP DDF command 383
DUMP option FORTLIB option of DSNH command 237
CANCEL THREAD command 96 FORTLOAD option of DSNH command 237
MODIFY irlmproc,ABEND command 263 FREE PACKAGE subcommand of DSN
dump, IRLM diagnostic 265 See also DSN command of TSO
DWQT option of ALTER BUFFERPOOL command 31 description 257
DYNAMICRULES option example 259
BIND PACKAGE subcommand 69 option descriptions 258
BIND PLAN subcommand 69 FREE PLAN subcommand of DSN
DSNH command 247 See also DSN command of TSO
REBIND PACKAGE subcommand 69 description 261
REBIND PLAN subcommand 69 example 262
option descriptions 261
functions, displaying information about 147
E
ENABLE option
BIND PACKAGE subcommand 73 G
BIND PLAN subcommand 73 GBPCACHE option of ALTER GROUPBUFFERPOOL
DSNH command 247 command 36
REBIND PACKAGE subcommand 73 GBPCHKPT option of ALTER GROUPBUFFERPOOL
REBIND PLAN subcommand 73 command 37
ENCODING option GBPOOLT option of ALTER GROUPBUFFERPOOL
BIND PACKAGE subcommand 75 command 37
BIND PLAN subcommand 75 GDETAIL option of DISPLAY GROUPBUFFERPOOL
REBIND PACKAGE subcommand 75 command 158
REBIND PLAN subcommand 75 GLOBAL option of START irlmproc command 352
END subcommand of DSN glossary 429
description 255 GRAPHIC option of DSNH command 238
example 255 group buffer pool RECOVER-pending (GRECP)
ENTRY option of DSNH command 237 status,removing using START DATABASE
escape character command 335
APOST option of DCLGEN subcommand 107 group detail report of DISPLAY GROUPBUFFERPOOL
QUOTE option of DCLGEN subcommand 107 command 160
establishing connections between IMS and a GROUP option of DSN command 210
subsystem 329 group, scope of command 13
EXPLAIN option GTF option
BIND PACKAGE subcommand 76 DISPLAY TRACE command 200
BIND PLAN subcommand 76 START TRACE command 364
Index 477
LIBRARY option (continued) MAXRO option of ALTER UTILITY command 40
DCLGEN subcommand 105 MAXUSRS option of START irlmproc command 351
RUN subcommand 312 MCS consoles, scope of commands 13
LIGHT option, START DB2 command 340 MDETAIL option of DISPLAY GROUPBUFFERPOOL
light restart, with ARM 341 command 158
LIMIT option of DISPLAY DATABASE command 134 member detail report of DISPLAY
LINECOUNT option of DSNH command 238 GROUPBUFFERPOOL command 161
LINK option of DSNH command 238 MEMBER option
link-editing, processing 227 BIND PACKAGE subcommand 82
LIST option of DISPLAY BUFFERPOOL command 121 BIND PLAN subcommand 82
LLIB option of DSNH command 238 DISPLAY UTILITY command 204
LnLIB option of DSNH command 238 member, scope of command 13
LOAD option MERGECOPY utility, effects of TERM command 407
DSNH command 238 message
SET SYSPARM command 323 DB2 commands 23
LOAD utility, effects of TERM command 407 DCLGEN subcommand 106
LOCAL option of START irlmproc command 352 DISPLAY THREAD with ACTIVE 185
location name DISPLAY TRACE command 202
BIND PACKAGE subcommand 74, 84 DISPLAY UTILITY command 204
DISPLAY LOCATION command 169 DSN command of TSO 210
REBIND PACKAGE subcommand 74, 84 DSNH command 237
REBIND TRIGGER PACKAGE subcommand 294 FLAG option of bind subcommands 77
LOCATION option FREE PACKAGE subcommand 259
DISPLAY THREAD command 186 FREE PLAN subcommand 262
DISPLAY TRACE command 201 MODIFY irlmproc,STATUS command 274
RESET INDOUBT command 308 RUN subcommand 313
START TRACE command 369 message by identifier
STOP TRACE command 402 DSN7106I 151
LOCKS option of DISPLAY DATABASE command 133 DSN9022I 23
LOCKTABL option of START irlmproc command 350 DSN9023I 23
LOG option of TRACE command 409 DSNB411I 123
logical page list (LPL) DSNB412I 123
