z/OS DFSMSrmm Implementation and Customization Guide
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Replacing IEHINITT with EDGINERS

z/OS DFSMSrmm Implementation and Customization Guide
SC23-6874-00

You can use the DFSMSrmm EDGINERS utility or the IEHINITT utility to initialize and erase tape volumes.

Use the IEHINITT utility to initialize tapes you do not want to be defined to DFSMSrmm. Use the RMM CHANGEVOLUME subcommand to inform DFSMSrmm that the volume has been initialized. If you use tapes that are initialized using a utility other than EDGINERS and do not inform DFSMSrmm, DFSMSrmm can issue message EDG4026I at OPEN time.

EDGINERS, if you decide to use it, performs these tasks:
  • Reads and validates volume labels.
  • Maintains RACF profiles.
  • Uses and updates information in the DFSMSrmm control data set.
  • Provides a facility to erase tapes.
  • Defines volumes you initialize or erase that are not yet defined in the control data set.
  • Ends processing when two consecutive errors are detected on the same volume to prevent subsequent volumes from being used incorrectly when a cartridge loader is in use. For example, if an incorrect volume label is read, the volume is demounted and a new mount request issued. Processing is dependent on the operator response to DFSMSrmm message EDG6663D and the WRONGLABEL processing described in EXEC parameters for EDGINERS.
  • Issues a WTOR to the operator when a mount request is issued. A reply to the WTOR is not always required as processing continues as soon as the volume is mounted. The WTOR is issued to allow the operator to skip a volume if the volume cannot be mounted for some reason.
  • Bypasses any IOS000I messages for an 'NCA' error (tape not capable message) when reading the label on a volume that has not been initialized.
  • In addition, EDGINERS can also be used to scan volume labels and compare the label information with the information defined to DFSMSrmm.

For information about preventing or limiting the use of IEHINITT, see Authorizing DFSMSrmm users and ensuring security.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014