Previous Topic: Reading the ReportsNext Topic: Running the Information Storage Update Log (EL)


NEXTKEY Report

NPDTST1 98.153 06/02 09.39 DATASET TRACE REQ RKEY=TLCTMS26 NPDTST1 VOL= DDN= DSN=TLCTMS.V191.ADD.EXEC VOL= PGM= LIB= WRITE KEYEXCES NAM=TOM SMITH CPUA SRC=CONS009 UID=PER99TLCTST10123 NEXTKEY: TLCTMS01 TLCTMS02 TLCTMS03 TLCTMS04 TLCTMS05 TLCTMS06 TLCTMS07 TLCTMS08 TLCTMS09 TLCTMS10 TLCTMS11 TLCTMS12 TLCTMS13 TLCTMS14 TLCTMS15 TLCTMS16 TLCTMS17 TLCTMS18 TLCTMS19 TLCTMS20 TLCTMS21 TLCTMS22 TLCTMS23 TLCTMS24 TLCTMS25 NPDTST1 98.153 06/02 09.39 DATASET VIOLATION RKEY=TLCTMS26 TLCTST1 VOL= DDN= DSN=TLCTMS.V191.ADD.EXEC VOL= PGM= LIB= WRITE KEYEXCES NAM=TOM SMITH CPUA SRC=CONS009 UID=PER99TLCTST10123

The sample report reflects user TLCTMS requested write access for file NPDTEST1.V191.ADD.EXEC. The rule entry for this file directed CA ACF2 for z/VM to another rule key through the NEXTKEY rule option. CA ACF2 for z/VM allows a maximum of 25 NEXTKEYs when validating access to a file. Eventually, the rule key that validated the access request in the sample was TLCTMS26, the 26th rule set CA ACF2 for z/VM searched during validation processing. Therefore, an error occurred.

The first logging entry on the sample is from a TRACE record and indicates that a KEYEXCES condition occurred when the 25th rule set directed CA ACF2 for z/VM to the 26th rule set. The NEXTKEY field of the logging entry lists all rule sets that CA ACF2 for z/VM searched during validation.

The second logging entry is a data set violation record and indicates that CA ACF2 for z/VM aborted the access request due to a KEYEXCES condition. The RKEY field indicates the processed rule key when CA ACF2 for z/VM aborted the access.

These trace records are a valuable aid in determining where and why a KEYEXCES condition occurred. In addition, if a NEXTKEY loop occurs, the easiest method of determining where the loop occurred is the TRACE record. When a NEXTKEY loop occurs, the rmrc field of the report indicates NKEYLOOP and the NEXTKEY field lists all rule sets that were referenced during CA ACF2 for z/VM validation. If you selected Extended terminal output ==> N, CA ACF2 for z/VM displays only the first four lines of output.

NEXTKEY

Lists the $KEY of every rule set that CA ACF2 for z/VM checked during access validation. This report lists these $KEYs in the order they were referenced. CA ACF2 for z/VM displays this field only for NEXTKEY trace records when you specify the TERMINAL or PRINTER format options. This line is useful for debugging purposes when an NKEYLOOP or KEYEXECS condition occurs.