See LPL (logical page list) DSNB413I 124
logical partitions, displaying 136 DSNB414I 124
LOGLOAD option of SET LOG command 319 DSNB415I 124
LONGLOG option of ALTER UTILITY option 41 DSNB420I 124
LOPTION option of DSNH command 239 DSNB421I 124
LPL (logical page list) DSNI021I 337
option of DISPLAY DATABASE command 133 DSNJ315I 46
recovering pages DSNJ316I 46
using START DATABASE command 335 DSNJ317I 46
LSTATS option of DISPLAY BUFFERPOOL DSNJ318I 46
command 121 DSNL440I to DSNL449I 309
LTE option of MODIFY irlmproc,SET command of DSNL448I 308
z/OS 270 DSNL450I 96
LTE option of START irlmproc command 351 DSNT392I 137
LUNAME option DSNT500I 138
DISPLAY LOCATION command 170 DSNT501I 138
RESET INDOUBT command 308 DSNT736I 379
LUWID option DSNU100I 204
DISPLAY THREAD command 187 DSNU105I 204
RECOVER INDOUBT command 301 DSNU106I 204
RESET INDOUBT command 309 DSNV413I 188
DSNW133I 363
DSNX943I 177
M DSNX950I 177
MACRO option of DSNH command 239 MODE option
MAINT option of MODIFY irlmproc,STATUS command ARCHIVE LOG command 44
of z/OS 274 STOP DB2 command 381
MAINT option of START DB2 command 340 STOP DDF command 383
MAXCSA option of START irlmproc command 351
Index 479
PART option (continued) PLAN option (continued)
STOP DATABASE command 378 DSNH command 248
partial-location name, DISPLAY LOCATION REBIND PLAN subcommand 88
command 170 RUN subcommand 312
PASS option of DSNH command 239 START TRACE command 365
PATH option STOP TRACE command 401
BIND PACKAGE subcommand 85 plan-name naming convention xvii
BIND PLAN subcommand 85 PLI option of DCLGEN subcommand 106
DSNH command 248 PLI2LIB option of DSNH command 240
REBIND PACKAGE subcommand 85 PLIB option of DSNH command 240
REBIND PLAN subcommand 85 PLILIB option of DSNH command 240
PATHDEFAULT option PLILOAD option of DSNH command 240
REBIND PACKAGE subcommand 87 PLIPLNK option of DSNH command 240
REBIND PLAN subcommand 87 PLIPMSG option of DSNH command 240
PBIND option of DSNH command 248 PLOCK keyword of MODIFY irlmproc,DIAG
PC option of START irlmproc command 352 command 265
PCICS option of DSNH command 249 PnLIB option of DSNH command 240
PCLOAD option of DSNH command 239 PNODEFER option of DSNH command 250
PDBPROTOCOL option of DSNH command 249 POPTHINT option of DSNH command 250
PDBRMLIB option of DSNH command 249 POPTION option of DSNH command 240
PDEFER option of DSNH command 249 POSTPONED option of DISPLAY THREAD
PDEGREE option of DSNH command 249 command 186
PDISABLE option of DSNH command 249 postponed units of recovery, recovering 303
PDLIBATCH option of DSNH command 249 POWNER option of DSNH command 250
PDMEM option of DSNH command 249 PPATH option of DSNH command 250
PDYNAMICRULES option of DSNH command 250 PQUALIFIER option of DSNH command 251
PENABLE option of DSNH command 250 PRECOMP option of DSNH command 240
PERFM option precompiler
DISPLAY TRACE command 199 DSNH command options 239
MODIFY TRACE command 282 invoking DSNH 227
START TRACE command 362 producing members for 82
STOP TRACE command 400 PRELEASE option of DSNH command 251
performance trace PRELINK option of DSNH command 241
displaying 197 PREOPT option of DSNH command 251
stopping 399 PRINT option of DSNH command 241
performance, trace privilege set of a process 3
class descriptions 367 procedure, stored
starting 361 See stored procedure
PFLAG option of DSNH command 250 processing, parallel
PGPROT option of START irlmproc command 352 VPPSEQT option of ALTER BUFFERPOOL
PGSTEAL option of ALTER BUFFERPOOL command 30
command 31 PROGRAM option of RUN subcommand 311
