Digital PDFs
Documents
Guest
Register
Log In
XX-C8E13-E7
June 1972
372 pages
Original
12MB
view
download
OCR Version
13MB
view
download
Document:
08 commands
Order Number:
XX-C8E13-E7
Revision:
0
Pages:
372
Original Filename:
08_commands.pdf
OCR Text
- 429 - DEC-10-MRDC-D gecsyUscemic OPERATING SYSTEM COMMANDS This manual reflects the software associated with the 5,05 monitor. For individual system program version numbers, refer to Page iii. DIGITAL EQUIPMENT CORPORATION « MAYNARD, MASSACHUSETTS - 430 - COMMANDS Ist Printing May 1971 2nd Printing (Rev) December 1971 3rd Printing (Rev) June 1972 Copyright © 1971, 1972 by Digital Equipment Corporation The material in this manual is for informational purposes and is subject to change without notice. The following are trademarks of Digital Equipment Corporation, Maynard, Massachusetts: DEC PDP FLIP CHIP DIGITAL COMPUTER LAB FOCAL - 431 - COMMANDS SOFTWARE VERSION NUMBERS The following versions of the software are discussed in this manual., ALCFIL Version 7 INITIA Version 3 BACKUP Preliminary Information KJOB Version 47 BATCON Version 6 LINED Version 13 CDRSTK Version 11 LOGIN Version 53 COMPIL Version 20 Monitor 5.05 COPY Version 6 OMOUNT Version 22 CREF Version 46 OPSER Version 4 DAEMON Version 6 PIP Version 32 DIRECT Version 2 - PLEASE Version 11 DUMP Version 4 QUEUE Version 3 FILCOM Version 16 QUOLST Version 4 FILEX Version 15 REATTA Version 3 FUDGE2 Version 14 RESTORE Preliminary Information GLOB Version 5 SETSRC Version 11 GRIPE Version 3 ‘SYSTAT Version 467 HELP Version 3 TECO Version 23 UMOUNT Version 20 | COMMANDS - 432 - COMMANDS - 433 CONTENTS Page CHAPTER 1 INTRODUCTION 1.1 1.2 Jobs | 443 Monitor Mode and User Mode . 444 1.3 Command Interpreters 1.3.1 Monitor Command Language Interpreter 445 1.3.1.1 Special Characters 446 1.3.2 . . Batch Command Interpreter 445 _ « 447 1.4 Command Formats 447 1;4.1 1.4.2 Command Names Command Arguménts 447 448 1.4.2.1 Project~Programmer Numbers and Passwords 448 1.4.2.2 Device Names 448 1.4.2.3 File Structure Names 451 1.4.2.4 File Specifications 451 1.5 COMPIL~Class Commands 453 Indirect Commands (@ Construction) 454 1.5.2 The + Construction 455 ].5;3 The = Construction- 1.5.4 The <> Construction 1.5.5 Compile Switches 457 1.5.6 Standard Processor 457 1.5.7 Processor Switches 458 1.5.8 LOADER Switches 460 1.5.1 CHAPTER 2 -~ ' | : - 456 456 SYSTEM COMMANDS AND PROGRAMS 2.1 Commands by Functional Groups 463 2.1.1 Job Initialization Commands 463 2.1.2 Facility Allocation Commands 464 2.1.3 Source File Preparation Commands 2.1.4 ) 465 File Manipulation Commands 465 2.1.5 Object Program Preparation Commands 465 2.1.6 Object Program Control Commands 465 2.1.7 Object Program. Examination Commands 466 2.1.8 Multiple Job Control Commands 466 - 434 - COMMANDS CONTENTS (Cont) Page 2.1.9 Job Termination Command 466 2.1.10 Sending Messages 466 2.1.11 Job Information Commands 467 2.1.12 System Information Commands 467 ALCFIL proaram 468 ASSIGN command 470 ATTACH command 472 BACKSPACE command 474 BACKUP program 475 CLOSE command 479 COMPILE command 480 CONTINUE command 485 COPY command 486 COPY program 488 CORE command 491 CPUNCH command 493 CREATE command 498 CREF command 499 CSTART command CCONTINUE command 500 D (deposit) command 502 DAYTIME command 504 DCORE command 505 DDT command 510 DEASSIGN command 512 DEBUG command 513 DELETE command 517 DETACH command 519 DIRECT command 520 DISMOUNT command 525 DSK command 527 DUMP command 529 DUMP program 530 E (examine) command 536 vi - 435 - COMMANDS CONTENTS (Cont) Page EbIT command 537 EOF command 538 EXECUTE command 539 FILCOM program 543 FILE command 553 FILEX program 557 FINISH command 560 FUDGE command 562 FUDGE2 program 563 GET command 568 GLOB program 569 GRIPE program 573 HALT command 574 HELP command 575 INITIA command 577 JCONTINUE command 578 KJOB command 579 LIST command 584 LOAD command 585 LOCATE command 589 LOGIN command 590 MAKE command 592 MOUNT commoand 593 OPSER program 597 PJOB command 601 PLEASE command 602 PLOT command 604 PRESERVE command 609 PRINT command 610 | PROTECT command 616 QUEUE command 618 QUOLST program 631 R command 632 REASSIGN command 633 vii - 436.- COMMANDS CONTENTS (Cont) Page REATTA program 635 REENTER command 637 RENAME command 638 RESOURCES command 640 RESTORE program 641 REWIND command 645 RUN command 646 SAVE command 648 SCHED command 650 SEND command 651 SET BLOCKSIZE command 653 SET CDR command 654 SET CPU command 655 SET DENSITY command 657 SET DSKPRI command 658 SET HPQ command 659 SET SPOOL command 660 SETSRC program 662 SET TIME command 666 SET TTY or TTY command 668 SFT WATCH command 672 SKIP command 675 SSAVE command 677 START command 679 SUBMIT command 680 SYSTAT command 686 TECO command 693 TIME command 694 TPIINCH command 696 TYPE command 702 UNLOAD command 703 VERSION command 704 WHERE command 706 ZERO command 707 viii - 437 - COMMANDS CONTENTS (Cont) Page CHAPTER 3 BATCH SYSTEM COMMANDS - Batch Components 3.1.2 The Queue Manager 710 3.1.3 The Batch Controller 710 3.1.4 The Output Spoolers 712 3.2 Submitting Jobs 712 3.2.1 Submifling a Job with Cards 713 3.2.1. The $JOB Card 713 The $PASSWORD Card 713 The $FORTRAN Card 713 714 3.2.1. 3.2.1. 3.2.1. 3.2.1. 3.2.1. b 709 The $DATA Card O The Stacker The End of File Card o 3.1.1 — 709 WN 3.1 Output ) 714 | 714 3.2.2 Submitting a Job with a File 3.2.2.1 Image of the $JOB Card 714 -3.2.2.2 Image of the $FORTRAN Card 715 3.2.2.3 Image of the $EOD Card 715 3.2.2.4 Image of the $DATA Card 715 3.2.2.5 Running CDRSTK 715 3.2.3 Submitting a Job with a Control File to the Batch 714 Controller 716 3.2.4 Interjob Dependency 716 3.3 CDRSTK Control Cards 717 3.3.1 $ALGOL 718 3,3.2 $COBOL 719 3.3.3 $DATA 721 3.3.4 $DECK 723 3.3.5 $DUMP 723 3.3.6 $EOD 724 3.3.7 $ERROR $NOERROR 724 3.3.8 $FORTRAN or $F40 725 3.3.9 $JOB 727 - 438 - COMMAND S CONTENTS (Cont) 729 $MODE 730 12 $PASSWORD 731 .13 $RELOCATABLE 731 .14 $SEQUENCE 732 BATCON Control File Commands 732 734 .CHKPNT 735 .ERROR 735 .GOTO 735 IF 736 737 .NOOPERATOR 737 0 . OPERATOR 737 O .REQUEUE 738 O .REVIVE 739 -_ .SILENCE 739 W Job Output 739 W The Log File 740 W 1.1 CDRSTK Messages 740 W 1.2 CDRSTK Error Reporting 741 W 1.3 Batch Controller Messages 742 1.4 Batch Controller Error Reporting 742 Sample Jobs 743 AW O NN - W W — . NOERROR WwWwwWw .BACKTO W 10 W wWwwWwWwwwwwwwwow $MACRO W Page CHAPTER 4 SYSTEM DIAGNOSTIC MESSAGES AND ERROR CODES 4.1 System Diagnostic Messages 748 4.2 Error Codes 780 APPENDIX A STANDARD FILENAME EXTENSIONS 783 APPENDIX B CARD CODES 787 APPENDIX C TEMPORARY FILES 7921 APPENDIX D SAVE AND SSAVE COMMANDS 795 COMMANDS - 439 ILLUSTRATIONS Page ' Title Figure No. 713 Typical Job on Cards 3-1 - 3-2 3-4 Sample Job #3 3-5 Sample Job #4 3-6 Sample Job #5 744 ' Sample Job #2 3-3 743 Sample Job #1. 744 | 745 ] 746 TABLES 1-1 1-2 : System Devices Processor Switches 4-1 A-1 B-1 B-2 Error Codes Filename Extensions ASCII Card Codes DEC-029 Card Codes c-1 Temporary Files B-3 Page Title Table No. DEC-026 Card Codes 449 459 : . ' 780 783 787 789 790 791 COMMANDS - 440 - FOREWORD DECsystem=10 Operating System Commands is a complete reference document describing the commands available in the DECsystem=10 operating system. The information presented in this manual reflects the 5.05 release of the monitor and other related programs. Commands to both the monitor command lan- guage interpreter and the programs in the Batch system are grouped in alphabetical order for easy reference to the command repertoire. DECsystem=10 Operating System Commands does not include reference material on assembly language programming. This information can be found in DECsystem-10 Monitor Calls (DEC-10-MRRC-D), which is intended for the experienced assembly language programmer. Included in DECsystem=10 Monitor Calls are discussions of the monitor programmed operators and the various I/O devices connected to the system. The two manuals, DECsystem-10 Operating System Commands and DECsystem=10 Monitor Calls, supersede the Timesharing Monitors Programmer's Reference Manual (DEC-T9-MTZD-D) and all of its updates. A third manual, Introduction to DECsystem=-10 Software (DEC-10-MZDA-D), is a general overview of the DECsystem=10. It is written for the person, not necessarily a programmer, who knows computers and computing concepts and who desires to know the relationship between the various components of the DECsystem=10. This manual is not intended to be a programmer's reference manual, and therefore, it is recommended that it be read af least once before reading the above-mentioned reference documents. \ SYNOPSIS OF DECsystem-10 OPERATING SYSTEM COMMANDS Chapter 1 presents all of the commands available to fhe user and introduces the various components of the operating system that interface with the user. Chapter 2 is a detailed description of the commands processed by the monitor command language interpreter. Presented in' Chapter 3 are the commands to the Batch system and o discussion of the programs in this system. The DECsystem-10 system error mes— sages and error codes arellisfed in Chapter 4 along with descriptive information on how to correct the errors. The appendices contain supplementary reference material and tables. 5.05 Monitor xii June 1972 - 441 - COMMANDS - CONVENTIONS USED IN DECsystem-10 OPERATING SYSTEM COMMANDS The following conventions have been used throughout this manual: dev: Any logical or physical device name. list A single file specification or a string of file specifications. A file specification consists of a filename (with or without The colon must be included when a device is used as part of a file specification. a filename extension), a device name if the file is not on disk, a project-programmer number, if the file is not in the user's disk area, and a protection code. A pair of file specifications or a string of pairs of file speci=- arg fications. . jobn A job number assigned by the monitor. file.ext Any legal filename and filename extension. core Decimal number of 1K blocks of core. adr An octal address. C(adr) The contents of an octal address. [proj, prog fs ~ Project-programmer numbers; the square brackets must be included in the command string. Any legal file structure name or abbreviation. The symbol used to indicate an altmode. fx A control character obtained by depressing the CTRL key and then the character key x. A back arrow used in command strings to separate the input and output file specifications. The system program response to a command string. The monitor response to a command string. The symbol used to indicafe that the user should depress the RETURN key. This key must be used to terminate every command to the Monitor Command Language Interpreter. Underscoring used to indicate computer typeout. A decimal number. An equal sign used in command strings to separate the input and output file specifications. COMMANDS : - 442 - - 443 - | COMMANDS : CHAPTER 1 INTRODUCTION The DECsystem=10 Operating System is the interface between the user and the actual machine. The operating system, or monitor, has many functions, some of which are: 1. scheduling multiple and simultaneous use of the system, 2. protecting users of the system from one another, 3. allowing access to system resources including peripheral devices, 4. providing a comprehensive disk file system, 5. directing data flow between peripheral devices and the user's program, 6. controlling non-interactive jobs, and 7. overlapping input-output operations with computations for high system efficiency. The user communicates with the operating system by means of the monitor command language. With the command Ianguggé he may access all available resources of the computing system and obtain all the services provided by the operating system. 1.1 JOBS The DECsystem-10 computing system is a multiprogramming system; that is, control is transferred rapidly among a number of jobs in such a way that all jobs appear to be running simultaneously. The fermiglg refers to the entire sequence of steps, From.beginning to end, that the user initiates from his interactive terminal or card deck or that the operator initiates from his operator's console. When a user initiates a job from his interactive terminal, the beginning of the job is designated by the LOGIN command and the end by the KJOB command. If a user initiates a job with a card deck, the beginning of the job is the $JOB card and the end is the end-of-file card. Operator jobs usually begin when the system is initialized and end when the system goes down. Jobs, which may be timesharing, batch, or real-time in nature, may be initiated at the central computer sife or at remote locations connected by the telephone system. is possible for him to initiate another job without killing the first one. Once a user initiates a job, it For example, a user can initiate I a timesharing job and by using the SUBMIT monitor command submit a second job for batch processing 1-1 COMMANDS - 444 - (refer to Chapter 2). He may then wait for the results from this batch job, or have the results auto~ matically output while he continues his timesharing job. In configuring and loading the DECsystem-10, the system administrator sets the maximum number of jobs that his system can simultaneously handle. This number may be up to 127 jobs if the system has enough memory, disk storage, processor capacity, and terminals to handle this load. & 1.2 MONITOR MODE AND USER MODE From the timesharing user's point of view, his terminal is in either monitor mode cr user mode. In monitor mode, each line the user types in is sent to the monitor command language interpreter. The execution of certain commands (as noted in the following examples) places the terminal in user mode. When the terminal is in user mode, it becomes simply an 1/O device for that user. programs use the terminal for two purposes. In addition, user The user program will either accept user command strings from the terminal (user mode) or use the terminal as a direct 1/0 device (data mode). Example (terminal dialogue): monitor mode <R P 1Ps monitor command user mode ASK:PKOGI MACETTY: W user command siring data mode THIS IS FILE 1 tZ monitor mode %1C R MACRO) user mode *3TTY$+DSKIPROG 1.0 data mode . user program using terminal as input device monitor command user command string user program using terminal as an output device assembly listing The special character tC (produced by typing C with the CONTROL key depressed) is used by a timesharing user to stop a user program and return the terminal to monitor mode. If the user program is waiting for input from the terminal, the user needs to type only one tC to retum the terminal to monitor mode; otherwise, he must type two 1C's. Because of this procedure, the user knows that his program is not waiting for input if there is no response from the monitor after one tC. Certain com- mands cause the user program to start running or to continue (as noted in the following chapter) but leave the terminal in monitor mode. - 445 - COMMANDS When the system is started, each terminal is in monitor mode ready for users to llog in. However, if the system becomes fully loaded (i.e., the maximum number of jobs that the system is set to handle . r has been initiated), then any unused terminals from which access is requested will receive the message JOB CAPACITY EXCEEDED. The card-oriented Batch user can think of his cards as being in stack mode, monitor mode, or user mode. V\{hen the card is in stack mode, it contains a control command beginning with a $ (refer to Chapter 3) and is sent to the Stacker, CDRSTK. CDRSTK interprets these commands and performs var- ious actions to create a control file for the Batch Controller. When fHe card is in monitor mode, it contains a monitor command preceded by a period and is copied by CDRSTK into the control file. When the card is in user mode, it contains a user-level program command preceded by an asterisk or an equal sign and is also copied by CDRSTK into the conirol file. As each line in the control file is executed, the Batch Controller passes the monitor-level line to the monitor command language interpreter and the user-level line to the user program. Example (sample card deck): /i USER MODE il | ] %/X=SYS:LOADER. % MONITOR MODE .R PIP MONITOR MODE i | .QUEUE LPT:=PROG I . | . STACK MODE DATA MODE STACK MODE USER COMMAND STRING MON(TOR COMMAND MONITOR COMMAND 1 $EOD MACRO eno oF caro peck CDRSTK CONTROL COMMAND - PROGRAM $MACRO _J CDRSTK CONTROL COMMAND 10-0897 1.3 1.3.1 COMMAND INTERPRETERS Monitor Command Language Interpreter When the terminal is in monitor mode, the user communicates with the monitor command language in- terpreter. By means of commands to this interpreter, the user may initialize jobs, allocate facilities, prepare source files, manipulate files, prepare, control, and examine object programs, control job sequences and multiple jobs, terminate jobs, send messages, and obtain job and system information. The commands described in Chapter 2 are processed by this interpreter. 1-3 COMMANDS - 446 - Most commands are processed without delay. However, a command may be momentarily délayed if a job is swapped out to the disk and the command requires that the job be resident in core; the command is executed when the job is swapped into core. The completion of each command is signaled by the output of a carriage return, line feed sequence. lows the carriage return, line feed. If the terminal is left in monitor mode, a period fol- If the terminal is left in user mode, any response other than a carriage return, line feed comes from the user's program. " For example, most standard system programs immed'iate.y send an asterisk(*) to the user's terminal to indicate their readiness to accept user command strings. The type~ahead technique may be employed by the experienced timesharing user at a terminal. This means that the user does not have to wait for the completion of one command before he can begin an-other. For example, if two operations are desired from the monitor, the request for the second opera- tion can be typed before receiving the period after completion of the first. The command interpreter makes several checks before processing commands from users. On disk systems, if a user who has not logged in types a command that requires him to be logged in, the system responds with ?LOGIN PLEASE and the user's command is not executed. where explicitly stated otherwise. The commands discussed in Chapter 2 all require login except When a command is recognized that requires the job to have core and the job has no core allocated, the command interpreter responds with ?NO CORE ASSIGNED and the user's command is not executed. 1.3.1.1 Special Characters - There are several special characters recognized by the monitor com= mand language intempreter that cause specific functions to be performed. As noted previously, controlC (1C) interrupts the program that is currently running and retums the terminal to monitor mode. This character causes the input line back to the last break character (e.g., carriage return, line feed) to be deleted (equivalent to the action of a tU). Two control-C's are necessary if the user program is not requesting input from the terminal (i.e., the program is in the middle of execution). The RUBOUT key on the terminal generates a character that causes the last character typed to be deleted. This permits correction of typing errors. characters typed to be deleted. slashes (\\ ). Depressing the RUBOUT key n times causes the last n The deleted characters are echoed on the terminal enclosed in back- Characters beyond the last break character or characters already processed by the user program are not deleted. =447 - COMMANDS Control-U (tU) causes the deletion of the current line, back to the last breck character. The system responds with a carriage return, line feed so that the line may be typed again. Once a break charac- ter has been typed, line-editing features ( tU and RUBOUT) can no longer be used on that line, 'excepi' when running TECO. Control-O (tQ) suppresses output to the terminal. The system responds with a carriage return, line feed sequence. A subsequent control~O re~enables output to the terminal. At remote stations, the effect of the tO may be somewhat delayed. 1.3.2 Batch Command Interpreter The monitor command language interpreter is used for all monitor commands submitted via the Batch system. In addition, the Batch user issues commands,_thaf are only used by the Batch programs, Stacker (CDRSTK) and Batch Controller (BATCON). Control commands, discussed in Chapter 3, are processed by the Stacker and, by means of these commands, the user can create a control file, a log file, and data files; can enter jobs into the Batch input queue; and can insert monitor commands into the control file. An additional interpretation is done by the Batch Controller. When the job is executed, the Batch Controller processes the control file to pass monitor commands to the monitor command language interpreter and user-level commands to the appropriate programs. 1.4 COMMAND FORMATS Each command is a line of ASCII characters in upper and/or lower case. Spaces and TABs preceding the command name are ignored. Comments may be typed on the same line as the command by preceding the comment with a semicolon. The monitor and batch command language interpreters do not interpret or execute a line of comments. Every command to the monitor command interpreter should be termi- nated by pressing the RETURN key on the console. In examples in this manual, the symbol ) is used to indicate that the user should depress the RETURN key. If the command is in error, the command up to the error is typed out by the monitor preceded and followed by a ?, and the terminal remains in monitor mode. 1.4.1 Command Names Commands to the monitor command interpreter are alphabetic strings of one to six characters; charac- ters after the sixth are ignored. Only enough characters to uniquely identify the command need be typed. It is recommended that a Batch job use the full command name since the abbreviations may change with the addition of new commands. - 448 - COMMANDS Installations choosing to implement additional commands should take care to preserve the uniqueness of the first three letters of existing commands. Control commands to the Stacker in the multiprogramming batch system must have a dollar sign (§) in the first column of the card or the line and an alphabetic character in the second column. Only the first part of the command name need be specified; as long as the specified command name is unique, it is accepted. The first three characters of the command name are generally sufficient to ensure unique- ness. 1.4.2 Command Arguments Arguments follow the command name and are separated from it by a space or TAB. If the monitor com-~ mand interpreter recognizes a command name, but a necessary argument is missing;, the monitor responds with ?TOO FEW ARGUMENTS Extra arguments are ignored. 1.4.2.1 Project-Progrommer Numbers and Passwords = Access to the DECsystem=10 is limited to authorized users. The system administrator provides each authorized user with a project number, a programmer number, and a password. The project numbers range from 1 to 377777 octal (numbers 1 to 10 are reserved for DEC) and the programmer numbers range from 1 to 777777 octal (numbers 1 to 7 are reserved for DEC and numbers 400000 to 777777 are reserved for special purpose.s)] . These numbers identify the user and his file storage area on a file structure. In a command string, the project and programmer numbers are separated with a comma and must be enclosed in square brackets, e.g., [10,7]. The password is from one to six SIXBIT characters and is only used when logging on the computing system. To maintain password security, the monitor does not echo the password. On terminals with local copy (refer to DECsystem=10 Monitor Calls), a mask is typed to moke the password unreadable. 1.4.2.2 Device Names - Associated with each system device controlled by the computing system is a physical device name. This name consists of three letters, zero to three numerals specifying the unit number, and a colon. Table 1-1 lists the generic physical device names associated with the various system devices. 1 When the programmer number is from 1 to 7, all project numbers are reserved for DEC. 1-6 - 449 - COMMANDS Table 1-1 System Devices Device Generic Physical Device Name All Disks - ALL: Card Punch CDP: Card Reader Console TTY CDR: _ DECtape CTY: DTx:T Disk DSK: Packs DPx:T Fixed-Head Display FHx:t DIS: Experimental System Library ‘ NEW: Help Library Line Printer HLP: LPT: Magnetic Tape MTA: Operator Teminal OPR: Paper-tape Punch . " Paper-tape Reader Plotter . ‘ PTR: : PLT: Pseudo-TTY - System Library PTP: - PTY: SYS: Teminal - TTY: tX represents A,B, ..., indicating the first controller, second con- troller, etc. The user may also assign a logical device name to a physical device. The logical name is from one to six alphanumeric characters of the user's choice, followed by a colon, and is used synonymously with a physical device name in all references to the device. Logical device names allow the user , when writing his program, to use arbitrarily selected device names, which he assigns to the most convenient physical devices at run time. However, care should be exercised when assigning logical device names because these names have priority over physical device names. For example, if a DECtape is assigned the logical name DSK » then all of the user's programs attempting to use the disk via the device name DSK will use the DECtape instead. Except for disk devices, only one logical device name can be associated at any one time with a physi- cal device. The same logical name can be used for a second physical device by disassociating it from the first device and associating it with the second device via the ASSIGN command. Logical device 5.05 Monitor , 1-7 - 450 - COMMANDS names are disassociated from all devices with the DEASSIGN command (refer to Chapter 2). Subsequent ASSIGN commands (refer to Chapter 2) to all devices except disk devices replace the old logical name with the new one. I3 The following is an example of the use of physical and logical device names.. Underscoring is used to indicate computer typeout. User requests a DECtape drive with the logical name ABC:") SASSIGN DTA: ' ABC, DTA6 DEVICE ASSIGNED =ASSIGN PTP: Monitor has given the user drive DTA6. mounts a DECtape on drive DTA6. The user User requests the paper=tape punch with the logical ABC:) name ABC. . % LOGICAL PTP NAME WAS IN USE, ASS5IGNED Paper-tape punch is reserved, and ABC now refers to the PTP. _.R PIP,) User requests the system program PIP.(Peripheral Interchange Program). fABC:*DTA6:FILEA) User issues a command string to PIP asking that file FILEA be transferred from device DTA6 to logical device ABC (physical device PTP: which is assigned to the user). *1C User returns to monitor mode. sASSIGN DTA: DEF:) User requests another DECtape drive with logical name DEF. <ASSIGNED JOB TO N1sN2sees All drives are in use by the specified jobs. No DECtape drive is assigned, and no logical assignment is made. +ASSIGN DTA6: DEF:,) User requests drive DTA6 (which he already has) with logical name DEF. The copy of the directory currently in core is cleared. DEVICE DTA6 ASSIGNED User mounts a new DECtape on the previously assigned drive. The new DECtape directory is read into core when next accessed. User deassigns PTP, thereby clearing the logical name DEASSIGN PTP:) ABC. R PIPJD User requests PIP. ) #ABC 1 «DEF tFILEB User requests that file FILEB be transferred from device DEF to device ABC. DFVICE ABC DCES NOT EXIST The logical device name ABC is no longer assigned. (continued on next page) 1-8 - 451 - *tC " +ASSIGN DTA6: XYZ:) ' COMMANDS User returns fo monitor mode. User requests drive DTA6 again with logical name XYZ. The logical name DEF is no longer associated with DTAé. The old directory is cleared from core. A6 A DEVICE DTA6 ASSIGNED User mounts a new DECtape. The new directory is- ready]i into core when next accessed. 1.4.2.3 File Structure Names - Disk devices are grouped according to file structures, which are logical arrangements of 128-word blocks on one or more disk units of the same type. Examples of types of disk units are: an RPO2 disk pack or an RM10B drum. Although a file structure can exist on exactly one disk unit, it can be distributed over several disk units of the same type and designated by a single name. However, two file structures cannot exist on the same unit. Each file structure has a SIXBIT name specified by the operator at structure defini tion time. This name can consist of five or less alphanumeric characters and must not duplicate a physical device name, a unit name, or an exist- ing file structure name. The recommended names for public file structures are DSKA, DSKB, ..., DSKN in order of decreasing speed. 1.4.2.4 File Specifications = All information (programs and data) in the system is stored as named Each named file has associated with it a file specification which consists of O b WN - files. the physical device name or file structure name, the filename, the filename extension, the ordered list of directory names, and the access protection code. The first four items of the file specification are necessary to uniquel/y identify a disk file. File specifications are ignored when given for devices other than DECtape or disk since these two devices are the only dirécfory-orienfed devices. In addition, items 4 and 5 do not apply to DECtapes. The physical device name used for DECtape or the file structure name used for disk may be any legal I device name discussed in the foregoing sections. A colon should always follow the device name; e.g., DTA3:. The filename is from one to six SIXBIT characters; all characters after the sixth are ignored. The filename extension is a period following by zero to three characters and is used to indicate the type of information in the file. (Refer to Appendix A for a list of standard filename extensions.) It is recommended that only the standard extensions be used even though other extensions are valid. Most programs I only recognize filenames and _exfensions consisting of letters and digits. The ordered list of directory names identifies the disk area in which the file is stored. This list can be a user file directory (UFD) 5.05 Monitor | 1-9 COMMANDS - 452 - represented by the project-programmer number of the owner of the files in the directory or can be a user file directory followed by one or more sub~file directories (SFDs). Monitor Calls for a description of SFDs.) (Refer to the DECsystem=10 The directory name must be enclosed in square brackets. . The access protection of the file is a three~digit code designating which users can read or write the file and must be enclosed in angle brackets. The protection code is specified only for output files. For a given file, the users are divided into three groups: project number as the owner, and the rest of the users. the owner of the file, the users with the sanie The sfandard protection code is 057 which allows users in the owner's project fo read and execute the file and prevents access by all other users. (For a complete description of access protection, refer to DECsystem=10 Monitor Calls.) The standard protection code can be redefined by the various installations. In command strings, the filename, the device name if the file is not on disk, and the directory name if the file is not in the user's disk area, are required. The filename extension, the device name if the file is on the disk, the directory name if the file is in the user's disk area, and the protection code are optional. The following are examples of file specifications: TEXT.MAC DTAS3:FILEA DSK:PROG2.CBL[10,16] filename and extension device and filename device, filename, extension, and directory name DSKA:MAIN,F4[27,235] <057> ’ complete file specification Many command strings allow the wildcard construction to be used. This means that the filename, the . extension, or the directory nome may be replaced totally with an asterisk or partially with a question mark to designate certain filenames, extensions, or directories. designate the entire filename, extension, or directory name. The asterisk is used as a wild field to For example, filename . * All files with this filename and any extension. * ext All files with this extension and any filename. * * All files, * * [project, *] All files in directories with this project number and any programmer number, The question mark is used as a wild character to designate pofi' of the filename, extension, or directory name. A question mark is used for each character that is to be matched; i.e., PR?? matches on four characters or less. For example, filename .M?? All files with this filename and any extension beginning with M. TES ?? .ext All files with this extension and any filename up ??.?27?°% All files with filenames of two characters or less. to 5§ characters beginning with TES. (continued on next page) - 453 - [25,577] ‘ COMMANDS ' Al files in directories with the project number 25 and the programmer numbers 500-577. The asterisk and the question mark can be specified together in the same construction. ??.% \ All files with filenames of two characters or less. In addition, the directory name can be specified with the project number, the programmer number, or both numbers missing. The following are examples of the various ways of representing a particular directory. | [15,23] The UFD [15,23]. ~ | The UFD that has the user's project number and the [,30] specified programmer number (30). The UFD that has the specified project number (36) [36,] and the user's programmer number. : The user's UFD. [,] -] | The user's default directory which may be different ‘ from his UFD (refer to the DECsystem-10 Monitor Calls and the SETSRC program). The number sign can be used to represent a filename or extension that contains characters that cannot be typed because they have special meanings in the system. For example, if o file with the name * MAC were typed in a command string, the user would be referencing all files with the extension .MAC since the * designates all files with the specified exi'ension MAC. To allow a filename or ex- tension to be typed that is composed of special characters, the user employs the number sign followed by the octal representation of the SIXBIT filename or extension. For example, #120000000000 repre-~ sents the file named *. If letters or digits are pqrf of the filename or the extension containing the special characters, the octal representation of the letters or digits must also appear following the number sign.', In other words, the number sign must be placed af the beginning of the filename and all characters following must be represented in octal. Furthermore, this construction can be used to read the contents-of a UFD. For example, #000010000073.UFD [1,1] représenfs the file named 10,73.UFD in the direcfory [t,11. ' The programs that recognize the number sign are DUMP, DIRECT, PIP, and QUEUE. 1.5 COMPIL-CLASS COMMANDS Certain monitor commands simplify communication between the user and the system programs of the DECsystem=10 by allowing the user to type a short, concise monitor command string that causes a series of operations to be performed. These commands are known as COMPIL-class commands and are de- scribed in detail in Chapter 2. These commands cause the monitor to run the COMPIL program, which 5.05 Monitor C1=11 COMMANDS - 454 - deciphers the command and constructs new command strings for the system program (e.g., TECO, PIP, LINED, FORTRAN) that actually processes the command. Each time CREATE, MAKE, EDIT, or TECC is executed, the command with its arguments is written as a-temporary file in core or on the disk. Therefore, the file specification last edited may be recalled for the next edit without specifying the arguments again. (This is an exception to the requirement that the filename must always be specified.) For example, if the command . CREATE PROGX.MAC is executed, then the user may later type the command LEDIT instead of EDIT PROGX .MAC assuming no other EDIT=class command that changed the filename was used in the interim. The COMPILE, LOAD, EXECUTE, and DEBUG commands with their arguments are also written in a temporary file so that the file specification given last may be recalled without specifying the arguments again. The temporary files containing these file specifications have filenames of the following form: nnnxx.x.TMP where nnn is the user's job number in decimal, with leading zeros to make three digits, and xxx speci= fies the use of the file. 1.5.1 Refer to Appendix C for a list of the temporary files. Indirect Commands (@ Construction) - When there are many program names and switches, they can be put into a file and do not have to be typed in for each compilation. This is accomplished by the use of the @ file construction, which may be combined with any COMPIL~-class command. The @ file may appear at any point after the first word in the command. In this construction, the word file must be a filename, which may have an extension and a project-programmer number. If the extension is omitted, a search is made for the command file with a null extension and then for a com~ mand file with the extension .CMD. The information in the specified command file is then put into the command string to replace the characters @ file. COMMANDS - - 455For example, if the file FLIST contains the string T, FILED FILEB, FILEC/LIS then the command | .COMPILE FILEA,FILEB,FILEC/LIST,FILED',FILEZ could be replaced by .COMPILE FILEA ,@FLIST,FILEZ Command files may contain the @ file construction to a depth of nine levels. If this process of in- is rapidly exceeded and an error mesdirection results in files pointing in a loop, the maximum depth sage is produced. The following rules apply in handling format characters in a command file. a. Spaces are used to delimit words but are otherwise ignored. Similarly, the characters b. To allow long command strings, command terminators (CARRIAGE RETURN, LINE FEED, ALTMODE) are ignored if the first nonblank character after a sequence of command TAB, VTAB, and FORM are treated like spaces. terminators is a comma. Otherwise, they are treated either as commas by the COMPILE, LOAD, EXECUTE, and DEBUG commands or as command terminators by all other ‘ COMPIL~class commands. c. d. e. Blank lines are completely ignored because strings of returns and line feeds are considered together. . ‘ Comments may be included in command files by preceding the comment with a semicolon. All text from the semicolon to the line feed is ignored. If command files are sequenced, the sequence numbers are ignored. 1.5.2 The + ConsfrUci'ion2 A single relocatable binary file may be produced from a collection of input source files by the "+" construction. For example: a user may wish fo compile the parameter file, PAR.MAC, the switch fi le, SWIT.MAC, and the file that is the body of the program, MAIN.MAC. This is specified by the following command: .COMPILE PAR+SWIT+MAIN ]However, if BLISS, SNOBOL, and MACX11 (the PDP=11 assembler for the PDP-10) are added as is obtained. These processors will be processors, one less level of indirecting for each processop set. These assembly switch settings are are switches assembly appropriate recognized only when the not supported. 2 )5 in COMPILE, LOAD, EXECUTE, dnd DEBUG commands only. 1-13 COMMANDS - 456 - The name of the last input file in the string is given to any output (.REL, .CRF, and/or .LST) files (e.g., MAIN in the preceding example). The source files in the "+" construction may each con- tain device and extension information and project-programmer numbers. 1.5.3 The= Consfruuci'ioh] Usually the filename of the relocatable binary file is the same as that of the source file, with the extension specifying the difference. This can be changed by the "=" construction, which allows a file~ name other than the source filename to be given to the associated output files. For example: if a binary file named BINARY .REL is desired from a source program named SOURCE.MAC, the following command is used. .COMPILE BINARY=SOURCE This technique may be used to specify an output name to a file produced by the use of "+" construction. To give the name WHOLE.REL to the binary file produced by PART1.MAC and PART2.MAC, the fol- lowing is typed. .COMPILE WHOLE=PART1+PART?2 Although the most common use of the construction is to change the filename of the output files, this technique may be used to change any of the other default conditions. processor output is DSK:source .REL [self]. The default condition for For example: if the output is desired on DTA3 with the filename FILEX, the following command may be used: EXECUTE DTA3:FILEX=FILE1.F4 1.5.4 The <> Construcfion] The <> construction causes the programs within the angle brackets to be assembled with the same parameter file. If +is used, it must appear before the <> construction. For example to assemble the files LPTSER.MAC, PTPSER.MAC, and PTRSER.MAC, each with the parameter file PAR.MAC, the user could type . COMPILE PAR+LPTSER, PAR+PTPSER, PAR+PTRSER With the angle brackets, however, the command becomes .COMPILE PAR+<LPTSER, PTPSER, PTRSER > However, the following command is invalid: . COMPILE <LPTSER, PTPSER, PTRSER >+PAR ]Used in COMPILE, LOAD, EXECUTE, and DEBUG commands only. 1-14 - 457 - 1.5.5 - COMMANDS Compile Switches The COMPILE, LOAD, EXECUTE, and DEBUG commands can be modified by including switches in the command string. These switches can be used to indicate the processor to be used, to force a compila-~ ton, to generate listings, to create libraries, to search user libraries, and to obtain loader maps. Each switch is preceded by a slcsh- and terminated Wifh a non~alphanumeric character, usually a space - or a comma. The switch used can be abbreviated if the abbreviation uniquely identifies the switch. The switches used with these four commands are either temporary or permanent. A temporary switch applies only to the file immediately preceding it. An intervening space or comma cannot separate the For example, filename and the switch. .COMPILE PROG , TEST/MACRO, SUBLET The /MACRO switch applies only to the file named TEST. A permanent switch applies fo all files following it until modified by a subsequent switch. It is separated from the file by spaces, commas, or a combination of both. For example, .COMPILE PROG /MACRO TEST,SUBLET .COMPILE PROG,/MACRO, TEST,SUBLET .COMPILE PROG ,/MACRO TEST,SUBLET - COMPILE PROG /MACRO, TEST,SUBLET In all four examples, the /MACRO switch applies to the files named TEST and SUBLET. The switches that can be used with the COMPILE, LOAD, EXECUTE, and DEBUG commands are de- scribed in the individual command explanations in Chapter 2. 1.5.6 Standard Processor Files with recognizable processor extensions (e.g., .MAC, .CBL, .F4, .ALG) are always translated by the processor implied by the exfension.] For example, a file named DATPRO .CBL will be proces‘'sed by the COBOL compiler.- Files without a recognizable processor extension are compiled or assem- bled according to the standard processor, which is normally FORTRAN at the beginning of the command string. The user can control the setting of the standard processor by including switches in the COMPILE, LOAD, EXECUTE, or DEBUG command string. Refer to the appropriate command descrip~ tions in\ Chapter 2 for the switches used to change the standard processor. ]By setting the appropriate assembly switches, SNOBOL, BLISS, and MACX11 (the PDP-11 assembler for the PDP-10) will be recognized as processors. However, these assembly switch settings are not supported . - . COMMANDS - 458 - In the following examples, the installation has chosen FORTRAN as the standard processor. The command .COMPILE NOEXT causes the file nomed NOEXT (with a null extension) to be compiled by FORTRAN. The command .COMPILE FILEZ .MIN also compiles the file with FORTRAN since .MIN is not recognized as a processor extension. The com- mand .COMPILE APART,DATA/COBOL, TEST causes the files APART and TEST to be compiled by FORTRAN and the file DATA by COBOL. The switches used to change the standard processor can be temporary or permanent switches (refer Paragraph 1.5.5). to For example, .COMPILE APART, /CCBOL DATA,TEST causes APART to be compiled by FORTRAN, and DATA and TEST to be compiled by COBOL. Note that if source files are specified with the appropriate extensions, the subject of processor can be disregarded, the standard since files with processor extensions are always translated by the proces- sor implied. 1.5.7 Processor Switches Occasionally it is necessary fo pass switches to the assembler or compiler being used in a COMPILE, LOAD, EXECUTE, or DEBUG command. For each translation (assembly or compilation), the COMPIL. program sends a command string to the translator containing three parts: output file, and a listing file. the source files , a binary To incluae switches with these files, the user must: a. If the + construction is used, group the switches according to each related source b. Group the switches according to the three types of files (source, binary, and listing) each file. : ¢. For each source file, separate the groups of switches by commas. d. Enclose all the switches for each source file within one set of parentheses. (SSSS) {SSSS,BBBB) (SSSS,BBBB,LLLL) €. file. Only source switches are present. Source and binary switches are present. Source, binary, and listing switches are present. Place each parenthesized string immediately after the source file to which it refers. The processor switches are listed in Table 1-2, along with their meanings and the types of files to which they apply. for - 459 - COMMANDS - Table 1-2 Processor Switches { Processor Source ALGOL Binary : Set dynamic storage region for own arrays D (known as the heap). The source file has line numbers in columns E - 73-80. List the source program. Suppress the error print out on the terminal . N >0 COBOL Meaning Listing Allow the listing of code generated. A A Produce a cross-referenced listing of all user- C defined items in the source program. Check the program for errors but do not gene~ E E E Delimit the words in quotes. Suppress the listing of the source program. rate code. Use the preceding file descriptor as a library L M M M file whenever the COPY verb is encountered. Print a map showing the parameters of the user) defined item. Suppress output of source errors on the terminal . o Do not generate trace calls and symbols. Produce a two-segment object program. The R high segment contains the resident sections of the Procedure division; the low segment con- " tains everything else. When the object program is loaded, LIBOL is added to the high segment. S S W w z W Rewind the magnetic tape. Zero the DECtape directory . moOw > The source file has sequence numbers in columns S Advance magnetic tape reel by one file. Backspace magnetic tape reel by one file. Generate a CREF-type cross-reference listing. FORTRAN I 1-6 and comments starting in column 73. List error message codes only. Print an octal listing of the binary program in addition to the symbolic listing. Must be ac= companied by /M. Translate the letter D in column 1 as a space and treat the line as a normal FORTRAN state- zz ment. Suppress oufput of error messages on the terminal . Produce code for execution on the KATO if run- ning on the KI10, and vice-versa. N NS - s - S . Include MACRO coding in output listing. Skip to the logical end of magnetic tape. Rewind the magnetic tape. Zero the DECtape directory. (continued on next page) 1-17 COMMANDS - 460 - Table 1-2 (Cont) Binary Listing Aw> Source Advance magnetic tape reel by one file. MM Processor ® > Processor Switches List macro expansions. Meaning MACRO Backspace magnetic tape reel by one file. Produce listing file in a format acceptable as input to CREF. Byte sizes match the format of the instruction. Byte sizes are two 18-bit fields. Reinstate listing (used after list suppression by § T switch). Suppress ASCII text in macro and repeat expan-— PPO0Z TM0 0 TM0 sion (SALL). Suppress error printouts on the terminal . Allow literals to occupy only one line. Increase the size of the pushdown list. Suppress questionable (Q) error indications on NXZE=w 2-' s—l the listing. Suppress listing. Skip to the logical end of magnetic tape. Rewind the magnetic tape. Suppress all macro expansions. Zero the DECtape directory . Examples: DEBUG TL.,;..IT (N) COMPILE Suppress typeout of errors during assembly . GUTPUT=MTA® : (W>S5M)/L Rewind the magtape (W), compile the first file, produce binary output for the KI10(S), andin- clude the MACRO codingin the output hshng (M). Output files are given the names OUTPUT.REL and OUTPUT,LST. COMPILE/MACRO A=MTAB :(W,,0) /L Rewind the magtape (W), compile the first file, and suppress Q (questionable) error indications on the listing. Note that when a binary switch is not present, the delimiting comma must appear. «COMPILE /MACRO A=MTA%:(.,,8)/L Compile file at current position of the tape and suppress Q error indications on the listing. Note that when the source and binary switches are not present, the delimiting commas must appear, 1.5.8 LOADER Switches In complex loading processes, it may be necessary to pass switches to the LOADER to direct its opera~ tion. This is accomplished by the % character. The % has the same meaning as that of the / in the 1-18 COMMANDS - 461 - like the /, the % takes a LOADER'S command string (refer to the LOADER documentation). Also, it. Therefore, fo leading sign (+or =) and one letter (or a sequence of digits and one letter) following set a program origin of 6000 for progrom C, the user types LOAD A,B,%60000C,D The COMPIL program allows more than one LOADER switch to be specified. .LOAD PROG %F/MAP . Refer to the LOAD command in Chapter 2 for a description of /MAP a0 T Q The most commonly used LOADER switches are: %S Load with symbols. %nO Set program origin to n. %F Cause early search of the default libraries. %P Prevent search of the default libraries. - For example: COMMANDS - 462 ~ - 463 - s COMMANDS CHAPTER 2 SYSTEM COMMANDS AND PROGRAMS Although there is one operating system for all configurations of the DECsystem=10, some commands may not be included in each DECsystem=10. This is especially true of the DECsystem=1040, the basic rsysi'em intended for small installations that do not want all of the system’s features because of a con= straint on core. Commands are deleted from the DECsystem=1040 by Feotfire test switches (recognized - by the beginning characters FT) defined at MONGEN time. In the standard DECsystem=-1040, many of these switches are not set ‘and, therefore, the corresponding commands are not available. This saves core but limits various features of the operating system. In the command déscripfions that follow, the Characteristics section indicates if the switch is normally off in the DECsystem-1040. If not stated, the command is available on all DECsystem-10s. In many cases, there are two commands fo run a program. For exorr;ple, the indirect command MAKE and the direct command R TECO both run the TECO program; In the DECsystem=1040, the switch implementing the indirect command may not be set but the switch implementing the direct command is always set. Therefore, it is always possible to run a program with the .R or .RUN command, even if the switch implementing the corresponding indirect command is off. 2.1 COMMANDS BY FUNCTIONAL GROUPS Although the commands are arranged in alphabetical order for ease of reference, they can be divided into functional groups for ease of learning. These groups with their associated commands are as follows. 