z/OS ISPF Software Configuration and Library Manager Guide and Reference
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Program flow

z/OS ISPF Software Configuration and Library Manager Guide and Reference
SC19-3625-00

When the FLM00CVE program is invoked, the program flow is as follows:

  1. Parse the argument string passed by invocation.
  2. Perform the REXX/HLAPI Initialization function (HL01).
  3. Perform the REXX/HLAPI Record Retrieve function (HL06).
  4. Perform the REXX/HLAPI Termination function (HL02).
  5. Verify that the user requesting to change the member has authority to do so based on information contained in the retrieved record.
  6. Output error messages if applicable.
  7. Return to caller passing return code as exit value.

Each of the steps above performs error-checking and return code analysis independently. If an error is noted, processing might terminate at that time or continue to another step. For example, after Information Management initialization has completed, Information Management Termination is attempted regardless of intervening errors; the transaction is not left hanging.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014