z/OS MVS Programming: Workload Management Services
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Restrictions

z/OS MVS Programming: Workload Management Services
SC34-2663-00

Restrictions

  1. This macro may not be used prior to the completion of WLM address space initialization
  2. If the key specified on IWM4MCRE was a user key (8-F), then the following must ALL be true:
    • caller must be in non-cross-memory mode (P=S=H). This implies that the current primary must match the primary at the time that IWM4MCRE was invoked. Running in a subspace is not supported.
    • must be in TCB mode (not SRB)
    • current TCB must match the TCB at the time that IWM4MCRE was invoked.
  3. The caller must serialize to prevent any delay monitoring services from being invoked concurrently or subsequently for the environment represented by the monitoring token
  4. This service should not be invoked while in a RTM termination routine (resource manager) for the TCB owning the monitoring environment since MVS will have its own resource cleanup routine and unpredictable results would occur. It is legitimate to use this service while in a recovery routine, however, or in mainline processing.
  5. This macro may only be used on z/OS V2R1 or higher.

Register
Contents
0
Reserved
1
Reserved
14
Reserved
15
Reserved

Register
Contents
0
Reserved
1
Reserved
14
Reserved
15
Reserved'.

When control returns to the caller, the GPRs contain:

Register
Contents
0
Reason code if GR15 return code is non-zero
1
Used as a work register by the macro
14
Used as a work register by the macro
15
Return code'.

When control returns to the caller, the ARs contain:

Register
Contents
0
Used as a work register by the macro
1
Used as a work register by the macro
14
Used as a work register by the macro
15
Used as a work register by the macro'.

Some callers depend on register contents remaining the same before and after using a service. If the system changes the contents of registers on which the caller depends, the caller must save them before calling the service, and restore them after the system returns control.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014