Thank you, that is exactly what I was looking for. Bobby Bauer Center for Information Technology National Institutes of Health Bethesda, MD 20892-5628 301-594-7474
-----Original Message----- From: The IBM z/VM Operating System [mailto:ib...@listserv.uark.edu] On Behalf Of Mike Walter Sent: Monday, September 14, 2009 11:55 AM To: IBMVM@LISTSERV.UARK.EDU Subject: Re: How to find out what user holds dasd You're looking for the command: CP Query SYSTEM rdev In your example: CP Q SYSTEM 16E0 Mike Walter Hewitt Associates The opinions expressed herein are mine alone, not my employer's. "Bauer, Bobby (NIH/CIT) [E]" <baue...@mail.nih.gov> Sent by: "The IBM z/VM Operating System" <IBMVM@LISTSERV.UARK.EDU> 09/14/2009 10:47 AM Please respond to "The IBM z/VM Operating System" <IBMVM@LISTSERV.UARK.EDU> To IBMVM@LISTSERV.UARK.EDU cc Subject How to find out what user holds dasd I'm trying detach and take a couple of volumes offline but seems some user has them and I can't identify which one. Is there a way to force a detach or to display who has it. Normally the devices are used for a server named UPST We are running z/VM 5.4 at 0901 q 16e0 DASD 16E0 CP SYSTEM UPST01 1 det 16e0 system HCPDTS124E DASD 16E0 in use by 1 users Ready(00124); T=0.01/0.01 11:45:07 det 16e0 upst HCPDTC045E UPST not logged on Ready(00045); T=0.01/0.01 11:45:12 Bobby Bauer Center for Information Technology National Institutes of Health Bethesda, MD 20892-5628 301-594-7474 The information contained in this e-mail and any accompanying documents may contain information that is confidential or otherwise protected from disclosure. If you are not the intended recipient of this message, or if this message has been addressed to you in error, please immediately alert the sender by reply e-mail and then delete this message, including any attachments. Any dissemination, distribution or other use of the contents of this message by anyone other than the intended recipient is strictly prohibited. All messages sent to and from this e-mail address may be monitored as permitted by applicable law and regulations to ensure compliance with our internal policies and to protect our business. E-mails are not secure and cannot be guaranteed to be error free as they can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by e-mail.