One more source for understanding how system service macros work is near the front of the books in chapter 1 "Using the Services". Note especially the section "Handling return codes and reason codes." This chapter covers generic topics that typically apply to all the macros in the book. This eliminates IBM's having to copy all the same text from chapter 1 into the description of each of the 100 or so macros in these books. E.g., chapter 1 tells us that we may need to initialize, at execution time, a remote parameter list by copying a macro expansion, defined at assembly time with the list form of the macro, onto the remote parameter list dynamically being manipulated by the execution form of the macro just before we code the execution form of the macro. Not all macros initialize the entire parameter list each time the macro executes. Knowing this has saved me a lot of frustrated debugging time.
Bill Fairchild Programmer Rocket Software 408 Chamberlain Park Lane * Franklin, TN 37069-2526 * USA t: +1.617.614.4503 * e: [email protected] * w: www.rocketsoftware.com -----Original Message----- From: IBM Mainframe Assembler List [mailto:[email protected]] On Behalf Of Peter Relson Sent: Thursday, June 07, 2012 6:37 AM To: [email protected] Subject: Re: Getmain question >But Binyamin said that GETMAIN RU does not have a defined return code; >and that's not so. The only time GETMAIN RU can have a non-0 RC is when CheckZeroRC=YES is specified. Thus, there is a *useful* return code for GETMAIN RU only when CheckZeroRC=YES. So GETMAIN RU has a "defined return code" of 0 but, as Binyamin wrote, that is meaningless in this case since for this invocation the R15 is always 0 upon return (as it abends if the obtain fails). SP229 never "spills" into SP230. If the trace shows SP230 then there were obtains from SP230. If the trace does not show SP229 then there were no obtains from SP229 within the timespan represented in the trace. AllowUserKeyCSA has nothing to do with obtains from non-CSA subpools. There are no "issues" with the AllowUserKeyCSA parameter other than with anyone who does allow it who cares about system integrity. Peter Relson z/OS Core Technology Design