2.1.1 Job Initialization Commands Since the system is limited fo authorized persons, these commands protect the system from unauthorized use. INITIA LOGIN COMMANDS 2.1.2 - 464 - Facility Allocation Commands The monitor allocates peripheral devices, file structure storage, and core memory to users on request and protects these allocated facilities from interference by other users. Software provisions are incor- porated in the monitor to differentiate the central station from the remote stations. Certain monitor commands, for example, ASSIGN and PLEASE, include station identification arguments to allow both user-access and allocation of system resources at any station. This feature gives the user considerable flexibility in allocating system facilities and directing input and output to the station of his choice. For example, by specifying a station number, the user can assign devices and input data from a periph- eral device at a station other than his own. In addition, by using the LOCATE command, he con logically establish his job at a station other than his physical station. If the station identification argument is not included in a command, the system aufomatically directs input and output to the user's logical station. The user's legical station is the same as his physical station if he has not issued the LOCATE command. When a nonsharable device is assigned to a job, it is removed from the monitor's pool of available sources. Any attempt by another user to reference or assign the device fails. re- Thus, a user should never leave the system without first returning his allocated facilities to the monitor pool. Allocated facilities are automatically returned to the monitor pool when the user deassigns them or kills his job. Until a user returns these facilities, no other users may utilize them except through opérai‘or intervention. Assignable devices (i.e., nondisk and nonspooled devices) in the monitor's pool of available resources are designated as being either unrestricted or restricted devices. An unrestricted device can be as- signed (ASSIGN command or INIT UUO) by any user. A restricted device can be assigned only by a privileged job (i.e., a job logged in under [1,2] or running with the JACCT bit set). However, a nonprivileged user can have ¢ restricted device assigned to him via the MOUNT command. This com=- mand allows operator intervention for the selection or denial of a particular device; thus the operator can control the use of the assignable devices. This is particularly useful when there are multiprogram- ming batch and interactive jobs competing for the same devices. The restricted status of a device is set or removed by the OPSER commands :RESTRICT and :UNRESTRICT. The facility allocation commands are as follows: ASSIGN DISMOUNT CLOSE REASSIGN FINISH SET DENSITY SET BLOCKSIZE SET DSKPRI CORE LOCATE DEASSIGN SET CDR MOUNT SET HPQ SET CPU SET SPOOL SET TTY or TTY 5.05 Monitor 2-2 COMMANDS ~ 465 - 2.1.3 Source File Preparation ‘Commands file. The ‘These commands call the system editing programs in order to create or edit a specified text ter-oriented system editing programs available are LINED -(a line-oriented editor) and TECO (a charac requires editor). In general, the editor used to create the file should be used for editing, since LINED line-blocked files and TECO does not. CREATE EDIT MAKE TECO 2.1.4 File Manipulation Commands . He can list ‘The commands in this group allow the user to manipulate his files to any desired extent ly via the source files, and DECtape and disk directories on the terminal or the line printer, possib user can on, the spooling mechanism. He can delete or rename files from disk and DECtape. In additi formats, transfer files between standard 1/O devices, perform conversion between various core image a new file or reand read and write various directory formats. Disk space can be either allocated for allocated for an existing file. Finally, the user can place files in the system queues and obtain of entries in those queues. ALCFIL DIRECT PRESERVE REWIND COPY FILEX QUEUE TY PE BACKSPACE BACKUP CPUNCH DELETE SKIP SUBMIT PRINT PROTECT EOF FILE TPUNCH RENAME LIST PLOT ' UNLOAD RESTORE ZERO 2.1.5 Object Program Preparation Commands The commands in this group are used fo prepare object programs and save the user's two files. COMPILE CREF DEBUG - EXECUTE . FUDGE FUDGE2 -2.1.6 Object Program Control Commands listings . core area as one or LOAD SAVE SSAVE storage deBy using the commands in this group, the user can load core image files from retrievable from the vices (i.e., disk, DECtape, magnetic tape). These files can be retrieved and cqntrolled ic tape user's terminal. Files stored on disk and DECtape are addressable by name. Files on mognet 2-3 COMMANDS - 466 - require the user fo pre=position the tape to the beginning of the file. Calls, Chapter 1, for a description of the job data area tions in this group. CONT (CCONT) REENTER JCONT GET 2.1.7 locations referenced by the command descrip- HALT DDT Refer to DECsystem=10 Monitor RUN R START (CSTART) Object Program Examination Commands The commands in this group aid the user in examini ng ond analyzing his object program. user's core area can be taken and later process Dumps of the ed by the system program DUMP according to the argu- ments specified by the user. D (deposit) DCORE DUMP E (examine) 2,1.8 Multiple Job Control Commands There is not necessarily a one~-to-one relatio nship between jobs and terminals. a job, but the user or operator may issue comman A terminal must initiate ds fo permit a job to float in a detached state where it is not associated with a particular termina l. Thus, more than one job may be controlled from the same terminal. ATTACH CSTART CCONT 2.1.9 OPSER DETACH REATTA Job Termination Command When the user leaves the system, all facilities facility pool so that they are available to allocated fo his job must be returned to the monitor other users. KJOB 2.1.10 Sending Messages The commands in this group allow the user interco nsole communication with other users of the system or with operators at any station. In addition, the user may record information by the operations staff at a later time. GRIPE PLEASE SEND ' in a disk file to be read - 467 - 2.1.11 . COMMANDS . Job Information Commands The user can obtain various job-related information with this group of commands. This information includes the number of his job, the quotas for each file structure associated with his job, and the running time and disk space that his job has used. In addition, the user may type or modify his file struc~ ture search list. 2.1.12 SET TIME SET WATCH QUOLST SETSRC DSK PJOB TIME System Information Commands With the commands in this group, the user is able to obtain system status information, including the time of day, the list of available devices, file structures, and physical units not in file structures, the scheduled use of the system, and the location of a specific peripheral device. DAY TIME RESOURCES : SCHED SYSTAT _ VERSION WHERE - 468 - COMMANDS ALCFIL program Function The ALCFIL program enables the user to allocate space for a new file or reallocate space for an existing file in one contiguous region on the disk. The size of the region is restricted by the size of the cluster count field (usually 512) times the cluster size of the file structure times the number of pointers in a disk device data block (not less than 10). Command Format R ALCFIL The ALCFIL program responds with /H FOR HELP FILE? The user may respond with dev:file.ext [proj,prog] or /H (for help) or /X (to exit) where dev: is a file structure or physical unit name. If dev: is omitted, DSK is assumed. ~ If one of the other arguments is omitted, O is assumed. If a filename is specified, the number of blocks presently allocated, if nonzero, is typed. ALCFIL responds with ALLOCATE? User may type N or N,M (decimal numbers) N = total number of blocks to be allocated for the file. M = logical block within the file structure or unit (depending on dev:) where the allocation is to begin. If the total number of blocks requested cannot be allocated (because of disk quotas), a partial allocation is given and the message ' PARTIAL ALLOCATION ONLY is typed. The user can issue the DIRECT command with the ALLOCATE switch to determine the number of blocks allocated. If the new blocks can be allocated, the message ALLOCATED is typed. Since an extended ENTER (refer to DECsystem=10 Monitor Calls) is executed to allocate the new blocks, the file need not exist before the blocks are allocated. .Version 7 ALCFIL " 2-6 - 469 - COMMANDS [ALCFJ.L program (Cont)l Characteristics The R ALCFIL command: Places the terminal in user mode. Runs the ALCFIL program, thereby destroying the user's core image. Associated Messages ~ Refer to Chapter 4. Example R ALCFIL) /H FOR HELP. FILE? TEST4.TSJT) ALLOCATE? 2000, .ALLOCATED FILE? TESTS.TST,) ALLOCATE? 1000) ALLOCATED FILE? TESTS5.TST,) 1000 BLOCKS ALLOCATE? ALREADY 500, ALLOCATED ALLOCATED FILE? DSKB:FILEAS ALLOCATE? PARTIAL FILE? 3000,) ALLOCATION ONLY - 7X EXIT +DIR/ALLOC)) FILEA Version 7 ALCFIL 175 <B57> ‘ l4-APRR=72 2-7 DSKB: COMMANDS - 470 - ASSIGN command Functien The ASSIGN command allocates an 1/O device to the user's job for the duration of the job or until a DEASSIGN command is given. This command, applied to DECtapes, clears the copy of the directory currently in core, forcing any directory references to read a new copy from the tape. (Refer to DECsystem=10 Monitor Calls for further details.) Although DECtape is the only device that should be ASSIGNed before use, to ensure that the monitor has a copy of the proper DECtape directory in its core area, it is wise to ASSIGN all devices, such as magnetic tape, before use. Command Formats ]. ASSIGN phys-devn log~dev phys-devn = any physical device listed in Table 1-1 in Paragraph 1.4.2.2, followed by a 1-to=3 digit number representing a specific unit, or any file structure name. This argu~ ment is required. With this command format, the monitor attempts to assign the device specifically requested. If unable to assign the device, the monitor types an appropriate message (refer to Chapter 4). log-dev = a logical name assigned by the user. This argument is optional. disk devices, only one logical name can be ossigned to a physical device. Except for Subsequent ASSIGN commands to all devices except disk devices replace the old logical name with the new one. Logical names are disassociated from all devices by the DEASSIGN com- mand . ASSIGN phys-devSnn log=dev phys=devSnn = any physical device followed by the letter S and a 1 or 2 digit number representing a specific station, or any file structure name. This argument is required. With this command format, the monitor attempts to assign a device ot the requested station. An appropriate message is typed if the device cannot be assigned (refer to Chapter 4). log~dev = same as above. ASSIGN phys~dev log-dev phys-dev = any physical device followed by a null argument implying any device of the designated type, or any file structure name. This argument is required. With this com- mand format, the monitor attempts to assign the requested device at the user's logical station. If this type of device does not exist af the user's logical station, the monitor attempts to assign the device at the central station. If undble to assign the device, the monitor types an appropriate message (refer to Chapter 4). log-dev = same as above. - 471 - | COMMANDS | ASSIGN command (Cont)| Characteristics The ASSIGN command: Leaves the terminal in monitor mode. Restrictions A comma may not be used to separate the logical and physical device names. If a comma is used, the monitor terminates its scan af the comma; therefore, the logical name is not assigned. Non-privileged jobs (i.e., jobs not logged in as [1,2] or running with JACCT set) can only use this command to allocate unrestricted I/O devices. non-privileged jobs via the MOUNT command. Restricted devices can be obtained by The ASSIGN when issued by a privileged job allocates both restricted and unrestricted devices. Associated Messages Refer to Chapter 4. Examples +ASSIGN LPT2 +AS LPT21:) ASSIGNED The user assigns a specific line printer (LPT2). ' CDRS2:) - ChR4 ASSIGNFD «ASSIGN TTY1 TTY1:LPT:) ASSIGMNFD The user assigns TTY 1 and gives it logical name \ LPT. oAS LPT2) LPT4 The user assigns any available card reader at station 2. The user assigfis any available line printer. The ASSIGNED LPT chosen is at either the user's station or the central station. =ASSIGN DTAZ:) PDEVICE NOT ASSIGNABLE 2ASSIGN DTA4 DTAL) ASSIGNED ~ | A non-privileged user attempted to allocate o re~ stricted device (DTA2). ‘The user then uses the generic device name (DTA) ‘to obtain the device. He could have used the MOUNT command fo assign the restricted device DTA2. 5.05 Monitor - 2-9 COMMANDS - 472 - ATTACH command Function The ATTACH command detaches the current job, if any, and connects the terminal fo a detached job. : Command Format ATTACH job [proj,prog] job = the job number of the job to which the terminal is to be attached. This argument is required. [proj,prog] = the project-programmer number of the originator of the desired job. This argument may be omitted if it is the same as the job to which the terminal is currently attached. The operator (device OPR) or a user logged=in under [1,2] may always attach to a job although another terminal is attached, provided he specifies the proper [proj ,prog] . To prevent users from attaching the jobs without knowing the PASSWORD associated with the job, a new job is temporarily created when the [proj,prog] argument is specified. This tem= porary job runs LOGIN to check the password. This can result in the current job not being able to attach to the specified job if the job capacity of the system would be exceeded with the creation of the temporary job. However, the current job is still detached even if there are no available jobs. The operater or any job logged=in as [1,2] can always attach to another job since they do not require the creation of a temporary job. Characteristics The ATTACH command: Leaves the terminal in monitor mode. Does not require LOGIN, Depends on FTATTACH which is normally absent in the DECsystem-1040. Restrictions Remote users cannot attach to jobs with a project number of 1. Batch users cannot issue this command. Associated Messages Refer to Chapter 4. - 473 - COMMANDS |[ATTACH command (Cont)| Examples LATT 1) FROM JOB .5 The user attaches to job 1 from job 5. The two jobs have the same [proj,prog] and therefore, the argument is not required, The user logs=in and is given job7. TTY25is now 2L0OG 27,235) JOB 7 %804 TTY25 BASSWORD} attached to job 7. %AT;ACH 36 ROM JoR 7 The user attaches to an existing job (36) and there~ by detaches his current job (7). Since the [proj, prog] associated with job 36 is different than the user's, he must specify the [proj,prog] of the de- 1634 23=FEB=72 WED 150,27)) PASSWORD? sired job. The system then requests the PASSWORD. If the given PASSWORD is correct, the terminal is attached to job 36, The terminal is attached to job 36. JATTACH 7)) PCAN'T ATT The user attempts to attach to job 7. The command fails because the [proj,prog] of job 7 is not the » T0O JOB same as the [proj,prog] of job 36. The terminal is still attached'to job 36. JK/FD JOB 36,USER [5@,27) LOGGED OFF TTIY25 1635 23«FER72 RUNTIME OMIN,0Q,348SEC The user killed job 36. The terminal is currently not attached to any job. Since the terminal is currently not attached to a job, the commadnd fails because there is no [proj, prog] to compare with the [proj,prog] of job 7. ATTACH 7)) FCAN'T "ATY TO JOB «ATTACH 7 FASSWORD [27,2393) ' ~ The command is accepted and the PASSWORD is requested. The message FROM JOBn is not output since the terminal was not attached to a job. The terminal is attached to job 7., .5.05 Monitor - 474 ~ COMMANDS BACKSPACE command | Function The BACKSPACE command spaces a magnetic tape backward a specified number of files or physical records. This command, depending on its arguments, is equivalent to the following PIP command strings: MTAn: (M #nB) « MTAn: (M #nP) « Command Formats 1. BACKSPACE MTAn: x FILES skips backward x files. 2. BACKSPACE MTAn: x RECORDS skips backward x records. Characteristics The BACKSPACE command: Leaves the terminal in monitor mode. Runs the PIP program. Depends on FTCCLX which is normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. Examples sBAC MTA2: sBACKSP 7 RECOKRDS ) MTA3: 11 FILES) ]This command runs the COMPIL program, which interprets the command before running the PIP prograr . Version 20 COMPIL Version 32 PIP 2-12 COMMANDS - - 475 - BACKUP program Function The BACKUP program encbles the user to save disk files on magnetic tape (MTA), DECtape (DTA), or disk (DSK). The save can be of the entire disk or selected subsets of the disk. The BACKUP program places data in the following files: 1. BACKUP SET file This file contains the data saved on the backup medium (MTA, DSK, DTA) with one BACKUP command. When data is saved on disk, the BACKUP SET file is one file with file delimiting control words. When written on magnetic tape, it is several files written in buffered binary mode. - The BACKUP SET file is composed of a BACKUP header, a user set, and a BACKUP trailer. The BACKUP header is one block in length and contains infor- mation concerning the creation of the BACKUP SET." This information includes the name and date of creation, the name of the system, and the user identification. The USER SET contains the directories and the files associated with the directories for all user areas. Even if a user has files on more than one file structure, his files will be saved together. For example, all files on all file structures for user 1,2 will be stored before the files for user 1,3. In other words, the user set is ordered according to project-programmer number, not according to file structures. However, within individual project-programmer numbers, all files on one file structure are saved before files on another. The BACKUP trailer contains information about the user set that was just created. This information includes the time, the date, and the length of the user set. The BACKUP trailer immediately follows the user set. 2. INDEX file ' . This file contains the directories and the filenames of all the disk areas that have been saved on the backup medium. In addition, it contains the relative block number in the BACKUP SET file where each element (file) begins. The index file is the last file writien on the backup medium and is separated from the BACKUP SET file. It can be saved on DECtape and can be listed, if desired. 3. COMMAND RECOVERY file This file contains information that indicates how much of the user's command has been processed and how much of the command remains. It is updated ot every check point in order to make crash recovery possible. . 4. Llog File t -~ The user is given a log file to aid him in error analysis. This file contains a record of either all actions performed by the BACKUP and RESTORE programs or only errors encountered in processing. The log file is a listing file. Preliminary Information 2-13 COMMANDS - 476 - {BACKUP program (Cont)| Command Format R BACKUP The user may type any of the following commands after the slash output by the BACKUP program. These commands are stored in core and are processed only when a START command is given by the user. All commands are terminated with a carriage return. Multiple files may be specified in one command string by separating the filenames with commas. The full wildcard construction may be used to replace the filename, the extension, or the directory (refer to Paragraph 1.4.2.4). Command Explanation BACKSPACE FILE Backspaces the magnetic tape to a user file header and positions the tape immediately before the header. BACKSPACE SET Backspaces the magnetic tape to a BACKUP header and positions the tape either immediately before the header or to the beginning of the tape if there is no BACKUP header (i.e., there is only one BACKUP SET on the tape). BACKSPACE UFD Backspaces the magnetic tape to a UFD header and positions the tape immediately before the header. BACKUP dev2: file descriptor « dev1: [proj,prog] /switch Writes the designated file on dev2 from devl. The user may specify files to be taken from and/or written to a user's area other than his own, provided that he has access privileges to the user areas. The device arguments are required. /switch = /EXCEPT file descriptor Indicates the files and/or areas that should not be written as BACKUP files. DELETE dev: file.ext Deletes the file named from the specified device. The specified device must be the device for which a BACKUP has been taken. DENSITY MTAn:x Sets the magnetic tope density as specified by x. x =2 200 bpi x=5 556 bpi x=8 800 bpi The default is the system standard defined at MONGEN time. DUMP ON dev: file.ext Dump the contents of the BACKUP set file beginning at the present position and ending at the next file control word. types of errors are ignored. All The device on which the dump is to be written may not be a listing device. ERROR DUMP dev: Returns to the last file control word and dumps the file on the device specified if a transmission error occurs during the backup of any file. (continued on next page) Preliminary Information COMMANDS - 477 - [BACKUP program (Cont)| Explanation Command Writes the index file with the designated filename on the device named. The index file is also written on the disk and saved as INDEX dev: file.ext the last file on the backup medium. The default is .BKP where nnnn corresponds to the tape sequence DSK:MTnnnn number., Writes a file on the specified device which contains a record of LOG dev: file.ext /switch the operations performed. The default is DSK:BACKUP.LOG. /Switch = /ERROR Logs only the errors. This switch is optional. If omitted, all operations are recorded. Specifies the parity on magnetic tape as odd or even. The de- PARITY dev: ODD or EVEN fault is odd. REWIND dev: On moagnetic tape, closes the backup set and rewinds the tape. On disk, closes the backup set. START Begins execution -of a series of commands sent previously. Com- mands are not processed until a START command is given. If there are no commands fo be processed when the START is executed, the command recovery file is searched for executable . commands. UNLOAD dev: Performs a rewind and unload to magnetic tape. The user may restart the BACKUP program at any time. By issuing o tC tC START sequence, the user can cancel present operations and specify new commands. A tC START sequence deletes the command recovery file if the next command given to the BACKUP program is not START. If START is the next command to BACKUP, the command recovery file is scanned, and the BACKUP program continues according to the information in the file. A tC CONT sequence does not delete the command recovery file, but completes the current requests. After all requests have been completed, the BACKUP program closes out the log file,.and types BACKUP COMPLETED and an asterisk on the user's terminal indicating that it is ready for more requests. MTA rewinds due to the magnetic tape being filled are actually rewind and unload operations to insure that the magnetic tape is not overwritten. When the BACKUP program reaches completion, the magnetic tape last written on remains in position unless a REWIND command is given. Characteristics The R BACKUP command: Runs the BACKUP program, thereby desl'roying fhe user's core image. Preliminary Information ' 2-15 COMMANDS - 478 - rBA,CKUP'prwam (Cont) | Associated Messages Refer to Chapter 4. Examples ~ oR BACKUP) /BACKUP MTA1:«DSKE:[10,22%] v ) ZINDEX DSKCEBAKFIL.LST) /STARY) ISBACKYP COMPLETED /7C Preliminary Information AT 16145122 2-16 - 479 - - COMMANDS CLOSE command Function The CLOSE command terminates any input or output currently in progress on the specified de- vice, and automatically performs the CLOSE UUO (refer to DECsystem~10 Monitor Calls). Files are CLOSEd, but not RELEASEd, and logical names and device assignments are preserved. Since most programs CLOSE files when they finish performing a command string, the CLOSE command.is provided for the occurrence of a program not terminating or a program being debugged. This command causes any disk files being written to be entered into the user's UFD. If a CLOSE is not done, the next RESET by a command (R, RUN, GET) or program will delete the partially written file. Command Format CLOSE dev dev = the logical or-physical name of the device on which 1/O is to be terminated. This argument is optional. If dev is omitted, /O is terminated on all devices, except for the job's controlling terminal, and all files are CLOSEd. ' Characteristics The CLOSE command: Leaves the terminal in monitor mode. Requires core. . Depends on FTFINISH which is normally absent in the DECsystem-1040. Restrictions The user cannot continue, but can start at the beginning or enter DDT. Associated Messoges Refer to Chapter 4. Examples CLOSE PTR3) CLOSE DEVAL) CLOSE) 2=17 COMMANDS - 480 - EOMPH..E command 1 Function The COMPILE command produces relocatable binary files (LREL files) and/or compilation listings for the specified source program files. The assembler or compiler used is determined by the source file extension or by switches in the command string. If no switches appear in the command string, the following translators are used: Source File Extension Translator Used ALG ALGOL compiler .CBL F4 COBOL compiler FORTRAN compiler (F40) MAC MACRO assembler .SNO SNOBOL compiler2 .BLI BLISS compiler? P11 MACXT1 cssembler2 Other than above, or null Standard processor, which is usually FORTRAN ot the beginning of the command string (refer to Paragraph 1.5.6). NOTE If a source file has a recognizable processor extension (see above), the processor cannot be changed with a switch. The only time that a processor can be specified with a switch is when the source file hos a non-recognizable processor exten= sion or a null extension, Normally the source file is translated if there is no corresponding binary (.REL) file or if the source file's date and time is later than or equal fo the binary file's date and time. If the binary file is newer than the source file, the source file is not translated and the current .REL file is used. However, switches can be used to override this action. Each time the COMPILE, LOAD, EXECUTE, or.DEBUG command is executed, the command with ifs arguments is remembered in a temporary file on disk, or in core if the monitor has the TMPCOR feature. Therefore, the filename used last can be recalled for the next command without specifying the arguments again (refer to Paragraph 1.5). The COMPILE command accepts several command constructions: the @ construction (indirect commands), the + construction, the = construction, and the < > construction. Refer to Paragraph 1.5 for a complete description of each of these constructions. ]This command runs the COMPIL program, which interprets the command before running the appropriate processor. 2SNOBOL, BLISS, and MACX11 (the PDP-11 assembler for the PDP-10) will be recognized as pro= cessors only if the appropriate ussembly switches are set. are not supported. Version 20 COMPIL 2-18 However, these assembly switch settings - 481 - | COMMANDS [COMPILE command (Cont)| Command Format COMPILE list - list = a single file specification, or a string of file specifications separated by commas. A file specification consists of a device name, a filename with or without an extension, and a directory name. The following switches can be used to modify the command string. These switches can be temporary or permanent switches (refer to Paragraph 1.5.5). Note that all the switches allowed with the LOAD, EXECUTE, and DEBUG commands can be used with the COMPILE command. However, only the switches pertinent to COMPILE are listed below; the others are ignored. /ALGOL Compile the file with ALGOL. Assumed for files with the extension of ALG. /BLISS! /COBOL ‘ Compile the file with BLISS. Assumed for files with the extension of .BLI. Compile the file with COBOL. Assumed for files with the extension of .CBL. /COMPILE Force a compilation on this file even though a binary file exists with a newer date and time than the source file. This switch is used fo obtain an extra compilation (e.g., in order to obtain"a listing of the compilation) since normally compilation is not performed if the binary file is newer than the source file. / CREF Produce a cross-reference listing file on the disk for each file compiled for later processing by the CREF program. These files have the filename of the source file and the extension of .CRF. The file can then be listed with the CREF command. However, with COBOL files, the cross-referenced listing is always appended to the listing file. No additional command need be given tfo obtain the listing. ' /FORTRAN 1 Compile the file with FORTRAN, Assumed for files with the extension of .F4 and all files with non-recognizable processor extensions (if FORTRAN is the standard processor). BLISS will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. Version 20 COMPIL COMMANDS - 482 COMPILE command (Cont)l Command Format (cont) /FUDGE Create a disk file containing the names of the .REL files produced by the command string. When the FUDGE command is given, PIP reads this file in order to generate a library REL file. Arguments to this switch are: /FUDGE:dev:file.ext [proj ,prog] dev: - the device on which to write the file. DSK: is assumed. file.ext = the name of the library file. The filename is required. If the extension is omitted, it is assumed to be .REL. [proj,prog] - the directory in which to place the file. The user's directory is assumed if none is given. This switch is permanent in the sense that it pertains to all .REL files generated by the command string. JLIST Generate a disk listing file, for each file compiled, with the filename of the source file and the extension of .LST. These files can be listed later with the LIST command. Unless this switch is specified, listing files are not generated except in COBOL; COBOL listings are always generated. /MACRO Assemble the file with MACRO. Assumed for files with extension of .MAC, /MACXTT Assemble the file with MACX11. Assumed for files wifh- extension of .P11, /NOCOMPILE Complement the /COMPILE switch by not forcing a compilation on a source file whose date is not as recent as the date on the binary file. /NOCOMPILE is the default action. /NOLIST Do not generate listing files. This is the default action except for COBOL files; COBOL listings are always generated. /SNOBOL] Compile the file with SNOBOL. sion of .SNO, 1 Assumed for files with an exten‘ SNOBOL and MACXT1 (the PDP-11 assembler for the PDP=10) will be recognized as processors only if the appropriate assembly switches are set. However, these assembly switch settings are not supported. Version 20 COMPIL - 2-20 - B - 483- COMMANDS [COMPlLE command (Cont)J Characteristics The COMPILE command: Leaves the terminal in monitor mode. Runs the appropriate processor. Restrictions The wildcard construction cannot be used. Associated Messages Refer to Chapter 4. Examples «COMPILE PROG,TEST.MAC,MANAGE/COBOL ) Compiles PROG (with null extension) with FORTRAN, TEST.MAC with MACRO, and MANAGE (with null extension) with COBOL only if REL files do not exist with later dates. A listing file is generated only for MANAGE. The files generated are PROG.REL, TEST.REL, MANAGE.REL, and MANAGE.LST. _.-COMPILE /L1IST SIGN.MAC,TABLES/NDLIST;MULTI.ALG) Compiles SIGN.MAC with MACRO, TABLES (with null extension) with FORTRAN, and MULTI.ALG with ALGOL. Listing files are generated for SIGN.MAC and MULTI.ALG. _.__CUMPILE/CREF/COMPILE DIVIDE,SUBTRC,ADD) . Forces a compilation of the source files although current .REL files exist and generates cross-referenced listing files. The files created are DIVIDE.CRF, DIVIDE.REL, SUBTRC.CRF, SUBTRC.REL, ADD.CRF, and ADD.REL. «COMPILE /FUDGE :MONITR.RELOLIBALL ) Compiles the files contained in the command file LIBALL and enters the names of all the REL files generated in a temporary disk file. When the FUDGE command is given, PIP generates the library REL file with name MONITR.REL. The library is created with the REL files in the same order as they were specified in the command file. Version 20 COMPIL . 2-21 COMMANDS - 484 - [ COMPILE command (Cont)| Examples (cont) «COMPILE OUTPUT=MTAGS (W,S,M)/L) Rewinds the magnetic tape (W), compiles the first file with FORTRAN, produces binary output for the KA10 (S), and includes the MACRO coding in the output listing (M). These switches are processor switches (refer to Paragraph 1.5.7). A listing file is gene~ rated with the name OUTPUT.LST, along with the file OUTPUT.REL. Version 20 COMPIL 2-22 - COMMANDS - 485 - CONTINUE command Function -The CONTINUE command starts the program af the saved program counter address stored in .JBPC by a HALT command: (tC) or a HALT instruction. Refer to DECsystem=-10 Monitor Calls " for a description of the job data area. Command Format CONTINUE Characteristics The CONTINUE command: Places the terminal in user mode. Requires core. Does not require LOGIN, Associated Messages Refer to Chapter 4. Example | Run a program called LOOP in your disk area. ~RUN LCOP) *C tC sDAYTIME) 23-FEB-72 sCONT) Stop the program. Check the time of day. 16:33:19 ‘ Continue the program. 2-23 COMMANDS - 486 - COPY qommand 1 Function The COPY command transfers files from one standard1/O device to another. The command string can contain one device output specification and any number of input specifications. The equal sign separates the destination (output) side from the source (input) side. This com=mand runs PIP and performs the basic PIP function of transferring files. Command Format COPY dev: file.ext [proj,prog]l <nnn>=dev: file.ext [proj,prog]l, file.ext [proj,progl, ... ~dev: = a physical or logizal device name. If the device name is omitted, DSK: is assumed, file.ext = the name of the file(s) fo be used on input or for output. If the output filename is omitted, the input filemane is assumed. PIP combines the files if many input files are being transferred to one output file. If many input files are being transferred to the same number of output files, PIP uses the /X switch to keep the files separate. The wildcard construction is allowed. [proj,prog] = the disk area in which either the files are to be read or written, If this argument is omitted, the user's default disk area is assumed. The user may transfer files to or from another area only if he has access to the area. <nnn> = the protection code to be given to the output file(s). standard is assigned. If omitted, the system ' Switches can be passed to PIP by enclosing them in parentheses in the COPY command string. When COMPIL interprets the command string, it passes the switches on to PIP, Characteristics The COPY command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=1040. Associated Messages Refer to Chepter 4. This command runs the COMPIL program, which interprets the command before running PIP. Version 20 COMPIL Version 32 PIP 2-24 COMMANDS - 487 - | cOPY command (Cont)| Examples ) {COPY=DTA3: FILNAM.MACs MANY.CEL»> COMMON.ALG The three files from DTA3 are transferred to the user's disk area with the same file- names. .COPY DTA3: : OUTPUT=*.*) All files in the user's disk are transferred to one file on DTA3 with the name OUTPUT. ) .COPY FILEA.*=DTAl: SOURCE.* The input files on DTA1 named SOURCE with any extension are transferred to DSK with the filename FILEA and the same extension. The number of output files equal the number of input files. ~COPY YOUKS.CBL (20, - 171 = MINE.CBL ) The file MINE.CBL from the user's disk area is transferred to [20,17] disk area with the name YOURS.CBL. The user must have privileges to write in area [20,17]. Version 20 COMPIL Version 32 PIP , 2-25 COMMANDS - 488 - COPY program Function PBWON — The COPY program is a DECtape copy routine that allows the user to Copy the entire contents of an input DECtape to an output DECtape. Zero all blocks on an output DECtape and clear the directory. Perform a word-by-word comparison of two DECtapes. Load a bootstrap loader and write it in blocks 0, 1, and 2 of the output DECtape. Command Format .R COPY.) *output DTA:=input DTA: /switches /switches = one or more of the following switches. Switches are preceded by a slash or enclosed in parentheses and can appear anywhere in the command string . /C Copy all blacks from the input DECtape to the output DECtape. /G Do not restart the program ofter a parity error, sage and continue the program. /H Type the available switches and their meonings.‘ /L Load the bootstrap loader into a core buffer. COPY expects the loader to be on logical device PTR in the file named BSLDR.REL. Note that Output an error mes= COPY must be SAVed if the loader is to be preserved with the COPY core image. /N Suppress the directory listing. /T Write the bootstrap loader in blocks 0, 1, and 2 of the output DECtape. This switch accepts, as input from the terminal, a core bank or offset. The loader is offset and then written on the tape. core bank = nnnK (16K to 256K) offset = 1000 to 777600 octal N /Z /6 Verify the similarities of the two DECtapes by performing a word-byword comparison and typing on the terminal the number of discrepancies discovered. Zero all blocks of the output DECtape and clear the directory . Leok for the directory in PDP=6 format (i.e., in block one instead of block 144), Version 6 COPY 2-26 - 489 - , COMMANDS | COPY program (Cont)| Command Format (cont) If no switches are specified, /C (copy) and /V (verify) are assumed by default. Note that upon completion, the directoryin core may not agree with the directory of the output DECfcpe. The output DECtape should be reassigned to guarantee that the directoryin core is up=to-date. : : Characteristics The R COPY command: Places the terminal in user mode. Runs the COPY program, thereby destroying the user's core image. Associated Messages Refer to Chapter 4. Examples K COPY) *DTAT: Run COPY = DTA3: ) Copy the contents of DTA3 to DTA7 and determine ~if the two DECtapes are the same (default condition). If the DECfopes disagree, the number of discrepanciesis typed on the terminal. iDTAQ 1/2= ) , Zero all blocks and clear the directory on DTA2, *1C Return to monitor mode. sASSIGN DSK:PTK:) The bootstrap loader must be on logical device PTR. +RENAME BSLDR.KEL=DTBGOT.xEL,) COPY expects the bootstrap loader to be named o BSLDR. R COPY ) Run COPY */L ) ’ Load the bootstrap loader into a core buffer. *1C - Return fo monitor mode. <SAVE DSK:iCOPY ) Version 6 COPY Save COPY so that the bootsirap loader is preserved with the COPY core image. 2-27 - 490 - COMMANDS [COPY progfam (Cont)J Examples (cont) sSTART) Start the COPY program. #DTAS:/T=) Write the bootstrap loader in blocks 0, 1, and 2 of DTAS. TYPE CORE BANK AND OFFSET FOk DTBOOT Respond with size of core bank or offset. E4K ) *1C Version 6 COPY Size of core bank (64K core bank = 177000 offset, top of core =1000) Return to monitor mode. 2-28 - 491 - COMMANDS CORE command Function The CORE command types or modifies the amount of core assigned to the user's job. Because programs usually allocate core, the user generally does not need this command. It is included for completeness and is used more frequently in non-swapping systems than in swapping systems. If the job is locked into core, this command with a nonzero argument cannot be satisfied and: therefore gives an erroneous return, Command. Format CORE n n = a decimal number. This argument is optional. If n is omitted, the monitor types out the amount of core used and does not change the core assignment. If n =0, the low and high segments disappear from the virtual addressing space of the job. If n >0, n represents the total number-of blocks of core to be assigned fo the job from this point on. If n is less than high plus minimum low segment size, n plus high segment size is assumed., ~ Core arguments can be specified in units of 1024 words or 512 words (a page) by following n with the letter K or P, respectively. For example, 3P represents 3 pages or 1536 words. If K or P is not specified, K (1024 words) is assumed. On systems with the KA10 processor (DECsystem~1040, 1050, or 1055), 1024 -words is the minimum unit of allocation and therefore,, all arguments are rounded up to the - nearest multiple of 1024 words. For example, 3P on the KA10 is treated the same as 2K, Characteristics The CORE command: Leaves the terminal in monitor mode. Does not operate when a device is currently transmitting data. 5.05 Monitor 2-29 COMMANDS - 492 - l CORE command (Confcfl Associated Messages Refer to Chapter 4. Examples sCOKE 5) = +CORE) 5+ /46K VIR« CCKE CCRE sCOKE LEFT = 274 10P,) «CORF 10+ /93P CCRE VIR.CORE LEFT 5.05 Monitor = 549P 2-30 - 493 - ' COMMANDS CPUNCH command Function The CPUNCH command is used to place entries into the card punch output queue. This com= mand is equivalent to the following form of the QUEUE command: QUEUE CDP: job name = list of input specifications Command Format CPUNCH iobndmé = list of input specifications jobname = name of the job being entered into the queuve. The default is the name of the first file in the request, not the name of the first file given. These differ when the the first file given does not yet exist, : input specifications = a single file specification or a string of file specifications, separated by commas, for the disk files being processed. A file specification is in the form dev:file.ext [proj,prog]l." dev: = any file structure to which CDPSPL will have access; the default is DSK:. file.ext = names of the files. The filename is optional. The default for the first filename is *, the default for subsequent files is the last filename used. The extension can be omitted; the default is .CDP. [proj,prog] = a directory to which the user has access; the user's directory is assumed if none is specified. Note that if all arguments to the command are omitted (i.e., only the command name is given), the listing of all entries in the card punch queue for all jobs of all users is output. . The wildcard construction can be used for the input specifications. Switches that aid in con=structing the queue entry can also appear as part of the input specifications. These switches are divided into three categories: 1. ' Queue~operation = Only one of these switches can be placed in the command string because they define the type of queue request. The switch used can appear anywhere in the command string. 2. General = Each switch in this category can appear only once in the command string because they affect the entire request. The switch used can appear any= where in the command string. 