Abstract for TSO/E Programming Services
This information supports z/OS (5650-ZOS).
Purpose of this information
This information describes the services that TSO/E provides for use in writing system and application programs.
Who should use this information
This information
is intended for:
- Application programmers who design and write programs that run under TSO/E.
- System programmers who must modify TSO/E to suit the needs of their installation.
You must be familiar with MVS™ programming conventions, the assembler language, and the structure of TSO/E.
Before using this information, read z/OS TSO/E Programming Guide which describes how to write a Command Processor and how to compile, assemble, execute and test a program in the TSO/E environment.
How this information is organized
The topics
of this information and their purposes are as follows:
- Introduction gives an overview of the services provided by TSO/E and discusses the types of programs that can be written using TSO/E.
- Considerations for using TSO/E services describes how to determine the version and release of TSO/E installed on your system, and explains programming considerations for MVS and the interface to the TSO/E service routines.
- Using the TSO/E Environment Service IKJTSOEV describes how to use the TSO/E Environment Service to establish a TSO/E environment outside of the TSO/E TMP and Service Routines.
- Invoking TSO/E service routines with CALLTSSR describes how to use the CALLTSSR macro instruction to invoke certain TSO/E service routines.
- Verifying subcommand names with IKJSCAN describes how to validate command and subcommand names.
- Verifying command and subcommand operands with parse describes how to validate command and subcommand operands.
- Using the terminal control macro instructions describes how to control terminal functions and attributes.
- Using BSAM or QSAM for terminal I/O describes how to use the basic sequential and queued sequential access methods in programs that operate under TSO/E.
- Using the TSO/E I/O service routines for terminal I/O describes how to use the STACK, GETLINE, PUTLINE and PUTGET service routines in a Command Processor.
- Using the TGET/TPUT/TPG macro instructions for terminal I/O describes how to use the TGET/TPUT/TPG macro instructions in a program to perform terminal I/O.
- Using the TSO/E message handling routine IKJEFF02 describes how to use IKJEFF02 in a Command Processor to issue messages.
- Using the STAX service routine to handle attention interrupts describes how to use the STAX service routine in a program to process attention interruptions.
- Using the CLIST attention facility describes how to use the CLIST attention facility to process a CLIST's attention exit.
- Obtaining a List of data set names describes how a program can use ICQGCL00 to obtain a list of data set names that match specified criteria.
- Using the space management CLIST ICQSPC00 describes how a program can use ICQSPC00 to ensure that data sets have adequate free space.
- Using IKJADTAB to change alternative library environments describes how to use IKJADTAB to create and remove alternative library environments and to modify alternative library definitions.
- Using the dynamic allocation interface routine DAIR describes how to use DAIR in a Command Processor to allocate, free, concatenate and deconcatenate data sets during program execution.
- Using IKJEHCIR to retrieve system catalog information describes how to use IKJEHCIR to retrieve information from the system catalog.
- Constructing a fully-qualified data set name with IKJEHDEF describes how a Command Processor can use IKJEHDEF to construct a fully-qualified data set name.
- Using the DAIRFAIL routine IKJEFF18 describes how to use the DAIRFAIL routine to analyze return codes from dynamic allocation (SVC 99) or DAIR.
- Analyzing error conditions with GNRLFAIL/VSAMFAIL describes how to use the GNRLFAIL/VSAMFAIL routine to analyze error conditions and issue appropriate error messages.
- Using the table look-up service IKJTBLS describes how to use the table look-up service to search the lists of authorized commands and programs and commands not supported in the background.
- Using the TSO/E Service Facility IKJEFTSR describes how an unauthorized program can use the TSO/E Service Facility to invoke other programs, commands, REXX execs and CLISTs, regardless of whether the invoked function is authorized.
- Using the variable access routine IKJCT441 describes how a program can use IKJCT441 to examine and manipulate CLIST and REXX variables.
- Accessing the Information Center Facility names directory describes how to use TSO/E program ICQCAL00 to access the Information Center Facility names directory.
- Using the printer support CLISTs describes how to use the printer support CLISTs to select printers and print data sets on selected printers.
- Invoking an Information Center Facility application describes how to use the application invocation function to invoke an application that is integrated into the Information Center Facility.
- Using the GETMSG service describes how to use the GETMSG service to retrieve system messages issued during a console session.
- Using the Unauthorized Resource Processor Service IKJURPS describes how applications that execute in a TSO/E environment can get control within the TSO/E terminal monitor program (TMP).
- Limits for TSO/E service routines describes the limits imposed by TSO/E services.
How to use this information
If you have never used this information, read Introduction to become familiar with the programming services that TSO/E provides. Then read the topic that discusses the service you want to use.