Handling a destroyed or damaged checkpoint/restart data set
The checkpoint/restart data set can be destroyed (possibly from a hardware problem or from being deleted) or damaged (possibly by an I/O error). The procedure to use depends on whether an application program uses IMS and, if it does use IMS, whether the checkpoint records were written to the IMS log.
This section contains the following topics:
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*