3. File control = Any number of these switches can appear in the command string because they are specific to individual files within the request. The switch used must be adjacent to the file to which it applies. If the switch precedes the filename, it becomes the default for subsequent files. Version 3 QUEQE 2-31 COMMANDS - 494 - [CPUNCH command (Cont)| Command Format (cont) The following switches can be used with the CPUNCH command. Switch /AFTER:tt Explanation Category Process the request after the specified time; tt is either General in the form of hhmm (time of day) or thhmm (time later than the current time). The resulting AFTER time must be less then the DEADLINE time. If the switch, or the value of the switch, is omitted, no AFTER constraints are assumed ., /BEFORE:t Quevue only the files with a creation date before time t where t is in the form dd=mmm=-yy hhmm, General If the switch, or the value of the switch, is omitted, no BEFORE constraints are assumed. /BEGIN:n Start the output on the nth card. The default is to File Control begin output on the first card. /COPIES:n Repeat the output the specified number of times. N must be less than 64, are needed, two separate requests must be made. this switch is not specified, the default is 1. /CREATE File Control If more than 63 copies If Make a new entry into the card punch output queve. Queuve Operation This switch is the default for the queue-operation switches. /DEADLINE:tt Process the request before the specified time; tt is General either in the form hhmm (time of day) or thhmm (time later than the current time). The resulting DEADLINE time must be greater than the AFTER time. If the switch, or the value of the switch, is omitted, no DEADLINE constraints are assumed. /DISPOSE:DELETE /DISPOSE:PRESERVE Delete the file after spooling. Save the file after spooling. File Control This is the default for all files except files with extensions .LST, .TMP, or .CDP (if protection of .CDP is Oxx). Version 3 QUEUE 2-32 File Control - 495 - COMMANDS [CPUNCH command (Cont)] Command Format (cont) Explanation Switch /DISPOSE:RENAME Rename the file from the specified directory immediately, remove it from the logged-out quota, and- Category File Control delete it after spooling. This is the default for files with extensions of .LST, .TMP, and, if the protection is Oxx, .CDP. List the entries in the card punch queue, but do not update the queues. Therefore, the list may not be an upto-date listing but the listing will be faster than with Queve Operation /FORMS:a Place the output on the specified form. The argument to the switch must be six alphabetic characters. The default is that normal forms are used. General /KILL Remove the specified entry from the card punch queue. This switch can be used for deleting a previouslysubmitted request as long as the request has not been by the Spoolers. started Queue Operation Limit the output to the specified number of cards. General After updating the queues, list the entries in the card punch queue; if this switch, along with all other switches, is omitted, all entries for all jobs of all Queue Operation Alter the specified parameters in the job. This switch requires that the user have access rights to the job. It can be used for altering a previously submitted re~ quest as long as the request has not been started by the Spooler. ' Queue Operation /F /LIST, © /LIMIT:n /LIST users are listed, /MODIFY Version 3 QUEUE 2-33 COMMANDS - 496 - [CPUNCH command (ContT] Command Format (cont) Switch /NEW Explanation Category Accept the request even if the file does not yet exist. An appropriate error message is given if the file does File Contro! not exist by the time the request is processed by the spooler, /NULL ' Accept the request even if there is nothing in the re- quest (i.e., create a queue entry to be later modified). No error message is given if there are no files . Generqgl in the request. /OKNONE Do not output message if no files match the wildcard construction. /PHY SICAL This is assumed at KJOB time. Suppress logical device name assignments for the device File Control Assign the specified external priority (n=0 to 62) to the request. The larger the number, the greater priority General Assign the protection nnn (octal) to the job. ngerol »specified. /PRIORITY :n File Control the job has. The default is 10 if no switch is given and 20 if the switch is specified without a value. /PROTECT:nnn If the switch, or the value of the switch, is omitted, the standard protection is assumed. /PUNCH:026 Punch the files in 026 Hollerith code. If a /PUNCH: - switch is not given the files are punched according to the data mode specified in the file, File Control /PUNCH:ASCII Punch the files in ASCII card code. If a /PUNCH: switch is not given, the files are punched according to the data mode specified in the file. File Control /PUNCH:BINARY Punch the files in binary card code. If a /PUNCH: switch is not given, the files are punched according to the data mode specified in the file, ' File Control /PUNCH:D029 Punch the files in DEC029 card code. If a /PUNCH: switch is not given, the files are punched according to the data mode specified in the file. File Control /PUNCH:IMAGE Punch the files in image card code. If a /PUNCH: switch is not given, the files are punched according to the data mode specified in the file. File Control Remove the file from the queve. File Control /REMOVE This switch is valid only with the /MODIFY and can be used to remove a previously submitted file as long as CDPSPL has not started processing the request. Version 3 QUEUE 2-34 - 497 - COMMANDS {CPUNCH command (Cont)| \ Command Format (cont) Switch 4 . /SEQ:n Explanation Specify a sequence number to help in identifying a re- Generadl Queve only the files with.creation dates after the speci- General quest to be modified or deleted. /SINCE:t fied time, /START:n Category tis in the form dd=mmm-yy hhmm, Begin on the nth line of the file. If the switch, or the value of the switch, is omitted, the spooler starts with File Control the first line. /STRS Search for the file on all file structures in the search list and take each occurrence. just the first occurrence. /UNPRESE—RVED Output the files only if they are not preserved (i.e., the first digit is 0). punching. File Control The default is to take This switch avoids redundant General Characteristics The CPUNCH command: Leaves the terminal in monitor mode. Runs the QUEUE program, thereby destroying the user's core image. Depends on FTQCOM which is normally absent in the DECsystem=1040, Associated Messages Refer to Chapter 4. Examples «CPUNCH SYSTAT.MAC/PUNCH:ASCIL) Punch the file SYSTAT.MAC in ASCII format. «CPUNCH SYSTAT.REL/PUNCH:BINARY/AFTER:1 7?)7)) Punch the file SYSTAT.REL in binary format, but do not begin punching it until after 5:00 pm. Version 3 QUEUE 2-35 COMMANDS - 498 - CREATE command 1 Function The CREATE command runs LINED (Line Editor for disk) and opens a new file on disk for Refer to the LINED writeup in the DECsystem~10 Software Notebooks. creation., Command Format CREATE file.ext file.ext = any legal filename and filename extension. The filename is required; the filename extension is optional . Characteristics The CREATE command: Places the terminal in user mode. Runs the LINED program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=1040, Associated Messages Refer to Chapter 4. Example CREATE TEST1.F4J) *- ]This command runs the COMPIL program, which fnferprel's the commands before running LINED. Version 20 COMPIL Version 13 LINED 2-36 COMMANDS - 499 - CREF command J Functien The CREF command runs CREF and lists on the line printer (LPT) any cross-reference listing files generated by previous COMPILE, LOAD, EXECUTE, and DEBUG commands, using the /CREF switch, since the job was initiated. The file containing the names of these CREFlisting files is then deleted.so that subsequent CREF- commands will not list them again. The output goes either to LPT immediately or to the disk to be spooled later to LPT. When the logical device nams LPT is assigned to a device other than the line printer, the CREF files are stored on tha* device with the same filename and the extension .LST. Command Format | CREF Characteristics The CREF command: Leaves the terminal in monitor mode.. Runs the CREF program, thereby destroying the user's core image. Depends on FTCCLX which is normally-absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. Example Compile the files contained in the command file PROMAC and produce CREF input compatible .COMPILE/CREF@PROMAC) - cross-reference listing files on the disk. ‘ .CREF) - « LOAD/C/MAP :NANE@CUNALL - ASSIGN MIAL LPT)) «CiEF) - Version 46 CREF Process and list the cross-reference listing files , prtoduced by the COMPILE command. ) Compile and load the files contained in the command file CONALL. Produce a loader map with the filename NAME and CREF input compatible cross~reference listing files on the Assign the logical name LPT to MTAL. Store the CREF files on MTAL to be listed at a later time. 2-37 COMMANDS - 500 - CSTART command CCONTINUE command Function The CSTART and CCONTINUE commands are identical to the START and CONTINUE com~ mands, respectively, except that the terminalis leftin fhe monitor mode. Command Format CSTART adr CCONTINUE adr = the address at which execution is to begin if other than the location specified within the file (. JBSA). If adris not specified, the starting address comes from . JBSA. An explicit starting address of 0 may be specified for adr. To use: 1. 2. Begin the programwith the terminal in user mode. Type control information to the program, then type 1C to halt the job with the terminalin monitor mode. 3. Type CCONTINUE to allow job to continue runnlng and leave the terminal in monitor mode. 4. Additional monitor commands can now be entered from the terminal . Characteristics The CSTART and CCONTINUE commands: Leave the terminal in monitor mode. Require core. Depend on FTATTACH which is normally absent in the DECsystem-1040. Restrictions These commands should not be used when the user program (which is continuing to run) is also requesting input from the terminal. These commands are not available to Batch users. Associated Messages Refer to Chapter 4. 2-38 COMMANDS - 501 - CSTART command CCONTINUE command {Cont) Excmple 2TYPE 18 20 FORMAT D0 The user types his source program. LOOP.F4) ACCEPT 20 17,1 (1) J=1,1 CONTINUE END -EXECUTE The user compiles, loads, and executes the program. LOOP) FORTRAN:LOOP,F4 LOADING LO0P 2K CORE EXECUTION 1000000 The user indicates that the program should loop tC The user stops the program. 1000000 times. +C The user continues the program but keeps the term- .CCONT) inal in monitor mode. The user times the program. LTIME) 2.95 KILO=CORE=SEC®133 The program is still running. JTIME) 1,45 %L 07 KILO=CORE=SEC®157 3 SYSTAT PLEASE YYPE aC SYSTAT would cause the program to terminate. ‘ FIRST « TIME) 7,00 The program appears to have finished because the runtime has stopped incrementing. The program will KYILO=CORE=SFC=157 =tC not output until the CONT command is given. LCONT) Continue the program so it can complete its typing. E%TU7 CPU NO EXIT TIME:5,55 EXECUTION Return to the monitor. ELAPSED ERRORS TIME:3135.73 DETECTED . ‘ 2-39 COMMANDS - 502 - D (deposit) command Function The D command deposits information in the user's core area (high or low segment). When debugging a sharable program with the D command, the SAVE command should be used rather than the SSAVE command (refer fo Appendix D). : Command Format . b 0 D Ih rh adr Ih = the octal value to be deposited in the left half of the location. This argument is required. rh = the octal value to be deposited in the right half of the location. This argument is required. adr = the address of the location into which the information is to be deposited. This argument is optional . If adr is omitted, the data is deposited in the location following the last D adr or in the location of the last E adr (whichever was last). Characteristics The D command: Leaves the terminal in monitor mode. Requires core. Associated Messages Refer to Chapter 4. 2-40 - 503 - COMMANDS [Qi:ommand (Cont)] Example Deposit in location 141, D 266000 2616 141 F Examine location 140. 140 GOB140/ Q47000 BOAROB D 47000 of the last E command. of 000140/ 047009 009001 Since adr is omitted, the deposit is in the location 1 . ‘ The examine is of the location of the previous D command. 2-41 - 504 - COMMANDS DAYTIME command Function The DAY TIME command types the date followed by the time of day. typed in the following format: dd=mmm=-yy hh:mm:ss where - dd = day mmm = month Yy Tyear hh = hours mm = minutes ss = seconds fo nearest hundredth. Command Format DAY TIME, Characteristics The DAY TIME command Leaves the terminal in monitor mode. Does not require LOGIN., Does not destroy the user's core area. Example sDAY) 11-SEP-70 .DA) {5-DEC-71 22:36:34 :47:02 2-42 The date and time are - 505 - COMMANDS DCORE command Function The DCORE command causes the DAEMON program fo write a core=image file of the user's core area that includes all accumulators and all relevant job tables. The jog can continue to run; i.e., the DCORE command does not destroy the user's core area. The file produced may be later processed by the DUMP program, if the user so desires. The DAEMON-written file consists of four categories: JOB, CONFIGURATION, DDB, and CORE. Each category has a two=word header, the first word contains the category number and the second word contains the number of data words in the category. The categories are as follows: CONFIGURATION ' CORE Job related information. 1 JOB DDB Description, Category Number Mnemonic : 2 ‘ ' 3 , The Configuration Table (.GTCNF) from the GETTAB UUO. The device data blocks (DDB) assigned to this job. The user's core area, both low and high 4 segments, in zero-compressed format to Appendix D). (refer The third word of each category begins the data for that category. DAEMON treats each category as a file and the addresses within the category start at zero. The user cannot examine the category header nor can he read past the end of one category into the next category . Version 6 DAEMON 2-43 COMMANDS - 506 - DCORE command (Cont)| Function (cont) 34 words -—ey The DAEMON-=-written file appears as follows: category number 1 } 2 25 words 25 I } 3 N b .o, words of DDB2 Jv 4 "m t category humber 2 number of octal words that follow .GTCNF table category number 3 N=n]+n2+. . .+nm n, words of DDB] i) N werds job related information number of octal words that follow - n m words of DDB N mJ L4 I number of octal words that follow Device Data Blocks category number 4 number of octal words that follow N words user's core in zero-compressed format Category 1 presently contains the following information, but may expand as more GETTAB enfries appear. Word 1 Version of DAEMON that wrote the file. DATE the file was written in standard system format. TIME in milliseconds that the file was written. JOB NUMBER in left half, HIGH SEG number (or 0) in right half. (continued on next page) Version 6 DAEMON 2-44 COMMANDS - 507 - [DCORE command (Cont] Function (cont) Word 5 ~ LH is reserved, TTY LINE NUMBER in right half. .GTSTS (job status word) for job. GTSTS for high segment, .GTPPN (project=programmer number) for job. .GTPPN for high segment. .GTPRG (user program name) for job. _ .GTPRG for high segment. .GTTIM (total time used) for job. +GTKCT (kilo-core-ticks) for job. .GTPRV (privilege bits) for job. .GTSWP (swapping parameters) for job. .GTSWP for high segment. Word 20 ' .GTRCT (disk blocks read) for job. .GTWCT (disk blocks written) for job. .GTTDB (time of day of last disk allocation, number of disk blocks allocated) for job. .GTDEV (device or file structure name) for high segment. .GTNMT (first half of user's name) for job. .GTNM2 (last half of user's name) for job. .GTCNO (charge number) for job. .GTTMP (TMPCOR pointers) for job. .GTWCH (WATCH bits) for job. .GTSPL (spooling control bits) for job. .GTRTD (real-time status word) for job. .GTLIM (time limit in jiffies) for job. Word 34 Category 2 presently contains the following information, but may expand if more .GTCNF entries are added. ’ Name of system in ASCIZ. %CNFGO %CNFG4 %CNDTO %CNDT1 %CNTAP %CNTIM %CNDAT %CNSIZ % CNOPR ' ' Date of system in ASCIZ. Name of system device in SIXBIT. Time of day in jiffies. - Today's date. Highest location in monitor +1. Name of OPR TTY console. (continued on next page) Version 6 DAEMON , 2-45 COMMANDS - 508 - | DCORE command (Cont)| Function (cont) %CNDEV LH = beginning of DDB chain. %CNSGT LH = -# of high segments, RH = +¥ of jobs. %CNTWR Non zero if system has two register hardware and software. LH = feature switches, RH = current state of switches. %CNSTS %CNSER %CNNSM %CNPTY %CNFRE %CNLOC %CNSTB Serial number of processor. # of nanoseconds per memory cycle. PTY parameters for Batch. AOBJN word to use bit map in monitor. LH = 0, RH = address of free 4-word core block area. Link to STB chain for remote Batch. Category 3 contains the device data blocks currently in use for this job. preceded by a word containing the length of the DDB, Each DDB is Category 4 is a compressed core image of both the high and low segments, i.e., it contains only nonzero words. Command Format & DCORE dev:name.ext [proj,prog] dev: = a disk~like device on which the core~image file is to be written. If omitted, DSK s assumed. ' name.ext = the name of the file to be written. The default filename is nnnDAE, where nnn is the job number in decimal, and the default extension is .TMP. filename is specified, the default extension is .DAE. [proj,prog] = the disk area other than that of the user. (the number under which he is logged in) is assumed. If omitted, the user's disk area Characteristics The DCORE command: Leaves the terminal in monitor mode. Runs the DAEMON program. Can continue after command . Depends on FTDAEM which is normally absent in the DECsystem=-1040. Version 6 DAEMON 2-46 If q - 509 - COMMANDS UDCOR E command (Cont)l Associated Messages Refer to Chapter 4, Exafnples .DCORE,) . - \ ' The core image file is written on the user's area of the disk with the name nnnDAE.TMP where nnn is the user's job number, «DCORE DSKB:FILEC) The core image file is written in the user's area on DSKB with name FILEC.DAE. Version 6 DAEMON 2-47 COMMANDS - 510 - DDT command Function The DDT command copies the saved program counter value from .JBPC into .JBOPC and starts the program at an alternate entry point specified in .JBDDT (beginning address of DDT as set by Linking Loader). DDT contains commands to allow the user to start or resume at any desired address. Refer to DECsystem=10 Mcnitor Calls for a description of the job data area locations. If the job was executing a UUO when interrupted (i.e., it was in exec mode and not in TTY input wait or SLEEP mode), the monitor sets a status bit (UTRP) and continues the job at the location at which it was interrupted. When the UUO processing is completed, the monitor clears the status bit, sets .JBOPC to the address following the UUO, and then traps fo the DDT address found in .JBDDT. If the job is in exec mode and in TTY input wait or SLEEP mode, the trap to the DDT address occurs immediafely and .JBOPC contains the address of the UUO. If the job is in user mode, the trap also occurs immediately . Therefore, it is always possible fo continue the interrupted program after trapping to DDT by executing a JRSTF @ .JBOPC. For additional information on the DDT program, refer to the DDT Programmer's Reference Man- val in the DECsystem-10 Software Notebooks. Command Format DDT Characteristics The DDT command: Places the terminal in user mode. Requires core, Requires the user to have a job number. Associated Messages Refer to Chapter 4. 2-48 - 511 - | COMMANDS fi)DT command (Cont)l Examples «TYPE LOOP_MAC) Type an undebugged program. ' JRST LOOP END LOOP LOOP: .DERUG ‘LOOP , Assemble and load the program with DDT. MACRO:,MAIN LOADING LOOP 3K .CORE DOT _EXECUTION LA LSAVE) Save the program. Jog sivep _START Start the program. 1C W.0DT) S LOOP/JRST LOOP CALLI12 JRSTEF @+ JBOPCEX Enter DDT, Fix the program. EXIT 2-49 COMMANDS -512 - I DEASSIGN command Function The DEASSIGN command returns one or more devices currently ASSIGNed to the user's job back to the monitor pool of available devices and clears any logical names. Restricted devices are returned to the restricted pool, and unrestricted devices to the unrestricted pool. Note that an INITed device is not retumed to the monitor pool unless a RELEASE UUO is done, only the logical name is cleared. Therefore, this command is provided for programs that are not termimating or programs that are being debugged. The command, applied to DECtapes, clears the copy of the directly currently in core, forcing the next directory reference to read a new copy from the tape. (Refer to DECsystem~10 Monitor Colls for further details.) Command Format DEASSIGN dev dey = either the logical or physical device name. This argument is optional . If it is not specified, all devices assigned fo the user's job, except the job's controlling terminal, are deassigned, and the logical name of the controlling terminal is cleared. Characteristics The DEASSIGN command: Leaves the terminal in monitor mode. Associated Messages Refer to Chapter 4. Examples _DEASSIGN LPT:) The line printer is returned to themonitor's pool L of available resources. ' _.DEASSIGN ) All devices assigned to the job are returned. 2-50 - 513 - COMMANDS - DEBUG command 1 Function The DEBUG command translates the specified source files if necessary (function of the COMPILE command), loads the REL files generated (function of the LOAD command), and prepares for debugging. DDT (the Dynamic Debugging Technique program) is loaded first, followed by the user's program with local symbols. Upon completion of loading, control is transferred to the DDT program. This program is used to check programs section by section by allowing the user to examine and. modify the contents of any location either before execution or during breakpoints. Refer to the DDT documentatioh for a description of the DDT commands. Each time a COMPILE, LOAD, EXECUTE, or DEBUG command is executed, the command with its arguments is remembered in a temporary file on disk, or in core if the monitor has the TMPCOR feature. Therefore, the last filename used can be recalled for the next command without specifying the arguments again (refer to Paragraph 1.5). The DEBUG command accepts several command constructions: the @ construction (indirect commands), the + construction, the = construction, and the <> construction. Refer to Paragraph 1.5 for a complete description of each of these constructions. Command Format DEBUG list list = a single file specification, or a string of file specifications separated by commas. A file specification consists of a device name, a filename with or without an extension, and a directory name. The following switches can be used to modify the command string. These switches can be temporary or permanent (refer to Paragraph 1.5.5). /ALGOL ~Compile the file with ALGOL. Assumed for files with the extension of JALG. /BLISS2 Compile the file with BLISS. Assumed for files with the exten- sion of ,BLI. /COBOL Compile the file with COBOL. Assumed for files with the extension of .CBL, (continued on next page) ]This command runs the COMPIL program, which interprets the command before running the appropriate processor, the LOADER, and DDT. 2B'LISS will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. Version 20 COMPIL : 2-51. - 514 COMMANDS DEBUG command (Cont)J Command Format (cont) /COMPILE Force a compilation on this file even though a binary file exists with a newer date and time than the source file. This switch is used fo obtain an extra compilation (e.g., in order to obtain a listing of the compilation) since normally compilation is not performed if the binary file is newer than the source file. /CREF Produce a cross-reference listing file on the disk for each file compiled for later processing by the CREF program. These files have the filename of the source file and the extension of .CRF. The file can then be listed with the CREF command. However, with COBOL files, the cross-reference listing is always appended to the listing file. No additional command need be given to obtain the listing. /FORTRAN Compile the file with FORTRAN. Assumed for files with the extension of .F4 and all files with non-=recognizable processor extensions (if FORTRAN is the standard processor). /FUDGE Create a disk file containing the names of the .REL files produced by the command string. When the FUDGE command is given, PIP reads this file in order to generate a library REL file. Arguments fo this switch are: /FUDGE:dev:file.ext [proj ,prog] dev: = the device on which to write the file. DSK: is assumed. file.ext = the name of the library file. The filename is re~ quired. If the extension is omitted, it is assumed to be .REL. [proj ,prog] = the directory in which to place the file. The user's directory is assumed if none is given. This switch is permanent in the sense that it pertains to all REL files generated by the command string. /LIBRARY Load the files in library search mode. This mode causes a pro- gram file in a special library file to be loaded only if one or more of its declared entry symbols satisfies an undefined global request in the source file. The system libraries are always searched. Refer to the LOADER documentation. {continued on next page) Version 20 COMPIL 2-52 - 515 - B COMMANDS [DEBUG command (Cont)| Command Format (cont) /LIST Generate a disk listing file, for each file compiled, with the filename of the source file and the extension.LST. These files can be listed later with the LIST command. Unless this switch is specified, listing files are not generated except in COBOL; COBOL listings are always generated. /LMAP /MACRO /MAP Produce o loader map during the loading process (same action as /MAP) containing the local symbols. Assemble the file with MACRO. Assumed for files with exten= sions of .MAC. ‘ ' Produce a loader map during the loading process. When this switch is encountered, a loader map is requested from the loader. After the library search of the system libraries, the map is written in the user's disk area with either the filename ) the default filename specified by the user (e.g., /MAP:fileor MAP.MAP, This switch is an exception to the permanent switch rule in that it causes only one map to be produced even though it may appear as a permanent switch. /MACX11" Assemble the file with MACX11. Assumed for files with the /NOCOMPILE Complement the /COMPILE switch by not forcing a compilation on a source file whose date is not as recent as the date on the binary file. Note that this switch is not the same as the-/REL switch, which turns off all compilation, even if the source file is newer than the REL file, /NOCOMPILE is the default extension .P11. action. - /NOLIST Do not generate listing files. This is the default action except for COBOL files; COBOL listings are always generated. /NOSEARCH Loads all routines of the file whether the routines are referenced or not. Since this is the default action, this switch is used only to turn off library search mode (/LIBRARY). This switch is not equivalent to the /P switch of the LOADER, which does not search any libraries. The /NOSEARCH default is fo search the system libraries. (continued on next page) MACX11 (the PDP-11 assembler for the PDP-10) will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. Version 20 COMPIL 2-53 COMMANDS - 516 - [DEBUG command (ContTl Command Format (cont) /REL Use the existing REL files although newer source files may be present. /SNOBOL] Compile the file with SNOBOL. Assumed for files with exten=~ sions of .SNO, Characteristics The DEBUG command: Places the terminal in user mode. Runs the appropriate processor, the LOADER, and DDT. Associated Messages - Refer to Chapter 4. ¥ Examples 2DEBUG/L FILEA,FILEB,FILEC/N,FILED ) Generate listings for FILEA, FILEB, and FILED =DEBUG TEST ) MACRO: TEST LOADER 2K TOADING “ DDT o/ CORE EXECUJTION BLT 15,8C16) - ]SNOBC)L will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. Version 20 COMPIL 2-54 - COMMANDS - 517 DELETE command 1 Function The DELETE command deletes one or more files from disk or DECtape. Command Format = DELETE list list = a single file specification or a string of file specifications separated by commas. The full wildcard construction (* and ?) can be used. If a device or file structure name is specified, it remains in effect until changed or until the end of command string is reached. Characteristics The DELETE command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=1040. Associated Messages Refer to Chapter 4, Examples sDEL *.MAC ) FILES DELETED: T1.MAC T2 « MAC T3 «MAC 14 BLOCKS FREED SDEL TEST!.MAC FILES DELETED: TEST1 «MAC 3 BLOCKS FREED . — This command runs the COMPIL program, which interprets the command before running PIP. Version 20 COMPIL Version 32 PIP 2-55 COMMANDS - 518 - |DELETE command (Cont)| Examples {cont) .DEL TEST?%,F4) FILES DELETED; [EST,Fd TESTS,Fd4 . F4 TESTOI TESTZ,F4 ¥ BLOCKS Version 20 COMPIL Version 32 PIP FREED 2-56 -519 - COMMANDS . DETACH command Function The DETACH command disconnects the terminal from the user's job without affecting the status The user terminal is now free to control another job, either by initiating a new of the job. job or attaching fo a currefitly running detached job. Command Format DETACH Characteristics The DETACH command: Detaches the terminal. Depends on FTATTACH which is normally absent in the DECsystem~1040. Restrictions This command is not available to Batch users. Associated Messages Refer to Chapter 4. Example <DETACH FROM JOB | 1 2-57 . COMMANDS - 520 - | DIRECT command Function The DIRECT command lists the directory entries specified by the argument list. output consists of the following columns: The standard filename, filename extension, length in blocks written, protection, creation date, version number, structure name, and directory name. Command Format DIRECT output specification = list of input specifications list = A single file specification, or a string of files specifications separated by commas or plus signs. The devices used on irput can be DSK:, DTA:, MTA:, and TMP: (TMPCOR). the device is o magnetic tape, the tape is rewound before and after the listing operation and analyzed to determine if it is a FAILSAFE or BACKUP tape. The default input specification is DSK:*.*, and the user's directories in all file structures defined by the job's search list are listed. Generally, a device name:;, an extension, or a directory name that precedes the file~ name becomes the default for all succeeding fules in the list. The full wildcard construction can be used. output specification = This argument (and the equal sign) is optional. specification is omitted, the default is TTY:. vice is DSK:. If the entire output If an output filename is given, the default de- If an output filename is not given, and one is needed, the filename is generated from the time of day as hhmmss. The default output extension is .DIR. The wildecard con- struction cannot be used in the output specification. The following switches may be used in the command string. name become the default for all succeeding files. Switches that precede the file= Switches can be abbreviated as long as the abbreviation is unique. /ACCESS:n Update the access date to the current date for any file of n blocks or less accessed by the DIRECT program. n is the written length unless the ALLOC switch is used and is a decimal number. If /ACCESS is omitted, the date is not changed. If /ACCESS is specified but :n is omitted, n=5 is assumed. /ALLOC List the allocated length of the file instead of the written length. The allocated lengthis used by LOGOUTin checklng quotas. (Disk and magnetic tape only.) (continued on next page) Version 2 DIRECT 2-58 COMMANDS - 521 - IDIRECT command (Contll Command Format (cont) /CHECKSUM :n /DENSITY Compute and print an 18=bit checksum for each file. This checksum is computed by rotating the result leff one bit before adding each word. (Disk and magnetic tape only.) Use the specified density when reading a magnetic tape. N is 200, 556, or 800 bpi. The default is installation dependent and is modified by the SET DENSITY command. /DETAIL ' Print all nonzero words in the LOOKUP block. The protection and data mode are also listed, even if they are zero. The author is not listed if it is the same as the owner of the directory. (Disk and magnetic tape only.) /FAST List short form of directory (i.e., filename, extension, structure to /F. name, and directory name). Equivalent /HELP Help text which indicates some of the switches available and how to use them. Equivalent to /H. /HELP:S List all switches (S) without their explanations. An asterisk pre= /LIST List the output on device LPT:. Equivalent to /L. /MARKS Indicate each tape mark and UFD when reading a magnetic tape. /OKNONE Suppress the error message if no files match the wildcard construc= /PARITY :ODD /PARITY :EVEN default is ODD. /PHY SICAL Ignore logical names used for device names. /PROTECTION:nnn Give the output file the protection nnn (octal). /RUN:file spec ‘Run the specified program when this command is finished. /RUNOFFSET:n Run the program specified with /RUN with an offset of n. If the switch is omitted, the default is O; if the switch is given without a fixes those switches which have a single=letter abbreviation. # tion, ' Specify the parity to be used when reading a magnetic tape. The ' value, the default is 1. /SLOW Output a full listing that includes the filename, extension, length in blocks written, protection, creation time, access date, structure name, and directory name. Equivalent to /S. (Disk and magnetic tape only.) (continued on next page) Version 2 DIRECT 2-59 COMMANDS - 522 - DIRECT command (Ccmt)] Command Format (cont) /SORT List the file structure name and directory name on each line instead of only on the first line in which they change. Multiple spaces are oufput instead of TABs. This switch is used to prepare a file to be sorted by the SORT program. /SUMMARY Output only the summary line which indicates the total number of blocks and files. Note a /F /SUMMARY lists a /F listing followed by the summary. /'TITLES Cause a heading to be output on each page consisting of a label for each column, date, time, and page number. Standard output to the line printer has this heading. /UNITS List the name of the actual disk unit instead of the file structure name. /WIDTH:n Output several entries on a single line to make the output n col- umns wide. For example, if /F is specified for output to the scope, four filenames appear per line. /WORDS The default for n is 64 columns. Output the length of the file in words instead of blocks. Characteristics The DIRECT command: Leaves the terminal in monitor mode. Runs the DIRECT program , thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=1040. Examples DIK DTA3:) _-._D IK ¥ MA(:) Lists all files on DTA3. Lists all files with MAC filename extension in all file structures in the job search list. DIk TFST.F4(27,601) Lists the directory entry for file TEST.F4 in user area 27, 60. (continued on next page) Version 2 DIRECT 2-60 COMMANDS - 523 - DIRECT command (Cont)] Examples (cont) .DIRECT) 4mMAYeT71 DSKC3 <A55> 05«FEB=72 34(70) 3 FILES ON <{155>» <p53> <A5%5>» <p55> 28a«FEBe72 28=FEB=7?2 25«FEBa72 SAMPL PIP G16DAE WEIRD CTL DAE TMP 1 2 22 4 <155>» <p55» <A55> <P55» WEIRD SAV 21 TOTAL OF 48 BLOCKS IN 25«FERw7? 25=FEB=72 25«FEB=72 DSKCP , t27,235) [27,235) szRECT/ALLOC 3 2 24 6 23 cTL DAE TMP SAMPL PIP G16DAE WEIRD WEIRD SAV TOTAL OF 58 BLOCKS IN 4eMAYe71 DSKCs <N55> 25«FEB=7??2 34(72) 5 ON FILES DSKC: t27,235) [27,235) <DIRECT/DETAIL) DSKC@ISAMPL,CTL[27,235] S=JANe?72 ACCESS DATE: CREATION TIME, DATE: MODE: WORDS - 14 WRITTENS 16:54 4wMAY=T7{ 155 ACCESS PROTECTION?: 54, ESTIMATED LENGTH: 5, BLOCKS ALLOCATED: 3, DATA BLOCK IN DIRECTORY: 303. DSKCosPIP,DAE(27,235) ACCESS DATE: 25«FEB=72 CREATION TIME, DATEs MODEs 17 " BLOCKS ALLOCATED: AUTHOR: 1,2 DATA BLOCK 13847 25-FEB=72 @55 ACCESS PROTECTION: . 2, IN DIRECTORY: 303. (continued on next page) Version 2- DIRECT 2-61 - 524 COMMANDS fi)IRECT command (Comt)] Examples (cont) DSKCO:G16PAE,.TMP [27,2385] ACCESS DATE! 235«FEB=72 CREATION TIME, DATE: 14:10 ACCESS PROTECTION: @55 25«FEB=72 MODE: 17 WORDS WRITTENS 2816, BLOCKS ALLOCATED: 24. AUTHOR:1,2 DATA BLOCK IN DIRECTORY: 323, DSKC@tWEIRD, [27,235) ACCESS DATE: 25«FEB=72 CREATION TIME, DATE: 14:38 ACCESS PROTECTION: @55 MODE: 1 WORDS WRITTEN: BLOCKS DATA 471. ALLOCATED: 6, BLOCK IN DIRECTORY: 303. DSKC@sWEIRD,SAV[27,235) ACCESS DATE: 25=FEB=72 CREATION TIME, DATE: 14209 ACCESS PROTECTION: @55 MODE: WORDS 25=FEB=7? 25«FEB=72 19 WRITTEN: 2566, VERSION:34(702) BI.OCKS ALLOCATED: 23. DATA BLOCK IN DIRECTORY: TOTAL OF 48 DIRECT [47, ] ) = Version 2 DIRECT BLOCKS IN 3P3. 5 FILES ON DSKC: [27,23%) Lists the directory entries for user with project number 40 and the user's programmer number. 2-62 COMMANDS - 525 - DISMOUN_T command Function The DISMOUNT command allows a user to return devices to the monitor pool of available resources and fo remove a file structure from his search list. Restricted devices are returned to the restricted poot and unrestricted devices to the unrestricted pool. The command applied to non-file structures 1s identical to the DEASSIGN command if the user waits for completion of the operator action. If the user does not wait for completion (e.g., he types a control-C after the message OPERATOR NOTIFIED), the device is not deassigned, but the request to the operator is still queued for the purpose of removing the media. The user must then issue the DEASSIGN command to release the device. This command applied to file structures enforces logged=out quotas (if necessary), allows physical removal of disk packs (if there are no other users of the pack), and removes the file structure name from the job's search list. The UMOUNT program runs privileged in the user's core area when the DISMOUNT command is typed. This program scans the user's command string, checks its validity, and performs as much of the requested action as possible. The UMOUNT program can complete all actions requested by the DISMOUNT command except for the action of physically removing packs, tapes, or cards. When operator action is required, the UMOUNT program writes a command file on 3,3 disk area and notifies the OMOUNT program (running on the operator's terminal) to perform the action. When the operator action has been completed, OMOUNT deletes the command file and notifies UMOUNT (if UMOUNT is waiting) to inform the user of completion. Command Format DISMOUNT dev: switches dev: = any previously ASSIGNed or MOUNTed device or file structure name. This argument is required. switches = the following switches are optional and only enough characters to make the switch unique are required. /CHECK ~ /HELP /PAUSE Check and list pending requests. Type this list. " | ~ Notify the user before requesting operator action. The user can " then abort the command if desired. (continued on next page) Version 20 UMOUNT 2-63 COMMANDS - 526 | DISMOUNT command (Cont)| Command Format (cont) /REMOVE Notify operator to physically remove disk packs, tape, or cards. A file structure is removed from the system only if no other users are using it. A request to remove the pack is queued to the operator and the message WAITING . . . is typed to the user. If the user does not want to wait for confirmation of the operator action, he may type control-C, This switch must be specified to notify the operator to remove the pack, even if no other jobs are using it. Characteristics The DISMOUNT command: Places the terminal in user mode. Runs the UMOUNT program, thereby destroying the user's core image. Depends on FTCALX and FTMOUN which are normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. Examples DSKA:). .DISMOUNT The user dismounts the file structure DSKA. This DSKA DISMOUMTED does not require an operator action. «DISMOUNT DTA4:/R) The user asks the operator to deassign DTA4 and remove the tape. OPERATOR NOTIFIED The command is waiting for completion of the operator action. The user does not wish to wait for confirmation of 1C removal. +DISMOUNT/CHECK ) NONE _PENDING @,COMMANDS Version 20 UMOUNT IN The user checks for completion and determines that his request is finished. QUEUE 2-64 COMMANDS - 527 - DSK command Function job, since the last DSK for the combined structures of the The DSK command types disk usage (logged in). Disk lized initia was job the since disk usage command, followed by the totalforma : t: usage is typed in the following RD, WT=1,J RD,WT=M,N and written since the last l number of 128-word blocks read where I and J are the incrementa written since block DSK command, and M and N are the total number of 128=word : s read and the job was initialized. NOTE I and J are kept modulo 4096. If automatic READ or WRITE print outs have been enabled using the SET WATCH command, I and J are usually zero, since the SET WATCH output also resets these values. - Command Format DSK job ent is job = the job number of the job for which the disk usage is desired. This argum optional. If job is omitted, the job to which theterminal is attached is assumed. l quantities If job is supplied (whether the job of this user or another user) the incrementa are nof reset to zero. Characteristics The DSK command: Leaves the terminal in monitor mode. Associated Messages Refer to Chapter 4. 265 COMMANDS _528_ | LDSK command (Cont)] Example DSKJ RD,WT=12,0 RD,WT=475,243 2-66 COMMANDS - 529 - DUMPcomnmndl Function The DUMP command calls the DAEMON program to write a core image file (function of the DCORE command) and then invokes the DUMP program to analyze the file written and to pro=vide printable output. The core image file is named nnnDAE.TMP where nnn is the user's job number. This file is described in detail in the DCORE command description. Command Formafs 1. 2. 3. DUMP /command /command /command ... DUMP @ dev:file.ext [proj,prog] DUMP The commands that appear in the DUMP command string are passed to the DUMP program and therefore are described in the DUMP program description. A DUMP command using a command file can also specify these commands. A DUMP command without any arguments prints a short dump of the user's core area via the command file QUIKDM. CCL which resides on device SYS:. Characteristics The DUMP command: Leaves the terminal in monitor mode. Runs the DAEMON program. Depends on FTDAEM which is normally absent in the DECsystem=-1040. Associated Messages Refer to Chapter 4. Examples LDUMP/OUT:TTY?:/MODE:ASCII,SIXBIT/WIDTH7,10/JUST:L,R=) 7RIGHTMA:26/D(3000 & 3004 This command string writes a core image file named nnnDAE.TMP and invokes the DUMP program to perform the output. The output goes to the terminal and the modes used on output are ASCII and SIXBIT. The ASCII field is 7 characters long, left justified and the SIXBIT field is 10 characters long, right justified. The right margin of the output in 26 characters. The dump consists of the contents of word 3000 fo word 3004. The hyphen is used to .continue the command string onto the next line. ‘Version 6 DAEMON Version 4 DUMP 2-67 COMMANDS - 530 - DUMP program Function The DUMP program provides printcble dumps of arbitrary data files in modes and forms specified by the user. The DUMP program accepts any data file as input and produces an ASCII file suitable for listing by PIP, the output spoolers, or other listing programs. For example, the DUMP program takes core image files prepared by the DAEMON program or SAVEd files pro- duced by the monitor. For a description of the DAEMON-=-written file, refer to the DCORE command., Command Formats 1. RDUMP) /command ) 2. RDUMP, /@ dev:file.ext [proj,prog] NOTE DUMP indicates its readiness by typing a slash (/) instead of an asterisk. The commands with their arguments are os follows. followed by a carriage rerurn, Commafnfil Lines can be continued by. typing o hyphen Argument ADDRESS ON or OFF Meaning Specifies if the address is to be dumped along with its contents. ALL APPEND The default is ON, Dumps the entire file. If the file is a DAEMON core image file, the entire category is dumped. ' Appends the output to the output file. output file is not overwritten. The existing This command is the default; its complement is SUPERSEDE. AUTOFORMAT ON or OFF Attempts to format output with line feeds, form feeds, and titles, if ON. If OFF, the user is responsible for all formatting. CATEGORY The default is ON. mnemonic for name of Selects the category of the DAEMON dump file to category. be used. Can be JOB, Addressing begins with 0 at the beginning CONFIGURATION, of each category. DDB, or CORE. If the input file is not a DAEMON file, this switch The default category is CORE. has no effect.: (continued on next page) Version 4 DUMP 2-68 - 531 - COMMANDS DUMP program (Cont) Command Formats (cont) Argument Command- Closes the output file. After this command is given, another OUT command should be given before the next command which does any output. CLOSE DUMP Meaning dump descriptor, . Dumps the specified bytes in the current modes. dump descriptor, ... EJECT. Starts a new page in the output file. EXIT Closes all files and returns control to the monitor (1Z has the same effect). INPUT <file descriptor> Specifies the input file. The defaults are: DSK:nnnDAE.TMP where nnn is the job number; the user's directory. If the filename is specified, it determines the extension from the set .TMP, .DAE, .SHR, .SAV, .HGH, .LOW, .XPN, and .DMP in that order. If an extension is specified with no filename, the extension determines the filename. IRADIX decimal number Specifies radix for numbers for input. This command uses decimal to compute the argument. The default is 10 for decimal. The argument must be numeric. If numeral is O or is missing, the input radix is set back to its default value. JUSTIFY LEFT, CENTER, or RIGHT Specifies the justification of the output in the output field. If the output overflows the output field, the entire output appears; it is not truncated. This switch is used in a one~to-one relationship with the MODE and WIDTH commands. If there are more MODE commonds, an argument of LEFT is used. If there are more JUSTIFY commands, they are ignored. "LEFTMARGIN expression ' Py - Sets the left margin of the output file. The default is 0. LINEPAGE expression Specifies the number of lines per output page. The default is 50, (continued on next page) Version 4 DUMP . 2-69 COMMANDS - 532 - DUMP program (Cont)l Command Formats (cont) Command Argument MODES ' B Meaning ASCII, DECIMAL, NULL, Selects the type of output. NUMERIC, OCTAL, as a single right justified character if bits 0~28 are ASCII dumps the word RADIX50, SIXBIT, zero or as 5 ASCII characters if bits 0-28 are non- SOCTAL, or SYMBOLIC. zero. Non printing characters print as a space. DECIMAL dumps as a signed decimal number. declares that nothing is to be dumped. NULL NUMERIC dumps as a signed number in the current output radix. OCTAL dumps as half=words separated by a comma (default) and takes 13 positions. RADIX50 dumps in RADIX50. SIXBIT dumps as one SIXBIT character if bits 0-24 are zero, or 6 SIXBIT characters if bits 0-24 are nonzero. SOCTAL dumps as signed octal and suppresses leading zeroes. SYMBOLIC dumps as a symbolic instruction. Any mode specification can appear more than once in the command string. The output is in the same order as the MODE list. : NUMPAGE expression Specifies that pages are to be numbered. sion is 0, page numbering is furned off. If expresIf expres- sion is not 0, page numbering begins at page = <expression>. If command is omitted, numbering - starfs at the first page. ORADIX decimal number Specifies redix for numbers for output. is 10 for decimal. The default If number is 0, the stanclard is used. The argument to this command is decimal and must not be an expression. OUTPUT <file descriptor> Specifies the output file. The defaults are: LPT:, the filename of the input file; the extension .LSD; the user's directory. RIGHTMARGIN - expression Sets the right margin of the output file. A field may overflow the right margin if it will not fit between the left and right margins. 1f ADDRESS is ON, the new line will have an address typed. If a page overflow occurs, a title line may also be printed. SUPERSEDE Specifies that the output is to supersede an existing file of the same name, if there is one. The comple- ment of this command is APPEND, which is the default. (continued on next page) Version 4 DUMP 2=-70 COMMANDS - 533 - |—D—UMP program (Cont) Command Formats {coni') Command SYFILE TDUMP TITLE TYPE] TYPE : TYPE TYPE TYPE TYPE TYPE WIDTH Argument <file descriptor> dump descriptor, <string of characters> dump descripfor, ... ' DAE DAT HGH LOW SAV SHR XPN expression Meaning if XTRACT from DSK: symbols are: to takeDefau the file fied. Specifies , the lts and is speci comm filename of the input file; one of the saved file extensions; the user's directory area. Dumps specified bytes to both output file and TTY. nt the subsequetitli inc|uded inis speci a title to nobe argu Specifies ings ng fied, ment . If . page head is turned off. , . After this command, an EJECT command should be given to skip fo a new page. Specifies that the input file is separated by DAEMON. , no file is a data file (i.e. Specifies that the input is ssing proce al speci special format; therefore, no ‘ done). Specifies that the input file is in .HGH file format. - Specifies that the input file is in .LOW file format. Specifies that the input file is in .SAV file format. Specifies that the input file is in .SHR file format.at. Specifies that the input file is in .XPN file form (see the Selects the width of each output modea MOD E comMODE and JUSTIFY commands). If WIDTH, mand is specified without a correspondinerg of posithe byte is dumped in exactly the numb WIDT H a If s. blank 3 tions required followed by t. command is specified, no free blanks are outpu TH speci- WID If o MODE specification overflowsn its out justifi= with give is t fication, the entire outpu list will be null a ted, omit is ssion cation. If expre - XTRACT generated & SY FILE comm. and fied in the lastsymb Uses the file speci ol table the e and extracts as a core imag fo determine theDAEtypeis ofassufilemed.being t file is usedcomm nsion of the inpu specified, theis exte 11f TYPE is not TYPE produced. If the extension not one recognized in the TYPE and, Version 4 DUMP 2-71 COMMANDS - 534 - [BUMP progfam (Cont)] Command Formats (cont) An expression is an octa l or decimal number, a (+t,=,*,/,and 1 grouped with parentheses) is a string of SIXBIT char acters, or program symb taining symbol., A text string is a string of indicates that the next ns using expressions ol, where program defi sented by-paiterns of grap special pattern. symbol, arithmetic operatio , or contents operators ([, nes the program con= characters enclosed in sing hic characters. le quotes. Special characters are repr e- To override these special character is to be acce The following patterns \, and @). A symbol patterns, a double quot pted as is, without incl represent non-grap uding it as part of a e hic characters and are output strings by the replaced in characters represen ted unless g double quote appears. <EL> - end line, <CR-LF> <VT> = vertical tak <FF> ~ form feed - altmode <AL> <HT> t<letter> \ <letter> - horizontal tab = control character = lower case character A byte descriptor is the desc ription of the Eyfe in the input file to be dumped. The format is: WORDS <POS, SIZE> where WORDS = the address of the word desired . POS = the position of the byte within the word, most bit in the byte, SIZE = the number of bits boundaries, A dump descriptor has the <FROM It may be any size and can form byte-descriptor> & <TO signifying everything from Version 4 DUMP in the byte. It specifies the bit numb byte descriptor> the first byte descriptor 2-72 to the second. er of the left- cross word or block - 535 - COMMANDS IPUMP program (Cont)l Characteristics The R DUMP command: Places the terminal in user mode. Is used with disk monitors only. Runs the DUMP program. Associated Messages Refer to Chapter 4. Version 4 DUMP | 2-73 COMMANDS - 536 - I E (examine) command Function The E command examines a core location in the user's area (high or low segment). Command Format E adr adr is required the first time the E or D command is used. If adr is specified, the. con~tents of the location are typed out in half-word octal mode. If adr is not specified, the contents of the location following the previously specified E adr or the location of the previous D adr (whichever was last) are typed out. Characteristics The E command: Leaves the terminal in monitor mode. Requires core. Associated Messages Refer to Chapter 4. Example <E 140) 000140/ 00R141/ 264000 QVRODD 002616 0ORYOR .E +E PP142/ 000R00 C0R000 . 2-74 - 537 - COMMANDS EDIT .command 1! | Function The EDIT command runs LINED (Line Editor for disk) and opens an already existing line sequence-numbered file on disk for editing. Software Notebooks., Refer to the LINED writeup in the DECsystem=10 Command Format EDIT file.ext file.ext = a filename and filename extension of an existing file. This argument is op~ tional if a CREATE or EDIT command has been given since the initialization of the job, . because the arguments of the EDIT-class commands are remembered in temporary files on the disk or in core if the monitor has the TMPCOR feature. Characteristics The EDIT command: Places the terminal in user mode. . Runs the LINED program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=1040, Associated Messages Refer to Chapter 4. Example +EDIT TEST.F4,) * . ]This command runs the COMPIL program, which interprets the command before running LINED., Version 20 COMPIL Version 13 LINED . 