phases of execution for DSNH processing 227 PSECSPAC option of DSNH command 241
PIMSBMP option of DSNH command 250 PSPACE option of DSNH command 241
PIMSMPP option of DSNH command 250 PVALIDATE option of DSNH command 251
PISOLATION option of DSNH command 250 PVT option of MODIFY irlmproc,SET command of
PKEEPDYNAMIC option of DSNH command 250 z/OS 270
PKLIST option
BIND PLAN subcommand 87
DSNH command 248 Q
REBIND PLAN subcommand 87 QUALIFIER option
PL/I application program, macro processing step for BIND PACKAGE subcommand 89
DSNH 227 BIND PLAN subcommand 89
plan DSNH command 248
See application plan REBIND PACKAGE subcommand 89
PLAN REBIND PLAN subcommand 89
option of DSNH command 240 qualifier-name naming convention xviii
PLAN option QUEUE option of STOP FUNCTION SPECIFIC 388,
BIND PLAN subcommand 88 389
DISPLAY TRACE command 200 QUIESCE option
DSNC DISPLAY command 217 DSNC STOP command 223
Index 481
RUN (continued) special character xv
subcommand of DSN (continued) SPUFI subcommand of DSN
return codes 211 See DSN command of TSO
RUN option SPUFI, description 325
DSNH command parameters 242 SQL ID (SQL authorization ID)
RUNIN option of DSNH command 242 See authorization ID, SQL
running DSNH processing 227 SQL option of DSNH command 243
RUNOUT option of DSNH command 242 SQLDELIM option of DSNH command 243
RUNSTATS utility, effects of TERM command 407 SQLERROR option
RW option of START DATABASE command 334 BIND PACKAGE subcommand 91
DSNH command 251
SQLFLAG option of DSNH command 243
S SQLRULES option
scanning rules, DB2 commands 9 BIND PLAN subcommand 92
schema.partial-name option REBIND PLAN subcommand 92
DISPLAY FUNCTION SPECIFIC command 148 SQLRULES option of DSNH command 248
START FUNCTION SPECIFIC command 346 SRC (subsystem recognition character)
STOP FUNCTION SPECIFIC command 388 See command prefix
schema.specific-function-name option SRV option
DISPLAY FUNCTION SPECIFIC command 148 DISPLAY TRACE command 200
START FUNCTION SPECIFIC command 346 START TRACE command 364
STOP FUNCTION SPECIFIC command 388 STOP TRACE command 401
schema.specific-function-name option of DISPLAY SSR command of IMS, description 327
FUNCTION SPECIFIC command 148 START command of IMS 329
scope of commands 13 START DATABASE command
SCOPE option description 331
ARCHIVE LOG command 45 example 337
DISPLAY FUNCTION SPECIFIC command 148 option descriptions 332
DISPLAY PROCEDURE command 176 recovering object in group buffer pool 335
DISPLAY THREAD command 185 recovering pages on logical page list 335
DISPLAY TRACE command 200 START DB2 command
START FUNCTION SPECIFIC command 346 description 339
START irlmproc command 352 example 341
START PROCEDURE command 356 option descriptions 339
STOP FUNCTION SPECIFIC command 389 START DDF command 343
STOP PROCEDURE command 395 START FUNCTION SPECIFIC command
STOP TRACE command 401 description 345
secondary authorization ID 3 example 347
SET ARCHIVE command option descriptions 346
description 315 START irlmproc command of z/OS
example 317 description 349
option descriptions 315 examples 352
SET LOG command option descriptions 349
description 319 START PROCEDURE command
example 321 description 355
option descriptions 319 example 357
SET SYSPARM command option descriptions 356
description 323 START RLIMIT command
example 324 description 359
option descriptions 323 example 360
SMF option START TRACE command
DISPLAY TRACE command 200 description 361
START TRACE command 364 example 370
STOP TRACE command 401 option descriptions 362
SOMDLLI option of DSNH command 242 STARTUP option of SET SYSPARM command 323
