Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
RLS Access Rules z/OS DFSMS Using Data Sets SC23-6855-00 |
|||||||||||||||||
The following table illustrates RLS access rules, showing the possible scenarios for opening data sets with and without RLS. In Table 1, OPEN1 represents an initial successful open and OPEN2 represents the options for a subsequent open of the same data set, with or without RLS.
Note: For non-recoverable data sets, either transactional
(CICS or DFSMStvs) RLS or non-transactional (non-CICS and non-DFSMStvs)
RLS is acceptable. For recoverable data
sets:
For example, if OPEN1 already successfully opened the data set to be accessed with RLS, the subsequent OPEN2 attempting to open it for non-RLS output would fail, regardless of whether or not the data set is recoverable. With the same OPEN1, if the data set is recoverable, OPEN2 can open it for non-transactional (that is, non-commit protocol) RLS input-only access. |
Copyright IBM Corporation 1990, 2014
|