2-75 COMMANDS ' - 538 - EOF command 1 Function The EOF command writes an end of file mark on the specified magnetic tape. This command is equivalent fo the following PIP command string: MTAn: (MF) « Command Format EOF MTAn: Characteristics The EOF command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. Examples <EOF MTA3:) ]This command runs the COMPIL program, which interprets the command before running the PIP program. Version 20 COMPIL Version 32 PIP 2-76 - 539 - ' COMMANDS EXECUTE command 1 Function The EXECUTE command translates the specific source files if necessary (function of COMPILE command), loads the REL files generated into a core image (function of LOAD command), and begins execution of the program. The assembler or compiler used is determined from the source file extensions or from switches in the command string (refer to the COMPILE command). If a REL file already exists with & newer date than that of the source file, compilation is not performed (unless requested explicitly via a switch). This command is équivalénf to a LOAD and START sequence of commands. Each time a COMPILE, LOAD, EXECUTE, or DEBUG command is executed, the command with its arguments is remembered in a temporary file on disk, or in core if the monitor has the TMPCOR feature. Therefore, the last filename used can be recalled for the next command without specifying the arguments again (refer to Paragraph 1.5). ’ The EXECUTE command accepts several command constructions: the @ construction (indirect commands), the + construction, the = construction, and the < > construction. Refer to Paragraph 1.5 for a complete description of each of these constructions. Command Format EXECUTE list list = a single file specification, or a string of file specifications separated by commas. A file specification consists of a device name, a filendme with or without an extension, and a directory name. ‘ ' The following switches can be used to modify the command string. be temporary or permanent switches (refer to Paragraph 1.5.5).. /ALGOL ) These switches can Compile the file with ALGOL. Assumed for files with the extension of LALG. /BLISS2 /COBOL Compile the file with BLISS. Assumed for files with the extension of .BLI. Compile the file with COBOL. Assumed for files with the extension of .CBL. (continued on next page) ]This command runs the COMPIL program, which interprets the command before running the appropriate processor and the LOADER. 2BLISS will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. Version 20 COMPIL ' 2-77 COMMANDS - 540 - [EXECUTE command (Cont) J Command Format (cont) /COMPLLE Force a compilation on this file even though a binary file exists with a newer date and time than the source file. This switch is used to obtain an extra compilation (e.g., in order to obtain a listing of the compilation) since normally compilation is not performed if the binary file is newer than the source file. /CREF Produce a cross-reference listing file on the disk for each file compiled for later processing by the CREF program. These files have the filename of the source file and the extension of . CRF. The files can then be listed with the CREF command. However, with COBOL files, the cross~referenced listing is appended to the listing file. No additional command need be given to obtain the listing. /FORTRAN Compile the file with FORTRAN. Assumed for files with the ex~ tension of .F4 and all files with nonrecognizable processor exten- sions (if FORTRAN is the standard processor). /FUDGE Create a disk file containing the names of the .REL files produced by the command string. When the FUDGE command is given, PIP reads this file in order to generate a library REL file. Arguments to this switch are: /FUDGE:devfile.ext[proj, prog] dev: - the device on which to write the file. DSK: is assumed. .file.exf - the name of the library file. The filename is required. If the extension is omitted, it is assumed to be .REL. [proj, progl - the directory in which to place the file. directory is assumed if none is given. The user's This switch is permanent in the sense that it pertains to all REL files generated by the command string. /LIBRARY Load the files in library search mode. This mode causes a program file in a special library file to be loaded only if one or more of its declared entry symbols satisfies an undefined global request in the source file. The system libraries are always searched. the LOADER documentation. /LIST Refer to Generate a disk listing file, for each file compiled, with the filename of the source file and the extension of .LST. These files can be listed later with the LIST command. Unless this switch is specified, listing files are not generated except in COBOL; COBOL listings are always generated. (continued on next page) Version 20 COMPIL 2-78 - 541 - COMMANDS [ EXECUTE command (Cont)l Command Format (cont) /LMAP Produce a loader map during the loading process (same action as /MAP) containing the local symbols., /MACRO . Assemble the file with MACRO., of .MAC. /MACXTT! Assumed for files with extensions Assemble the file with MACX11. Assumed for files with extensions of .P11. Produce loader maps during the loading process. When this switch is encountered, a loader map is requested from the loader. After /MAP the library search of the system libraries, the map is written in the user's disk area with either the filename specified by the user (e.g., /MAPile) or the default filename MAP.MAP. This switch is an exception to the permanent switch rule in that it causes only one map to be produced even though it appears as a permanent ' switch. Complement the /COMPILE switch by not forcing a compilation on /NOCOMPILE a source file whose date is not as recent as the date on the binary file. Note that this switch is not the same as the /REL switch, which turns off all compilation, even if the source file is newer thon the REL file. /NOCOMPILE is the default action. /NOLIST Do not generate listing files. This is the default action except for COBOL files; COBOL listings are always generated. /NOSEARCH Loads all routines of the file whether the routines are referenced or not. Since this is the default action, this switch is used only fo turn off library search mode (/LIBRARY). This is not equivalent to the /P LOADER switch, which does not search any libraries; the /NOSEARCH switch scans the system libraries. Use the existing REL files although newer source files may be /REL present. /SNOBOL2 Compile the file with SNOBOL. Assumed for files with an extension of .SNO, 1MACX] 1, the PDP-11 assembler for the PDP=10, will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. 2SNOBOL will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. Version 20 COMPIL * : 2-79 - 542 - COMMANDS - EXECUTE command (Cont) I Characteristics The EXECUTE command: A Places the terminal in user mode. Runs the appropriate processor and-the LOADER. Starts the execution of the compiled and loaded program. Associated Messoges Refer to Chapter 4. Examples <EXECUTE TEST) MACRO: TEST LOADING LOADER 2K CORE EXECUTION Version 20 COMPIL 2-80 - 543 - COMMANDS FILCOM program I Function The FILCOM program is used to compare two' versions of a file and to output any differences. Generally, this comparison is line by line for ASCII files or word by word for binary files. FILCOM determines the type of comparison to use by examining either the switches specified in the command string or the extensions of the files. Switches always take precedence over file extensions. ' Command Format SR FILCOM) Xoutput dev:file.ext [proj,prog] = input dev] :file.ext [proj,prog], input devzzfile.exi‘ [proj ,prog] output dev: = the device on which the differences are to be output. input dev: = the device on which an input file resides. Defaults 1. If the entire output specification is omitted (including the equal sign), the output device is assumed to be TTY, 2. If an output filename is specified, the default output device is DSK. 3. If the output filename is omitted, the second input filename is used, unless it is null. this case, the filename FILCOM is used. 4, If the output extension is omitted, .SCM is used on a source compare and .BCM is used on a binary compare. 5. If the [proj,prog] is omitted (input or output side), the user's default directory is assumed. 6. If an input device is omitted, it is assumed to be DSK. 7. In If the filename and/or extension of the second input file is omitted, it is taken from the first input file. 8. A dot following the filename of the second input is necessary to explicitly indicate a null extension, if the extension ofthe first input file is not null. Version 16 FILCOM 2-81 COMMANDS FILCOM program (Cont) | Command Format (cont) 9. The second input file specification cannot be null unless a binary compare is being per~ formed. In a binary compare, if the first input file is not followed by a comma and a second input file descriptor, the input file is compared to a zero file and is output in its entirety. This gives the user a method of listing a binary file. Refer to Example 4. Switches The following switches con appear in the command string, depending on whether a source com- pare or a binary source compare is being performed. Binary Compare /H Type list of switches available (help text). /nL Specify the lower limit for a partial binary compare (n is an octal number). This switch, when used with the /nU switch, allows a binary file to be compared only within the specified limits. /nU Specify the upper limit for a partial binary compare (n is an octal number). This switch, when used with the /nL switch, allows a binary file to be compared only within the specified limits. : Compare files in binary mode without expanding the files first (refer to Appendix D). extensions. /X This switch is used to compare two binary files with ASCII Expand SAV files before comparing them in binary mode. This action removes differences resulting from zero compression (refer to Appendix D). Source Compare /A Compare files in ASCII mode. This switch is used to force a source compare on two ASCII files with binary extensions. /B Compare blank lines. /C Ignore comments (all text on a line following a semicolon) and spacing (spaces and tabs). Without this switch, blank lines are ignored. This switch does not cause a line consisting entirely of ~a comment fo become a blank line, which is normally ignored. (continued on next page) Version 16 FILCOM 2-82 - 545 - | COMMANDS |FILCOM program (Cont)] Command Format (cont) Source Compare (cqni') /H Type list of switches available (help text). Specify the number of lines that determine a match (n'is an octal number). /nL A match means that n successive lines in each input file have been found identical. When a match is found, all differences occurring before the match and after the previous match are output. In addition, the first line of the current match is output after the differences to aid in locating the place within each file o which the differences occurred. The default value for n is 3. /S Ignore spaces and tabs. /U Compare in update mode. This means that the output file consists of the second input file with vertical bars next to the lines that differ from the first input file. This feature is useful when updating a document because the changes made to the latest edition are flagged with change bars in the left margin. The latest edition of the document is the second input file. If switches are not specified in the command string, the files are compared in the mode implied by the extension. The following extensions are recognized as binary and cause a binary compare if one or both of the input files have one of the extensions. .BAC .BIN .BUG .CAL .CHN .DAE .DCR .DMP . .HGH LOW .MSB .RMT <RTB .SAV .QUE .QUF .REL .RIM .SHR .SVE .SYS .UFD .OVR .SFD XPN Binary files are compared word by word starting of word 0 except for the following two cases: 1. Files with extensions .SHR and .HGH are assumed to be high segment files. Since the word count starts at 400000, upper and lower limits, if used, must be greater than (or equal to in the case of the lower limit) 400000. 2. Files with extensions .SAV, .LOW, and .SVE are assumed to be compressed core image files and are expanded before comparing. Version 16 FILCOM 2-83 COMMANDS - 546 - FILCOM program (Con?)] Command Format (cont) Conflicts are resolved by switches cr defaults. If a conflict arises in the absence of switches, the files are assumed to be ordinary binary files. Output In most cases, headers consisting of the device, filename, extension, and creation date of each input file are listed before the differences are output. However, headers do not appear on output from the /U switch (update mode on source compare). Source compare output ~ After the headers are listed, the following notation appears in the left column of the output n)m where n is the number of the input file, and m is the page number of the input file (see examples). The right column lists the differences occurring between matches in the input files. Following the list of differences, a line identical to each file is output for reference purposes. The output from the /U switch differs from the above-described output in that the output file created is the second input file with vertical bars in the left column next to the lines that are different from the first input file. Binary compare output =~ When a difference is encountered between the two input files, a line in the following format appears on the output device: octal loc. first file=word second file=word ‘ XOR of both words If the exclusive OR (XOR) of the two words differs only in the right half, the third word output is the absolute value of the difference of the two right halves. This usually indicates an ad- dress that changed . If one input file is shorter than the other, after the end of file is encountered on the shorter file, the remainder of the longer file is output. Version 16 FILCOM 2-84 . | - 547- COMMANDS [FiLcOM program (Cont) | Characteristics The R FILCOM command: Places the terminal in user mode. , Runs the FILCOM program, thereby destroying the user's core image. Associated Messages Refer to Chapter 4, Examples 1. The user has the following two ASCII files on disk: First File Second File N FILE A FILE B A A B B C C D G E H page 1 1 F G H A J : 1 2 1 J 3 K -y L M First File Second File ' N N 0 0 P P Q e R R S S page 2 T T. U u Vv Y 4 W 5 X W Y X Z Y z Y (continued on next page) Version 16 FILCOM : 2-85 COMMANDS - 548 - |FILCOM program (Cont)t Exameles (cont) To compare the two files and output the differences on the terminal, the following sequence is used: sR FILCOM)) Ruri the FILCOM program. *F ILEASFILEB)) Compare the two files on disk and output the difBy default, three consecutive identical lines determine a match. ' ferences on the terminal. head eaders line .identical . FILE 1) DSK:FILEA 151 FILE 1) A ok o ok 231 FILE B 2l A 1 D 1) E \ N files ook o ok ok 3 ok ok ok e ok ok ok % in both files 1)1 K L 1) M 231 2) 2 }/ 2)2 N 2) kb o ok 3 line 132 identical Ak in both files 212 0y Second difference G 1) l::i* . ) 1 ok Aok identical 17-JAN=-1972 1456 17-JAN-1972 ook ok ok o ok 3k ok ok ok ok oK oK oK identical fdentica line 1456 . First t difference in both ine CREATED: A~ files ,. CREATED: FILE 2) DSK:FILEKE N 1 > Third difference 3 ok ok ok ok oK oK ok W g }‘4 W - Fourth difference ok ok ko 3 oK ok ok ok ok o ok ok T_L This column indicates the page number of the file. ——— This column indicates either the first file or the second file. (continued on next page) Version 16 FILCOM 2-86 - : - 549 - COMMANDS FI LCOM program‘(Cont)J ExcmEIes (cont) To compare the two files and output the differences on the line printer, the following commands are used. Note that in this example the number of successive lines that determines a match has been set to 4 with the /4L switch. «R FILCOM) *LPT:/4L=FILEA,FILEB) FILE 1) DSK:FILEA FILE 2) DSK:FILER FILE 1)1 | ) 1 1) ‘ CREATED: CREATED: 1456 17-JAN-1972 1456 17-JAN-1972 A A B - 1) C D :: 1) ook 5k i_: G 2) A FILE B 21 B} 2) 2) These lines are listed as being different because the /AL switch specifies that 4 consecutive lines must be found identical in the two files before they ’ are considered as a match. C 2> G ok ok e o ok ok ok ok ok ok ok K 11 K 1) L 1) M 1)2 N sk ok ok 231 1 2) 2 2) 3 N 2)2 ok s o ook ok ok ok ok ok K 12 W ok ok ok 232 4 2) 5 2) W stk o ok ok s ok ok ok o K ok (continued on next page) Version 16 FILCOM : 2-87 COMMANDS - 550 - LFILCOM program (Cont)| Examples (cont) To compare the two files so that the second input file is output with vertic al bars in the left column next to the lines that differ from the first input file, use the follo wing command sequence. R FILCOM) XPT:/U=FILEA,FILER) N-<><£U1.E<C-I(D7GO"UOZQM"'LHICDOWJ> FILE 2. B The lines with vertical bars indic ate the differences between the two files. The lines with vertical bars indicate the differe nces between the two files. To compare two binary files on the disk and the following command sequence. *R output the differences on the terminal, use FILCOM) *TTY:+DSK:DIAL.REL,DIAL2)) Version 16 FILCOM FILE 1) FILE DSK:DIAL.REL 2) DSK:DIAL2.REL _ CREATED: 0000 CREATED: 23-DEC-1971 #0900 12-AUG-1971 2NAAAY QPRRR4A BONA2 BOVBRI NORARB 0O00B4 VOVO6P PABON3 NS54T16 000311 vARRD6 372712 MREEDI PVB311 nAvR4 2000080 17573 PPANRD 510354 17573 P17575 513216 510355 17573 513216 2-88 00057 326004 - 55] - COMMANDS FlLCOM program (Cont)] Examples (cont) 3. To compare two high segment files, the command sequence below is used. locations begin at 400000. sR Note that the FILCOM) ATTY:+SYS:TABLE «SHKk» TABLE .SHRK) - 4. ‘ FILE 1) SYS:TABLE.SHR CREATED: 2020 24-JAN-1972 FILE 2) DSK:TABLE.SHR CREATED: 1829 30-NOV-1971 400000 0O1611 400010 PB1630 4071517 POBV21 420003 0PB6675 P000R0 D15024 407670 P13651 4b7670 MO0 4 005600 G00BTO PA4700 0BO113 PO110Y BVOL63 BOT147 400005 545741 444562 554143 625700 N11602 261262 40010 634000 OB0000 260740 403516 454740 403516 400011 474000 000000 200000 414036 674000 414036 4BB12 402000 DOB1S56 202000 VOOT20 600VOY PBV6TE 400013 200040 406354 201000 000472 VO1640 46726 To list a binary file, use the following command sequence. sR FILCOM) ATTY:+SYS:DOT.REL)) PPPR00 V0004 @D000] PO0OB1 Q0CPE0 V000A0 000002 GNOBR0 054716 POVOG3 BO0R06 NODROI PORODO 000004 002POO PB2OOS ©VOBVAT S17716 PPO006 000001 DOAVE2 000007 008200 POV Note that the following sequence will not work because of the terminating comma. ATTY:«SYS:DOT «REL,) 2COMMAND ERROR Version 16 FILCOM 2-89 COMMANDS - 552 - [FI LCOM program ( Cont)l Examples (cont) 5. To compare two binary files between locations 150=160 (octal). R FILCOM) FTTY:/156L/160U+SYS:SYSTAT «SAV,SYSISYSDPY.SAV)) 6. FILE 1) SYS:SYSTAT.SAV CREATED: 9818 36-NOV-1971 FILE 2) SYS:SYSDPY.SAV CREATED: 1642 29-NOV-1971 000150 2004%0 0oa137 200740 pA3217 RBD340 VR3320 pAd151 260740 PR4226 404500 PR 4242 664240 PR0VO64 PoA152 260740 PD4253 661500 PR2200 401240 PO 6253 PAA153 200040 na5011 260749 NB21723 60700 BpB7732 nBR154 260740 BB4D 63 200049 DD 4243 V6D T0P VY220 PBP155 ., 201041 1777717 202040 RV3241 Vo300l 774536 0oB156 D470406 PoBB 42 200040 0R4241 247000 0B 4203 00157 254000 POB174 251040 D4l 42 BRS040 BRAG36 160 476020 Ba6T7174 211040 003144 667040 VY6630 To compare two .SAV files. Note that the files are expanded before the comparison. sR FILCOM) *FTTY:+5YS:TRY1 «SAV,SYS:TRY.SAV ) FILE 1) SYS:TRY1.SAV CREATED: 2043 05-JAN=-1972 FILE 2) SYS:TRY.SAV CREATED: P818 30~NOV-1971 Pan114 NR4000 Po01 40 PPO00 PoPo0BY DR4000 000140 o116 777536 PP5536 slaaYaLols) dayuldds) 777536 PP5536 poc1117 popeeD pB5536 230000 vovVBL 00120 206000 PB0B1 49 PpT7222 0da1 40 eoni121 ROP2BY 0R60B0 P00 vpgT222 200130 12609 PBBRAAS PONR0D 200000 010000 POOOOS 200133 pB3727 PBST17 PP6643 PATTT7 DB5164 V2000 200137 PA3400 20070 P46T700 PRo 140 NNBLA4 045300 PRRR T4 264000 PO1454 B47000 VRYAY 223009 001454 POO141 260040 B1773 200040 0esp715 DeLVLY PB4T06 900142 201240 01447 402000 006644 603240 POT203 200143 5422490 P21634 251040 vo7221 713200 206415 PR01 44 260040 BR2774 403000 PPRO15 663040 002761 200145 621000 7101 R Y] 476000 PR67T15 257000 06705 PO0O146 200240 PA3504 200740 BR6606 DOB500 P0 5302 200147 251240 Pvon12 951140 BO5076 2006300 05064 200000 po1222 200150 402000 003613 200400 280137 602400 003724 Pe0151 201040 PO3T730 263740 RY4226 061700 BB7516 200152 200260 03632 260740 V04253 06N s520 07461 208153 321240 POA164 200040 205011 121200 085175 - - Version 16 FILCOM 005536 ppl1222 2-90 COMMANDS - 553 FILE command I Function The FILE command provides remote conirol of DECtape-to-disk and disk=to~DECtape fransfers on operator=handled DECtapes. Command - Formats 1. FILEC of FILE commands to be read to determine if any of the user's re= Checks the queue quests are still pending. No argument is required. Pending requests will be listed. 2. FILED, id, file.ext, file.ext, «vv Deletes the specified files from DECtape. Requires Tape ID and list of filenames as arguments. The tape ID is any alphanumeric name of6 characters or less that is used to identify the tape. Upon completion, an automatic FILE L is performed. 3. FILEF, id, file.ext, file.ext, ... Files information onto a DECtape. Requires Tape ID and list of filenames as arguments. Upon completion, an automatic FILE L is performed. i 4, FILEL, id Reads the directory of a DECtape and places it in the user's disk area as an ASCII file with filename id.DIR. id is any alphanumeric name of 6 characters or less that is used to identify the tape. It is the only argument. The user may then read the directory ‘with a monitor command string. (See Examples). 5. FILER, id, file.ext, file.ext, ... Recalls (transfers) information from the user's DECtape fo the disk. Requires Tape id and list of filenames as arguments, If the specified files already exist, they are superseded with the ones from the DECtape. If the specified files do not exist, they will be created on the first file structure in the job's search list for which creation is allowed. After the files are transferred, an automatic FILE-L is performed. Version 20 UMOUNT 2-91 COMMANDS , - 554 - EILE command (Contfl Command Formats (cont) 6. FILEW Waits until all of the user's pending requests are processed before continuing. are pending requests, the message WAITING . . . is typed fo the user. when all requests have been processed. not fo wait. 7. If there Control returns The user may type control-C if he decides FILEZ, id, file.ext, file.ext, . . . Zeroes the directory of the DECtape before the files are copied and then performs the same operations as the F option. Requires Tape id and may have a list of filenames as arguments. After the files are copied, an automatic FILE L is performed. The C and W funcitons are the only requests that are performed immediately. quests are placed in a queue to be performed whenever possible. The other re- The user's terminal and job are free to proceed before the request is completed. The function argument function argument is not specified, a brief dialogue is performed. is optional . If the In most cases the user does not need fo specify which file structures the files are on because UMOUNT determines this (with LOOKUPs) and passes the information to OMOUNT, However, file structure names may be specified in file descriptors. When no structure name is explicitly typed, the default is initially the first file structure in the user's search list (implied by DSK:) on which he is allowed to create files. Refer to the description of the SETSRC program. When a file structure name is typed or implied, it becomes the new default. The asterisk construction may be used, but care should be taken when generic DSK: is Because DSK: may define many file structures, the single file structure is typed. chosen as follows: When the asterisk construction is used for the filename or extension, the first structure on which the user may create files in his search list is used. standard file structure. This is called the user's If the asterisk construction is not used and the file exists, the first file structure list that contains the specified file is used, unless overridden by a default. If the file does not exist, the standard structure is used. WARNING If the user has a search list with multiple file structures, the asterisk construction when used with the FILE R com= mand can cause files to be created rather than superseded. Version 20 UMOUNT 2-92 in the search (See Examples.) - 555 - COMMANDS FILE command (Cont)J Characteristics The FILE command: Leaves the terminal in monitor mode. Runs the UMOUNT program, thereby destroys the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=1040. Restrictions The project~programmer number may not be specified.in file descriptors. Associated Messag es Refer to Chapter 4, Exémp-les ~ JFILE R,MINE,MAIN,F4,SUBFIL.MAC) - REGUEST for which creation is allowed. There are two com . STORED 5,CONMANDS The files MAIN.F4 and SUBFIL.MAC are taken from the user's DECtape labeled MINE and placed on the first file structure in the user's search list IN QUEUE ST ] mands in the queue {counting this one). 2, R JoR24 TTYS 27,235 MINE DSKB3,0SKBIMAIN,F4,SUBFIL,MAC) 3, COMMANDS IN QUEUE The user checks to see if his request is still waiting to be processed. The first line of the output indi- cates that the user's request is second in the queue (2.), that the request made is a RECALL (R), that - the user's job is 24 (JOB24), that the user is on terminal 5 (TTY5) under the project-programmer number of [27,235] (27,235), that the tape is identified by the name MINE (MINE), and that the files will be written in the directory on DSKB: (DSKB:). The second line indicates that there are 3 commands in the queuve. (continued on next page) Version 20 UMOUNT- T 2293 COMMANDS - 556 - |FILE command (Cont)| Examples (cont) oFILE L, 4) The user wants the directory on the DECtape labeled 4 to be placed in his disk area as an ASCII file. .TYPE 4,DIR) The user then reads the directory file with the : TY PE command. If the user's search list is as follows: DSKA/N, DSKB, DSKC with file A on DSKA, file B on DSKB, and file Con DSKC, the following commands are equivalent: The user types: The user could have typed: The command as passed to OMOUNT: FILE .FILE .FILE F,2,4,B,C F,2,DSK2A,DSK:B, DSKs:C F,2,DSKAtA, DsKC:C DSKB:B, The first file structure that contains each file is used. .FILE R,3,4,D5KB3B,C LFILE R,3,D8K3A,DSKB1B, DSKBSC ,FILE R,3,DSKA1A,DSKB:B, DSKB3C The user changes the default o DSKB and even though file C exists on DSKC, file on DSKB; files A and B are superseded. FTILE Falskexk FILE FrlsDSKikoex cFILE C is created FrloDSKBt*ex Because the asterisk convention was used, the first file structure on which the user may create files (DSKB) is used. FILE Rs2s85C a%y DSKC :B « % FILE Ka2,DSKeA, DSKB:Co*sDSKC 1R o % «FILE KsZ2,DSKA:A, DSKE :Ce*»DSKC 15 « * Because of the asterisk convention, DSKB is used for file C (even though file C exists on DSKC). The wser explicitly typed a structure name for file B; therefore, DSKC is used even though file B is on DSKB. File A is superseded. Version 20 UMOUNT 2-94 - 557 - | ) COMMANDS FILEX program: Function The FILEX program is a general file transfer program intended to convert between various core image formats, and to read and write various directory formats. Files are transferred as 36~bit data. The only processing on the data is that necessary to convert between various core image representations. ‘ Command Format R FILEX) *dev:ofile.ext [proj,prog]l <nnn>/switches = dev:ifile .ext [proj,prog] /switches If the project-programmer and/or the switches appear after the device name, they apply to all the following files. If they appear after the filename, the specifiers apply only to the preceding file. The input filename or extension may be * in which case the usual processing of the * construction occurs (refer to the TYPE command). The output filename and extension may be * in which case the filename and extension of the input file is copied. If the output filename or extension is missing, the same procedure occurs as with the * construction, except that all core image files are written with the default extension and format appropriate to the output device (unless overridden by switches). If a protection <nnn>is not specified, files are written with the system standard protection unless the files are being written on SYS. On SYS, files are written with protection <155>, except for files with extension .SYS. These files have the default protection of <157 >, ' Meaning of Switches: Help text /H = toobtain an explanation of the command string and individual switches, DECtape Format Specifiers Version 15 FILEX /% - PDP-15 DECtape format /M = MIT project MAC PDP-6/10 DECtape format /O - Old DEC PDP-6 DECtape format /T = normal PDP-10 directory format /V - PDP-11 DEC’rape format (Note that PDP-11 contiguous files are “not supported by FILEX.) 2-95 COMMANDS - 558 - | FILEX program (Cont) I Command Format (cont) File Format Specifiers /A ASCII processing; meaningful only for PDP=11 and PDP=15 tapes. /B binary pv'ocessing; overrides default extension. /C compressed; save file format. This format is assumed for files with extensions .SAV, .LOW, .SVE. The default output extension is .SAV unless the input extension is .LOW or .SVE, in which case the extension remains unchanged. /D dump format: /E expanded core image files (used by FILDDT). This format is assumed for files with extension .XPN. The default output extension is This format is assumed for files with extension .DMP, XPN. /1 image processing; meaningful only for PDP=11 and PDP-15 tapes. /S simple block (SBLK) format, project MAC's equivalent of .SAV format. The default output extension is .BIN, DECtape Processing Specifiers /G (go on), ignores read errors on input device. FILEX checks the always-bad=checksum bit in the 5-series monitor, so this switch is not needed for files with .RPABC on (e.g., CRASH.SAV). /L /P (list), causes a directory on an input DECtape file to be typed on the terminal, or causes a directory listing of the output DECtape at the end (i.e., after the output). (preserved), causes quick processing (/Q) and preserves the scratch file ofter processing for use by another command. /Q /R (quick), causes an input or output DECtape to be processed quickly via a scratch file. (reuse), reuses a scratch file preserved by a /P in a previous com= mand . /Z {zero), causes the appropriate format of a zeroed directory to be written on a DECtape output file, If TAPEID appears in the output specifier, then TAPEID is written as the tape identifier in the directory . TAPEID is preceded by a up arrow (1) and may be 6 characters on a PDP=-10 tape, 3 characters on a project MAC tape, and is not present on a PDP-=6 tape. Version 15 FILEX 2-96 : 5 559 - COMMANDS IFILEX program (Cont)l Characteristics The R FILEX command: Runs the FILEX program, thereby destroying the user's core image. Examples The dump format file is com= R FILEX,) pressed and written as TEST.SAV. **DSK:«DTA1 :TEST «DMP/C sk FILEX Copy CRASH.SAV to an ex~ | *DSK:SER1DS5«XPNI 105 1 1-DSKC :CRA SHeSAVI1,4] panded format file for FILDDT to examine. Version 15 FILEX 2-97 COMMANDS - 560 - | FINISH command Function The FINISH command terminates any input or output currently in progress on the specified de- vice and autoratically performs the RELEASE UUO (which CLOSES the files) and DEASSIGN command, thus making the device available to another user. This command is preferred over the DEASSIGN command because it completely disassociates an INITed device from the user's job, thereby preventing the user from continuing his program. If the user wishes to continue his program, he should use the DEASSIGN command. Command Format FINISH dev dev = the logical or physical name of the device on which 1/O is to be terminated. This argument is optional . If dev is omitted, 1/O is terminated on all devices, except the job's controlling terminal and the logical neme of the controlling terminal is cleared. Characteristics The FINISH command: Leaves the terminal in monitor mode. Requires core. Depends on FTFINISH which is normally absent in the DECsystem-1040. Restrictions The user cannot continue his progrem if the device was INITed, but he can start ning or enter DDT. Associated Messages Refer to Chapter 4. 2-98 at the begin- - 561 - COMMANDS FINISH command (Cont)] Examples sFINISH CDRL) SFINISH DTA7:) SFINISH LPT3) 2-99 COMMANDS - 562 - | I FUDGE command ! Function The FUDGE command causes PIP to read a temporary file generated by a previous COMPILE, LOAD, EXECUTE, or DEBUG command using the /FUDGE switch and to create a library REL file. The library is created with the REL files in the same order in which they were specified in the command string containing the /FUDGE switch. NOTE Since the COMPIL program sorts out files by compilers, mixed , FORTRAN and MA.CRO programs are sorted so that all FORTRAN progrars are compiled first and MACRO programs second. J However, the /FUDGE switch combines them in the order in which the COMPIL program encountered them. Command Format FUDGE Characteristics The FUDGE command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. Examples 2COMPIL/FUDGESLIBARY/MACRO TEST,MATH,DATPRO,CBL,SCIENC,F4) Create a disk file named LIBARY which contains the names of all the REL files produced. ' -FUDGE,) Create the library file and call it LIBARY. This file contains the following: TEST.REL, MATH.REL, DATPRO.REL, and SCIENC.REL. 1. This command runs the COMPIL program, which interprets the command before running program, Version 20 COMPIL Version 32 PIP 2-100 the PIP - 563 - COMMANDS FUDGE2 program Function The FUDGE2 program is used to update files containing one or more relocatable binary programs and tomanipulate programs within program files. Three files are used in the updating process: : 1. A master file containing the file to be updated. 2. A transaction file containing the file of programs to be used when updating. 3. An outputfile containing the updated file, All three files can be on the same device if the device is DSK. The two input files can be on the same DECtape.: ~ The desired function of FUDGE2 is specified by @ command code at the end of the command string. Only one command code can be specified in each command string.. The command string is then terminated with an ALTmode, represented in this manual by a dollar sign ($). Switches can also be used to manipulate file directories and to position a magnetic tape. Command Format .RFUDGE2) o Zoutput dev:file. ext=master dev:file.ext<programs>, transaction dev:file.ext<programs> (command)$ oufput dev: = the device on which the updated file is written. If omitted, DSK is assumed. master- dev: = the device containing the file to be updated. If omitted, the default is DSK. transaction dev: ) = the device containing the files of programs to be used in the updating process. When more than one file is transferred from magnetic tape or paper tape, a colon must follow the device name for each file. MTA: : : For example, Transfer 3 files If the device is omitted, DSK is assumed. file .ext = the filename and extension of each file. Filenames must be specified for directory devices, but the extension can be omitted. If the extension is not given, it is assumed to be .REL unless the /L switch appears in the command string. In this case, the output extension .LST is assumed. (continued on next page) Version 14 FUDGE2 2-101 COMMANDS ' - 564 - | FUDGE2 program (Cont)] Command Format (cont) file.ext (cont) Project-programmer numbers appearing after a filename apply to that file only. If the project-programmer number appears before the filename, it applies to all subsequent files until another device is specified. The asterisk convention can be used with the input files (refer to Paragraph 1.4.2.4). <programs > = Names of programs (on DSK or DTA only) to be used in the up- dating process. They are grouped within angle brackets in the same order as they appear in the file and are separated by commas. When manipulating all the programs within a file, only the filename need be specified. appear for the output file. (command) = Code for the function to be performed. Program names cannot This code can be either preceded by a slash or enclosed in parentheses and must oppear at the end of the command string. Each command results in the updated file being output to the output device. codes are as follows: The command A Append the specified programs in the transaction file(s) to the master file. C Delete local symbols from the master file. D Delete the specified programs from the master file. E Extract the specified files and/or programs from the input files. The entire file is extracted if program names are not specified. H I ' Type the commands and switches available. Insert programs from the specified transaction files into the master file. The programs from the transaction files are inserted immediately before the specified programs in the master file. L List the names and lengths of all relocatable programs within a file. The length is in one of two forms: low segment break, high segment breck or program break , absolute break The length of FORTRAN programs is not output. (continued on next page) Version 14 FUDGE2 2-102 - 565 - COMMANDS |FUDGE2 program (Cont)] Command Format (cont) (command) (cont) ~ R Replace the specified programs in the master file with the specified programs in the transaction file. The number of replacing programs must be the same as the num=ber of programs to replace. List all the enfry points within a program. These entry points are listed across the page. Write index blocks into a library file. Index blocks are used in a direct access library search (refer to the LOADER documentation). command. : This command implies a C o File directories can be manipulated and magnetic tapes positioned by including switches command string. by a slash or enclosed in parentheses. The following switches are available: /B | Backspacé a magnetic tape one file. /K Advance a magnetic tape one file. /T~ Skip to the logical end of-tape on a magnetic tape. /W Rewind a magnetic tape. /Z ~ Clear the directory of the output DECl'ape. Characteristics The R FUDGE2 command: Places the terminal in user mode. Runs the FUDGE2 program, thereby destroying the user's core image. Associated Messages Refer to Chapter 4. Version 14 FUDGE2 in the These switches can appear anywhere in the command string and are preceded 2-103 COMMANDS - 566 - . I FUDGEZ2 program (Cont)l Examples <R FUDGE2J *PT:=DTA1:LIB4A(L)F List all relocatable programs (.REL) from the file LIB40, located on DTAT1, on the line printer. *iSK:LIB4BB=DTA2 :LIB4AA <EXP«35sEXP.3C>>» DTA1 :F4<EXP.3A,EXP.3B>(K)3 Replace programs EXP.3 and EXP.3C located in file LIB4AA on DTA2, with programs EXP.3A and EXP.3B in File F4 on DTAT1; write out the new LIB4AA file on disk and call it LIB4BB. ADTAL sNFILE=DSK:IMFILE <M1 DTA3 s TFILEA<TAL A A ’ M2 ,M35M4> »TAS> Insert into MFILE the programs TA1 and TA2 from ’ - DTA4:TFILEB<TB1.TB2>/1% TFILEA, and TB1 and TB2 from TFILEB. NFILE with the following order: Create TA1,M1,TA2,M2,TB1,M3,TB2, M4 Insertion is on a one~to-one basis. If there are more programs to be inserted than specified programs before which they are to be inserted, the extra files are ignored. ILE <M1 2 M2 » M3, M4> #TAL :NFILE=DSK:MF However, in this example (where TFILEA and DTA3:TFILEA DTA4:TFILEB/IS TFILEB contain the programs TAT and TA2 and TBI and TB2, respectively) create an NFILE with the following order: TA1,TA2,M1,TB1 M2, ,TB2, M3, M4 HTA2:TESTA=MTAL1 : (WK »MTA2: :(ZADS Clear the directory of DTA2; rewind MTA1 and advance the tape one file; append the first two program files from MTA2 to the second file on MTA1 and write out the resultant file on disk, calling it TESTA. *OUTPUT=LIBARY»DTA]l :LIBARY<FILEY,FILEZ>/A% Append the programs FILEY ond FILEZ contained in the file LIBARY on DTAT1 to the end of the file LIBARY on disk. Write the new file on disk and call it OUTPUT. (continued on next page) Version 14 FUDGE2 2-104 - 567 - COMMANDS fiJDG E2 program (Cont) ] Examples (cont) ANEWF IL=0LDF IL<TEST>SUBTRC,>MULT I>>BASF 1 L<PkO0G» SUBF IL <MATH>(E)$ Extract the specified programs from the files ROUT IN>ANS>»WER OLDFIL, BASFIL, and SUBFIL and create a new output file called NEWFIL. The order of the programs in NEWFIL is as follows: TEST, SUBTRC, MULTI, PROG, ROUTIN, ANSWER, MATH. *1C Version 14 FUDGE2 Return to the monitor. 2-105 COMMANDS - 568 - IGETA command Function The GET command loads a core image from a retrievable storage device but does not execution. begin ' This command clears all of user core. However, programs should not count on this action and should explicitly clear those areas of core that are expected to contain zeroes (i.e. ; programs should be self-initializing). This action allows programs to be restarted by a 1C, START sequence without having to do another GET command. On magnetic tape, if the low or high segment is missing, a null record is output before the EOF for the missing segment so that two EOFs cannot occur consecutively. Therefore, a saved null segment does not appear as a logical EOT (2 EOFs in a row). Command Format GET dev+file.ext [proj, progl core The arguments and the defaults are the same as in the RUN command. The extension applies to the low file, not the high file. An extension of .SHR, then -HGH, is assumed for the high file. If the user types an extension of .SHR or .HGH, the extension is treated as a null extension since . SHR and .HGH are confusing as low file extensions. Characteristics . The GET command: Leaves the terminal in monitor mode. Does riot operate when the device is currently transmitting data. Associated Messages Refer to Chapter 4, Example +GET SYS:PIPJ J0B SETUP +GET TESTJ JOB SETUP 2-106 - 569 - COMMANDS GLOB program l Function The GLOB program reads multiple binary program files and produces an alphabetical cross- referenced list of all the global symbols (symbols accessible to other programs) encountered. This program also searches files in library search mode, checking for globals, if the program file was loaded by the LOADER in library search mode (refer to the LOADER documentation). The GLOB program has two phases of operation; the first phase is to scan the input files and build an internal symbol table, and the second, to produce output based on the symbol table. Because of these phases, the user can input commands to GLOB in one of two ways. The first way is to specify one command string containing both the output and input specifications. (This is the command string format most system programs accept.) The second is to separate the command string into a series of input commands and output commands. Command Formats 1. RGLOB outdev:file.ext [proj,prog] = input dev:file.ext [proj,prog] ,file.ext,... dev:file.ext [proj ,prog] é 2. RGLOB followed by one or more input commands in the form dev:file.ext [proj ,prog] ,file .ext [proj,prog], ... ,dev:file.ext [proj,progl, ... J) and then one or more output commands in the form outdev:file.ext [proj,prog] = () When the user separates his input to GLOB into input commands and. output commands (Com- mand Format #2), the input commands contain only input specifications and the output commands, only output specifications. Each output command causes a listing to be generated; any number of listings can be printed from the symbol table generated from the current input files as long as no input commands occur after the first output command. When an .input com“mand is encountered after output has been generated, the current symbol table is destroyed and a new one begun. Defaults 1. If the device is omitted, it is assumed to be DSK. cation is omitted, the output device is TTY. However, if the entire output specifi- (continued on next page) Version 5 GLOB - 2-107 COMMANDS - 570 - GLOB program (Cont) I Command Format (cont) Defaults (cont) 2. If the output filename is omitted, it is the name of the last input file. are required. 3. If the output extension is omitted, .GLB is used. is assumed fo be .REL the filename. 4, The input filenames If the input extension is omitted, it unless the null extension is explicitly specified by a dot following If the proi,écf-programmer number [proj,prog] is omitted, the user's default directory is used. 5. An AlLTmode terminates the command input and signals GLOB to output the cross=referenced listing. In other words, a listing is not output until GLOB encounters an ALTmode. The AlLTmode appears at the encl of the command string shown in Command Format #1 or at the end of each output command shown in Command Format #2. Switches Switches control the types of glcbal listings to be output. Each switch can be preceded by a slash, or several switches can be enclosed in parentheses. Only the most recently specified switch (except for L, M, P, Q, and X, which are always in effect) is in effect at any given time. If no switches are specified, all global symbols are output. availdble. The following switches are /A Output all global symbols. /E List only multiple defined or undefined (erroneous) symbols. /F List nonrelocatable (fixed) symbols only. /H List the switches available (help text). /L This is the default if no switches are specified. Scan programs only if they contain globals previously defined and not yet satisfied (library search mode). ' /M Turn off library search mode scanning resulting from a /L switch. /N List only symbols which are never referenced. /P List all routines that define a symbol to have the same value. The routine that defines the symbol first is listed followed by a plus (+) sign. Subse~ quent routines that define the symbol are listed preceded by a plus sign. /Q Suppress the listing of subsequent definers that result from the /P switch. (continued on next page) Version 5 GLOB 2-108 - 571 - COMMANDS IGLOB program (Cont)l Command Format (cont) Switches (cont) /R /S List only relocatable symbols. List symbols with non-conflicting values that are defined in more than one program, /X Do not print listing header when output device is not the terminal, and include listing header when it is the terminal. Without this switch, the header is printed on all devices except the terminal. The listing header is in the following format: FLAGS SYMBOL OCTAL VALUE DEFINED IN REFERENCED IN Symbols listed are in alphabetical order according to their ASCII code values. The octal value is followed by a prime (') if the symbol is relocatable. The value is then relative to the beginning of the program in which the symbol is defined. Flags preceding the symbol are shown below. : M N Multiply defined symbol (all values are shown). Never referred to (i-\..e. , was not declared external in any of the binary programs). S Multiply specified symbol (i.e., defined in more than one program but with non=conflcting values). The name of the first program in which the symbol was encounteredis followed by a plus sign. U Undefined symbol. Characteristics The R GLOB command: Places the terminal in user mode. Runs the GLOB program, thereby destroying fhe user's core image. Associated Messages Refer to Chapter 4. " Version 5 GLOB 2-109 COMMANDS - 572 - GLOB program (Contfl Examples R GLOB,) Run the GLOB program. *PT:=MAIN,DTA2 :SUB4@,SUBS0 All global symbols in the programs MAIN (on DSK), SUB40, and SUB50 (on DTA2) are listed on the line printer. Along with the symbol is listed its value, the program in which it is defined, all programs in which it is referenced, and any error flags. MTA4:BATCH.REL,DATA,DTA6 :NUMBER -REL:CLASS‘) ) ADSKIMATH.REL,LIBARY. The programs to be scanned are BATCH.REL, DATA .REL on DTA4; NUMBER.REL, CLASS.REL on DTA6; and MATH.REL, LIBARY .null on DSK. MPT:=/F ® List only nonrelocatable symbols on the line printer. *DSK:SYMBOL=/R List only relocatable symbols in the file named ATTY:=/E (& Print all erroneous symbols on the terminal . EXTSYM is an undefined symbol appearing in the program U EXTSYM SUBRTE SYMBOL in the user's default directory . SUBRTE. x1C Version 5 GLOB Return to monitor mode. 2-110 - 573 - COMMANDS GRIPE program | Function The GRIPE program accepts text from a user and records it in a disk file, thereby enabling users to record comments and complaints to be read at a later time by the operations staff. Command Format R GRIPE When the GRIPE program responds with a YES?, type the text, using as many lines as necessary, terminated with an ESCAPE. The text is written as a file with <157>protection and includes a-header with the date, time, and project-programmer number of the user writing the comment. Therefore, the user does not need to identify himself. Characteristics The R GRIPE command: Places the terminal in user mode. Runs the GRIPE program, thereby destroying the user's core image. Associated Messages Refer to Chapter 4. Example ——————— sR GRIPE)) YES? (TYPE ESCAPE WHEN THROUGH) THIS CONSOLE OUT ALMOST THANK OF PAPERS YOU Version 3 GRIPE 2-111 1S , COMMANDS - 574 - HALT command Function The HALT (tC) command transmits ¢ HALT command to the monitor command interpreter. stops the job and stores the program counter in the job data area (.JBPC). Refer to the DECsystem=10 Monitor Calls for a description of the job data area. Command Format HALT (tC) Characteristics The HALT (tC) command: Places the terminal in monifor mode. Does not require LOGIN, Example 2-112 It - 575 - COMMANDS HELP command Function The HELP command is used to obtain useful documentation on various system features. Command Formats 1. HELP outputs the instructions for receiving information. 2, HELP * outputs the names of features that have available documentation. 3. HELP name outputs the information on the named Feafure. Only the first six characters of the argument to the command are scanned. must be A through Z, 0 through 9, or asterisk (*). Characteristics The HELP command: Leaves the terminal in monitor mode. Does not require LOGIN, Associated Messages Refer to Chapter 4. Version 3 HELP 2-113 These characters COMMANDS - 576 - LHELPcomnmnd(Confl] Examples W HELP v,) HELP I8 AVAILABLE FOR THE FOLLOWING? PTPSPL SHELP TYPE DIRECT MYCOPY CDRSTK MATCH CDPSPL LPTSPL BATCON HELP SOUP FAILSA PIP FGEN PLTSPL TECO DIRECT) OUTWINPUT*INPUT+,.. /ACCESSIN = ACCESS ALL LISTED FILES UNDER N BLOCKS LONG /ALLOCATED » GIVE ALLOCATED LENGTH /CHECKSUM » COMPUTE CHECKSUM OF EACH FILE /DETAIL = EVERYTHING FROM EXTENDED LOOKUP /F /H w ® FAST THIS MODE TEXT /S & SL.OW MODE /L ® OUT TO LPT /PHYSICAL = DO PHYSICAL OPENS /SORT = PREPARE FOR SORTING /SUMMARY = JUST PRINT SUMMARY LINE /TITLES = INCLUDE TITLES SPECIFIC /UNITS s GIVE /WORDS a OUTPUT WILD NAME, UNIY /WIDTHIN = TRY TO FILL PAPER WIDTH OF N COLUMNS w [S LENGTHS ETC. IN 7 IS WILD LETTER OF NAME, "OUTs" MAY BE OMITTED WORDS ETC, DEFAULT IS TTY?1.DIR=DSKtw,w[MY DIRECTORY] Version 3 HELP - 22114 - 577 - COMMANDS INITIA command l Function The INITIA command performs standard system initialization for the terminal issuing the com= This command is issued automatically at system startup and at the 400 series restart at mand. certain designated terminals, but may be re-issued at any time by the user. This command is used to initiate specific system programs, such as the operator service program, OPSER, on a particular console. The INITIA command runs SYS:INITIA.SAV which, depending upon the system configuration and the number of the TTY from which it is typed, may cause any of a number of events to occur. For more information, refer to the INITIA specification in Notebook 7 of the DECsystem=10 Software Notebooks. Command Format INITIA Characteristics The INITIA command: Leaves the terminal in monitor mode. Runs a specific system program. Does not require LOGIN, : Depends on FTCCLX which is normally absent in the DECsystem=-1040. Associated Messages Refer to Chapter 4. Examples LINITIA) 5S04 SYS Version 3 INITIA #2 22:12:17 TTY24 2=115 COMMANDS - 578 - JCONTINUE command Function The JCONTINUE command forces a continue of the speciFied job if the job was in a tC state because of a call to the device error message routine (HNGSTP). Command Format JCONTINUE n n = the number of the job fo be continued. This argument is required. Characteristics The JCONTINUE command: Places the terminal in monitor mode. Does not require LOGIN. Depends on FTJCON which is normally absent in the DECsystem-1040, Associated Messages Refer to Chapter 4. Example +JCONT 14) 2-116 - 579 - COMMANDS KJOB command I Function In multiprogramming systems, the KJOB command: Stops all assigned 1/O devices and returns them to the monitor pool. Returns all allocated core to the monitor pool. Returns the job number to the pool. Leaves the console in the monitor mode. Performs an automatic TIME command. In swapping systems, the KJOB command performs all the above procedures. In addition, the command responds with CONFIRM: The user may‘ type tC to abort logout, or type an optional file structure name (or list of file structure names) preceded by one of the following: FJ to logout immediately saving all files (including temporary files) as they are. DJ to delete all files on the specified file structures. Responds with ARE YOU KJ _ to delete all unprotected files (i.e., files with Oxx protection code) on the Identical to R LOGOUT, or RUN UUO to LOGOUT. SURE? Type Y or D for YES, any other character for NO. - specified file structures. If project 1 or other jobs are logged-in with the same project-programmer number, responds with ARE YOU SURE? Type Y or K for YES, any other character for NO. P to save and protect (i.e., assign a protection code of 1 in the owner's field) all but temporary files (TMP, CRF, LST) on the specified file structures. If project 1 or other jobs are logged-in with the same project-programmer num- ber, responds with ARE YOU SURE? Type Y or P for YES, any other character for NO. $J : to save without protecting all but temporary files on the specified file structures. If project 1 or other jobs are logged=in with the same project-programmer number, responds with ARE YOU SURE? Type Y or S for YES, any other char- acter for NO. LJ 1.J to list the directories of the specified file structures. to individually determine what to do with all files on the specified file struc: ture as follows: (continued on next page) Version 47 KJOB 2-117 COMMANDS - 580 - [KJOB command (Cont)] Function (cont) After each filename is listed, type P to protect the file. SJ to save the file. K) to delete the file. Q) to learn if over logged-out quota on this file structure. If not over quota, nothing is typed, and the same filename is repeated. E) to skip to next file structure and save this file if below logged=out quota for this file structure. If not below logged-out quota, a message is typed and the same filename is repeated. H) UJ to list responses and meanings. to individually determine what to do with all but protected files. files are always preserved. B) Protected to delete no files except when user is over the logged~out quota, then delete enough files to be kelow quota. The files are deleted in the following order: 1) unprotected files according to the category of the file, 2) spooled files not previously queued, and 3) protected files according to the category of the file. The categories of files are as follows: 1) temporary files, 2) relocatable files, 3) backup files, 4) save files, and 5) all other files. Q) to leam if over logged-out quota on the specified file structures. H) to list the KJOB options and their meanings. W, to list the names of the files that are deleted. XJ toturn off the listing of the names of the files that are deleted. Complement If no file structure names are specified, the responses are for all file structure names in the job search list. If file structure names are specified, the responses apply to those file structures, and CONFIRM is retyped. The KJOB command ignores all logical assignments. The user has the option of going through the CONFIRM dialogue, even if other jobs are logged- in under the same project-programmer number or if he is logged=in under project 1. (However, if sufficient responses are included on the KJOB command line or in a temporary file entered through an alternate entry point, CONFIRM is not typed.) By responding to a CONFIRM mes- sage, the user has an opportunity to organize his disk area by deleting or preserving specific files. - The KJOB program calls the QUEUE program to perform the qfieuing of files which have been deferred to logout time. This includes all spooled output unless the user has specifically queued output spooling earlier. Version 47 KJOB Queuing may be suppressed with the /Z response (see below). 2-118 - 581 - L COMMANDS KJOB command (Cont)] Command Formats 1. KJOB CONFIRM: When the CONFIRM: response is given, the user may type any of the above-described letters followed by an optional file structure name or list of file structure names separated by commas. The user may type one of the above~described letters, followed by optional file structure names, on the same line as the KJOB command, and the CONFIRM: message will not be typed. 2. KJOB <log file descriptor> =/ <letter> <list of file structure names>/<letter> <list of file structure names> etc. <log file descriptor> has the following form: -<dev:file.ext [proj,prog]>. file is not a disk or spooled device, TTY isused. If the log <letter> = any letter from the above~described set. In addition, the following re~ sponses are available to any jobs using this command format: - /Z:n specifies the degree of queuing desired: n = 0 suppresses all normal queuing done at LOGOUT time. n = 1 queues the log file only. n = 2 queues the log file and spooled output (,.LPT, etc.) n =3 queues the log file, spooled output, and ,.LST. n = 4 queues the log file, spooled output, ..LST, and any requests deferred to LOGOUT time (deferred requests are not yet implemented). If Z is given without a value or if there are no spool bits set for job, Z:0 is assumed. Otherwise, /Z:2 is assumed. /VL:n specifies that the limit of pages for LPT files is to be n (decimal). /VC:n specifies that the limit of cards for CDP files is to be n (decimal). /VT:n specifies that the limit of feet of paper tape for PTP files is to be n (decimal). /VP:n specifies that the limit of minutes for PLT files is to be n (decimal). /VR:n specifies that the priority of the queue request is to be n; n is from 0 through 62. /VR:62 is the standard. (continued on next page) Version 47 KJOB 2-119 COMMANDS - 582 ~ IKJOB command (Cont)] Command Formats (cont) /VS:n specifies that the sequence number for the queue request is to be n. /VD:v specifies that the file disposition of the log file is to be v. v =D deletes the log file after printing. v =P preserves the log file after printing. renames the log file before printing to the queue area and v =R deletes it after printing. Default is /VD:R. If a value to the above switches is not specified, the value is equivalent to 0 (e.g., /VD is equivalent to /VD:0). For the /Vx switches, a value of 0 is equivalent to the standard (e.g., /VD = /VD:0 = /VD:R). The letters must appear on the input side of the command string. If the log file is specified, all TTY output is appended to the log file. If no log file is specified or if the log file is not a disk or spooled device, the default is TTY. In addition, if responses to CONFIRM are required and are not specified on the KJOB command line, these responses will then be read from TTY. Therefore, users should be careful when employing this command format. 3. The KJOB program may be entered at the CCL entry point through the RUN UUO. When this is done, TMPCOR file K.JO or disk file nnnKJO.TMP, where nnn is the user's job number in decimal, is used instead of the TTY input. This temporary file has the follow= ing format: ' KJOB <log file descriptor> = / <list of file structure names>/ < letter> <list of file structure names> etc. Characteristics The KJOB command: Detaches the terminal. Stops all assigned I/O devices since it does not operate when a device is transmitting data. Runs the KJOB and LOGOUT programs. Does not require LOGIN. Associated Messages Refer to Chapter 4, Version 47 KJOB 2-120 currently - 583 - COMMANDS [ KJOB command (Cont)]l . Examples 1. An example of the CONFIRM dialogue. 2K CONF IRM: 1) : DSKB TESTA oTST <@55> <@55> TESTS .TST : K : P) .BAK <055> 5. BLKS Kj T3 .BAK <055> Ko) .BAK <P55> 6. BLKS TEST .BAK <055> 5. BLKS <REL +MAC <B#55> <@55> 5. BLKS 5. BLKS JOB +SHR USER S5, <055> (10,633 K4 5. BLKS TEST TEST TEST 30+ BLKS : S,) LOGGED OFF TTYZ24 AT 2309 DELETED 5 SAVED 4 RUNTIME FILES 2565 TOTAL @ MIN, 00<60 SEC 11-MAY-71 FILES BLOCKS USED An example of the user bypassing the CONFIRM dialogue. K/F) JOB 9, SAVED USER ALL 23 RUNTIME 3. S5@5. BLKS T11 T2 2. 2000. BLKS. 1 (10,1101 FILES MINs LOGGED S1.52 OFF TTY3 DISK BLOCKS) (630. 1349 18&-MAR-7] SEC An example of the command when used in the Batch system. The output appears in the log file. ' 12:20:51 12:21:02 12:21:02 12:21:02 MONTR K DSKBR:MUM.LOGL18,1101=/W/B/VL:200 LGOUT JOB 12, USER [1@,110] LOGGED OFF TTYS5@ 1221 LGOUT SAVED ALL 38 FILES (1275. DISK BLOCKS) LGOUT ANOTHER JOB STILL LOGGED IN UNDER [10,110] "12:21:02 LGOUT RUNTIME @ 4. MIN, 18-MAR-71 00.65 SEC An example of the User specifying two switches. - <K/W/B). DELETED MYFILE JOB : 14, DELETED SAVED 1 52 RUNTIME Version 47 KJOB USER @ ([28,275) FILES FILES MIN, LOGGED (1922. (1735. @2.60 TTY35 DISK BLOCKS) SEC ' OFF DISK BLOCKS) 2-121 1454 13-APR=72 COMMANDS - 584 - [ LisT commana ? Function The LIST command directs PIP to list the contents of named source file(s) on the line printer (LPT). The output goes either to LLPT immediately or to the disk to be spooled to LPT if it is being spooled for this job. Refer to the QUEUE and PRINT commands. If the LPT is being spooled, the QUEUE program should always be used since it saves time and disk accesses. Command Format LIST list list = a single file specification or a sting of file specifications separated by commas. A file specification consists of a device name, a filename and extension, and a direc~- tory name. This argument is required. Switches can be passed to PIP by enclosing them in parentheses in the LIST command string. When COMPIL interprets the command string, it passes the switches on to PIP. Characteristics The LIST command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem~1040. Associated Messages Refer to Chapter 4. Examples SLIST SLIST SLIST 1 TEST % *.MAC) DTAA4 :A:B:C) This command runs the COMPIL program, which interprets the command before running PIP. Version 20 COMPIL Version 32 PIP 2-122 COMMANDS - 585 - LOAD command 1 Function The LOAD command translates the specified source files if necessary (function of COMPILE command), runs the LOADER, and loads the .REL files generated. The assembler or compiler used is determined by the source file extension or by switches in the command siring (refer to the COMPILE command). If a REL file already exists with a more recent date than that of the source file, compilation is not performed (unless requested via a switch). This command generates a core image but does not begin execution. At this point, the user can : start his program or save the core image for future execution. Each time the COMPILE, LOAD, EXECUTE, or DEBUG command is executed, the command with its arguments is remembered in a temporary file on disk, or in core if the monitor has the TMPCOR feature. Therefore, the filename. used last can be recalled for the next command without specifying the arguments again (refer to Paragraph 1.5). The LOAD command accepts several command constructions: the @ construction (indirect commands), the + construction, the = construction, and the < > construction. Refer to Paragraph 1.5 for a complete description of each of these constructions. ’ Command Format LOAD list list =a single file specification, or a string of file specifications separated by commas. A file specification consists of a device name, a filename with or without an extension, and a directory name. ' The following switches can be used to modify the command string. These switches can be temporary or permanent switches (refer to Paragraph 1.5.5). /ALGOL Compile the file with ALGOL. Assumed for files with the exten- /BLISS2 Compile the file with BLISS. Assumed for files with the extension sion of .ALG. " _ - of .BLI. /COBOL Compile the file with COBOL. Assumed for files with the extension of .CBL. (continued on next page) ]This command runs the COMPIL program, which interprets the command before running the appropriate processor and the LOADER. \ 2BLISS will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. Version 20 COMPIL ' ' 2-123 COMMANDS _586.. ILOAD command (Contfl Command Format (cont) /COMPILE Force a compilation of this file even though a binary file exists with a newer date and time than the source file. This switch is used to obtain an extra compilation (e.g., in order to obtain a listing of the compilation) since normally compilation is not per- formed if the binary file is newer than the source file. /CREF Produce a cross~-reference listing file on the disk for each file com- piled for later processing by the CREF program. These files have the filenume of the source file and the extension of .CRF. can then be listed with the CREF command. The files However, with COBOL files, the cross~referenced listing is always appended to the listing file. /FORTRAN No additional command need be given to obtain the listing. Compile the file with FORTRAN. Assumed for files with the ex— tension of .F4 and all files with nonrecognizable processor exten- sions (if FORTRAN is the standard processor). /FUDGE Create a disk file containing the names of the .REL files produced by the command string. When the FUDGE command is given, PIP reads this file in order to generate a library REL file. Arguments to this switch are: /FUDGE:dev:file .ext [proj,prog] dev: - the device on which to write the file. file.ext -~ the name of the library file. DSK:is assumed. The filename is required. If the extension is omitted, it is assumed to be .REL. [proj,prog]l - the directory in which to place the file. The user’s directory is assumed if none is given. This switch is permanent in the sense that it pertains to all REL files generated by the command string. /LIBRARY Load the files in library search mode. This mode causes a program file in a special library file to be loaded only if one or more of its declared entry symbols satisfies an undefined global request in the source file. The default libraries are always searched. Refer to the LOADER documentation. /LIST Generate a disk listing file, for each file compiled, with the file- name of the source file and the extension of .LST. be listed later with the LIST command. These files can Unless this switch is speci- fied, listing files are not generated except in COBOL; COBOL listings are always generated. (continued on next page) Version 20 COMPIL 2-124 COMMANDS - 587 - l LOAD command (Cont) I Command Format (cont) /LMAP Produce .a loader map during the loading process (same action as /MAP) containing the local symbols. /MACRO Assemble the file with MACRO . Assumed for files with extensions of .MAC. /MACX11 ] Assemble the file-witfi MACX11. Assumed for files with an exten~ sion of P11, /MAP Produce a loader map during the loading process. When this switch is encountered, a loader map is requested from the loader. After the library search of the default libraries, the map is written with the filename specified by the user {e.g., /MAP:file) or with the default filename MAP.MAP in the user's disk area. This switch is an exception to the permanent compile switch rule in that it causes only one map to be produced although it may appear as a permanent switch, ' /NOCOMPILE Complement the /COMPILE switch by not forcing a compilation on a source file whose date is not as recent as the date on the binary file. Note that this switch is not the same as the /REL switch, which turns off all compilation, even if the source file is newer than the REL file. /NOCOMPILE is the default action. /NOLIST Do not generate listing files. This is the default action except for COBOL files; COBOL listings are always generated. - /NOSEARCH Load-all routines of the file whether the routines are referenced or not. Since this is the default action, this switch is used only to turn off library search mode (/LIBRARY). This is not equivalent to the /P LOADER switch because /P does not search any libraries where /NOSEARCH will scan the default libraries. Use the existing .REL files although a newer source file may be /REL present. /SNOBOL 2 Compile the file with SNOBOL. Assumed for files with an exten- sion of .SNO. Characteristics The LOAD command: Leaves the terminal in monitor mode. Runs the appropriate processor and the LOA DER. ]MACXH (the PDP-11 assembler for the PDP-10) will be recognized as a processor only if the appropriate assembly switch is set. 2 However, this assembly switch setting is not supported. SNOBOL will be recognized as a processor only if the appropriate assembly switch is set. However, this assembly switch setting is not supported. Version 20 COMPIL 2-125 COMMANDS - 588 - [LOAD command (Cont)] Associated Messages Refer to Chapter 4. Examples o« LOAD TEST) MACRO: TEST LOADING LLOADER 2K Version 20 COMPIL CORE 2-126 - 589 - COMMANDS LOCATE command Function - 7 The LOCATE command logically establishes the user's job at a specified station. When the job is initiated, the user's logical station corresponds to his physical station. Therefore, this command is needed only if the user desires to change his logical station. Command Format LOCATE nn nn = the station number. An argument of 0 denotes the central station. A null argument implies the station of the user's terminal, i.e., his physical station. Characteristics The LOCATE command: Leaves the terminal in monitor mode. . . Depends on FTREM which is normally absent in the DECsystem-1040. Restrictions The LOCATE command must specify a station that is currently in contact with the central stafion. ! Associated Messages Refer to Chapter 4. Examples JLOCATE 2,) TLoc o 2-127 COMMANDS - 590 - I LOGIN command Function The LOGIN command is used to gain access to the system. Support program which accepts the user's LOGIN data. programmer numbers followed by his password. This command loads a Monitor The user types in his project and To login successfully, the project and pro- grammer numbers and the password typed in by the user must match the project and programmer numbers and password stored in the system accounting file (SYS:ACC T.SYS). Command Format LOGIN proj,prog proj ,prog = the user's project-programmer number. The project and programmer numbers may be separated by either a comma or a slash. If a slash is used, the message of the day is not output to the user unless the date on the file containing the message (NOTICE.TXT) is later than the last time the user logged-in. If this is true, the mes- sage is typed only once, whereas, when the comma is used, the message is output every time the user logs in. This argument may be typed on the same line as the LOGIN command, or on the following line after LOGIN types out the number sign. Characteristics The LOGIN command: Returns the terminal to monitor mode or starts a program running if specified in ACCT.SYS entry for proj,prog. Runs the LOGIN program. Does not require LOGIN. Associated Messages Refer to Chapter 4. Version 53 LOGIN 2-128 - 591 - COMMANDS LOGIN command (Cont) Example . The following is the procedure used to gain access to the system. JLOGIN 27,235 4 JOB 21 5S@417A TTY23 LOGIN types the job number assigned to user (job number 21), followed by monitor name, version number, and console line number. If the user does not type his project-programmer number on the same : line as the LOGIN command, LOGIN outputs a number sign indicating that the user should type in his project-programmer number. PASSWORD ¢ System requests user to type his password. User types password followed by carriage return (refer to Paragraph 1.4.2.1). To maintain password security, the monitor does not echo the password. On terminals with local-copy (refer to DECsystem-10 Monitor Calls), a mask is typed to make the password unreadable. 1135 8-JUN-71 THUR TYPE SYS:SCHED FOR If user entries are correct, the system responds with NEXT time, date, day of the week, the message of the - day (if any), and a period, indicating readiness to WEEKS SCHEDULE h Version 53 LOGIN accept another command. _ 2-129 COMMANDS =592 - l MAKE command 1 Function The MAKE command runs TECO (Text Editor and Corrector) and creates a new file on the disk. If a file already exists with the same name, a waming message is given and the file is superseded. Notebooks. Refer to the TECO manual in Notebook 6 of the DECsystem-10 Software Command Format MAKE dev:file.ext [proj,progl dev: = the device or file shucture name on which the file is to be created. DSK: is assumed, If omitted, , file.ext =any legal filename and filename extension. filename extension is optional . The filename is required; the [proj,prog] = the directory in which the file is to be created. If omitted, the user's default directory is assumed. other UFD, Note that the default directory may be an SFD or some : Characteristics The MAKE command: Places the terminal in user mode. Runs the TECO program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. Example <MAKE TEST3.MAC.J) * ]This command runs the COMPIL program, which interprets the commands before running TECO . Version 20 COMPIL Version 23 TECO - 2-130 - 593 - COMMANDS MOUNT command Function The MOUNT command allows the user to request assignment of a device via the operator. This command is similar to the ASSIGN command, but, whereas the ASSIGN command operates without operator communication, the MOUNT command requests operafor interaction when _necessary. For example, if a Batch user requests a DECtape drive and all drives are in use, then the operator can free one for the user, if he wishes. the restricted pool of devices. The user can request devices from ' The MOUNT command gives the operator greater control over assignment of devices on the system. When a user requests a device via this command, the operator has the option of either ‘selecting a specific unit (e.g., DTA5) or cancelling the request completely (all units of this type are in use and the operator does not want to free one for this user). The operator may also mount the media for the requested unit if the media is sufficiently identified (e.g., a deck of cards in the card reader or an identified DECtape on a specific drive). When the MOUNT command is used to gain access to a file structure, it allows the user to specify a particular drive, places the file structure name at the end of the job's search list, and waits for completion of operator action, if desired. Each file structure can have an administrative file, QUOTA.SYS, which contains a list of quotas for all users allowed access to the structure. When the file structure is mounted, a UFD is created for the user if he has an entry in QUOTA.SYS on the file structure. The MOUNT command runs the UMOUNT program in the user's core area. UMOUNT scans the command string and completes as much of the command as possible without operator intervention. When operator intervention is required, UMOUNT queues a request to the OMOUNT program by writing a command file on the 3,3 disk area. OMOUNT examines these command files and interacts with the operator. When the command file is deleted, the operator action has been completed. UMOUNT waits for this completion of operator action unless the user types a control-C. When a control=C is typed, the user does not receive a message of confirmation, but can later use the /CHECK switch fo see if his request is still pending (see Examples) . ' Command Format MOUNT dev: log-dev /switches (drives) dev: = one of the following: (1) a physical device name (e.g., DTA3, CDR, MTA), (2) a logical name previously associated with a physical device by either a MOUNT or ASSIGN command, or (3) a file structure name (one that is already mounted or one whose name appears in STRLST.SYS). This argument is required. (continued on next page) Version 20 UMOUNT 2-131 COMMANDS - 594 - [ MOUNT command (Cont)] Command Format (cont) log-dev = any SIXBIT name that is not the same as dev:. In other words, it may not be a physical device name or logical name that is currently being used or has previously been used as dev:. This argument is optional. switches = The following switches are optional and only enough characters to make the switch unique are required. The unique names are underlined below. /CHECK Check and list pending requests. /HELP Type this list. /MULTI Multi-access, disk only, complement of /SINGLE, default condition. /PAUSE Notify the user before sending the message to the operator for a request. The user can then abort the command if desired. /RONLY Read only, same as /WLOCK . /SINGLE Only this job can access files on the structure (single access), file protection is enforced for him, disk only. /VID:name A visual identification passed to the operator as a comment to assist him in identifying a particular unit to mount. The argument can be in one of two forms: 1) any string of up to 25 characters containing only letters, digits, periods, and hyphens, or 2) any string of up to 25 characters enclosed in single quotes. However, break characters and single quotes are not allowed in the string. The naming and use of this switch is relevant only to the extent that the installation operator knows what it means. The PLEASE command should be used for any complex procedures or long communications with the operator. /WENABL Write enable for this job, complement of /WLOCK, default condition. . (continued on next page) Version 20 UMOUNT 2-132 - 595 - COMMANDS “MOUNT command (Cont)] Command Format (cont) /WLOCK -~ Write locked for this job. This job cannot write on this file structure and the monitor will not update BAT blocks or the access date. If /SINGLE is given, the operator may set hardware write lock ‘to ensure that nothing is written. (drives) = the physical drives on which the units are to be mounted. may be used only when mounting file structures. order within the file structure. A drive argument The drives must be in the logical unit Drive names are separated by commas. Leading and embedded drives that are not specified must be represented by null names (, ,DPA3). Unspecified trailing drives may be omitted. Drive names are as follows: Blank, null - unspecified. UMOUNT finds one of proper type. Two letters - controller class (e.g., DP). Three letters - specific controller (e.g., DPA). that controller. : UMOUNT finds a drive on Three letters and one or fwo digits - specific drive (e.g., DPAO, DPA1). The user, by specifying a drive list, may force the packs to be mounted on specific drives or controllers. If no drive (or incomplete) specification is given, an available drive of the proper type is found. : Characteristics The MOUNT command: Places the terminal in user mode. Runs the UMOUNT program, thereby destroying the user's core image. Depends on FTCCLX and FTMOUN which are normally absent in the DECsystem-1040. Associated Messages . B Refer to Chapter 4. Version 20 UMOUNT 2-133 - 596 - COMMANDS [MOUNT command (Cont)l Examples ) <MOUNT PKIV: PRIV Asks the operator to mount the file structure PRIV. MOUNTED -MOUNT PAY:(DPA,,»DPB)/S MCUNT MINE 3, OPERATOR NOTIF IED WATITING .. Requests that the first unit of file structure PAY be mounted on Controller A, the second unit on any controller, the third unit on controller B, and any remaining units on any drives. The structure will be single access (i.e., available only to this job). Mount the file structure MINE. The request is queued to the operator. 1C UMOUNT is waiting for the request to be completed. The user does not wait for confirmation. +MOUNT /CHECK ) The user wants to know if his request hqs been processed, NONE R The request has been processed. PEND ING bETSRC) *T DSKA»DSKB,»PRIV,PAY,MINE,FENCE *1C sMOUNT DTA INPUT The user wants to know if the file structure is in his search list. The file structure has been added to his search list. The user wants the operator to select a DECtape drive and assign it with logical name INPUT, OPERATOR NOTIFIED WAITINGesos INPUT =MOUNT . (DTAS) MOUNTED INPUT/VID:325 The request is queued to the operator. UMOUNT is waiting for the request to be completed. The operator has selected DTAS. The user asks the operator to mount the DECtape labeled 325. He may use either DTA5 or INPUT to refer to his device. For example, the Batch user would use INPUT since he would not know what DECtape drive he is assigned. OPERATOR NOTIFIED WAITING .o . INPUT (DTAS3) SMOUNT INPUT MOUNTED OUTPUT The request is queued. UMOUNT is waiting for confirmation. The mount is successful . The user changes the logical name to OUTPUT., The logical name INPUTis no longer valid. OUTPUT (DTAS) Version 20 UMOUNT MOUNTED The mount is successful. 2-134 - 597 - COMMANDS OPSER program Function The OPSER program facilitates multiple job control from a single operator terminal by allowing The OPSER program acts as the operator to run several jobs called subjobs from his terminal . the supervisor of the various subjobs by allowing monitor level or user level commands to be passed fo all of the subjobs or to selected subjobs. trieved by OPSER. OQutput from the various subjobs may be re- The subjobs of OPSER run on psuedo-TTYs (refer to DECsystem=10 Monitor Calls) and all initializations of the pseudo-TTYs are performed by OPSER. The operator needs only to pro- vide the subjob name, either an OPSER-provided subjob number or an operator-assigned name. System programs that require a dedicated terminal can be run as subjobs of OPSER. By running system jobs on pseudo-TTYs, OPSER is able to maintain an 1/O link between the running jobs and the operator. In addition, the output from the various subjobs is concentrated on one terminal instead -of many, as was the case when each system program required its own terminal . Refer to the MPB Operator's Manual in the DECsystem~10 Software Notebooks for complete information on OPSER. Command Format R OPSER OPSER signifies its readiness to process commands by typing an asterisk if no subjobs are in use or subjobs are in a wait for an operator action. OPSER responds with an exclamation point when a subjob is running. Commands may be entered whenever - OPSER is operating. Each command is preceded by a colon and must be typed to sufficient length to make it unique. OPSER Commqnds :AUTO/hh:mm filespec Process the specified file as an automatic startup file. The file is terminated by an end-of-file or the typing of a line on the console by the operator. This is the normal way that the standard subjobs are started by the operator. The time argument is optional; when it is given, the AUTO file is run at the specified time. :BATMAX n] :BATMIN n] | Specify the maximum number of batch jobs allowed. Specify the minimum number of batch jobs guaranteed. (continued on next page) ] Not yet implemented. Version 4 OPSER | 2-135 COMMANDS - 598 - OPSER program (Cont)l Command Format (cont) :CLOSE :CURRENT Close the disk log file without opening a new one. Type the number of the current subjob (the last one typed into). Output from another subjob does not affect current subjob . :DAYTIME Obtain the current date and time. :DEFINE xxx=n Associate the symbol xxx as the mnemonic for subThe symbol B is reserved for the subjob running BATCON ., job number n. :DEVICE nam:log:n Assign the device with the physical name nam and logical name log to subjob n. The logical name is optional but a null field must be typed if the name is omitted, e.g., :DEVICE CDR::3. :ERROR n Report only error messages (that is, ignore nonerror messages from subjob n). Message reporting is re- sumed with the :REVIVE command. EXIT Exit to the monitor if no subjobs are in use; other- wise give a list of those that are running. This should be used instead of 1C, since EXIT does not return the job to monitor mode if there are any active subjobs. :FREE Type the first free subjob number. :HELP Type a text which briefly explains the commands . :JCONTn Continue the specified stopped job. :KJOB, n,m,p Kill the specified subjobs saving all files. Causes /Z:0 to be included to KJOB so spooled files are not queued. :KILL n,m,p Kill the specified subjobs. This is identical to :KJOB. :KSYS hhmm :LOGIN proj,prog Stop all timesharing at the time specified by hhmm. Login a new subjob. If no project-programmer num- ber is typed, assume OPSER's project-programmer number. :MSGLVL 0. Cause the response to the :WHAT command to include the JOBSTS bits. (continued on next page) Version 4 QOPSER 2-136 - 599 - ' .COMMANDS [OPSER program (Cont) Command Format (cont) :tMSGLVL 1 ~ Cause the response to :WHAT command to eliminate the JOBSTS bits. :QUEUE <line> Initiate the first free subjob and send the typed-in line to the system queue manager. :RESOURCES Jype the list of the available system resources. :RESTRICT dev] Make the specified device a restricted device (i.e., one that is assignable only by a privileged job or the MOUNT program). :REVIVE n Resume normal echoing of output from subjob n. :SEND <line> Simulate the SEND monitor command. SET a Simulate a SET monitor command. :SET RUN CPUn Add CPUn to the pool of CPUs to be used for run- Valid SET monitor commands are SET CORMAX, SET CORMIN, SET DATE, SET DAYTIME, SET LOGMAX, SET OPR TTY, SET SCHED, and SET TTY. ning jobs. :SET RUN NO CPUn Remove CPUn from the pool of CPUs to be used for running jobs. :SILENCE n, :SLOGIN proj, prog Ignore all output from subjob n. LOGIN one subjob but suppress its response. If proj, prog is omitted, OPSER uses its own. :STOP n Put the specified subjob in monitor mode. This is equivalent to inputting two conirol=C's in interactive mode. SYSTAT xx Run SYSTAT with optional argument xx over the first free subjob. :TLOG filespec Create a disk log file with the specified name. If the file already exists, a message is typed to deter= mine whether the existing file should be superseded. If not, the file is appended to the existing one. Default for filespec is OPSER.LOG. TJTYTST Test this terminal by typing all the ASCII characters between octal 40 and 174, inclusive. (continued on next page) ] Not yet implemented. Version 4 OPSER 2-137 COMMANDS - 600 - IEPSER program (Contfl Command Format (cont) tUNRESTRICT dev]‘ ' Make the specified device a unrestricted device (i.e., one that is assignable by both privileged and non-privileged- jobs). ‘WHAT n,m, p Type the status of the specified subjobs on the terminal. The status includes a SYSTAT with the time, the time of the last input and the last output, and a linear listing of the JOBSTS bits. When a subjob number or name is required in a command string, the subjob may be specified in one of four ways. It can be omitted, in which case the last subjob typed into is used. implied. The mnemonic ALL may be used, in which case all active subjobs are A decimal number can be used from zero to the limit OPSER is generated for. Finally, a mnemonic can be assigned to the subjob with the :DEFINE command. Examples sR OPSER,) *:AUTO To start an automatic startup file. CTY.ATO tMSGLVL 0 sTLOG An example of an automatic startup file. $SLOG DAE= sDEFINE DAE~-R DAENON 2 5LOG :DEFINE M= M= OMOUNT M-=START $SLOG tDEFINE L-g L= LPTSPL L=-START :SLOG :DEFINE B-MJOB B-KR B= 5 BATCON B-START ]Nof yet implemented. Version 4 OPSER 2-138 - 601 - ~ COMMANDS PJOB command Function The PJOB command causes the monitor to respond with the job to which the user's terminal is : attached. Command Format PJOB Characteristics The PJOB command: Leaves the terminal in monitor mode. Associated Messages Refer to Chapter 4. Example +PJOBJ ] . — . P 2-139 COMMANDS - 602 - PLEASE command Function The PLEASE command allows the user non-conflicting two=way communicat ion with the desig- nated station operator. Command Format PLEASE dev: prog! text dev = any terminal not assigned to a job (i.e., is not a job’s controlling terminal) with which the user wishes to communicate, including: a. b. c. TTYn: directs the text to a specific terminal unit. The default is TTYO. OPRnn: directs the text to the operator's terminal station nn. (null argument) directs the text to TTYO at the central station. ‘ prog! == the name of the system program to be run automatically when the completed. message is This argument may appear before or after the device argument and must be concluded with an exclamction point. If PLEASE is entered at the CCL entry point, it reads file nnnPLS.TMP. This file is sent to the designated device. After the operator terminates the request, the specified program will be run at its CCL entry point, Neither the dev: or prog! argument can be used from a Batch control file. text = the user's message. The argument is required. Characters are not transmitted until the RETURN, vertical tab, or form feed key is depressed, at which point the entire line is fransmitted. When the user depresses the RETURN, vertical tab, or form feed key, a message informing the operator of the caller's station number, proj-prog number or user's name if monitor job tables are available, and text message is printed on dev:. An ESCAPE or control-C on either the user's terminal or dev: causes communication to terminate and the user's TTY to be left in monitor mode. Note that when the line terminates with an ESCAPE, the line is typed but the operator response is not waited for. Messages may be typed in both directions without retyping the command. Characteristics The PLEASE command: Places the terminal in user mode until ESCAPE is typed. Runs a system program except when used with Batch. Depends on FTCCLX which is normally absent in the DECsystem =-1040. Version 11 PLEASE 2-140 COMMANDS - 603 - [ PLEASE command (Cont)J Restrictions For Batch users, the PLEASE command is trapped By the Batch Controller and only PLEASE text is allowed. It can be used to request operator action while in the Batch mode. The line of text can o_n|y be one line terminated with an ESCAPE, Associated Messages Refer to Chapter 4. Example LPLEASE TELL ME WHEN DTA3 WILL BE FREE,) ' OPERATOR HAS BEEN NOTIFIED iN HALF AN HOUR THANKS tC Version 11 PLEASE "2-141 COMMANDS - 604 - I PLOT command Function The PLOT command is used to place entries in the plotter output queuve. equivalent to the following form of the QUEUE command: This command is QUEUE PLT:jobname = list of input specifications Command Format PLOT jobname = list of input specifications jobname = name of the job being entered into the queve. The default is the name of the first file in the request, not the name of the first file given. These differ when the first file given does not yet exist. input specifications = a single file specification or a string of file specificatio separated by commas, for tne disk files being processed. form devfile.ext[proj, prog]. ns, A file specification is in the dev: = any file structure to which PLTSPL will have access; the default s DSK:. file.ext = names of the files. The filename is optional. The default for the first filename is *, the default for subsequent files is the last filename used. The extension can ke omitted; the default is . PLT, ' [proj, prog] = a directory to which the user has access; the user's directory assumed if none is specified. is If no arguments are given with the command (i.e., only the command name is given), the entriés for all jobs of all users are output. for the input specifications. The asterisk convention can be used Switches that aid in constructing the queue entry can appear as part of the input specifications. These switches are divided info three cate- gories: 1.. Queue-operation = Only one of these switches can be placed mand string because they define the type of queue used can appear anywhere in the command string. 2. request. General = Each switch in this category can appear only mand string because they affect the entire request. appear anywhere in the command string. in the com- The switch once in the com- The switch used can (continued on next page) Version 3 QUEUE 2-142 - 605 - COMMANDS [PLOT command (Cont)J Command Format (cont) 3. File control = Any number of these switches can appear in the command string because they are specific to individual files within the request. The switch used must be adjacent to the file to which it applies. If the switch precedes the filename, it becomes the default for subsequent files. The following switches can be used with the PLOT command: Category Explanation Switch Process the request after the specified time; it is either /AFTER:tt General in the form of hhmm (time of day) or +thhmm (time later than the current time). The resulting AFTER time must be less than the DEADLINE time. If the switch, or the ° value of the switch, is omitted, no AFTER constraints are assumed. /BEFORE:t Queve only the files with creation dates before + where General /BEGIN:n Start the output after n feet. output at the beginning. The default is to start : File Control /COPIES:n Repeat the output the specified numberof times. n must be less than 64, If more than 63 copies are needed, two separate requests must be made. If the File Control t is in the form dd-mmm=-yy hhmm. switch is omiited, single copies are output. /CREATE /DEADLINE :tt Make a new entry into the plotter output queue. This switch is the default for the queue~operation switches. Queue Operation Process the request before the specified time; tt is General either in the form hhmm (time of day) or +hhmm (time later than the current time). The resulting DEADLINE time must be greater than the AFTER time. If the switch, or the value of the switch, is omitted, no DEADLINE constraints are assumed. /DISPOSE :DELETE /DISPOSE :PRESERVE Delete the file after spooling. File Control Save the file after spooling. This is the default for all files except files with extensions .LST, .TMP, and, if the protection is Oxx, .PLT. File Control (continued on next page) Version 3 QUEUE 2-143 - 606 - COMMANDS [PLOT command (Cont) I Command Format (cont) Switch /DISPOSE :RENAME Explanation Category Rename the file from the specified directory immediately, File Control remove it from the logged-out quota and delete it after sposling. This is the default for files with extensions .LST, .TMP, and if the protection is Oxx, .PLT. /F List the entires in the plotter queue, but do not update the queuves. Queue Operation Therefore, the list may not be an up-to-date listing but the listing will be faster than with /LIST. /FORMS:a Place the output on the specified form. The argument to the switch must be six alphabetic characters. General The de- fault is that normal forms are used. /KILL Remove the specified entry from the plotter queve. This switch can be used for deleting a previously submitted Queue Operation - request as long as the request has not been started by the spoolers. /LIMIT:n Limit the output to the specified number of pages. General JUIST List the entries in the plotter queue; if the switch, along with all other switches, is omitted, all entries for all jobs General of all users are listed. /MODIFY ‘ Alter the specified parameters in the job. This switch requires that the user have access rights to the job. It can be used for altering a previously submitted request Queue Operation as long as the request has not been started by the spoolers. /NEW Accept the request even if the file does not yet exist. File Control (continued on next page) Version 3 QUEUE COMMANDS - 607 - [PLOT command (Cont)l Command Format (cont) e Category Explanation Vi Switch /NOTE:a Plot the specified text (a) in the output. File Control /NULL Accept the request even if there is nothing in the re- General quest. No error message is given. /OKNONE Do not output message if no files match the wildcard /PHYSICAL Suppress logical device name assignments for the device specified. : : construction. File Control If the /PLOT: switch is File Control Plot the file in binary mode.- If the /PLOT: switch is File Control Plot the file in ASCII mode. /PLOT:ASCII File Control This is assumed at KJOB time. omifted, the file is plotted in the data mode specified in the file. /PLOT:BINARY omitted, the file is plotted in the data mode specified in the file. /PLOT:IMAGE Plot the file in image mode. If /PLOT: switch is omit~ ted, the file is plotted in the data mode specified in the File Control file. Assign the specified external priority (n=0 to 62) to the request. The larger the number, the greater priority the job has. The default is 10 if no switch is given and 20 ~if the switch is specified without a value. /PRIORITY :n /PROTECT:nnn Assign the protection nnn (octal) fo the job. If the General General switch or the value of the switch is omitted, the standard protection is assumed. Remove the file from the queue. This switch is valid /REMOVE File Control only with /MODIFY and can be used to remove a pre- viously submitted file as long as the spoolers have not started processing the request. /SEQ:n Specify a sequence number to help in identifying a request to be modified or deleted. General /SINCE:t Quevue only the files with creation dates after the specified time t where t is in the form dd=mmm=yy hhmm. General (continued on next page) Version 3 QUEUE 2-145 COMMANDS - 608 - LPLOT command (Contfl | Command Format (cont) ‘Switch Explanation /START:n » Category Start on the nth line of the file. If the switch, or the value of the switch is omitted, the first line is assumed. File Control /STRS Search for the file on all file structures in the search list and take each occurrence. The default is to take just the first occurrence. File Control /UNPRESERVED Output the files only if they are not preserved (i.e., the first digit of the protection code is 0). This switch avoids redundant plotting. General Characteristics The PLOT command: Leaves the terminal in monitor mode. : Runs the QUEUE program, thereby destroying the user's core image. Depends on FTQCOM which is normally absent in the DECsystem=-1040. Associated Messages Refer to Chapter 4. Examples sPLOT *.PLT/FORMS :PLAIN) Cause all files with the extension PLT in the user's ared to be plotted. Because these are spooled files (i.e., have the extension . PLT), the files are renamed out of the user's area immedi deleted ofter plotting. ately, and The operator is asked to put PLAIN paper on the plotter. Version 3 QUEUE COMMANDS - 609 - PRESERVE command ! Function The PRESERVE command renames the specified files with the standard protection inclusivelyi ORed with 100 (usually 155 or 157). The files are then preserved and KJOB will not delete them unless requested to. This command has the same action as the P argument to the KJOB command when individually determining what to do with each file. ‘ Command Format PRESERVE filel.ext,file2.ext, file3.ext,. .7 . The full wildcard construction can be used for either the filename or the extension. Chqracterisfics The PRESERVE command: - Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DEFsystem-'lO40. Associated Messages Refer to Chapter 4. Example PRESERVE TEST.MAC,) <PRE PROG» ) COLE.F4,NAME.