TurboIMAGE/XL Database Management System Reference Manual (30391-90012)
Table Of Contents
- 1 Introduction
- 2 Database Structure and Protection
- 3 Defining a Database
- 4 Using the Database
- 5 TurboIMAGE/XL Library Procedures
- Using TurboIMAGE/XL Intrinsics
- DBBEGIN
- DBCLOSE
- DBCONTROL
- DBDELETE
- DBEND
- DBERROR
- DBEXPLAIN
- DBFIND
- DBGET
- DBINFO
- INTRINSIC NUMBER 402
- Syntax
- Parameters
- Discussion
- Mode 101: Item Number
- Mode 102: Item Name
- Mode 103: Items in Database
- Mode 104: Items in Data Set
- Mode 113: BTREEMODE1 and Wildcard Character
- Mode 201: Set Number
- Mode 202: Set Name
- Mode 203: Sets in Database
- Mode 204: Sets with Item
- Mode 205: Set Capacity
- Mode 206: Number of Data Set Chunks
- Mode 207: Size of Data Set Chunks
- Mode 208: Primary and Actual Capacity
- Mode 209: B-Tree Attachment
- Mode 301: Paths
- Mode 302: Key or Search Item
- Mode 401: Logging
- Mode 402: ILR
- Mode 403: Dynamic Roll-Back
- Mode 404: Logging Subsystem Information
- Mode 406: Database Information
- Mode 501: Subsystem Access
- Mode 502: Critical Item Update
- Modes 8nn: Third-Party Indexing
- Mode 901: Language
- DBLOCK
- DBMEMO
- DBOPEN
- DBPUT
- DBUNLOCK
- DBUPDATE
- DBXBEGIN
- DBXEND
- DBXUNDO
- 6 Host Language Access
- Model Program
- ORDERS Database Model Program
- Main Body of Program
- Opening the Database
- Retrieving All the Records on a Chain (with Item Level Locking)
- Retrieving a Data Entry Using a Record Number
- Retrieving Master Data Using a Key Value
- Retrieving Data Serially (with Set Level Locking)
- Adding an Entry
- Updating an Entry
- Deleting an Entry
- Rewinding a Data Set
- Obtaining Database Information
- Obtaining Error Messages and Explanations
- Closing the Database
- C
- COBOL II
- Defining Data Types, Variables, and Intrinsics
- Main Body of Program
- Opening the Database
- Retrieving All the Records on a Chain (with Item Level Locking)
- Retrieving a Data Entry Using a Record Number
- Retrieving Master Data Using a Key Value
- Retrieving Data Serially (with Set Level Locking)
- Adding an Entry
- Updating an Entry
- Deleting an Entry
- Rewinding a Data Set
- Obtaining Database Information
- Obtaining Error Messages and Explanations
- Closing the Database
- FORTRAN 77
- Pascal
- RPG
- 7 Logging and Recovery
- Database Utilities Used in Logging and Recovery
- Recovery Options
- Logical Transactions
- Dynamic Roll-Back Recovery
- Intrinsic Level Recovery
- Logging Preparation
- Step 1--Checking MPE/iX Logging Configuration
- Step 2--Acquiring Logging Capability
- Step 3--Logging to Tape or Disk
- Step 4--Building a Log File for Logging to Disk
- Step 5--Creating the Log Identifier
- Step 6--Setting the Log Identifier
- Step 7--Setting Flags for the Database Backup Copy
- Step 8--Making a Database Backup Copy
- TurboSTORE/iX 7x24 True-Online Backup
- Logging Status
- Logging Maintenance
- Roll-Forward Recovery
- Roll-Back Recovery
- DBRECOV Commands Used with Roll-Forward and Roll-Back Recovery
- Recovery Tables
- Post-Recovery Options
- The Mirror Database
- 8 Using the Database Utilities
- Restructuring the Database with TurboIMAGE/XL Utilities
- Summary of Utility Routines
- Utility Program Operation
- DBLOAD
- DBRECOV
- >CONTROL
- >EXIT
- >FILE
- >RECOVER
- >ROLLBACK
- >RUN
- DBRESTOR
- DBSTORE
- DBUNLOAD
- DBUTIL
- >>ACTIVATE
- >>ADDINDEX
- >>CREATE
- >>DEACTIVATE
- >>DETACH
- >>DISABLE
- >>DROPINDEX
- >>ENABLE
- >>ERASE
- >>EXIT
- >>HELP
- >>MOVE
- >>PURGE
- >>REBUILDINDEX
- >>REDO
- >>RELEASE
- >>SECURE
- >>SET
- >>SHOW
- Syntax
- Parameters
- Example (Show Users)