SOURCE option of DSNH command 242 STAT option
SPACENAM option DISPLAY TRACE command 199
DISPLAY DATABASE command 131 MODIFY TRACE command 282
START DATABASE command 333 START TRACE command 363
STOP DATABASE command 377 STOP TRACE command 400
SPACEUN option of DSNH command 243 STATISTICS option of DSNC DISPLAY command 217
Index 483
TRACE CT command of z/OS (continued) VTAM (Virtual Telecommunications Access Method),
option descriptions 411 DISPLAY NET command 97
TRACE option
MODIFY irlmproc,SET command of z/OS 270
MODIFY irlmproc,STATUS command of z/OS 274 W
START irlmproc command 352 WAIT option of ARCHIVE LOG command 45
START TRACE command 369 WEPR option of DISPLAY DATABASE command 133
TRACK option of DSNH 243 WORKUNIT option of DSNH command 244
TRANSACTION option WRAP option of TRACE CT command 411
DSNC DISPLAY command 217 WSECPAC option of DSNH command 244
DSNC MODIFY command 221 WSPACE option of DSNH command 245
TSO CLISTs of DSNH 227 WTRSTART option of TRACE CT command 411
TSO option of DSNH command 242 WTRSTOP option of TRACE CT command 412
TYPE option
DISPLAY GROUPBUFFERPOOL command 158
DISPLAY THREAD command 185 X
XCF (cross-system coupling facility), status of
members 151
U XLIB option of DSNH command 245
unit of recovery, in IMS 114 XREF option of DSNH command 245
unit of work
See also unit of recovery
displaying an outstanding 113 Y
resetting YES option
IMS 101 START DB2 command 340
indoubt 101 START irlmproc command 352
UNLOAD utility, effects of TERM command 407
USE option of DISPLAY DATABASE command 132
UT option of START DATABASE command 334
utilities
Z
z/OS commands
displaying status 203
MODIFY irlmproc,ABEND 263
identifier 406
MODIFY irlmproc,DIAG 265
terminating 405
MODIFY irlmproc,PURGE 267
utility-id naming convention xviii
MODIFY irlmproc,SET 269
MODIFY irlmproc,STATUS 273
START irlmproc 349
V STOP irlmproc 391
VALIDATE option TRACE CT 411
BIND PACKAGE subcommand 92 ZPARM
BIND PLAN subcommand 92 See subsystem parameters
DSNH command 248
REBIND PACKAGE subcommand 92
REBIND PLAN subcommand 92
VDWQT option of ALTER BUFFERPOOL command 31
version of a package
BIND PACKAGE subcommand 84
REBIND PACKAGE subcommand 84
VERSION option of DSNH command 244
version-id naming convention xviii
virtual storage access method (VSAM)
See VSAM (virtual storage access method)
VPPSEQT option of ALTER BUFFERPOOL
command 30
VPSEQT option of ALTER BUFFERPOOL
command 30
VPSIZE option of ALTER BUFFERPOOL command 30
VPXPSEQT option of ALTER BUFFERPOOL
command 30
VSAM (virtual storage access method) password,
DCLGEN subcommand 105
Overall, how satisfied are you with the information in this book?
How satisfied are you that the information in this book is:
When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any
way it believes appropriate without incurring any obligation to you.
Name Address
Company or Organization
Phone No.
___________________________________________________________________________________________________
Readers’ Comments — We’d Like to Hear from You Cut or Fold
SC18-7416-00 Along Line
_ _ _ _ _ _ _Fold
_ _ _and
_ _ _Tape
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Please
_ _ _ _ _do
_ _not
_ _ staple
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Fold
_ _ _and
_ _ Tape
______
NO POSTAGE
NECESSARY
IF MAILED IN THE
UNITED STATES
_________________________________________________________________________________________
Fold and Tape Please do not staple Fold and Tape
Cut or Fold
SC18-7416-00 Along Line
Printed in USA
SC18-7416-00
Spine information: