z/OS MVS Programming: Workload Management Services
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Restrictions

z/OS MVS Programming: Workload Management Services
SC34-2663-00

Restrictions

  1. This macro may not be used prior to the completion of WLM address space initialization
  2. All parameter areas must reside in current primary.
  3. Caller is responsible for error recovery
  4. Only limited checking is done against the input monitoring token.
  5. If the key specified on IWM4MCRE was a user key (8-F), then the primary addressability must exist to the performance block IWM4MCRE obtained. This condition is satisfied by ensuring that current primary matches primary at the time that IWM4MCRE was invoked. If this service is invoked in a subspace, the condition may be satisfied by ensuring that the performance block is shared with the base space.
  6. FUNCTION(CONTINUE) may not be used when there is an outstanding continuation established by use of Transfer Continue
  7. The caller must serialize to prevent any delay monitoring services from being invoked concurrently for the input monitoring environment.
  8. This macro may only be used on z/OS V2R1 or higher.

Register
Contents
0
Reserved
1
Reserved
13
The address of a 216-byte standard save area
14
Reserved
15
Reserved

Register
Contents
0
Reserved
1
Reserved
14
Reserved
15
Reserved

When control returns to the caller, the GPRs contain:

Register
Contents
0
Reason code if GR15 return code is non-zero
1
Used as a work register by the macro
14
Used as a work register by the macro
15
Return code

When control returns to the caller, the ARs contain:

Register
Contents
0
Used as a work register by the macro
1
Used as a work register by the macro
14
Used as a work register by the macro
15
Used as a work register by the macro

Some callers depend on register contents remaining the same before and after using a service. If the system changes the contents of registers on which the caller depends, the caller must save them before calling the service, and restore them after the system returns control.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014