* ]This command runs the COMPIL program, which interprets the command before running PIP. Version 20 COMPIL Version 32 PIP 2-147 COMMANDS - 610 - | PRINT command Function The PRINT command is used to place entries into the line printer output queue. is equivalent to the following form of the QUEUE command: This command QUEUE LPT:jobname = list of input specifications Command Format PRINT jobname = list of input specifications jobname = name of the job being entered into the queue. The default is the name of the first file in the request, not the name of the first file given. These differ when the first file given does not yet exist. input specifications = a single file specification or a string of file specifications, sepa~ rated by commas, for the disk files being processed. devfile.ext[proj, prog]. A file specification is in the form dev: = any file structure to which LPTSPL will have access; the default is DSK:. file.ext = names of the files. The filename is optional. The default for the first filename is *, the default for subsequent files in the last filename used. The extension can be omitted; the default is . LPT. [proj, prog] = a directory to which the user has access; the user's directory is assumed if none is specified. If no arguments are given with the command (i.e., only the command name is given), the entries for Gll jobs for all users are output. The asterisk convention can be used for the input specifications. Switches that aid in constructing the queue entry can appear as part of the input specifications. switches are divided into three categories: 1. These Queue-operation = Only one of these switches can be placed in the command string because they define the type of queue request. The switch used can appear anywhere in the command string. 2. General - Each switch in this category can appear only once in the command string because they affect the entire request. The switch used can appear anywhere in the command string. (continued on next page) Version 3 QUEUE 2-148 COMMANDS - 611 - IPRINT command (Cont)l Command Format (cont) switches can appear in the command 3. File control = Any number of these ‘ndivi dual files within the request. The to ic specif string because they are it applies. If the switch switch used must be adjacent to the file to which lt for subsequent files. precedes the filename, it becomes the defau The following switches can be used with the PRINT command: Switch /AFTER:tt _ Category Explanation General ied time; it is either Process the request after theof specif day) or +hhmm (time later ———————————— o in the form of hhmm (time than the current time). The resulting AFTER time must or the be less than the DEADLINE time. If the switch, aints value of the switch, is omitted, no AFTER constr are assumed. General a creation date before time t, Queue only the files with dd-mmm-yy hhmm. If this switch /BEFORE:t where t is in the form is omitted, no BEFORE constraints are assumed., /BEGIN:n /COPIES:n Start the output on the nth page. The default is to begin File Control output on the first page. Repeat the output the specified number of times. nmust File Control be less than 64. If more than 63 copies are needed, two separate requests must be made. If this switch is omitted, one copy is given. Queve Operation queve. Make a new entry into the line printer output operation /CREATE ' /DEADLINE :tt This switch is the default for the queue~ switches. ‘ tt is either General Process the request before the specified time; (time later than ‘n the form hhmm (time of day) or +hhmm the current time). The resulting DEADLINE time must be greater than the AFTER time. If the switch, or the ' value of the switch, is omitted, no DEADLINE con- ' /DISPOSE:DELETE /DISPOSE:PRESERVE straints are assumed. Delete the file after spooling.. the default for all Save the file after spooling. This is .LST, .TMP, and, files except files with extensions of if the protection is Oxx, .LPT. Version 3 QUEUE File Control ' 2-149 File Control (continued on next page) COMMANDS -612 - [EBINT command (Com Command Format (cont) Switch /DISPOSE:RENAME Explanation Category Rename the file from the spec ified directory immediately, remove it from the logg ed-out quota, and dele te it after File Control spooling. /F This is the default for files with extensions -LST, .TMP, and, if the protection is Oxx, .LPT . List the entries in the line printer queue, but do not update the queves. Therefor e, the list may not be an up- to~date listing but the listi ng will be faster than /LIST, /FILE:ASCII Queuve Operation with Indicate that the input file format is to be interpreted as ASCII text. This is assu med for all files with ex~ File Control tensions other than .DAT . /FILE :COBOL Indicate that the input file as COBOL SIXBIT text . /FILE:F ORTRAN Indicate that the input file FORTRAN ASCII text (obe characters). of .DAT. /FORMS :q format is to be interpreted File Control format is to be interpreted File Control ys FORTRAN carriage control This is assumed for files with the extensjon Place the output on the spec ified form. The argument to the switch must be six alph abetic characters. The defa ult is General that normal forms are used /HEADER:0 or 1 . Output block headers at the (default). /KILL beginning of the file, if 1 Do not output headers, if 0. Remove the specified entr y from the Batch input quev e. This switch can be used for deleting a previously sub- mitted request as long as by the spooler. /LUMIT:n /LST the request has not been ified number of pages. General printer queve; if the switch, Queue Operation along with all other switches fer all jobs of all users are /LOG , is omitted, all entries listed. Define the file that the spoo process. Queve Operation started Limit the output to the spec List the entries in the line File Control lers will use to record their The default is jobname . LOG., File Control (continued on next page) Version 3 QUEUE 2-150 COMMANDS - 613 - [PRINT command (Cont)| Command Format (cont) Explanation Switch Alter the specified parameters in the job. /MODIFY Category This switch requires that the user have access rights to the job. Queue. Operation It can be used for altering a previously submitted request as long as the request has not been started by the spooler. /NEW Accept the request even if the file does not yet exist. File Control /NOTE:a Print the specified text (a) in the output. File Control /NULL Accept the request even if there is nothing in the General request. /OKBINARY No error message is given, Print files whose extensions imply binary information. File Control Normally files with extensions .SAV, .SHR, .LOW, .REL, and .HGH will not appear in the print queue. /OKNONE " Do not output message if no files match the wildcard construction. /PHYSICAL File Control This is assumed at KJOB time. . Suppress logical device name assignments for the device File Control specified. /PRINT:ARROW Convert all control characters to up~arrow format except 011-015 and 020-024. This is the default. File Control /PRINT:ASCII Send the file to the line printer with no changes. File Control /PRINT:OCTAL Perform an octal dump of the file. File Control Suppress all carriage=control characters except for File Control /PRINT:SUPPRESS ASCII code characters LF and CR; this switch implies the use of the /PRINT:ARROW and is equivalent to the operator command to the spooler (SUPPRESS). /PRIORITY :n Assign the specified exterhal priority (n=0 to 62) to the request. General The larger the number, the greater priority the job has. The default is 10 if no switch is given and 20 if the switch is specified without a value. /PROTECT :nnn Assign the protection nnn (octal) to the job. If'the General switch, or the value of the switch, is omitted, the standard protection is assumed. ' (continued on next page) Version 3 QUEUE 2-151 COMMANDS - 614 - PRINT command (Cent) Command Format (cont) Switch Explanation /REMOVE Remove the file from the queve. Category This switch is valid only with /MODIFY and can be used to remove a previously File Control submitted file as long as the spooler has not started processing the request. /REPORT :code Print the specified report within a COBOL report file. Code can be up to 12 characters in length. File Control /SEQ:n Specify a sequence number to help in identifying a request to be modified or deleted. General /SINCE:t Queue only the files with creation dates after the speci- General fied time t where t is in the form dd-mmm-yy hhmm, /SPACING :DOUBLE /SPACING :SINGLE Double~space the output lines. Single-space the output lines. /SPACING switch is used. /SPACING :TRIPLE /START:n File Control This is the default if no Triple=space the output lines. Start on the nth line of the file. File Control File Control If the switch, or the File Control value of the switch, is omitted, the first line is assumed. /STRS Search for the file on all file structures in the search list and take each occurrence. The default is to take just File Control the first occurrence. /UNPRESERVED Output the files only if they are not preserved (i.e., the first digit of the protection code is 0). General This switch avoids redundant printing. Characteristics The PRINT command: Leaves the terminal in monitor mode. Runs the QUEUE program, thereby destroying the user's core image. Depends on FTQCOM wkich is normally absent in the DECsystem=1040. Associated Messages Refer to Chapter 4. Version 3 QUEUE 2-152 -615- . COMMANDS [PRI'NT command (Contfl Examples +PRINT NOTICE" TXT) «PRINT SYSTAT.SCM/DISP:REN/COP :2) Print the file DSK:NOTICE. TXT. Print two copies of the file DSK:SYSTAT.SCM from the user's default area. Rename the file out of the user's area immediately and delete it after spooling. «PRINT *+TXT/HFAD:0/FORMS :2PART,) Print all files in the user's area which have the extension .TXT. Do not print file headers between the files. Print the files on forms known to the operator as 2PART. Remove the request with sequence number 356 from the LPT queve. This is accepted only if the spooler ‘has not started processing the request. <PRINT /SEQ:356/KILL) +PRINT LOADER«SAV/0KBINARY/PRINT :SUPPRESS) Print a file known to be a binary file and suppress all carriage control characters except CR and LF, ~ «PRINT PRGMAC+REL/PRINT:0CTAL ) Print an octal dump of the file PRGMAC, REL. Version 3 QUEUE 2-153 COMMANDS - 616 - PROTECT command 1 Function The PROTECT command renames the specified files with the requested of this command is similar to the R switch in PIP. The protection of a file is indicated by three octal digits. class of user. protection. The action Each digit represents a particular O —=NWHhOOON The first digit represents the owner of the fi le, the second represents users with the same project number of the owner, and the third represents all of the other users. Each number in the three digit code can be one of the following : No access privileges Execute the file only Read and execute the file Append, read, and execute the file Upddte, append, read, and execute the file Write, update, cppend, read, and execute the file Rename, write, update, append, read, and execute the file Change protecticn, rename, write, update, append, read, and execute the file. The standard protection is normally 057 which means the owner has all privileges (0), users in the owner's project can read and execute the file (5), and all other users cannot access the file (7). However, the system standard may be changed by the individua l installations. Command Format PROTECT filel<nnn>, file2 <nnn>, file3 <nnn>, ... The protection can be specified before the filename in which case it is the default for subsequent files until changed. The full wildcard construc tion can be used for either the filename or the extension. Characteristics The PROTECT command: Leaves the terminal in menitor mode. Runs the PIP program, thereby destroying the user's Depends on FTCCLX which is normally absent core image. in the DECsystem-1040. ]This command runs the COMPIL program, which interprets the command before running Version 20 COMPIL Version 32 PIP 2-154 PIP, - 617 - COMMANDS [PROTECT command (Cont)| Associated Messages Refer to Chapter 4, Examples: +PROTECT PRO FORM.*<157>) MAIN.MAC<123>, Version 20 COMPIL Version 32 PIP <456>EQUIL-CBL:ADD.ALG) 2-155 COMMANDS - 618 - QUEUE command Funcfiorg The QUEUE command allows the user to make entries in several system queues - the input queue for the Batch system, and the output spooling queues for the line printer, the card punch, the paper~tape punch, and the plotter. The QUEUE command also provides the means of ob- taining listings of the entries in the queves. Command Formats 1. QUEUE INP: jobname = control file specification, log file specification & To make an entry in the Batch input queve, INP:. 2. QUEUE output queue naime: jobname = list of input specifications To make an entry in an output spooling queve. 3. QUEUE listing file specifications/LIST = list of queue names To obtain a listing of the entries in a queve. 4, The following six commands can be substituted for the various formats of the QUEUE command: a. CPUNCH jobname = list of input specifications equivalent to QUEUE CDP: jobname = list PLOT jobname = list of input specifications equivalent to QUEUE PLT: jobname = list PRINT jobname = list of input specifications equivalent to QUEUE LPT: jobname = list PUNCH jobname = list of input specificafions] equivalent to QUEUE PTP: jobname = list SUBMIT jobname = control file name, log file name equivalent to QUEUE INP: jobname = control file, log file TPUNCH jobname =’ list of input specifications equivalent to QUEUE PTP: jobname = list Queue names are taken from the following list: INP: (I:) LPT: (L:) CDP: (C:) PTP: (PT:) PLT: (PL:) Batch input queue line printer output queuve, default condition card punch output queue paper-tape punch output queue plotter output queue ]The PUNCH command can be redefined by the installation to be equivalent to QUEUE CDP: jobname = list. Version 3 QUEUE 2-156 - 619 - . COMMANDS QUEUE command (Cont)] Command Formats (cont) Control file specification is the file specification, plus switches and keyword parameters, fof the control file being submitted to the Batch input queue. This file can be on any file structure that the user has access to; the default is DSK:. The filename is required, but the extension can be omitted; the default is .CTL. The asterisk construction is legal for the filename or extension. Log file specification is the file specification for the file that is to be used to record actions taken during the execution of the control file. This file can be on any file structure in which the user can write. The default is the same file structure in which the control file resides. If the filename is missing, the log file is given the same name as the control file. If the extension is omitted, it is .LOG, Jobname is the name of the job being entered info the queve. The default jobname is the name of the first file in the request not the first file given. These names are different when the first file given does not yet exist. Input specifications are the file specifications for the disk files to be processed, and the various switches and keyword parameters that aid in constructing the queue entry. The files can be on any file structure that the queue processor has access to; the default is DSK:. The files can be in any directory, provided that the user has read-access to them; the default is the user's direc~- tory. The filename is optional; the default is * for the first filename. The default for subsequent filenames is the last filename used. . Note that the asterisk construction is legal only in the input specifications. The extension can be omitted because each queue has a default extension for the files to be processed. These default extensions are: .CTL - Batch input queue .LPT .CDP - line printer queuve card punch queue .PTP - paper-tape punch queuve .PLT - plotter queue The listing file specification is the description of the listing file. The default for the listing file destination is TTY unless a name is specified. If no queue names are specified, all queues for all the jobs of all users are listed. Switches - Three categories of switches are provided. The first category contains the switches that define the operation; the second contains the switches that can appear only once because they affect the entire request; the third contains the switches specific to each file. In general, switches that precede the filename become the default for all succeeding files. This is true also for a device name, an extension, or a directory name that precedes a filename. Queue-Operation Switches - Only one of this type of switch can be placed in a command string, because these switches define the type of queue request. This switch may appear anywhere in the command string. Version 3 QUEUE 2-157 COMMANDS - 620 - LQU EUE command (Contfl Command Formats (cont) General Queue Switches - Each of these switches can appear only once in a command string. They affect the entire request, generall y in terms of scheduling. These switches can appear anywhere in the command string. File-Control Switches - These switches affect the individual files in a request adjacent to the filename in the command string. and must be In order to change the defaults for the rest of the files, however, these switches must appear before a filename. In the table of switches below, the following conventions have been used: ALL - Switches that can appear for both the Batch input queue and the output queues. INPUT - Switches that can appear only for the Batch input queve. LIST - Switches that can appear only for the listing file specification. OUTPUT - Switches that can appear only for the output queues. Switch /AFTER:# Meaning Category Process the request after the specified time. Queues General ALL General QUTPUT File Control OUTPUT General INPUT t is either in the form hhmm (time of day) or +hhmm (time later than the current time). The re- sulting AFTER time must be less than the DEADLINE time. If the switch, or the value of the switch, is omitted, no AFTER constraints are assumed. /BEFORE:t Queue only the files with creation dates before time t where t = ddmmm-yy hhmm, /BEGIN Start the output on the nth page, card, or foot. The default is to begin output on the first unit. /CARDS:n Use n (decimal) as the maximum number of cards that can be punched by the job. If the switch is omitted, no cards are punched. If the switch is given with no value, 2000 cards is assumed as the maximum, (continued on next page) Version 3 QUEUE 2-158 - COMMANDS - 621 - [ QUEUE command (Cont)J Command Formats (cont) Meaning /CHARGE:o] ~ Charge the run to the specified ac~ Queues Category General ALL File Control OUTPUT General INPUT Queue Operation ALL count, Repeat the ou'rth the specified num= /COPIES:n ~ ber of times (n must be less than 64). The default is one copy. If more than 63 copies are desired, two requests must be made. - Use n (in decimal K) as the maximum /CORE:n amount of core memory that the job can use. If the switch is omitted, the maximum of 25K is assumed; if the value of the switch is omitted, a maximum of 40K is assumed. /CREATE Make a new entry in the specified queuve. This switch is the default : for the queue-operation switches. /DEADLINE :# Process the request before the specified time. ALL General t is either in the form hhmm (time of .day) or +hhmm (time later than the current time). The resulting DEADLINE time must be greater than the /AFTER time. If the switch, or the value of the switch is omitted, no DEADLINE constraints are assumed. /DEFER! Make a new entry in the specified - Queue Operation ALL queue, but the request is deferred until LOGOUT, (continued on next page) ]No’r yet implemented. Version 3 QUEUE 2-159 COMMANDS - 622 - [QUEUE command (Cont)] Command Formats (cont) Meaning Switch /DEPEND:n Category Specifies the initial value of the Queues ‘General INPUT File Control ALL File Control ALL Fite Control ALL Queue Operation LIST General INPUT dependency count in decimal. When used with /MODIFY, this switch changes the dependency count of another job. If n is a signed num- ber (+ or =), that number is added to or subtracted from the dependent job's count. If nis not a signed number, the dependent job's count is changed to n. If this switch is omitted, no dependency is assumed. /DISPOSE:DELETE Delete the file after spooling. /DISPOSE :PRESERVE Save the file ofter spooling. This is the default for files with extensions of .LST, .TMP, and if protection is Oxx, .CDP, .LPT, .PLT, .PTP. /DISPOSE :RENAME Rename the file from the specified directory immediately, remove it from the logged--out quota, and delete it after spooling. This is the default for files with exten= sions of .LST, .TMP, and if pro=tection is Oxx, .CDP, .LPT, .PLT, .PTP. /F List the entries in the queue, but do not update the queues. There- fore, the list may not be an up=todate listing of the queues but the listing will be faster than with /LIST. /FEET:n Use n (in decimal) as the maximum number of feet of paper tape that the job can punch. If the switch is omitted, no paper tape is punched. If the value is omitted, the default is 10*B+20 feet, where B is the num- ber of blocks in the request. (continued on next page) Version 3 QUEUE 2-160 COMMANDS - 623 - {QU EUE command (Cont) Command Formats (cont) Switch Category ‘Mearing Queues /FILE:ASCII Specify that the input file format is to be interpreted as ASCII text. This is assumed for all files with extensions other than .DAT. File Control OUTPUT /FILE:COBOL Specify that the input file format is to be interpreted as COBOL File Control OUTPUT SIXBIT text. /FILE:ELEVEN Specify that the input file format is to be interpreted as binary format. File Control OUTPUT /FILE:F ORTRAN Specify that the input file format is to be interpreted as FORTRAN ASCII text (obeys FORTRAN File Control OUTPUT General OUTPUT File Control OUTPUT Queue Operation ALL carriage control characters). is assumed for files with an extension of .DAT. /FORMS:a This Place the output on the named forms. The argument to the switch must be six alphabetic characters. Normal forms (14 x 11) are used if this switch is omitted. Narrow forms are 8-1/2 x 11, /HEADER:0 or 1 Output block headers at begin- ning of the file if 1 (default); do ‘not output headers if O. /HELP Print a message giving the general format of the command string and ex- plains the dialogue that is entered if the user needs additional help. /KILL Remove the specified entry. from the specified queuve. This switch requires an output specification; it does not default to LPT:* The /KILL switch can be used for deleting a previously submitted request as long as the request has not been started. ' (continued on next page) Version 3 QUEUE 2-161 COMMANDS - 624 - lQUEUE command (Contfl Command Formats (cont) Switch Meaning /LIMIT N ) Category Limit the output to the specified number of pages, cards, feet, or Queves General OUTPUT Queue Operation LIST File Control OUTPUT (LPT) minutes. /LIST List the specified entries in the queue; the default entries are those for queues for all the jobs of all users. /LOG Define the file that the spoolers will use to record their output. The de- fault is jobname.LOG. /MODIFY Alter the specified parameters in the ' ~ Queue Operation ALL specified jobs; this switch requires that the user have access rights to the job. It also requires a queue name; it does not default to the LPT. This switch can be used to modify a pre' viously submitted request as long as the request has riot been started. /NEW Accept request even if file does not yet exist. File Control ALL File Control OUTPUT General OUTPUT File Control OUTPUT (LPT) - File Control OUTPUT This is the default for the log file of Batch input queve. /NOTE:a Output the specified text (a) in the output. /NULL Accept request even if there is nothing in the request. No error message is given. / OKBINARY Print files whose extensions include binary information. Normally files with extensions .SAV, .SHR, .LOW, -REL, and .HGH will not be in print queues. /OKNONE : Do not produce message if no files match the wildcard construction. . (continued on next page) Version 3 QUEUE 2-162 COMMANDS - 625 - L— QUEUE command (CoLt)I Command Formats (cont) 1 Switch /OUTPUT :n Category . Meaning Cause job to terminate with a /Z:n to KJOB (n is from O to 4). Quevues General INPUT General INPUT Identical to /PUNCH:x, /PRINT:x, /TAPE:x, or /PLOT:x. File Control OUTPUT Suppress logical device names for File Control ALL File Control OUTPUT (PLT) File Control OUTPUT (PLT) N=0 Suppress all normal queuing performed at LOGOUT time. N=1 Queue only the log file. N=2 Queue only the log file and spooled output (e.g., *.LPT). N=3 Queue the log file, spooled output, and *, LST files. N=4 Queue the log file, spooled output, *,LST files, and any requests deferred to LOGOUT fime. /PAGE:n ‘Usen (decimal) as the maximum number of pages of output that the job can print. If the switch is omitted, the maximum is 200 pages; if only the value is omitted, a maximum of 2000 pages can be printed. /PAPER :x /PHYSICAL the specified device. /PLOT:ASCII Plot the file in ASCII mode. If ‘the /PLOT switch is omitted, the file is plotted in the data mode specified in the file. /PLOT:BINARY ‘ Plot the file in binary mode. If the /PLOT switch is omitted, the file is plotted in the data mode specified in the file. (continued on next page) . Version 3 QUEUE 2-163 COMMANDS - 626 - LQU EUE ¢command (Cont) I Command Formats (cont) Switch /PLOT:IMAGE Meaning Category Plot the file in image mode, Ifthe /PLOT switch is omitted, the file is Queues File Control OUTPUT (PLT) File Control OUTPUT (LPT) File Control OUTPUT (LPT) plotted in the data mode specified in the file. /PRINT:ARROW Convert all control characters to uparrow format except 011-015 and 020-024. /PRINT:ASCII This is the default. Send the file to the line printer with no changes. /PRINT:OCTAL Print the file in octal. File Control OUTPUT (LPT) /PRINT:SUPPRESS Suppress all character-control char~ File Control OUTPUT (LPT) acters except for ASCII code charac- ters LF and CR; this switch implies the use of the /FRINT:ARROW, Equivalent to operator command to spooler (SUPPRESS). /PRIORITY :n Give the specified external priority (n =0 to 62) to the request. ~ General ALL General ALL File Control OUTPUT (CDP) File Control OUTPUT (CDP) A larger number is greater priority. The default is 10 if no switch is given, and 20 if a switch is given without the value. /PROTECT :nnn Specify a protection nnn (in octal) for this job or queue entry. If the switch, or the value of the switch, is omitted, the standard protection is assumed. /PUNCH 026 Punch files in 026 Hollerith code. If the /PUNCH switch is not given, the files are punched according to the data mode of the file. /PUNCH:ASCII Punch files in ASCII card code. the /PUNCH switch is not given, If the files are punched according to the data mode of the file. (continued on next page) Version 3 QUEUE 2-164 COMMANDS - 627 - [QUEUE command (Cont) Command Formats (cont) Meaning - Switch /PUNCH:BINARY Category Punch files in binary card format. If Queves File Control OUTPUT (CDP) File Control OUTPUT (CDP) File Control OUTPUT (CDP) File Control OUTPUT File Control OUTPUT (LPT) General INPUT General ALL General OUTPUT the /PUNCH switch is not given, the files are punched according to the data mode of the file. /PUNCH:D029 Punch files in the old DEC 029 card code. If the /PUNCH switch is not given, the files are punched according to the data mode of the file. /PUNCH:IMAGE Punch files in image mode. If the /PUNCH switch is not given, the files are punched according to the data mode of the file. /REMOVE Remove the file from the queue. This switch is valid only with the /MODIFY switch and can be used to remove a previously submitted - file as long as the Batch System has not started processing the-job. /REPORT :code Print the specified report within a COBOL report file., Code can be up to 12 characters in length, /RESTART:0 or 1 A value of 0 (default) means the job cannot be requeued or restarted by the operator after a system crash, A message is sent to the job's log file. A value of 1 means the job will be requeued or restarted. The job should not be restartable if there are changes to the permanent file directory. /SEQ:n Specify a sequence number to aid in identifying a request to be modi- fied or deleted. /SINCE:t Queue only the files with creation dates after the specified time t where t is in the form dd=mmm-yy (continued on next page) hhmm, Version 3 QUEUE 2-165 COMMANDS - 628 - | |QUEUE command (Cont)| Command Formats (cont) iv!'ifch _Afigfmihg - Category Queves /SPACING:DOUBLE Double-space the output lines. File Control OUfil—J-T—ZEPT) /SPACING :SINGLE Single=space the printed lines File Control OUTPUT (LPT) Triple=space the printed lines. File Control OUTPUT (LPT) Start on n line of the file. File Control ALL File Control OUTPUT File Control OUTPUT (PTP) File Control OUTPUT (PTP) File Control OUTPUT (PTP) File Control OUTPUT (PTP) General INPUT (default). /SPACING:TRIPLE /START :n If the switch, or the value of the switch, is omitted, the Batch System starts with the first line. /STRS Search for the file on all structures in the search list and takes each occurrence. » The default is to take just the first occurrence of the file. /TAPE:ASCII Punch the tape in ASCII code. If the /TAPE switch is not given, the files are punched according to the data mode of the file. /TAPE:BINARY Punch the tape in binary mode. If the /TAPE switch is not given, the files are punched according to the data mode of the file. /TAPE:IBINARY Punch the tape in image=binary mode. If the /TAPE switch is not given, the files are punched according to the data mode of the file. /TAPE:IMAGE Punch the tape in image mode. If the /TAPE switch is not specified, the files are punched according to the data mode of the file. /TIME thhmmss Specify the central processor time limit for the job. If no switch is specified, the limit is 5 minutes; if the switch is specified without a value, the limit is 1 hour. (continued on next page) Version 3 QUEUE 2-166 COMMANDS - 629 - [QUEUE command (Cont)l Command Formats (cont) ~ Meaning ‘ _ Switch Use n (decimal minutes) as the max~ /TPLOT:n Queves Category General INPUT imum amount of plotting time allowed for the job. If the switch is omitied, no plotter time is allowed; if the value is omitted but the switch is given, the maximum plotter time is 10 minutes. /UNIQUE: 0 or 1 Run any number of Batch jobs under this project-programmer number at the same time, if 0. Runs only one Batch job af any one time, if 1 (default). General INPUT /UNPRESERVED Output file only if not preserved. General OUTPUT /ZDEFER! Create a new entry in a queve and defer it until LOGOUT; however, the deferred file is zeroed first so Queue Operation ALL that all previous /DEFER requests from the current job are deleted. Characteristics The QUEUE command (and its associated variations): Leaves the terminal in monitor mode. Runs the QUEUE program, thereby destroying the user’s core image. Does not require LOGIN when only queue listings are desired. Depends on FTQCOM which is normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. T —— g, lNoi’ yet implemented. Version 3 QUEUE 2-167 COMMANDS ~ 630 - [QUEUE command (Cont) ] Examples Enter files FILEA. LPT and FILEB,LPT in the line- <QUEUE FILEA,FILEB ) printer queue under the jobname of FILEA, <QUEUE Enter file TEST.CTL in the Batch input queue under INP:=TEST) jobname TEST and log file with name TEST.LOG. <QUEUE Enter file MAN.CTL in the Batch input queue IN:PAYR=MAN J) under jobname PAYR and log file with name MAN.LOG. SQUEUE DSK:A«X=/LIST)) Place a queue listing of all jobs into file A.X in the user's disk area, +QUEUE Place file FILEA.CTL in the Batch input queue with the jobname FREED. An external priority of 4 and CPU time limit of one minute and five seconds are set for the job. The log file is named FILEA,LOG, INP:FREED=FILEA/CREATE /PRIORITY:4/TIME:1:5) 2QUEUE Remove the entry corresponding to TEST.CTL from INP:TEST=/KILL the Batch input queve. «QUEUE INP:JOBNAM=/MODIFY/TIME:200) Alter the time parameter of the entry corresponding to JOBNAM.CTL in the Batch input queue. s@JEUE INP3=J0B.CTL/PAGES:500/TPLOT 220 ) Establish a limit of 500 pages and 20 minutes of plotting on the output generated by this job. cQWUEJUE PLI':=JOB.PLYT/LINMIT :2@) Version 3 QUEUE Queve a file to PLTSPL with a limit of 20 minutes of plotting time. 2-~168 COMMANDS - 631 - QUOLST program I Function The QUOLST program informs the user of both the amount of disk space he has used and the amount he has left on each file structure in his search list. This program also returns the amount of free space that the system has left for all users of the structure. Free system space on structures not in the user's search list is not output. This information can be obtained by typing SYSTAT /F. The output given for each file structure consists of 1) the structure name, 2) the number of blocks used, and 3) the numbers of blocks left in the logged=in quota, in the logged-out quota, and on the structure. Command Format R QUOLST Characteristics The R QUOLST command: Leaves the terminal in monitor mode. Runs the QUOLST program, thereby destroying the user’s core image. ExamE les =H QUOLST) JSER? 21,400 DSKA: DSKB: 9 491 STr DSKC® USED LEFT3CIN)> o 10009 1000 9509 COUT) (S5YS) 50089 396 100 4509 4723 4249 The user is over quota on DSKA: <R QUOLST ) USER S STR DSKA: DSKB: DSKC s Version 4 QUOLST 31,50 USED__ 1922 1735 %) LEFT:CIN) -22 78265 2000 ¢OUT) -922 8265 1000 2-169 (5YS) 4215 36 6378 and must delete files before he can logout. COMMANDS : - 632 - R command Function The R command loads a core image from the system device and starts it at the location specified within the file (. JBSA). It is equivalent to RUN SYS: file.ext core and is the usual way to run a system program that does not have a direct monitor command to run it. This command clears all of user ccre. However, programs should not count on this action and should explicitly clear those areas of core that are expected to contain zeroes (i.e., programs should be self-initializing). This action allows programs to be restarted by a 1C, START sequence without having to do another R command. On magnetic tape, if the low or high segment is missing, a null record is output before the EOF for the missing segment so that two EOFs cannot occur consecutively. Therefore, a saved null segment does not appear as a logical EOT (2 EOFs in a row). ¢ Command Format R file.ext core . Arguments are the same as in the RUN command except that SYS: is used as the default device. (In nondisk monitors, the default is the generic name that matches the system device.) Refer to the RUN command for a discussion of the core argument. The extension applies to the low file, not the high file. .HGH, is assumed for the high file. An extension of . SHR, then If the user types an extension of .SHR or .HGH, the extension is treated as a null extension since .SHR and .HGH are confusing as low file extensions. : Characteristics The R command: Places the terminal in user mode. Runs a system program. Associated Messages Refer to Chapter 4. Examples R PIPJ * R PIP 5) b 2-170 - 633 - ' COMMANDS REASSIGN command | Function The REASSIGN command allows one job to pass a device to a second job without having the device go through the monitor device pool (restricted or unrestricted). Both restricted and unrestricted devices can be reassigned. This command, applied to DECtapes, clears the copy of - the directory currently in core, forcing the next directory reference to read a new copy from the tape, but does not clear the logicalTMme assignment. If a device is INITed, a RELEASE UUO is performed unless the user issuing the command is reassigning the device to himself. Command Format REASSIGN dev job dev = the physical or logical name of the device to be reassigned. required. This argument is ' job = the number of the job to which the device is to be reassigned. If no job is specified, the device is reassigned to the job issuing the command. This is useful when the user wants to force the next directory reference to come from the tape instead of core. ‘ A logical name which is also a physical name can be reassigned only if the job issuing the command and the job to which the device is to be reassigned have the same project-programmer number, or the user issuing the command has operator privileges (logged-in under [1,2] or logged-in at OPR). However, a logical name cannot be duplicated; i.e., two devices cannot have the same logical name. ) 4 Characteristics The REASSIGN command: Leaves the terminal in monitor mode. Requires core. : \ Does not operate when the device is currently transmitting data. Restrictions The job's controlling terminal cannot be reassigned. 5.05 Monitor ' 2-171 * COMMANDS _634.. [REASSIGN command (Cont)| Associated Messages Refer to Chapter 4. Examples REASSIGN LPT117) R&assign the line printer to job 17. REASSIGN CDP:4 ) Reassign the card punch to job 4. - 635 - COMMANDS REATTA program | Function The REATTA program allows a user to transfer his job from one terminal to another. Unlike the ATTACH command, REATTA does not require a password or that the terminal be of the same type that LOGIN recognizes in order to run the job. For example, usually a [1,2] job can run only on a local terminal. However, the REATTA program can be used to attach a [1,2] job from a local terminal to a remote terminal. Before reattaching his job, the user should verify that the terminal to which he is attaching is turned on and working properly. Otherwise, it might be difficult fo retrieve the job. Command Format .RREATTA ) REATTA responds by asking for the new terminal name. TYPE NEW TTY NAME: The user answers with either the new terminal name (e.g., CTY, TTY2) or number (e.g., 2). REATTA then responds with FROM JOB n on the old terminal, and NOW ATTACHED TO JOB n on the new terminal. Characteristics The R REATTA command: Leaves the terminal in monitor mode. , Runs the REATTA program, thereby destroying the user's core image. Restrictions The R REATTA com'mand is not available to Batch users. Version 3 REATTA 2-173 COMMANDS - 636 - |REATTA program (Cont) | Associated Messages Refer to Chapter 4. Examples «R REATTA,) - TYPE NEW TTY FROM JOB 7 NOW _ATTACHED NAME: TTYZ27)) ;appears on old terminal TO JOB 7 ;appears on TTY 27 * — Version 3 REATTA 2-174 - 637 - ' COMMANDS REENTER command I Function The REENTER command is similar to the DDT command. It copies the saved program counter value from .JBPC into . JBOPC and starts the program af an alternate entry point specified in .JBREN (must be set by the user or his program). If the job was executing a UUO when it was interrupted (i.e., in exec mode but not in TTY input wait or SLEEP mode), the monitor continves the job until the UUO is completed and then traps fo the REENTER address in .JBREN. _If the job is in TTY input wait or SLEEP mode, the trap to the REENTER address occurs immediately and . JBOPC contains the address of the UUO. If the job is in user mode, the trap also occurs immediately. Therefore, it is always possible to continue the interrupted program after trapping by executing a JRSTF@, JBOPC. Command Format REENTER Characteristics The REENTER command: Places the terminal in user mode. " Requires core. Requires the user to have a job number. Associated Messages Refer to Chapter 4. Example «REE) 3-175 COMMANDS - 638 - I RENAME command 1 Funcfi_g_q The RENAME command changes the name of one or more files on disk or DECtape. Command Format RENAME arg arg = a pair of file specifications separated by an equal sign, or a string of such pairs - separated by commas: RENAME new! = old1, new2 = old2, ... Device or file structure names can be specified only with the new filename and remain in effect until changed or until the end of command string is reached. “In addition, a protection may be specified with the new filename and remains in effect only for that filename. This command accepts the full wildcard construction. Characteristics The RENAME command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=1040, Associated Messages Refer to Chapter 4. ]This command runs the COMPIL program, which interprets the command before running PIP. Version 20 COMPIL Version 32 PIP 2-176 - 639 - - COMMANDS |RENAME command (Cont)] Example <RENAME Tt1.MAC=T1.MAC) FILES RENAMED : T1.MAC sRENAME *+.BAK=#*.MAC,) FILES RENAMED: Til.MAC . MAC T2 T3 . MAC sRENAME TEST.MAC<@57>=TEST«MAC) FILES ¢ RENAMED TEST « MAC Version 20 COMPIL Version 32 PIP 2-177 - 640 - COMMANDS RESOURCES command Function The RESOURCES command prints the names of all available devices (except TTY's and PTY's), all file structures, and all physical units not in file structures (unless they are down or nonexistent). Command Format RESOURCES Characteristics The RESOURCES command: Leaves the terminal in monitor mode. Does not require LOGIN, Example ,RES) DSKA'DSKB;DSKCnDPBE,DPBi;CDRG;2|PTRGJLPTmp1'203}DTA3131405l5'70MtAgLLy21 - PTPO,CDP2,PLTR,DISA 2-178 COMMANDS - 641 - RESTORE program I Function The RESTORE program enables the user to place back onto disk that which was saved on the backup medium (magnetic tape, disk, or DECtape) with the BACKUP program. This includes restoring the entire disk or a subset of the disk. The data to be returned to the disk is read from the BACKUP SET file. This file contains the data that was saved with one BACKUP command. On a restore,. either the BACKUP SET file can be scanned for the desired files or the index file can be searched to determine where the requested data is stored within the BACKUP SET file. The index file contains the directories of all areas written on the backup medium along with the relative block number in the BACKUP SET file where each file begins. When the entire backup medium is being restored, the RESTORE program starts af the beginning of the index file and continues until it reaches the last file in the index. concerning the During a restore, a command recovery file is created that contains information portion of the user's command that has been executed and the portion that is remaining. This file resides on the disk and is updated as portions of the user's request are completed. The com" mand recovery file is valuable if the system fails because only part of the restore need be redone. As files are restored to disk , UFDs are created for each file structurone which the user has files. These newly created UFDs are then entered into the MFD, Command Format R RESTORE be typed by the user dfter the RESTORE program outputs ' The following commands may a slash. These commands are stored in core and are not processed until the START command is given. The full wildcard construction may be used to replace the filename or the extension (refer to Paragraph 1.4.2.4). : Command ‘BACKSPACE FILE BACKSPACE SET Backspaces the magnetic tape to a user file header and positions the tape before the header. Backspaces the magnetic tape to a BACKUP header and positions the tape either before the header or to the beginning of the tape if there is no BACKUP header (i.e., there is only one BACKUP set ) on the tape). BACKSPACE UFD Exglanation Backspaces the magnetic tape to a UFD header and positions the tape immediately before the header. (continued on next page) ~ Preliminary Information 2-179 COMMANDS - 642 - [RESTORE program (Cont) ] Command Format (cont) Command Explanation DELETE dev:file.ext Deletes the named file from the designated device. This device must be one on which a BACKUP has been done. DENSITY MTAn:x Sets the magnetic tape density as specified by x. DUMP ON dev:file.ext x=2 200 bpi x=5 556 bpi x =28 800 bpi The default is the system standard defined at MONGEN time. Dumps the contents of the BACKUP set file beginning at the present position and ending at the next file confrol word. errors are ignored. All types of The device on which a dump is to be written may not be a listing device. ERROR DUMP /switch Returns to the last file control word and dumps the file if a transmission error of the type specified has occurred. /switch = any or all of the following /CHECK SUM /PARITY /READ /WRITE ERROR HALT /switch Halts program execution if the type of error specified by /switch occurs during restoring. An asterisk is typed to the user so that he may type further instructions. The user may want to backspace the tape and dump it. The command recovery file is destroyed unless simply a START command is given. In this case, the current file is skipped and the next command in the recovery file is executed. /switch = any or all of the following: /CHECK SUM /EXCEPT /PARITY /READ INDEX dev:file.ext Reads the index file with the designated filenames from the specified. device (continued on next page) Preliminary Information 2-180 COMMANDS - 643 - IRESTORE program (Cont)l Command Format (cont) Explanation Command LOG dev:file.ext /switch Writes a file on the specified device so that operations of the RESTORE program can be recorded. The default is DSK:RESTOR.LOG. ' ' /switch = /ERROR Logs only the errors. If this switch is omitted, all operations are recorded. PARITY dev: ODD or EVEN Specifies the parity on magnetic tape as odd or even. The default is odd. RESTORE devl: [p,p] file.ext «~dev2/switch . : Writes the specified files from dev2 to the designated area on devl. For example, if all of the disk is to be restored from the entire BACKUP SET file, the command is RESTORE DSK: « MTAT: /switch = /EXCEPT file descriptor Indicates the files that should not be restored. REWIND dev: SET ACCEéS dd-mmm-yy SET CREATION dd-mmm-yy On disk, On magnetic tape, closes BACKUP set and rewinds tape. closes BACKUP set. Sets the access date to be used when restoring files. The files will be restored only if accessed after this date. Sets the creation date to be used when restoring files. The files will be restored only if created after this date. : SKIP dev: FILE Advances to next file frailer, EOF1, and positions after it. SKIP dev: SET Advances to next BACKUP set trailer and positions after it, or skips to end of the tape and positions the tape between the fape marks. SKIP dev: UFD Advances to next UFD header, HDR1 ,. and positions before the START Begins execution of a series of commands entered previously. Commands are not processed until a START command. If there are no commands to be processed when the START is executed, the command recovery file is searched for an executable command. UNLOAD dev: Performs a rewind and unload to the magnetic tape. Preliminary Information ‘ header. 