SVA_AUTOIPL_DEV_VALIDATION
- Description:
- Performs device validation for device(s) specified in the AutoIPL policy for SADMP and/or MVS™ when an AutoIPL policy exists. Reports problems if the device validation fails. If the check determines that there is no AutoIPL policy defined, or that the customer does not have the appropriate hardware feature, the check stops running.
- Reason for check:
- If an AutoIPL policy exists all of the following conditions must
be met for the device to pass device validation:
- The device must exist
- The device must be accessible
- The device must be DASD
- The device must not be specified as a secondary device in a Metro Mirror pair. Use the report generated from this check to determine if there are problems with device(s) specified in the AutoIPL policy.
- z/OS® releases the check applies to:
- z/OS V1R11
- User override of IBM values:
- The following sample shows the defaults for customizable
values for this check. Use this sample to make permanent check
customizations in an HZSPRMxx parmlib member used at
IBM Health Checker for z/OS startup. If you just want a one-time
only update to the check defaults, omit the first line (ADDREPLACE POLICY)
and use the UPDATE statement on a MODIFY hzsproc command.
Note that using non-POLICY UPDATEs in HZSPRMxx can
lead to unexpected results and is therefore not recommended.
ADDREPLACE POLICY[(policyname)] [STATEMENT(name)] UPDATE CHECK(IBMSVA,SVA_AUTOIPL_DEV_VALIDATION) ACTIVE SEVERITY(MED) INTERVAL(24:00) DATE('date_of_the_change') REASON('Your reason for making the update.')
- Parameters accepted:
- No.
- Reference:
- For information about Exploiting the Automatic IPL Function, see z/OS MVS Planning: Operations.
- For information about DIAGxx (Control common storage tracking and GFS trace) see z/OS MVS Initialization and Tuning Reference
- Debug support:
- No
- Verbose support:
- No
- Messages:
- This check issues the following exception messages:
- BLWH0002E
- SECLABEL recommended for multilevel security users:
- SYSLOW - see z/OS Planning for Multilevel Security and the Common Criteria for information on using SECLABELs.