- Example Discussion
- Example (Show All)
- Example Discussion
- Example (Show Capacity)
- Format of Show Device List
- Example (Show Device)
- Format of Show Indices
- Example (Show Indices)
- Format of Show Locks List
- Example 1 (Show Locks)
- Example 1 Discussion
- Example 2 (Show Locks)
- Example 2 Discussion
- >>VERIFY
- 9 Using a Remote Database
- 10 Internal Structures and Techniques
- 11 B-Tree Indices
- A Error Messages
- B Results of Multiple Access
- C Database Design Considerations
- D Multiple Calls to DBLOCK
- E TurboIMAGE/XL Log Record Formats
- F MPE/iX Log Record Formats
- G Recovery and Logging Quick Reference
- H TurboIMAGE/XL versus TurboIMAGE/V

Appendix D 655
Multiple Calls to DBLOCK
D Multiple Calls to DBLOCK
For the purpose of deadlock prevention, the system views any call to DBLOCK in which
something is actually locked as a lock on a single resource, even though the call may have
specified multiple lock descriptors. Any program which does not have the Multiple RIN
(Resource Identification Number) capability (CAP=MR) can only have one resource locked
at a time, and thus can only call DBLOCK once without an intervening call to DBUNLOCK. It
may be necessary for some applications to violate this rule. The purpose of this appendix is
to tell you how to avoid problems that can arise if you prepare your application programs
with MR capability (CAP=MR).
Some typical situations in which CAP=MR could be required are the following:
• A program has two or more databases open and wishes to lock part or all of each
database simultaneously. (One or more of the databases may be on a remote HP 3000.)
• A program wishes to lock an MPE file and a database simultaneously.
• A program wishes to lock data entries in a database and, after reading their contents, to
apply further locks. This is very dangerous and is not recommended, because deadlocks
can occur very easily.
The danger in all cases is that a deadlock could occur. For example, suppose process A has
data set 1 locked and is trying to lock data set 9, and process B has data set 9 locked and is
waiting for data set 1. In this case, a deadlock has occurred and the only way to break it is
to restart the operating system.
To avoid restarting the operating system, use DBCONTROL mode 7 to activate deadlock
detection for all open databases. If a deadlock occurs, an error 26 is returned to the process
instead of causing a system hang. The process can subsequently call DBUNLOCK to release
all locks on the database placed by the access path.
TurboIMAGE/XL avoids deadlocks within single calls to DBLOCK by first sorting the lock
descriptors into an internally-defined sequence. It then applies the locks in ascending
order sorted by data set number, then by the value provided for the lock item. You can use
the same strategy in avoiding deadlocks. First define an order in which entities should be
locked and then impose a rule on all programmers that this order be adhered to. The
sequence of unlocking is not important. The rule that you establish should apply to all of
the following lockable entities:
• Databases, data sets, and data entries
• Remote databases, data sets, and data entries
• MPE files (FLOCK), global RINs (LOCKGLORIN), KSAM files (FLOCK), and files locked
with the COBOLLOCK procedure
When applying multiple DBLOCK calls to the same database, extreme caution should be
exercised because the deadlock situations can be very subtle. For example, if a process
locks a data set and then attempts to lock the database, the process will wait for itself
forever.