2-181 COMMANDS - 644 - |RESTORE program (Confl Command Format (cont) The RESTORE program may be restarted by the user at any time. The user can cancel current requests and specify new ones with a 1C tC START sequence. The command recovery file is deleted with a 1C START sequence unless the next command given to RESTORE is a START. If this is the case, the command recovery file is searched and the RESTORE program proceeds according to the information in the file. A 1C CONT sequence does not delete the command recovery file; this sequence of commands com- pletes the current requests. Upon completion of all requests, the RESTORE program closes the log file and types an asterisk on the user's terminal indicating its readiness for more requests. Rewinds to the magnetic tape due to it being filled are actually rewind and unload operations to en- sure that the magnetic tape is not overwritten. When the RESTORE program reaches completion, the magnetic tape last written on remains in position unless a REWIND command is given. Characteristics The R RESTORE command: Runs the RESTORE program, thereby destroying the user's core image. Associated Messages Refer to Chapter 4. Preliminary Information 2-182 COMMANDS - 645 - REWIND command 1 l Function The REWIND command rewinds a magnetic tape or a DECtape. This command is equivalent fo the PIP command string: ,dev: (MW)+ . Command Format REWIND dev: dev: = a magnetic tape (MTAn) or a DECtape (DTAn). Characteristics The REWIND command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. Examples sREW DTA4:) SREWIND MTAl:) ]This command runs the COMPIL program, which interprets the command before running the PIP program. Version 20 COMPIL Version 32 PIP _ 2-183 COMMANDS - 646 - I RUN command Function The RUN command loads a core image from a retrievable storage device and starts at the location specified within the file (. JBSA). If the program has two segments, both the low and high segments are set up. If the high file has extension .SHR (as opposed to .HGH), the high segment will be shared. Therefore, if the -user has RUN (or GET) the same program, 1/O will not usually be required for the high segment. A two-segment program may have a low file extension (.LOW). The RUN command clears all of user core. However, programs should not count on this action and should explicitly clear those areas of core that are expected to contain zeroes (i.e., the programs should be seif-initializing). This action allows programs to be restarted by a 1C, START sequence without having to do another RUN command. On magnetic tape, if the low or high segment is missing, a null record is output before the EOF for the missing segment so that two EOFs cannot occur consecutively. Therefore, a saved null segment does not appear as a logical EOT (2 EOFs in a row). Command Format RUN dev:file.ext [proj,progl core dev: = the logical or physical name of the device containing the core image. The default device name is DSK:. (In nondisk monitors, the default is the generic name that matches the system device.) ' file.ext = the name of the file containing the core image; .ext applies to the low file, not the high file. An extension of .SHR, then .HGH, is assumed for the high file. If the user types an extension of .SHR or .HGH, the extension is treated as a null exten- sion since .SHR and .HGH are confusing as low file extensions. The default filename is the job's current name as set by the last R, RUN, GET, SAVE, or SSAVE command, the last SETNAM UUO, or the last command which ran a program. [proj,progl = the project-programmer number; required only if core image file is located in a disk area other than the user's. core = the amount of core to be assigned to the sum of the low and high segments if different from minimum core needed to load the program or from the core argument of the SAVE command which saved the file. If core < the minimum low segment size, then an error message occurs. If core >the minimum low segment size and < the sum of the high segment size. If core > the sum of the minimum low segment and the high segment size, then the core assignment is the size of both the low and high segments to - 5.05 Monitor and the min- imum low segment size, then the core assignment is the low segment 2-184 be used. COMMANDS - 647 - RUN command (Coni)l Command Format (cont) Core arguments can be specified in units of 1024 words or 512 words (a page) by following the number with K or P, respectively. For example, 2P represents 2 pages or 1024 words. If K'or P is not specified, K (1024 words) is assumed. Note that on KA10 based systems (DECsystem=1040, 1050, 1055), the minimum unit of allocation is 1024 words. Therefore, all arguments are rounded up to the nearest multiple of 1024 words (e.g., 3P is treated as 2K on a KA10 based system)., Since previous core is returned, MTA must have the core argument because there is no directory telling how much core is for the low segment. Refer to Appendix D. ~ Characteristics &, The RUN command: Places the terminal in user mode. Restrictions On systems with a large amount of core memory, the user should not specify a core argument that forces the high segment to start higher than 400000 (i.e., a core argument of greater than 128K) unless the program's high segment is location independent. If this is done, the ILLEGAL UUO error message is likely to occur. Associated Messages Refer to Chapter 4. Examples <RUN TEST.) +RUN HISTST (10,631 <RUN DTA3:TEST1. 5.05 Monitor 2-185 COMMANDS - 648 - SAVE command Function The SAVE command writes out a core image of the user's core area on the specified device. It saves any user program (two-segment sharable, one-segment nonsharable, or two~segment nonsharable) as one or two files. command, it will be nonsharable. Later, when the program is loaded by a GET, R, or RUN If DDT was loaded with the program, the entire core area is written; if not, the area starting from zero up through the program break (as specified by .JBFF) is written. Refer to DECsystem~10 Monitor Calls for a descriptio of n the job data area locations referenced by this command. The SAVE command should be used instead of the SSAVE command when debugging a segment program. two- Refer to Appendix D for additional information on the SAVE command. On magnetic tape, if the low or high segment is missing, a null record is output before the EOF for the missing segment so that two EOFs cannot occur consecutively. Therefore, a saved null segment does not appear as a logical EOT (2 EOFs in a row). Command Format SAVE dev:file.ext [proj,prog] core dev = the device on which the core image file is to be written. name is DSK:. system device. fied. The default device In nondisk monitors, the default is the generic name that matches the The colon following the device name is required if a device is speci- file.ext = the name to be assigned to the core image file. The default filename is the job's current name as set by the last R, RUN, GET, SAVE, or SSAVE command, the last command which ran a program (e.g., DIRECT), or the last SETNAM UUO. ext applies to the low file, not the high file. assumed for the high file. An extension of .SHR, then .HGH, is If the user types an extension of .SHR or .HGH, the extension is treated as a null extension since .SHR and .HGH are confusing as low file ex~ tensions. If ext is omitted and the program has only one segment, the ext is assumed to be .SAV. If ext is omitted and the program has two segments, the high segment will have extension .HGH, und the low segment will have extension . LOW. [proj, prog] = the name of the disk area on which the core image file is to be written. core = the amount of core in which the program is to be run. This value is stored in JOBDAT as the job's core area (. JBCOR) and is used by subsequent RUN and GET commands. This argument is optional. Core arguments can be specffied in units of 1024 words or 512 words (a page) by following the number with K or P respectively. 1024 words. 5.05 Monitor For example, 2P represents 2 pages or If K or P is not specified, K (1024 words) is assumed. 2-186 - 649 - COMMANDS | IEAVE command (CorE)Jfl Command Format (cont) minimum unit of Note that on KA10 based systems (DECsystem-1040, 1050, 1055),upthe nearest the to rounded are ts allocation is 1024 words. Therefore, all argumen system). based KA10 a on 2K as treated is multiple of 1024 words (e.g., 3P If core is omitted, only the number of blocks required by the core image area (as ex- plained in the RUN command descripfion) is assumed. Characteristics The SAVE command: Leaves the terminal in monitor mode. Requires core. Does not operate when a device is currently transmitting data. Associated Messages Refer to Chapter 4. Example .SAVE ) J0B_SAVED +SAVE DTA3:TEST) JOB SAVED 5.05 Monitor | 2-187 COMMANDS - 650 - [SCHED command Function The SCHED command types out the schedule bits as set by mand. The schedule bits are as follows: 0 1 2 4 100 200 400 : the last privileged SET SCHED com- regular timesharing. no further logins allowed except from CTY, no further logins from remote terminals, and no answering of data sets, batch jobs only, ' device mounts can be done without operator intervention. unspooling allowed. no operator coverage. Command Format SCHED Characteristics The SCHED command: Leaves the terminal in monitor mode. Does not require LOGIN, Depends on cutput from the SET SCHED command which is normally absent in the DECsystem-1040, Example St matp——— - .SCHED) oe04an ' Regular timesharing, but no operator coverage, 2-188 COMMANDS - 651 - SEND command Function The SEND command provides a mechanism for one-way inferconsole communication. (This command replaces the TALK command.) A line of information is transmitted from one terminal to another, with the identification of the terminal sending the information. With remofe communications capabilities, SEND is able to differentiate between stations. When the SEND command is sent from the central station operator's terminal (OPR) or from a terminal logged in as [1,2], it allows a broadcast of a line of information to all non-slaved terminals (including remote ’rermina‘ls) in the system. This allows important information to be dispersed, such as system shutdown or hardware problems. SEND ALL messages do not go fo slaved terminals uniess the SET TTY NO GAG bit is set to permit reception when the terminal o is busy. A busy test is made on single~destination messages before the message is sent unless the sender or the receiver of the message is OPR or a job logged-in as [1,2]. The receiver of the message is considered busy if his terminal is not at monitor command level. If the receiver is busy, the sender receives the message BUSY and the information is not sent, unless the receiving terminal has the TTY NO GAG bit set (refer to the SET TTY command). If the receiving terminal is turned off, the information appears to have been sent, since the hardware cannot detect this condition on hard-wired terminals. Command Format SEND dev: text or SEND JOB n text dev = any physical terminal name (CTY included) or OPRnn. If OPRnn is specified, the message is sent to the operator at station nn. If OPR (nn is null) is specified, the message is sent to the operator at the user's logical station. If the terminal sending the message is the operator's terminal, the argument may be ALL to provide the broadcast operation. n = the job number to which the message is to be sent. The message printed on the receiving terminal appears a3 follows: 5TTY ne = text where n is the TTY sending the message, and text is the message. A bell sounds on the receiving terminal when the message is sent. 5.05 Monitor ‘ - 2-189 COMMANDS | - 652 - ISEND command (Contfl Characteristics The SEND command: Leaves the terminal in monitor mode. Does not require LOGIN. Depends on FTTALK which is normally absent in the DECsystem-1040. Restrictions The SEND command is not available to the Batch user. Associated Messages Refer to Chapter 4. Examples =SEND OPR: PLEASE WRITE-ENABLE DTA3,) 2-190 COMMANDS - 653 - SET BLOCKSIZE command | Function The SET BLOCKSIZE command sets a default blocksize for the specified magnetic tape. Command Format SET BLOCKSIZE dev: nnnn e dev: = MTAn: where n is the number of the magnetic tape drive for which the blocksiz user The tape. c ~is fo be set, ora logical name associated with a physical magneti . must have the magnetic tape assigned to him. This argument is required size for this nnnn = a decimal number up to a maximum of 4095 designating theof block d numspecifie the legality the for done magnetic tape. No additional checking is ber besides the check for the maximum 4095. This argument is required, Characteristics The SET BLOCKSIZE command: Leaves the terminal in monitor mode. Depends on both FTSET and FTMTSET whiéh are nomally absent in the DECsystem-1040. Examples LSET BLOCKSIZE MTA2:3956) LASSIGN MTAAINAMED) MTA4 ASSIGNED «SET BLOCKSIZE NAME:2000) 2-191 COMMANDS - 654 - l SET CDR command Function The SET CDR command sets the filename for the next card-rea DECsystem-10 Monitor Calls). der spooling intercept (refer to This command is generally not needed, even when the reader is being simulated on the disk via the spooling user wishes to reset or change the spooling. mand to read spooled input card decks. mechanism. card It is included in case the In addition, the Batch Controller uses this com- Command Format SET CDR filename filename = one- to three-character filename to be used on next card-reader INIT. Characteristics The SET CDR command: Leaves the terminal in moniter mode. Depends on FTSET and FTSPL which are normall y absent in the DECsystem-1040. Examples <SET CDR A -SET CDR MAS) 2-192 COMMANDS -655 - SET CPU command Function run. The SET CPU command allows a privileged user to change the CPUs on which his job cancan be job the under run programs the whether specify to It is used in a multiprocessing system the with processed on the primary CPU, the secondary CPU, or either CPU. The job remains (2) given, is tion specifica specified CPU until (1) another SET CPU command with a different issuing by command CPU SET the overrides a KJOB command is issued, or (3) the user's program the SETUUO with a different specification. [f the SETUUO overrides the command, the SETUUO specification given in the UUO remains in effect until a RESET or EXIT UUO or another , executed is UUO RESET or EXIT with o different specification is executed. When an the job reverts back to the specification given in the last SET CPU command. When the user logs in, the CPU specification is usually set to ALL. The schedulers for each CPU compete for jobs with the ALL specification so that the load is dynamically balanced between CPUs. Therefore, this command is generally not needed but is provided in case the user wishes to ' change the CPU specification. Command Formats 1. SET CPU CPxn adds the specified CPU to the job's CPU specification. 2. SET CPU NO CPxn removes the specified CPU from the job's CPU specification. 3. SET CPUALL | adds all of the CPUs to the job's CPU spec'ificationi. | 4, SET CPU ONLY CPxn changes the CPU specification so that it includes only the specified CPU. names for x = either U designating a logical name or A or1 designdfing physical em -1077), a KA10 processor (DECsystem-1055) or a K110 processor (DECsyst respectively. n = a decimal number from O to the number of processors in the system. 2-193 COMMANDS - 656 - [SET CPU command (Cont) Characteristics The SET CPU command: Leaves the terminal in monitor mode. ‘Depends on FTSET and FTMS which are normally absent in the and 1070, DECsystem-1040, 1050, Restrictions The privileges required for using this command are determin ed by bit 5 (JP,CCC) of the privilege word, .GTPRY, Associated Messages Refer to Chapter 4. Examples »SET CPU ONLY CFPU1) “SET CPU CPA® ) hd -— 2-194 COMMANDS - 657 - SET DENSITY command Function ' The SET DENSITY command sets a default density for the specified magnetic tape. Command Format SET DENSITY dev: nnn dev:= MTAn: where n is the number of the magnetic tape drive for which the density is to be set, or a logical name associated with a physical magnetic tape. The user must have the device assigned to him. This argument is required. nnn = 200 bpi 556 bpi 800 bpi " This argument is required, Characteristics The -SET DENSITY command: Leaves the terminal in monitor mode. Depends on both FTSET and FTMTSET which are normally absent in the DECsystem=1040. * Examples §e l;fi FT DENSITY MTAS5: 556) 2-195 COMMANDS - 658 - | SET DSKPRI command Function The SET DSKPRI command allows a privileged user to set the priority for his job's disk operations (data transfers and head positionings). values is =3 to +3. The standard priority is 0, and the range of permissible This means that a priority lower than the standard can be specified, as well as one higher than the standard. The priority specified applies to all disk I/O channels currently open or subsequently opened whose priority has not been explicitly set with a DISK. UUO (refer to DECsystem--10 Monitor Calls). The priority specified in the SET DSKPRI command re- mains in effect until (1) another SET DSKPRI command is given with a different priority, (2) a KJOB command is issued, or (3) the user's program overrides the SET DSKPRI command by issuing a DISK. UUO with a different priority. Command Format SET DSKPRI n n = a decimal number from -3 to +3 indicating the priority to be associated with job's disk operations. the When n =0, the priority is the normal timesharing priority. Chqrccterisfics The SET DSKPRI command: Leaves the terminal in monitor mode. Depends on both FTSET and FTDPRI which are normally absent in the DECsystem~1 040. Restrictions The privileges required for using this command are determined by bits 1 and 2 of word, .GTPRV. a 0 priority. These two bits specify an octal number from 0-3. Examples «SET 5.05 Monitor DSKPRI 2) 2-196 the privilege The user is always allowed COMMANDS | - 659 - SET HPQ command | Function The SET HPQ command allows a privileged user to place his job in a high-priority scheduler run queue. With this command, the user obtains a faster response and CPU time than in the normal timesharing queves. The job remains in the specified high~priority queue until (1) another SET HPQ command to a different high=priority queue is given, (2) a KJOB command is issued, or (3) the user's program overrides the SET HPQ command by issuing an HPQ UUO with a different value. If an HPQ UUQ overrides the command, the level specified in the UUO re- mains in effect until a RESET or EXIT UUO or another HPQ UUO with a different value is executed. When an EXIT or RESET UUO is executed, the job is returned to the high-priority queue specified in the SET HPQ command. _ - Command Format SET HPQ n n = a decimal number from 0 to 15 indicating the high-priority queue to be entered. When n = 0, the queue is the normal timesharing run queve. to 15 are high-priority queues. Queue numbers from 1 The number of high-priority queues is an installation parameter and may be less than 15, Characteristics The SET HPQ command: Leaves the terminal in monitor mode. Depends on both FTSET and FTHPQ which are normally absent in the DECsystem~1040. Restrictions The privileges required for using this command are determined by bits 6 through 9 of the privi= lege word, .GTPRV. These four bits specify an octal number from 0-17, which is the highest priority queue attainable by the user. ' Examples +SET HPQ 4), 2-197 COMMANDS - 660 - SET SPOOL command Function The SET SPOOL command adds devices to or deletes devices from the current list of devices being spooled for this job. vices is simulated on disk. Spooling is the mechanism by which 1/O to or from slow-speed deDevices capable of being spooled are: the line printer, the card punch, the card reader, the paper tape punch, and the plotter. ' Command Formats 1. SET SPOOL devl, dev2, ...devn adds the specified devices to the job's spool list. 2. SET SPOOL ALL places all spooling devices into the spool list. 3. SET SPOOL NONE clears the entire spool list. 4. SET SPOOL NO devl, dev2, ...devn removes the specified devices from the job’s spool list. devl, dev?, ... devn = names of one or more devices to be added to or deleted from the current spool list. Characteristics The SET SPOOL command: Leaves the terminal in monitor mode. Depends on both FTSET and FTSPL which are normally absent in the DECsystem-1040. Restrictions To unspool devices, the job must have (1) the privilege bit set in . GTPRV, (2) bit 28 (200 octal) set in the STATES word by the operator SET SCHED command, or (3) the user must be logged-in under [1,2]. 2-198 =661 - COMMANDS . lSiET SPOOL command (Cclt)] | Associated Messages Refer to Chapter 4. Examples Is| -'o} SET SPnOL CDPt) SET SPOOL NO LPT3) ~SET SPNNI. NONE) 2-199 COMMANDS - 662 - I SETSRC program Function The SETSRC program is used to manipulate the job's search list or the system's search list. A search list is defined to be the order of file structures that are to be searched whenever generic device DSK: is explicitly or implicitly specified by the user. This search list is originally defined by the system manager to include the file structure s which the user can access. With the SETSRC program, the user can alter the search list defined for him by adding or deleting file structures. The search list is in the form fs1/s/s, fs2/s/s, ..., FENCE, ...., fs9/s/s where fs is the name of the file structure and /s is a file structures on the left of the FENCE comprise the generic device DSK for this job. switch modifying the file structure. active search list and represent the The files to the right of the FENCE comprise the The passive search list and represent file structures that were once in the active search list. File structures are kept in the passive search list in order that quotas can be checked on a DISMOUNT or KJOB command. The FENCE represents the boundar y between the active and passive search list. Note that the MOUNT and DISMOUNT commands can adding or deleting a file structure. also change the job's search list by Since the SETSRC program does not create a UFD if one does not exist, the MOUNT command should be used to create a UFD, The name of the new file structure is placed at the end of the search list. Refer to the SETSRC specification in the DECsystem~10 Software Notebooks for a complete description of the SETSRC program, Command Format R SETSRC The user can then respond with any of the following command s: Command A Explanation Add one or more file structures to the existing search list. The file struc- tures (with any switches) are appended to the beginnin g or the end of the active search list according to the followin g specifications: 1. If no asterisk appears in the specification (e.g., fs1, fs2) or if an asterisk appears before the file structure names (e.g., the file structures are added to the end of the search *, fs1, £s2), list. (continued on next page) Version 11 SETSRC 2-200 COMMANDS - 663 - [Sf'ETSRC program (Coitll Command Format (cont) Command Explanation (e.ge., fsi, fs2, *), the ws the file structureningnames 2. If the asterisk follo of the search list. are added to the begin A (cont) file structures e of the file structures (e.g., 3. If the asterisk appears in the middl asterisk are added to the fs1, *, fs2), the file structures before thestruct ures after the asterisk file the and beginning of the search list are.added to the.end. in the search list, it is removed If the specified file structure is currentlyTheref ore, this command can be and then added in the desired position. used to reorder the search list. file structures in the current Create a new search list for this job. listAny moved to the passive search are new - search list which are not in the C list. . CP Create a new default directory path. H device SYS:). The user must be logge Obtain information about the available commands. altering the switch Modify the cutrent search list and DSK specification by does not add or structure search list for Create a new system search list (i.e., dthein file under [1,2] to use this command. Cs settings for individual file structures. This command remove file structures from the search list. search list. They are placed on the right Remove file structures from the search list)-so that on subsequent LOGOUTs or R T TP TS side of the FENCE (passive DISMOUNTs quota limits can be checked. : Type the search list of the job. Type the default directory path. Type the system search list. file string. Switches that modify hes used in the SETSRC commandthat The following switches can beiatel switc Other y. modif they ure struct the file structures must appear immed commyandafterstring d as long as the . The switches can be abbreviate can appear anywhere in the . below lined under um number of characters is abbreviation is unique. The minim Switches that modify file structures - /CREATE Allow new files to be created on the file structure. Version 11 SETSRC 2-201 (continued on next page) COMMANDS - 664 - [SETSRC program (Com Command Format (cont) /NOCREATE Do not allow new files to be created on the file structure when specified, but allow files to be superseded. file structure if the user specifies the /NOWRITE file structure name explicitly. Do not allow writing on the file struct ure for this job (i.e., the file structure is read only), /WRITE DSK is Files can be created on the Allow writing on the file structure. If no switches are specified, /CREATE previous versions of SETSRC, /N and /WRITE are assumed. For compatibility with is equivalent to /NOCREATE and Switches that modify the directory /R equivalent to /NOWRITE. path (used only with the CP command) These switches can be typed in direct ly as commands by omitting the CP command and the slash (i.e., /SCAN is equivalent to CP/SCAN), /NOSCAN Cancel the scan switch for the direct /SCAN Set the scan switch for the directory ory path. Switches that modify the DSK or SYS path. specification (used only with the C These switches can be typed in direct ly as commands by omitting the C slash (i.e., NOSYS is equivalent to M/NOSYS) . /UB: [ proj,progl Set the job's library directory to the UFD user's DSK specification. and M commands) or M command and the [ proj,progl and add it to the This means that if o file is not found in the user's directories in his search list, the library directory will then be searched for the file. - /NOLB Remove the library directory from /NOSYS Remove the SYS specification from /NONEW Remove the [ 1, 5] directory from /SYS Add the SYS specification to the the user's DSK specification, the user's DSK specification. the user's SYS specification. user's DSK specification. This means that user's directories in his search list or in his library directory (if /LIB: [ Proj, progl has been specified), the syste m directory [ 1,4] will then be searched for the file. if a file cannot be found in the /NEW Add the directory [ 1,5] to the user's SYS specification. This means that when the system directory is searc hed, the directory [ 1,5] will be searched sefore the directory [ 1,4]. Characteristics The R SETSRC commend Places the terminal in user mode . Runs the SETSRC program, there by destroying the user's Version 11 SETSRC 2-202 core image. COMMANDS - 665 - SETSRC program (Cont){, Restrictions path The user must be logged in under [1,2] to create a new system search list. The directory FTSFD if only and monitors. later and 5.04 the with commands (CP and TP) are meaningful only is on, Examples ) +R SETSRC x1 ) The user's search list is defined as DSKB. DSKB:s» FENCE *A 18 DSKA?S Add DSKA to the end of the search list. pskat) The user's search list is defined as DSKB, DSKA, DOKB T DSKAS L FENCE *A ) DSKCss* Add DSKC to the beginning of the search list. rd 1) AS ,FENCE DSKC$sDSKB$sDSK *n DSKA:) i) Remove DSKA from the search list, DSKC:,DSKB:,FENCESDSKAS The user's search list is defined as DSKC, DSKB, *V D.sKB:/Nowr{ITh:) Do not allow writing on DSKB, xM Set the user’s library directory to [27,500] and add ] P /LIBILRT,500 it to the user's DSK specification. Add SYS: to the user's DSK specification. ) *5Y5 %) 7LIB:[27s50013/5Y5 ¢ DSKC:sDSKB? /NOWR ITEsFENCES»DSKA The user's DSK and SYS specifications are first followed by the user's search list. :'1‘.5) KB 3 »FENCE s DSKC DSKA:>DS Version 11 SETSR_C The system search list is defined as DSKA, DSKB, DSKC. 2-203 COMMANDS - 666 - SET TIME command Function The SET TIME command sets a central processor time limit for a job. When the time limit is reached, the job is stopped and a message is typed. A timeshari ng job may be continued by typing CONT, but no time limit is in effect unless it is reset. tinuved. A Batch job cannot be con- Command Format SET TIME n n = number of seconds of central processor time to which the job is limited. ment of 0 cancels the time remaining. An argu- Characteristics The SET TIME command: Leaves the terminal in monitor mode. Depends cn both FTSET and FTTLIM which are normally absent in the DECsystem=1040. Associated Messages Refer to Chapter 4, Examples «MAKE *I10 LOOP,Fa) Create a program with an indefinite loop. CONTINUE GNT2 tu END $¢ *EXSS «TYPE 1o LNOP.Fe) CONTINUE Type the program. GOT0 17 END (continued on next page) 2-204 COMMANDS - 667 - EET TIME command (Contfl Examples (cont) Compile and load the program, LLOAD LOOPR) FORTRANS LCOP.F4 LOADING LOOP 2K CNRE CEXIT JSET TIME 5) LTIME) 3,50 _ Set the time limit to 5 seconds. Clear the incremental run time, so that the SET TIME command can be checked. 5,57 KILO=CORE=SECE32 Start the loop. - LSTART) %TIME LIMIT EXCEEDED : As expected, the time limit was exceeded. g.00 % . TIME 10,57 KTL0-CORE-SEC267 ® ey 2-205 COMMANDS - 668 - SET TTY or TTY command Function The SET TTY command (or TTY command) declares properties command is typed to the scanner service. of the terminal line on which the With hardwired TTYs, the system manager can set the default conditions, so that this command is usually not needed. However, the user is likely to use this command on data sets, where the terminal cannot be predicted. Command Formats 1. SET TTY NO word equivalent to TTY NO word 2. SET TTY word equivalent to TTY word NO = the argument that determines whether a bit is to be set ment is optional . or cleared. word = the various words representing bits that may be modified words are as follows: SET TTY ALTMODE SET TTY NO ALTMODE This argu-~ by this command. The Converts the ALTmode codes of 175 and 176 to the ASCII standard escape character 033. Restores the individual identity of the codes 175 and 176. SET TTY BLANKS Restores multiple carriage return=line feeds and form feeds. SET TTY NO BLANKS Suppresses blank lines (consecutive carriage return- line feeds after the first) and outputs form feeds and vertical tabs as 2 carriage return-line feeds. This is used for the display terminal in order to prevent the output from moving up off the screen. SET TTY CRLF Restores the carriage return. SETTTY NO CRLF The carriage return normally output at the end of line exceeding the carriage width is suppressed. SET TTY ECHO Restores the normal echoing of each character typed in. (continued on next page) 5.05 Monitor 2-206 COMMANDS | - 669 - [§Ifi' TTY command (Con_t)_l Command Formats (cont) The terminal line has local copy and the computer SET TTY NO ECHO should not echo characters typed in. : al. The The filler class n is assigned to this termin377 octal). SET TTY FILL n filler character is always DEL RUBOUT, No fillers are supplied for image mode output. Equivalent to TTY FILL 0. Fillers for output and SET TTY NO FILL echoing are determined from the following: ' Octal Character Name BS - HT LF VT FF CR XON TAPE XOFF NTAP : / e 010 011 012 013 014 015 021 022 023 024 Number of Fillers for Filler Class 0 0 0 0 0 0 0 0 0 0 0 2 1 1or?2 1 2 12 lor2 T 1 1 1 3 2 6 6 lTor2 | lor2f 6 6 6 6 21 21 20ord | 2or 4T 1 1 1 1 1 1 1 1 +1 if 0-3 spaces fo tab stop; 2 if4-7 spaces to tab stop.the line is +11 or 2 if CR is typed; 2 or 4 if CR is supplied because too long. SET TTY FORM VT This terminal has hardware FORM (PAGE) and ' : | SET TTY NO FORM (vertical tab) characters. The monitor sends eight line feeds for a FORM and SET TTY GAG The SEND command cannot be received at this ter- _ four line feeds for a VT. minal unless the terminal is at command level (initial state). SET TTY NO GAG The SEND command can be received at this termi- SET TTY LC The translation of lower-case characters input to nal even though it is not at command level. upper case is suppressed. (continued on next page) 2-207 COMMANDS - 670 - IET TTY command (Contfl Command Formats (cont) SET TTY MO LC The monitor translates lower-case charac ters to upper case as they are received. In either case, the echo sent back by the monitor matche s the case of the characters after translation. By looking at the printout, the user can determine what transla ~ tion was performed by the monito r. SET TTY PAGE The user has the ability to temporarily suspen tem typeout without losing it. d sys- The XOFF key (1S) suspends the typeout, and the XON key (1Q) re~ The XOFF and XON keys are not echoe d and are not sent to the user's program. This com= mand is useful for display terminals where the user stores it. may want to read a page of text before it disappears from the screen. Note that this preemp ts the use of 15 and 1Q for reading paper tape (see SET TTY TAPE), SET TTY NO PAGE SET TTY SLAVE The typeout control ability of the XOFF and XON keys is disabled. The current interpretation of these keys depends on the last SET TTY TAPE comman d, The terminal becomes slaved, i.e., no comman ds may be typed on the terminal, and the terminal may be ASSIGNed by another user. The user can slave only his own terminal and must contact the operator in order to unslave it, SETTTY TAB ' This terminal has hardware TAB stops every columns. SET TTY NO TAB SET TTY TAPE eight The monitor simulates TAB output from programs by sending the necessary number of SPACE charact ers. The XON key (1Q) causes the terminal paper tape. to read The XOFF key (1S) causes the term- inal to stop reading paper tape. SET TTY NO TAPE The XON key (1Q) and the XOFF key (1S) have special paper tape function. PAGE function. SET TTY WIDTH n The carriage width (the point at which a free car- riage return is inserted) is set to n. The range of n is 17 (two TAB stops) to 200 decimal. 5.05 Monitor no They may have a 2-208 =671 - COMMANDS l SET TTY command (Cont)J rd Characteristics The SET TTY command: Leaves the terminal in monitor mode. Does not require LOGIN, Depends on FTSET which is normally absent in the DECsystem-1040. However, the TTY command format can always be used. 2-209 COMMANDS - 672 - ISIET WATCH command Function The SET WATCH command sets the system to print incremental job statistics automatically. This command provides the user with a tool for measuring the performance of his programs. Command Formats 1. S‘ET WATCH argy, aArg,, ..., Argg prints the specified WATCH statistics. 2. SET WATCH ALL prints all the WATCH statistics, 3. SET WATCH NONE eliminates the printing of all WATCH statistics. 4. SET WATCH NO argy, argy, .. .,afgs eliminates the printing of the specified WATCH statistics. The following arguments enakle printing whenever a monitor command console from monitor to user mode. switches the arg = DAY prints the time of day, as [HH:MM.SS] arg = VERSION prints the version of the program in standard format (refer to the VERSION command). The following arguments enable printing whenever the console is returned to monitor mode via the 1C, EXIT, HALT, ERROR IN JOB n, or DEVICE xxx OPR zz ACTION REQUESTED messages. arg = READ prints the incremental number of disk blocks read modulo 4096. arg = RUN prints the incremental run time. arg = WAIT prints the wait time (time elapsed since the user started or contin- ued the program). arg = WRITE prints the incremental number of disk blocks written modulo 4096. 2-210 COMMANDS - 673 - rSET WATCH command (Con_t)J Command Formats (cont) ied in any order. Statistics are not Any combination of the arguments may be specifsuch ASSIGN or PJOB. When a printed for commands that do not run programs, cs ofaswhich he has notified the system user logs in, his job is set to WATCH the statisti in ACCT.SYS. kept is WATCH to cs manager. The information on what statisti Therefore, a user. The order of the error message is the same as the order of output. can find these out cs statisti the of cance who forgets either the argument or the signifi each statistic, n betwee typed always is space ngle by examining the message. A si whether the statistic appears or not; therefore, it is possible to tell which statistics are being typed. ' NOTE Enabling WATCH output- interacts with the incremental data typed by the TIME and DSK commands. Characteristics The SET WATCH command: Leaves the terminal in monitor mode. . Depends on FTSET and FTWATCH which are normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. 2-211 COMMANDS - 674 - EET WATCH command (Cont)] Examples 1. +SET WATCH 2ARGS AKE: P DAY,»RUNsWAIT,KE AD,WKITE ION»AL s»VE L s NONE KS =SET WATCH) 2ARGS ART: *SET WATCH K DAY, RUN,WAITKEAD »WRITE ION»>A »VE LL » NONE KS DAY KUN 457 243) WAIT KFAD WRITE PIP) [22:36:19) *1C 2. (0«10 2.95 sSET WATCH <R VERSION DAY) TFCO) [9:44:30]3 (S:TECO 22(64) + 3] *tC 2-212 - 675 - COMMANDS SKIP command 1 l Function The SKIP command spaces a magnetic tape forward a specified number of files or records or to the logical end of tape. This command, depending on its arguments, is equivalent to the following PIP command strings: MTAn: (M #nA) « MTAn: (M #nD) « MTAn: (M #nT) Command Formats 1. SKIP MTAn: x FILES advances forward x files. 2. SKIP MTAn: x RECORDS advances forvyard X records. 3. SKIP MTAn: EOT advances forward to the logical end of tape. The words FILES, RECORDS, and EOT can be abbreviated to F, R, and E, respectively. Characteristics The SKIP command: Leaves the terminalin monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX Wthh is normally absentin the DECsystem-104O Associated Messages Refer to Chqpfér 4. ]This command runs the COMPIL program, which interprets the command before running the PIP program. Version 20 COMPIL Version 32 PIP 2-213 COMMANDS - 676 - LSKIP command (Contq Examples <SKIP VMTAQ: 4 FILES ) sSKIP MTAL: EOT) SKIP MTAZ2: 20 KFCORDS) Version 20 COMPIL Version 32 PIP 2-214 - 677 - COMMANDS | SSAVE command I Function segment, if present, The SSAVE command is the same as the SAVE command except that the high sharability, the this indicate To . will be sharable when it is loaded with the GET command GET will cause nt subseque A .HGH, of instead .SHR n high segment is written with extensio program does the if given not is message error an Because . sharable be to the high segment without having programs system not have a high segment, a user can use this command to save to know which are sharable. is output before the On magnetic tape, if the low or high segment is missing, a null record Therefore, a saved ively. consecut occur cannot EOFs two that so EOF for the missing segment null segment does not appear as a logical EOT (2 EOFs in a row). the proThe SAVE command rather than the SSAVE command, should be used when debuggiizeng the reinitial not does command SSAVE a after command GET gram. This is because a d or the DDT original high segment from the file after the user modifies it with the D comman . program. Refer to Appendix D for more information on the SSAVE command Command Format SSAVE devfile.ext [proj,prog] core Arguments and defaults are the same as in the SAVE command. a Characteristics The SSAVE command: Leaves the terminal in monitor mode. Requires core. Does not operate when a device is currently transmitting data, - Associated Messages Refer to Chapter 4. Example LSSAVE DSK:TESTW JOB SAVED (continued on next page) 2-215 COMMANDS - 678 - |SSAVE command (Cont)] Example (Cont) +LOAD FILEL MACRO: FILE1 Compile and load program. LOAD ING LOADER 1K CORE EXIT +SSAVE ) JOB Save a sharable copy. SAVED +GET,) JOB SETUP The filename is taken from the routine that contained the starting address. ' Get a sharable copy. 2-216 COMMANDS =679 - START command l Function sly loaded with the GET comThe START command begins execution of a program either ispreviou from . JBPC to .JBOPC. copied counter mand or interrupted (e.g., 1C). The old program , the address supplie d in the file (. JBSA) An explicit start address is optional, and, if omitted the job was executing a UUO when interrupted ‘s used. If an address argument is specified and wait or SLEEP mode), the monitor sets a status (i.e., it was in exec mode but not in TTY input was interrupted before trapping to bit (UTRP) and continues the job at the location at which isit comple ted, the monitor clears the ing the specified START address. When the UUO process and then traps to the START address. UUO, the ng followi address the to JBOPC . sets bit, status m occurs immediately, and the to trap the If the job is in TTY input wait or SLEEP mode, job is in userprogra mode, the trap also occurs im_ JBOPC ‘contains the address of the UUO. If the mediately. Command Format START adr than the location specified odr = the address at which execution is to begin if otheradr is not specified, the address If l, optiona is t argumen This . within the file (.JBSA) comes from .JBSA. A starting address of 0 may be specified. Characteristics The START conj\ma nd: Places the terminal in user mode. Does not operate when a device is currently transmitting data. Requires core. Requires LOGIN if an address argument is specified. Associated Messages Refer to Chapter 4. Example ) «START 2-217 COMMANDS - 680 - I SUBMIT command Function vy The SUBMIT command is used to place entries info the input queue command is equivalent to the following form of the for the Batch system. This QUEUE command: QUEUE INP: jobname = control file, log file Command Format SUBMIT jobname = control file, log file jobname = name of the job being entered into control file = name of the control file. This file contains all monitor-level and user- level commands for processing by the Batch log file = name of the log file. processing of the job. the queue. Controller (BATCON). This file is used by the Batch Controller to record ‘ its Only the two files mentioned above can be specifie d in a request to the Batch input queve. The name of the control file is required; the log file name is optional and, if omitted, is taken from the control file. If the jobname is ommited, it is the name of the first file in the request, not the name of the first file given. If an extensi on is omitted, the following are assumed: .CTL for the centrol file .LOG for the log file. Three categories of switches can be used in 1. the command string: Queve-operation - Only one of these switch string because they define the type of anywhere in the command string. 2. 3. es can be placed in the command queue request. General ~ Each switch in this category can appear only once in the command string because they affect the entire request. The switch used can appear anywhere in the commard string. File control ~ Any number of these switches cause they are specific to individual files must be adjacent to the file to which 2-218 can appear in the command string be- within the request. if applies. name, it becomes the default for subseq uent Version 3 QUEUE The switch used can appear files. The switch used If the switch precedes the file- COMMANDS - 681 - = laJBMlT command (Cont) Command Format (cont) The following switches can be used with the SUBMIT command. SwitcH. /AFTER:tt Explanation Process the request after the specified time; tf is either ‘n the form of hhmm. (time.of day) or +hhmm (time later Category General than the current time). The resulting AFTER time must be less than the DEADLINE time. If the switch, or the value of the switch, is omitted, no AFTER constraints are assumed. /CARDS:n /CORE:n Use n (decimal) as the maximum number of cards that ¢an be punched by the job. If the switch is omitted, no cards are punched. If the switch is given with no value, 2000 cards is assumed as the default. Usen (decimal K) as the maximum amount of core memory that the job. can use. If the switch is omit= ted, 25K is the maximum. If the switch is specified, but the value is omitted, the default maximum is General General 40K. /CREATE /DEADLINE:tt /DEPEND:n Make a new entry into the Batch input queue. This switch is the default for the queue-operation switches. Process the request before the specified time; it is either in the form hhmm (time of day) or +hhmm (time later than the current time). The resulting DEADLINE time must be greater than the AFTER time. If the switch, or the value of the swifch, is’ omitted, no DEADLINE constraints are assumed. - Specify the initial value of the dependency count (in decimal). When used with /MODIFY, this switch changes the dependency count of another job. If n is a signed number (+ or -), that number is added to or subtracted from the dependent job's count. If nis not a signed number, the dependent job's count is changed fo n. If this switch is omif- Queue Operation General General ted, no dependency is assumed. /DISPOSE:DELETE Delete the file after processing. File Control (continued on next page) Version 3 QUEUE 2-219 COMMANDS - 682 - JEUBMIT command (Cont)] Command Format (cont) Switch /DISPOSE:PRESERVE Explanation Save the file after processing. Category This is the default for all files except those with extensions .TMP, .LST, .CDP, .LPT, .PLT, and .PTP. /DISPOSE :RENAME Rename the file from the specified directory imme- File Control List the entries in the input queue, but do Queue Operation diately, remove it from the logged-out quota, and delete it after processing. This is the default for files with extensions . TMP, . LST, .CDP, .LPT, .FLT, and . PTP, /F File Control the queves. not update Therefore, the list may not be an up-to- date listing, but the listing will be faster than with /LIST. /FEET:n Use n (decimal) as the maximum number of paper tape that the job can punch. feet of General If the switch is omitted, no paper tape is punched. If the value is omitted, the default is 10*B+20 feet, where B s the rumber of blocks in the request. /KILL Remcve the specified entry from the Batch queue. input This switch can be used for deleting previously-submitted request as long a Queue Operation as the request has not been started by the Batch Contro llet. /UST List the entries in the input queue; the defaul t is all Queue Operation Alter the specified parameters in the job. This switch Queuve Operation entries for all jobs of all users. /MODIFY requires that the user have access rights to the job. It can be used for altering a previously submitted re~ quest as long as the request has not been started by the Batch Controller. /NEW Accept the request although the file does exist. This is the default for the log file. placing this switch with the control file, can submit his job and then create the not yet When File Control the user control file. (continued on next page) Version 3 QUEUE 2-220 COMMANDS - 683 - l—SEBMIT command (Cofll Command Format (cont) Switch /OUTPUT:n Explanation Category Cause job to terminate with a /Z:mn to KJOB (nis N=0 Suppress all normal queving performed af N=1 Queue only the log file. N=3 Queue the log file, spooled output, and N=4 Queue the log file, spooled output, +.LST files, and any requests deferred o ' LOGOUT time (default). . N=2 LOGOUT time. , _ Queue only the log file and spooled output (e.g., *.LPT). : *,LST files. Use n (decimal) as the maximum number of pages of /PAGE:n General ' from O to 4). output that the job can print. If the entire switch . is omitted, the maximum is 200 pages; if only the General value is omitted, the maximum is 2000 pages. - /PHYSICAL Suppress logical device name assignments for the File Control /PRIORITY n Assign the specified external priority (n=0 fo 62) General ' device specified. , ) to the request. The larger the number, the greater priority the job has. The default is 10 if no switch is given and 20 if the switch is specified without a value. /PROTECT :nnn Assign the protection nnn (octal) to the job. If the switch, or the value of the switch, is omitted, the General standard protection is assumed. /RESTART:0 or 1 A value, of 0 means the job is not requeued or restarted by the Batch Controller after a system crash General (default). A message is sent to the job's log file. A value of 1 means the job is restarted by the Batch Controller. /SEQ:n ‘ ying Specify b a sequence number to help P in identifY P General a request to be modified or deleted. (continued on next page) Version 3 QUEUE. - 2-221 COMMANDS - 684 - lilJBMIT command (Confl v Command Format (cont) Switch /START:n Explanation ' Begin on the nth line of the control file. Category If the File Control switch, or the value of the switch, is omitted , the Batch Controller starts with the first line. /START mxxx Start at the statement labelled xxx (up to 5 characte rs) of the control file. /TIME thhmmss Specify the central processor time limit for the job. no switch is specified, the limit is 5 minutes ; if the If File Control General switch is given without a value, the limitis 1 hour. /TPLOT:n Use n (decimal minutes) as the maximum amount of plotting time allowed for the job. If the switch is General omitted, no plotter time is allowed; if the value is omitted, but the switch is given, the maximum is 10 minutes. UNIQUE:0 or 1 Run any Y number of Batch jobs under this l programmer number at the same time, projectproj if 0. General Run only one Batch job at any one time, if 1 (default )., Characteristics The SUBMIT command: Leaves the terminal in monitor mode. Runs the QUEUE program. Depends on FTQCOM which is normally absent Associated Messages Refer to Chapter 4. Version 3 QUEUE 2222 ‘ in the DECsystem-1040. COMMANDS - 685 - rSUBMlT command (Coni)J Examples LSUBMIT USRJOB=CONTRL,LOGFIL) OO\IO~§J'I-!=-(A)I\)—I The defaults are as follows: 9. control file name is CONTRL.CTL log file name is LOGFIL.LOG no cards punched (/CARDS:0) maximum core of 25K (/CORE:25) no dependency (/DEPEND:0) control and log files are saved after spooling (/DISPOSE:PRESERVE) , no paper tape punched (/FEET:0) all line printer output is spooled with the maximym pages being 200 (/OUTPUT:4, /PAGE:200) priority is 10 (/PRIORITY:10) 10. standard protection is assumed (/PROTECT:nnn (standard)) 11. job is not restarted after a crash (/RESTART:0) 12. control file is begun on the first line (/START:1) 13. maximum CPU time is 5 minutes (/TIME:0:05) 14. 