Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Composite State of a Lock Table Entry z/OS MVS Programming: Sysplex Services Guide SA23-1400-00 |
|
The term “composite state” was previously introduced to
depict the cumulative state, in terms of shared or exclusive, of a
resource request queue. This same term can be used to describe the
state of a coupling facility lock table entry. Whereas the composite
state of a resource request queue reflects the state of all owners
and requestors of a particular resource, the composite state of a
lock table entry denotes the state of the owners and requestors of
ALL resources mapping to that lock table entry. Similar to a resource
request queue, a lock table entry can be in one of three composite
states — free, shared, or exclusive.
The same rules used to determine compatibility of requests that are added to a resource request queue can also be used to determine the effect of a resource request on the state of the corresponding lock table entry. Figure 1 illustrated this concept. For example, Figure 1 depicts a four-entry lock table with multiple owners of resources that hash to lock table entry 2. The composite state of this lock entry is determined to be “exclusive” because there is at least one exclusive owner of a resource mapping to this entry. Additionally, the lock entry is recognized as being incompatible because the resources (XYZ and JKL) that map to this entry are owned in conflicting states. |
Copyright IBM Corporation 1990, 2014
|