15. no plotter time allowed (/TPLOT:0) : only one job at a time under a given project-programmer number is run : (UNIQUE:1) LSUBMIT USRJOR/MODIFY/FEETE35/CORE) number of feet of paper Modify the original request to include 35 feet as the maximum mamount of core that the tape that the job can punch and 40K of core as the maximu job can use. This command is valid only if the job has not been started yet by the Batch system. _SURMIT USRJOB=/KILL) Kill the job only if it has not been started by the Batch system, Version 3 QUEUE ’ 2-223 COMMANDS - 686 - SYSTAT command Function The SYSTAT command runs a system program which prints This information allows a user to determine the load on status information about the system. the system before logging-in. To write the output on the disk as a file with name SYSTAT. TXT, assign device DSK with logical name SYSTAT. The SYSTAT command types the status of the system: system name, time of day, date, uptime, percent null time (idle plus lost time), number of jobs in use. [t types the status of each job logged-in: job number; project-programmer number (**, ** = detached, [OPR] = the project-programmer number of the operator, [SELF] = user's project- programmer number); terminal line number (CTY = console terminal, DET = detached, Pn = PTY number); program name being run; program size; job Monitor Calls); run tirme since logged-in. and swapped state (refer to DECsystem-10 . It types the status of high segme:nfs being used: name (PRIV = nonsharable, OBS = superseded); device or file structure riame from which the segment came; directory name (**, ** if detached); size (SW = swapped out, SWF = swapped out and fragment ed, F = in core and fragmented on disk, SPY = user is executing the SPY UUO); number of users in core or on the disk. The command types swapping space used, virtual core used, swapping ratio, active swapping ratio, virtual core saved by sharing, average job size. It types status of busy devices: device name, job number, how device is assigned (AS = ASSIGN command, INIT = INIT or OPEN UUO, AS+INIT = both ways). It types system file structures: free blocks, mount count, single-access job. It types remote stations: number of station ; status of station. It types dataset control: number of the TTY, status of TTY. Version 467 SYSTAT 2-224 COMMANDS - 687 - EYSTAT cohmand (Contfl Command Format SYSTAT arg arg= one or more single letters (in any order) used to type any subset of the SYSTAT output. This argument is optional. The following message, produced by fypmg SYSTAT /H, lists the various arguments to the SYSTAT command. SYSTAT/H) V467(5) SYSTAT SYSTAT TYPE X —4NITTOZCOLCIImMmOW TYPE INSTRUCTIONS: "SYS<CKET+>" TG LIST THE ENTIKE STATUS, OK '"SYS " FCLLOWED BY ONE OK MORE LETTERS AS FOLLOWS-STATUS BUSY DEVICE FILE STRUCTURE MESSAGE DORNMANT SEGMENT STATUS NON=-DISK ERROR REPORT THIS JOR STATLUS OUTPUT TO LPT STATUS NON-JOB STATUS ' (ALL BUT b OTHER SYSTEM STATUS DISK PERFORMANCE STATION STATUS KEMOTE SHORT JOB DATASET READ STATUS STATUS DSK:CRASHXPN NNN PRINTS JUST JOB NNN (. DOES THIS JOB) [(P»PN] PRINTS JUST JORS WITH THAT PKOJ-PROG (P AND/OK PN MAY BE %) “#NNN PRINTS JUST JOBS FROM TEKMINAL NNN (ALSOs> C=CTYs» PNN=PTYNNs» TNN=TTYNN».-THIS TTY) Characteristics The SYSTAT command: Leaves the terminal in monitor mode. Runs the SYSTAT program, thereby destroying the user's core image. Does not require LOGIN. Depends on FTCCLX which is normally absent in the DECsystem-1040. Version 467 SYSTAT \ 2-225 COMMANDS - 688 - lSYSTAT command (Cont)] Examples 25Y5TAL) STATUS OF uPlIbk 7300:59, 534 JUBS bt e b o s s b DO IS »= 0= b LA NOUDLURN=SE LR UT LW - JuB B50400-05 IN JSE #40. ATl 1U3Z OuT OF wHO LINE# 16:15:17 NULL TINME 64. 59 wWHAT = ON 1¥5%Z LOGGED 11-APR-72 IDLE IN» SIZECK) 2 + 3% LOST DFETACBHED STATE RUN TINME {oPr 3] LET DAENMON S+SPY SL 49 564 SW 131 TECO 243 1C Lornl SW 2 OPSER 1+3 HB Sw LOrR ] 3:43 4 UNMOUNT 243 1C Sw 2,111 338 3 Plp 1 +4 tC Sw 274,1431 609 CUBDDT 14+4 RN 20 7 26 12¢15 LOPr ) CTvy PP 1 +4 16,35 29 1C SWw FDS5YS 43 22 T1 SW 1:37 347s12456 65 PIP 1+4 tC SW 27151131 5 64 QAUEUE 2+4 1C SW 29 0P ] re BATCON 2+3 RrN 271,701 61 SEEK 2+8 [l SW 33721113 114 KJon 1+3 tC Sy 40 564 13 150 [ECO 2+3 T1 Sw 4237 Sw 25 21:45 5:08 122,216 124 KJUB 1+4 165107 ra SYSTAT 6+5PY 142,1243 62 TECO 2+3 146,500 1:09 112 TECO 243 2:09 1477 EDITS 2+6 Sw 155 TECO 2+3 5w Pl LPTSPL 2 4 65 2492353 £ornl 2 1:24 ) 13:47 22 345,1417 T4 EDITS 2+6 23 topPnr ] P3 LPTSPL 2 r4 PTPEPL 243 SW OPSER 143 SW 46 1:38 5w 24 Lorrl 25 (0PR] 26 Lornl reé6 oPnCMO 245 (0P Sw rs OPRONMNO 245 Sw 137 UMOUNT 2+3 27 36051436 43 18:39 1:25 1:31 1:021 29 125,207 15 EDITS 2+6 39 119,1412 127 TECC 2+3 31 492 5570 12 PIpP 1+4 32 405,505 Sw 1:26 25 PIp 1+4 33 40,633 ‘SW 1:13 146 TECO 2+3 34 2117701 14 SEEK 2+8 35 13,20 142 D 13+34 36 4135521 21 TECO 37 2+3 4025570 P17 DCTDE 4 1 7 5:33 SW 4 33:14 20 5w 12 (continued on next page) Version 467 SYSTAT 2-226 COMMANDS - 689 - I SYSTAT command (Cont4)| Examples (cont) 38 39 49 41 42 43 44 122,1202 60 560 406,104 402,514 271,701 1451145 1451145 4% 46 49 48 49 50 51 52 53 2,5 11,176 10,33 1034 255 110,1367 34051107 2,5 HIGH SEGMENTS: 122,1007 136 153 35 36 30 EDITS TECO PLEASE SPACE RAFCO" 2+6 2+3 1 2 6+8 TI SW TO SL SW TI Sw Tl 135 144 DET 6 13 157 26 7 122 QUEUE COMPCT UMOUNTTECO SYSTAT TECO AID SYSTAT TECO 343 S 243 4+3 6+SPY 2+3 249 4 2+3 CB Sw TO TO SwW T1 RN TI Sw RN SW CB TI SW P10 11 UMOUNT DIRECT "PNN COrnESPONDS TO TTY172+NN OWNER DSKB OPSEKR DIRECT DSKB GuMANGA DSKB DSKB PIP DSKB TECO 5YS 5YS SYS SYS SYS 3 SW 3 S 3 Sw 4 3 (PrRIVY QUEUE LIBUL OMOUNT JOB 35 SYS SYS SYS 34 4 8 5 SW DSKB PTPSPL UMOUNT KJOB AID DSKB DS KB DSKB DSKB DSKB DSKB DSKB 5YS SYS SYS SYS SYS 6 SWw 3 SW 3 3 Sw SW 9 SWAPP ING SPACE USEDY= 1567635 . SL SW tC SwW 10 2:11 45 2:16 3:02 . 16 24 HIGHCK) USERS PrOGRAN DEVICE EDITS 243 1+3 6233 2 1 2 5 12 4 1 2 4 2 1 4 1 1 25% VIRT. CORE USED = 254/635 = 40% D54/144 = 1.8 SWAPPING RATIO 757144 = B+5 ACTIVE SWAPPING RATIO VIRT. CORE SAVED BY SHARING = 115/0115+254) AVERAGE JOB SIZE = 163/53 = 3.1 + 206/53 = 3.9 TOTAL = 369/53 = 7.0 (continued on next page) Version 467 SYSTAT 2-227 COMMANDS - 690 - liYSTAT command (Con?)l E(_gme les (cont) BUSY DEVICES: DEVICE JOB LPTY 23 LPT1 21 WHY © AS+INIT AS+INIT DTAl 14 AS DrA2 19 AS DTA3 33 AS DIA4 7 as DTA6 27 DIAY 26 AS+INIT MIAl 37 as AS+INIT MTA2 35 as MTA3 31 AS PTPO 24 INIT 72 bDBS DISK SYSTENM FILE STHUCTURES: NAME FHREE DSKA 705 12 DSKB 17220 54 MOUNT DSKC 35895 5 DIAG 2835 3 TOTAL FrEE LOGICAL 56655 DATASET CONTROL TTY# STATUS 60 IN 61 IN USE USE 62 IN USE USE 64 IN 65 IN USE 72 IN USE 74 IN USE « KJOB (continued on next page) Version 467 SYSTAT 2-228 COMMANDS - 691 - IE(STAT command (Confll Examples (cont) P) ;SYSTAT STATUS OF B50400-05 #4090 AT 16:27:49 ON 11-APR-72 DISK PERFORMANCE STATISTICS:3 UNIT F/5 On BW BR 716 FREE DSKA FHAl1 (1xD@PB2)>: 6616 DWw DR 716 FREE, @ SEEKS 177 ' 8811 59861 XR XW MR MU 2 @ 30062 27935 @ P 41622 16489 ] ] 20563 9505 ? 7 15503 7687 2 Q 9711 2 2 4236 1214 7 2 8199 2602 1 1DATAI ERROKS: 1DAT:1 RETRIES:l 2CONI:4000,15 1CONI:4000,4015 2DATAT:2 ' 2140071 17215 DSKB FREE DPABC1B2446)2 4445 FREE, 54617 SEEKS 12648 1155 DPAlC117986): 4345 FREE, 42791 SEEKS MSB 39483 » 30498 ERRORS: 1DAT:11 RETRIES:1 2CONI:15 1CONI 55,4015 2DATAI :54661,40000 1DATAI 2154661 ,40000 "MSB 41724 37609 17037 2790 ERRORS: 1DEV:s8 1DAT:240 RETRIES:1 2CONI:15 1CONI®5,4015 2DATAI:102 261,240000 1DATAI:102261,240009 DPA2C1QP2376): 4173 FREE, 33215 SEEKS 35413 35205 1236 14911 MSB ' MSB ERRORS: 1DEV:6 RETRIES:3 2CONIz15 1CONI 42015 2DATAI 456661 400000 4313 FREE, 32078 SEEKS DPA4C192490): 32920 384172 2215 12599 1DATAL1:456661 50 35925 FREE DSKC : ' 337 5934 ' DPAS5C151669): 35925 FREE, 2863 SEEKS 1725 = 1 250 M5B DIAG 2945 FREE DPAGCDIAGA1)Y: 2945 FREE, 68088 SEEKS 2133 2532 533 8423 msSB ACTIVE SWAPPING STATISTICS: USED(K) W R UNIT FHAW FHAL 809992 397720 366056 351376 = 84Z 2817335 181/300 = 60% « KJOB Version 467 SYSTAT 22229 COMMANDS - 692 - ISYSTAT command (Contfl ~ Examples (Cont) 25YS t10,%1.) SYSTAT 10 14 25YS va67(5) [SELF] 10,133 V4R7(5) STATUS 0F UPTIME 45:47, JOBS SWAPPING VIRT, SYSTAT TECO 5+SPY 2+3 RN T1 ' 3 47 /0) SYSTAT 15 10 @ 50416A 60% OUT SPACE USED CORE USED SWAPPING NULL IN USE RATIO = = OF = SYSTEM TIME 37. A5,18 = = AT 55% 15 6R/352 85/350 82 IDLE LOGGED = & 24% 1316311 5% 1 ON 24«FEB=72 LOST DETACHED 19% 4.7 ACTIVE SWAPPING RATIO = 5/18 = 0.3 VIRT, CORE SAVEN BY ‘SHARING = 5/(5+85) AVERAGE JOB SIZE = 49/15 = 3.3 + 41/15 Version 467 SYSTAT + IN, PeM, 2-230 = ® 6% 2,7 TOTAL = 901/15 = 6,0 COMMANDS - 693 - TECO command 1 Function The TECO cor;\mand runs TECO and opens an already existing file on disk for editing. Refer to the TECO manual in the DECsystem=10 Software Notebooks. Command Format TECO dev:file.ext [proj,prog] dev: = the device or file structure name containing the existing file. If omitted, DSK: is assumed. file.ext = the filename and filename extension of the existing file. If omitted, the arguments of the last EDIT-class command are used. [proj, prog]l = the directory name in which the file appears. If omitted, the user's : ' directory is assumed. Characteristics ‘The TECO command: ) Places the terminal in user mode. Runs the TECO program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=-1040, Associated Messages Ref;er to Chapter 4. Example <TECO TEST1.MAC ) xtC +TECO DSKB:F ILNAM.CBL (100,273 ) ]This command runs the COMPIL program, which interprets the commands before running TECO. Version 20 COMPIL - Version 23 TECO 2-231 COMMANDS - 694 - TIME command Function The TIME command causes typeout of the total running time since the last TIME command, fol(logged-in), followed by the integrated product of running time and core size (KILO-CORE-SEC=). Time is typed in the following format: lowed by the total running time used by the job since it was initialized hh:mm:ss. hh where hh = hours mm = minutes ss.hh = seconds to nearest hundredth. Interrupt level and job scheduling times are charged to the user who interrupt or rescheduling occurred. was running when the NOTE If automatic runtime is enabled using the SET WATCH command, the incremental runtime is usually 0. Command Format TIME job job = the job number of the job whose timing is desired. If job is omitted, the job to which the terminal is attached is assumed. In this case, monitor types out the incremental running time (running time since last TIME command) as well as the ning time since the job was initialized. Characteristics The TIME command: Leaves the terminal in monitor mode. Does not require LOGIN. Associated Messages Refer to Chapter 4, 2-232 total run- - 695 - _ COMMANDS lTIME command (Cont)] Example The command is given for the first time after LOGIN; « TIME) therefore, the incremental time equals the total 2,38 0,98 time since LOGIN. KILO»CORE=SEC=1 «T1) 2,00 2,98 KILO=CORE=SFC=1 .DIR/F) NEWSRS BAK NEW525 Foo RNO SFD PETALS SAV CSHELL MAC TRYCIO METER MAC RNO c’ PETALS CIo SURFIT MAC F4 DSKkB: [12,770) DSKC: MAC ALG 2T1) 0,40 0,78 . The DIRECT command took .40 seconds of runtime and 5 kilo-core~seconds. KILO=CORE=SEC=6 2-233 COMMANDS - 696 - TPUNCH command Function The TPUNCH command is used to place entries into the paper-tape punch output queue. command is equivalent to the following form of the QUEUE command: This QUEUE PTP: jobname = list of input specifications. The TPUNCH command can be further abbreviated to PUNCH jobname = list of input specifications. However, individual installations may redefine PUNCH to mean output to the card-punch queue instead of the paper~tape punch queuve. Command Format TPUNCH jobname = list of input specifications jobname = name of the job being entered into the queue. The default is the name of the first file in the request not the name of the first file given. These differ when the first file given does not yet exist. input specifications = a single file specification or a string of file specifications, separated by commas, for the disk files being processed. form dev:file.ext [proj,prog]. A file specification is in the dev: = any file structure to which PTPSPL will have access; the default is DSK:. file.ext = names of the files. The filename is optional. The default for the first file- name is *, the default for subsequent files is the last filename used. be omitted; the default is . PTP, ' The extension can [proj, prog] = a directory to which the user has access; the user's directory is assumed if none is specifed. The wildcard construction can be used for the input specifications. If no arguments appear in the command string (i.e., only the command name is given), all entries in the paper~tape punch queuve for all jobs are listed. Switches that aid in corstructing the queue entry can also appear as part of the input specifi~- cations. These switches are divided into three categories: 1. Queue-operation - Only one of these switches can be placed in the command string because they define the type of queue request. anywhere in the command string. ' The switch used can appear (continued on next page) Version 3 QUEUE 2-234 - COMMANDS - 697 - FI‘PUNCH command (ConE)_l Command Format (cont) 2. only once in the command General - Each switch in this category can appear switch used can appear any- string because they affect the entire request. The where in the command string. nd string File control = Any number of these switches can appear in the .comma The switch used the request because they are specific to individual fi les within the switch precedes the fileIf . applies it which to file must be adjacent to the name, it becomes the default for subsequent files. The following switches can be used with the TPUNCH command. Switch /AFTER:#t Category Explanation Process the request after the specified time; ft is either = General in the form of hhmm (time of day) or +hhmm (time later than the current time). The resulting AFTER time must be less than the DEADLINE time. If the switch, or the value of the switch, is omitted, no AFTER constraints are assumed. ' General /BEFORE:t Queve only the files with a creation date before /BEGIN:n Start the output on the nth foot of tape. The default File Control /COPIES:n Repeat the output the specified number of times. N File Control time t where t is in the form dd-mmm-yy. is to begin output on the first foot. must be less than 64. If more than 63 copies are ’ needed, two separate requests must be made. If this switch is omitted, one copy is made. /CREATE Make a new entry into the paper-tape output queue. This switch is the default for the queue-operation switches. /DEADLINE::tt Process the request before the specified time; tt is either in the form hhmm (time of day) or +thhmm (time later than the current time). The resulting DEADLINE fime must be greater than the AFTER Queuve Operation General time. If the switch, or the value of the switch; is omitted, no DEADLINE constraints are assumed. (continued on next page) “Version 3 QUEUE 2-235 COMMANDS - 698 - ’IPUNCH command (Cont)—] Command Format (cont) Switch Explanation /DISPOSE:DELETE Delete the file after spooling. /DISPOSE:PRESERVE Save the file after spooling. /DISPOSE :RENAME Category File Control This is the default of all files except files with exten sions of . LST, “TMP, and if the protection is Oxx, .PTP. Rename the file from the specified directory im- mediately, remove it from the logged-out quota, ard delete it after spooling, If omitted, this File Control File Control is the default for files with extensions . LST, -TMP, and if the protection is Oxx, .PTP. /F List the entries in the paper-tape punch queue, but do not update the queues. There fore, the list may not be an up~to~clate listing, but the listing will be faster than with /LIST. /FILE:ASCII Y * /FILE:ELEVEN Indicate that the file format {s ASCII This is File Control 1] binary for=- File Control the default. Incicate that the file format is MACX1 mat, /KILL text. Remove the specified entry from the paper-tape punch queue. This switch can be used for delet a previously submitted request as Queuve Operation ing Queue Operation long as the request has not been started by the paper~tape punch spooler. i (continued on next page) Version 3 QUEUE 2-236 COMMANDS - 699 - [TPUNCH command (Contll Command Format (cont) /LIMIT:n Limit the output fo the specified number of feet. The default is 10*B+20 feet, where B is the number of blocks in the request. JLIST Category Explanation Switch General ' List the entries in the paper~tape punch queue; if the switch, along with all other switches, is omitted, all Queuve Operation Alter the specified parameters in the job. This switch requires that the user have access rights to the job. It can be used for altering a previously submitted request as long as the request has not been started by Queue Operation entries for all jobs of all users are listed. /MODIFY the spooler. ' ~ File Control /NEW Accept the request even if the file does not yet exist. /NOTE:a Punch the specified text (a) in the output. File Control /NULL Accept the request even if there is nothing in the General request. /OKNONE No error message is given. Do not output message if no files match the wild- File Control _ card construction. This is assumed at KJOB time. /PHYSICAL Suppress logical device name assignments for the File Control device specified. /PRIORITY :n Assign the specified external priority (n = 0 to 62) to the request. The larger the number, the greater priority the job has. The default is 10 if no switch is given and 20 if the switch is specified without a General value. /PROTECT:nnn Assign the protection nnn (octal) to the job. If the switch, or the value of the switch, is omitted, the standard protection is assumed. General /REMOVE Remove the file from the queue. This switch is valid chly with the /MODIFY switch and can be used to remove a previously submitted file as long as the spooler has not started processing the request. File Control (continued on next page) Version 3 QUEUE 2-237 COMMANDS - 700 - [TPUNCH command (Contfl Command Format (cont) Switch /SEQ:m /SINCE s Explanation Category Specify a sequence number to help identify a request to be modified or deleted. General Queue only the files with creation dates after the General specified time t where t is in the form dd-mmm-yy. /START:n Begin on the nth line of the file. If the switch, or the value of the switch, is omnt’red the spooler File Control staris with the first line. /STRS Search for the file on all file structures in the search list and take each occurrence. just the first occurrence. /TAPE:ASCII File Control The default is to take ; Punch the tape in ASCII code. If the /TAPE switch is File Control If the /TAPE switch File Control not specified, the file is punched according to the data mode of the file. /TAPE :BINARY Punch the tape in binary mode. is not specified, the file is punched according to the data mode of the file. /TAPE:IBINARY Punch the tape in image-binary mode. If the /TAPE File Control If the /TAPE switch File Control switch is not specified, the file is punched according to the data mode of the file. /TAPE:IMAGE Punch the tape in image mode. is not specified, the file is punched according to the data mode of the file. /UNPRESERVED Output the files only if they are not preserved (i.e., the first digit is 0). This switch avoids redundant General printing. Chaoracteristics The TPUNCH command: Leaves the terminal in monitor mode. Runs the QUEUE program, thereby destroying the user's core image. Depends on FTQCOM which is normally absentin the DECsystem~1040. Version 3 QUEUE 2-238 COMMANDS : -701 - [TPUNCH command (Cont)] Associated Messages Refer to Chapter 4. Examples +TPUNCH TENDMP +RFL/TAPE tBINAKY/COPIES S ‘) Punch 5 copies, in binary mode, of the file DSK:TENDMP.REL. Version 3 QUEUE 2-239 COMMANDS -702 - l TYPE command 1 Function The TYPE command directs PIP to type the ‘contents of the named source file(s) on the user's terminal. To stop the typing, type tC twice. - Command Format TYPE list list = a single file specification or a string of file specifications separated by commas. The filename is required. The extension is required if the filename has an extension. In addition, the full wildcard construction can be used. Switches can be passed to PIP by enclosing them in parentheses in the TYPE command string. When COMPIL interprets the command string, it passes the switches on to PIP. Characteristics The TYPE command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core area. Depends on FTCCLX which is normally absent in the DECsystem=1040. Associated Messages Refer to Chapter 4. Examples «TYPE FILEA,DTAC :FILER.MAC,) TTYPE *.TMP,DTAZ:C ) ]This command runs the COMPIL program, which interprets the command before running PIP. Version 20 COMPIL Version 32 PIP 2-240 - 703 - COMMANDS - UNLOAD command | Function d is The UNLOAD command rewinds and unloads a magnetic tape or d DECtape. This comman equivalent to the following PIP command string: 'dev:'(MU) - I Command Format UNLOAD dev: dev: = a magnetic tape (MTAn) or a DECtape (DTAnN). Characteristics The UNLOAD command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem=-1040. Associated Messages Refer to Chapter 4. Examples LUNLCAD DTA7: ) SJUNL MTA3: ) ]This command runs the COMPIL program, which interprets the command before running the Version 20 COMPIL Version 32 PIP 2~241 PIP program. COMMANDS- ' - 704 - VERSION command Function ’ The VERSION command prints the version number of the program in the user's core area (i.e., the last program run implicitly or explici tly). The version number is obtained from - JBVER and . JBHVR in the job data area and js printed in standard format. from this command is in one of the follow ing representations: low + high The low and high segments are different. low There is dnly a low segment. low + The low and high segments are the same. +1 The output A GETSEG UUO has been done to a high segment which matches the low segment. + highj A GETSEG UUO has been done to a high segment which does not match the low segment. blank! The high segment has been released. With the VERSION command, the low and high segments are represented in the format name version With the SET WATCH VERSION command, the low and high segme nts are represented in one of three formats: name version :name version The program is not from SYS: The output is the resul t of SETNAM UUO (e.g., at the end of loading). S:name version The program is a system prog The name is a SIXBIT name and number, the standard format is: ram (not logical device SYS:) the version is in standard format. major version minor version , When printing the version (edit) - group who modified program 'Output only from the SET WATCH VERSION command. 2-242 last - 705 - | . COMMANDS [VERSION command (Con_t)J Function (cont) edit is octal and enclosed in The major version is octal; the minor version is alphabetic; the and preceded by a hyphen octal is program the d modifie last who group parentheses; and the customer use). There are no (0 = DEC development, 1= all other DEC personnel, and 2-7 = appear in print. The parennot does it spaces separating the items, and if an item is zero, is zero. The following item nding correspo the if print in appear theses and hyphen also do not are examples of version numbers output in standard format. 10B(335)-1 maiér version 10, minor version B, edit number 335, - group that modified program last 1. 7(5) major version 7, minor version 0, edit number 5, group 54A major version 54, minor version A, edit number O, group that modified program last 0. that modified program last 0. Command Format VERSION Characteristics The VERSION command: Leaves the terminal in monitor mode. Depends on FTVERS which is normally absent in the DECsystem-1040. Examples R TECO,) *C LVERSION,) + TECO 22(64) .TYPE SAMPL.TXT) THIS IS A TEXT FILE SVERSION) PIP 31(35) + 2-243 COMMANDS A - 706 - l WHERE command Function The WHERE command enables the user device is located. the physical location of the terminal job. to determine the station at which a If the station of a particular termin specific peripheral al is requested, the number return ed is which may or may not be the location This depends on whether the user chang command. Command Format WHERE devn dev = any physical device name and n is the unit number, Characteristics The WHERE command: Leaves the terminal in monitor mode, Does not require LOGIN, Depends on FTREM which is normally absen t in the DECsystem-1040. Associated Messages Refer to Chapter 4. Examples ':f' WHERE «WH 7 % WHE cDR23) TTY: ‘) OPR: 0PR3) ] | 2WHERE €TY3) of the controlling: ed his job's logical location with the LOCATE ;station of CDR2, istation of ' job's terminal., T istati on of job issuing command, ;central station. 2-244 COMMANDS \ - 707 - ZERO command 1 Function The ZERO command clears the directory of the output device. This command is equivalent to the following PIP command string: dey:/i - - Command Format ZERO dev: dev:=a DECtape (DTAn) or a disk (DSK). This argument is.required. A directory name can be specified with ZERO DSK: and if the user has access to the specified directory, the directory is zeroed, If no directory is specified, the user's directory is assumed, Characteristics The ZERO command: Leaves the terminal in monitor mode. Runs the PIP program, thereby destroying the user's core image. Depends on FTCCLX which is normally absent in the DECsystem-1040. Associated Messages Refer to Chapter 4. Examples <ZER DTA4: ) _-_ZERO: DSK: ) <ZER DSK: [27,40)) ]This command runs the COMPIL program, which interprets the command before running the PIP program. Version 20 COMPIL Version 32 PIP \ 2-245 COMMANDS - 708 - COMMANDS - 709 - CHAPTER 3 BATCH SYSTEM COMMANDS The Batch System, operating under the control of the DECsystem=10 Operating System, increases sys- Batch jobs may be entered from V best suited for tem throughput by processing jobs that do not require human interaction. Types of jobs ts of data, frea batch environment are: large and long=-running jobs, jobs that require large amoun Up to 14 quently run production jobs, and jobs that require little or no interaction with theofuser. aring jobs. Batch jobs can be processed concurrently without adversely affecting the running timesh 1. 2. 3. Local devices Remote devices Interactive terminals. 3.1 BATCH COMPONENTS The Batch System consists of a group of programs; some are used for Batch operations only, others are available for various operations of the total computing system. GR; the The individual Batch components are: the Stacker, CDRSTK; the Queue Manager, QMAN punch), Batch Coniroller, BATCON; and the output spoolers, LPTSPL (line printer), CDPSPL (card PLTSPL (plo’r’ref), and PTPSPL (paper-tape punch). 3.1.1 The Stacker , responsible for The Stacker, CDRSTKis 1. reading a sequential input stream from an input device, ined in the 2. separating the input by placing it in files according to' the control cards conta input stream, creating the job's log file and entering a report of its processing, and 4. entering the job into the Batch input queve. 3-1 COMMANDS -710 - When input is from the card reader, CDRST K accepts ASCII, binary, 026, and DEC-0 29 Hollerith code. (Refer to Appendix B for tables of card converts it to one of the menti oned codes. The input is read in image mode, and CDRSTK If input is from any other device , only ASCII code is accepted. CDRSTK creates three types of files codes.) during its copying of the input data: Batch control file, and the job's log file. in the input and are placed into the user's disk area. Refer to Paragraph 3.3 for the cause CDRSTK to copy information A user control file is created for each into these files. valid job and is subsequently processed This file contains all monitor level and to the control cards Programs and data are copied into these files and are passed to the job, while it is running, by the Batch Contro ller. description of the control cards that the user's data fi les, the The data files are created according user level commands encountered in by the Batch Controller. the input. CDRSTK also enters commands resulting from the processing of certain contro l cards and any information that not follow specific control card format , to Paragraph 3.4 for g description The control file is placed in the user's of the Batch Controller commands disk area. that can be entered into the con~ trol file. The job's log file contains a report of the CDRST K's processing, along with a record intervention during its operation. created files and is deleted after 3.1.2 This file is in the user's disk area does Refer of any operator along with the other CDRSTK=- it is printed by the line printer spoole r. The Queue Manager The Queue Manager, QMANGR, is the program that schedules jobs and When CDRSTK finishes processing a job, it makes an entry into the Batch Manager computes and dyncmi cally revise the job is to be run. input queve. s priorities for the job and notifies the Jobs are scheduled for running according job and to the priorities established by the system. entry only when the output is compl to the parameters pertaining to each queve until the job terminates. is logged off the system, an output queue entry is usually made The Queue Manager again schedules The Queue Batch Controller when While the |ob is running, its queue entry is flagged to show it is in use, but the entry is not deleted from the deleted. maintains system queves. When the job and the entry in the input queve is the job's output and deletes the job's output queue etely finished. 3.1.3 The Batch Controller The Batch Controller, BATCON, contro ls all jobs entered into the Batch Syste file created by CDRSTK or the user m. and initiates and controls the runni It reads the control and system program commands direct ng of the job by passing data ly to it. COMMANDS -711 - the monitor for gktion. The Monitor commands are examined by the Batch Controller and passedtheto chara cter in column 1 in each L ] ng Controller determines the destination of commands by interd preti s are ignored. until a nonspace line of the control file. . If column 1 contains a space or tab,orthenumespace ric character, the line is either character is encountered. If column 1 contains an alphabetic 1 contains a special character, the at monitor command level or at user command fevel. If column Batch Controller interprets the line as follows: column 2. $ (dollar sign) - The:interpretation depends upon the character in d to the log file as a combetic character, the line is copie If column 2 contains an alpha ssed. ment because it is a Stacker control line and has already been proce as data. If column 2 contains a numeric or special character, the line is treated and the line is If column 2 contains a dollar sign ($), the initial dollar sign is suppressed treated as data. is entered into If column 2 contains a line feed, vertical tab, or form feed, a blank line : the log file. mn 2. (period) - The interpretation depends upon the character in colu alphabetic character, the line is treated as a monitor command If column 2 contains anessed . . and the period is suppr with the If column 2 contains a nonalphabetic character, the line is treated as data period as part of the data. command or program dataams.and the asterisk is treated as a user-level od * (asterisk) = The line isstand ard input data meth for most system progr suppressed. This is the The equal sign is command or program ,data. line is treated as a userthelevel = (equal sign) = The space d to the propasse not (i.e. essed suppr and the end of line arecomm suppressed and final !lys indic termiands comm these se becau and a DDT or TECO gram). This line norma cters ratheatesr than rly if prope ion funct the end of the line and would not nate with special chara d. the end of the line were passe ; (semicolon) = The.line is treated as a comment to the log file. . The percent and level statement label treated as part of a comm % (percent sign) - ThevedlineforisDEC error, the had has job the when red use. If % is encounted. In this case, the %FIN no sign is normally reser ted. execu is s a 9%FIN is encountere control file is advancedof, unles the .IF command in Paragraph 3.4.5. Refer to the discussion ol file other than those The Batch Controller does not examine the contents of any lines in the(1),contr rts the up-arrow as destined for the monitor. However, when it encounters an up=arrow it conve follows: rrow and the digit are If the cHarac’rer following the up-arrow is a numeric character, the up~a passed to the job. cter, the up-arrow and the up—arrow is an alphabetictA chara If the character followingtothe lated to CTRL-A. trans is character are translated a control character; e.g., (continued on next page) 3-3 COMMANDS -712 - If the character following the up-ar row is another up-arrow, the first up--ar row is ignored and the second up-arrow is treated as an up-arrow; e.g., 1A is treated as tA (up-arrow A) and t11A is treated as 1 1A (up-arrow up~arrow A), If the job is requesting input and is at mediate levél line is found. monitor level, the control file is read until a comma nd or inter- If a job is requesting input at data command, the Batch Controller inserts a control-C, level and the next line is a monit or A Batch user may not issue the follo wing monitor commands when his job ATTACH, DETACH, CCONT, CSTAR T, and SEND. is operating in batch mode: If these commands are used, the line is suppressed and flagged at BATERR in the log file and the job is continued. All other monitor commands and system program commands may be used by a job operating in batch mode. The Batch Controller makes entries to the log file to record job. 3.1.4 its processing of the control fi le and The Output Spoolers The output spoolers receive job output Manager. that has been placed into the output Usually a job's output is placed LPTSPL spooling program at the same are in the form QxxSnn. LPT, where where the job is currently located., queues by the Queue in a line printer queve to be print ed at a later time by the station from which the input was recei ved. The output filenames xx is a random number, and nn is the station number of the However, the user can also specify other output his programs within his job or by means of the QUEUE monitor command in his job. causes output to the card punch , paper-tape punch » or plotte r o be automatically system. 3.2 the The second specifies nonstandard output printer devices either in The first method spooled by the spooling to any of the spooling device s. SUBMITTING JOBS A job is a unit that consists of one step or a group of steps. related data, or several programs and their data, It can contain (1) a single program and (2) the monitor and user-level required to control the progr and its commands that are ams. The Batch system allows the user to submi t his job by one of the following three 1. 2. 3. methods: The user punches his job on cards, inserts control cards to CDRSTK, and leaves his cards at the designated place for the opera tor to run (refer to Paragraph 3.2.1 ). The user creates his job as a file for input to CDRSTK (instead of havin g his job on cards) and then runs CDRSTK himself (refer to Paragraph 3.2.2). The user bypasses CDRSTK by creati and then enters his job into the 3.2.3). Version 6 BATCON ng his own control file on disk for the Batch input queue from his termi Batch Controller nal (refer to Paragraph 3-4 =713 - 3.2.1 COMMANDS Submitting a Job with Cards With this method, a job is submitted via a deck of cards, hounded by the control cards that mark its beginning and end. Other conirol cards to CDRSTK are interspersed among the card deck to direct CDRSTK's processing. Figure 3=1 shows a job containing the appropriate control cards to CDRSTK., This job compiles, loads, executes, and lists a FORTRAN program, | END OF FILE I FORTRAN PROGRAM $FORTRAN $PASSWORD MUMB $J0B TEST2 [20,27]/ 10-0729 Figure 3=1 3.2.1.1 Typical Job on Cards The $JOB Card - This card notifies CDRSTK that a job is to be processed. CDRSTK creates a control file into which commands are placed for the Batch Controller and a log file on the disk. The first argument (TEST2) shown on this card is the user-assigned name for the job; the second argument ([20,271) is the project-programmer number of the user. For a description of switches which can be used on this card, refer to Paragraph 3.3.9. 3.2.1.2 The $PASSWORD Card ~ This card contains the PASSWORD associated with the project- programmer number specified on the $JOB card. assigned to the user by the system manager. $PASSWORD card. In Figure 3-1, the PASSWORD is MUMB, which was Refer to Paragraph 3.3.12 for more information on the - - 3.2.1.3 The $FORTRAN Card ~ This card causes CDRSTK fo insert a COMPILE monitor command (refer to Chapter 2) into the control file in order to cause the program to be compiled.. Immediately following the $FORTRAN card is the FORTRAN source program to be compiled. The source program is read into a disk file with the specified filename (or a defaulf name if a filename is not given) and with an extension of .F4. Refer to Paragraph 3.3.8 for more information on the $FORTRAN card. 3-5 COMMANDS 3.2.1.4 =714 -~ The $DATA Card - The card after the FORTRAN program is the $DATA card. This card causes CDRSTK to insert an EXECUTE monitor command (refer to Chapter 2) into the control file in order to load and then execute the previously compiled program. Refer to Paragraph 3.3.3 for additional information on this card. 3.2.1.5 The End of File Card - The last card shown in the example is the end-of-file card. This card signals the end of the job. The card is recognized by CDRSTK as the end of the file because of the punches in rows 12, 11, 0, 1, 6, 7, 8, 9 in columns 1 and 80 of the card. Refer to Paragraph 3.3 for more information about this card. 3.2.1.6 Output = Once the program is punched on cards, the card deck is submitted to the operator, who in turn stacks the job in the card reader. The user receives his output in the form of line printer listings. Refer to Paragraph 3.5 for an explanation of the job output. The CDRSTK control cards shown in Figure 3-1 are just a few of the control cards available to the user. For a complete description of all the CDRSTK control cards, refer to Paragraph 3.3. 3.2.2 Submitting a Job with a File With this method, a job is submitted via a file contained on any input device that supports ASCII code. This file contains the program and data with card images of the control cards for CDRSTK. The following example shows the creation of a disk file containing a FORTRAN program and card images of CDRSTK control commands. Note that it corresponds to the card example in Paragraph 3.2.1. SLOGIN 2¢1,27) JOB17 55C4 TTY1] PASSWOKD © 1020 _15-MAR-72 +MAKE JOE,) *I $JOR TESTZ2, WED [(20,271) SFORTRAN,) C FORTRAN PROGRAM GOES HERE $F.0D) ) $DATA £% AEX$ S 3.2.2.1 Image of the $JOB Card - The first line of the file is an image of the $JOB card, Note that the $ character must be the first character of the line in.order for CDRSTK to recognize it os a control command. This line causes a control file and a log file to be created on the disk when CDRSTK is run. The first argument (TEST2) is the user-assigned name for the job; the second ([20,271) is the 3-6 -715 - COMMANDS user project-programmer number of the user. The $PASSWORD card image is not needed because the card, refer is already logged-in when creating the input file. For additional information on the $JOB to Paragraph 3.3.9. monitor com=~ 3.2.2.2 Image of the $FORTRAN Card - This line causes CDRSTK to insert a COMPILE source program mand (refer to Chapter 2) into the control file in order to compile the program. The a filefollows immediately and is read into a disk file with the specified filename (or a default name if information on name is not given) and with an extension of .FA. Refer to Paragraph 3.3.8 for more the $FORTRAN card. m. 3.2.2.3 Image of the $EOD Card - This'lifie indicates to CDRSTK the end of the FORTRAN progra Refer to Paragraph 3.3.6 for more information. monitor com= 3.2.2.4 Image of the $DATA Card - This line causes CDRSTK to insert an EXECUTE m. mand (refer to Chapter 2) into the control file in order to load and execute the progra es the 3.2.2.5 Running CDRSTK - Once the file is created and CDRSTK is run by the user, it process operator. user~created file in the same manner as it processes input fi les of jobs entered directly by the The user runs CDRSTK by typing :R CDRSTK ) CDRSTK responds with an asterisk, and then the user types in the following command *START dev:fi Ie.ext) ‘ where dev: is the name of the device containing the input file for CDRSTK and file.ext is the | the file. Using the above file, the command is FSTART name of DSK:JOB) and CDRSTK responds with When CDRSTK has completed its processing (i.e., when it has created the control and log files entered the job info the Batch input queue), it responds with READY X and has COMMANDS -716 - indicating its readiness to accept another file. At this point, the user can enter another file or return to monitor mode with a tC, The card images shown in the preceding exampl e are only a few of the CDRSTK control card available. Refer to Paragraph 3.3 for a complete description of all of the control cards. 3.2.3 images Submitting a Job with a Control File to the Batch Controlle r With this method, a job is submitted via the steps within a control file to the Batch Controller. The file must be a disk file and is created with a system editor. Since this file is processe d directly by the Batch Controller, control card images are not used. The control file consists of monitor commands, user program commands, comments, and sequence control statements. description of control file ccmmands. assumes that a file named DATA.F4 already exists on MAKE Refer to Paragraph 3.4 for a The following is an example of creating a control file. It disk. JOBuCTL) *I EXECUTE /COMPILE DATA.F4 /LIST) $% FXE% Once the control file is created, the user can enter the job into the Batch input queue one of three ways:- 1. SUBMIT jobname = control file, log file refer to the SUBMIT command in Chapter 2. 2. QUEUE INP: jobname = control file, log file refer to the QUEUE command in Chapter 2. 3. RQUEUE - refer to the QUEUE specification in Notebook 7 of 3.2.4 the DECsystem-10 Software Notebooks. Interjob Dependency Jobs are not necessarily run in the order that they are read into by the user on the $JOB card (refer to Paragraph 3.3.9) the Batch System. Priorities stipulated and additional parameters set by the Batch System are dynamically computed by the Queue Manager to determine in what order the jobs However, it is often useful to submit several jobs that must be run job updates a master file and another job processes it. upon the running of the other. are run. in a specific order, for example, one Therefore, the running of one job is dependent Although these jobs could be combined into one large job, it is some~ times necessary to keep them distinct; i.e., they might be submitted by different people at different S times, =717 - COMMANDS Because the jobs in the Batch System are run in order of priority, the user specifies an addition- al priority, an initial dependency count, on the $JOB card of the dependent job. count becomes part of the queue entry. than zero cannot be scheduled. This dependency Any input queue entry that has a dependency count greater When the count becomes zero, the job is scheduled, based upon the time it was submitted and the time that the dependency count became zero. If the dependency count becomes negative, an advisory message is sent to the issuing job and to the dependent job. The dependency count can be altered by including the QUEUE command as part of any job upon which the dependent job is waiting. (Refer to the QUEUE monitor command.) The QUEUE command switch that allows the user to change the dependency count of another job is the /MODIFY/DEPEND :nn switch. If the user specifies a plus or minus sign before the count (nn), that number is subtracted from or added to the dependent job's count, If the user does not specify a sign, the dependent job's count is changed to the count specified in the /MODIFY/DEPEND: switch. 3.3 | CDRSTK CONTROL CARDS Control cards are inférspersed among the input stream to aid CDRSTK in separating the input into the appropriate files, either the user's data files or the control file processed by the Batch Controller. control cards contain a dollar sign ($) in column 1 and an alphabetic character in column 2. The These are the only cards read and interpreted by CDRSTK; the remainder of the input is separated and placed into the appropriate file. Note that if the user creates his own control file, he bypasses CDRSTK, and, therefore, does not use these control cards. Only the first part of the command name or switch need be specified; as long as the name is unique, it is accepted. The first three characters of a command name are generally sufficient to ensure uniqueness. The standard comment and. continuation conventions for the system can be used on the * control card. A comment is preceded by a semicolon; characters after the semicolon to the end of the card are treated as comments. A card may be continued by placing a hyphen as the last non-TAB or non=space character before the end of the card. spaces can follow. . Comments beginning with a s'emicol;m, TABs, and All defaults for control card parameters are installation parameters. The end-of-file is used to signal the end of the job. When input is from the card reader, an end-offile card is used. Column 1 of this card has rows 4 and 5 blank and rows 6, 7, 8, and 9 punched. The recommended form of this card has columns 1 and 80 containing punches in rows 12, 11, 0, 1, 6, 7, 8, 9, withrows 2, 3, 4, and 5 blank, so that the card can be recognized in any orientation. When devices other than the card reader are used for input, the standard end-of-file for each device is treated by CDRSTK as the end of the job. 3=9 COMMANDS -718 - 3.3.1 $ALGOL Function This card causes CDRSTK to copy the named ALGOL program onto disk and fo insert a COMPILE monitor command into the control file. source program. The card is placed at the beginning of the When the job is run, the specified program is compiled and temporary relo~ catable binary and listing files are created. The binary and listing files can be made perman- ent if the user renames them to change their protection. The source file can be preserved by means of the /PROTECT switch., The listing file is printed as part of the job's output. Processor switches can be passed to the ALGOL compi ler by including them in the command string. The position of these switches in the command determines their position in the COMPILE command generated by CDRSTK. For example $ALGOL /NOLIST (E,,N) results in the following COMPILE command .COMPILE /COMPILE DECKAA.ALG /NOLIST (E,,N) Refer to Paragraph 1.5.7 for a description of the ALGOL processor switches. Card Format $ALGOL dev:name.ext [proj,prog] (processor switches) /S ]/52 .. ./Sn dev: = a file structure name. If omitted, DSK is assumed. name.ext = the name of the file to be created on disk. If omitted, TDRSTK assigns a unique filename of the form DECKaa (where aa = AA through ZZ) with the extension ALG. It is recommended, however, that the user select a distinct filename for each job that is in the Batch system simultaneously. [proj, prog] = a directory name other than that specified on the $JOB card. the project-programmer number .on the $JOB card is used. (processor switches) = the switches to be passed to the ALGOL compiler. If omitted, They must be enclosed in parentheses and the slash cannot appear in connection with these switches. /S /S /Sq == the switches that control the mode of input interpretation and the hshng of the compi led program, Switch Meaning Default /ASCII The input is read in ASCII mode. on /D029 The card deck is read in the old DEC-029 format. off This format is similar to ASCII and is available only in those installations that use DEC-029 format. JLIST A temporary listing file of the program is created. on (continued on next page) Version 11 CDRSTK 3-10 COMMANDS -719 Card Format (cont) Default Meaning Switch off No listing file of the program is created. /NOLIST The protection to be set for the file (in octal). /PROTECT :nnn The file is preserved ‘only until KJOB for the job. When ON is specified, trailing blanks are suppressed. /SUPPRESS: ON or OFF on They are not suppressed when OFF is specified. /WIDTH:nn The maximum number of columns to be read. If the specified width is less than 80, only that number of columns is read. The remaining columns are treated as blank. Normally this switch is only used when 80 The card deck is read in 026‘card code. off the /SUPPRESS switch is on, /026 Restrictions The /026 and /D029 switches apply only to card reader input. Input from other devices ismust be read in ASCII code; otherwise an error message is written in the log file and the job terminated. 3.3.2 $COBOL Function This card causes CDRSTK to copy the specified COBOL program onto disk. The card ais placed at the beginning of the source program, and when CDRSTK reads the card, it inserts COMPILE monitor command into the control file and copies the COBOL program into the file on the specified disk area. When the job is run, the program is compiled and a temporary recan files locatable binary file and a temporary listin g file are created. The binary and listing be made permanent if the user renames them to change their protection. The source file can be preserved if the user specifies the /PROTECT switch. The listing file is printed as part of the job's output. Processor switches can be éqssed to the COBOL compiler by including them in the command string. The position of these switches in the command determines their position in the C OMPILE command generated by CDRSTK. For example $COBOL (A,M,C) /PROTECT:057 results in the following COMPILE command .COMPILE /COMPILE DECKAB.CBL (A, M, C) /LIST Refer to Paragraph 1.5.7 for a description of the COBOL processor switches. Version 11 CDRSTK COMMANDS ..720- Card Format $COBOL dev:name.ext [proj, prog] (processor switches) /S ]/52. . ./Sn dev: = a file structure name. If omitted, DSK is assumed. name.ext = the name of the file to be created on disk. If omitted, CDRSTK assigns a unique filename of the form DECKaa (where aa = AA through ZZ) with the extension .CBL. It is recommended, however, that the user select a distinct name for each job in the Batch system simultaneously. [proj, prog] = a directory name other than that specified on the $JOB card. the project-programmer number on the $JOB card is used. (processor switches) = the switches to be passed to the COBOL enclosed in parentheses and the slash cannot appear in compiler. If omitted, They must be connection with these switches. /S]/S .+./S_= the switches that control the mode of input inferpfiet aflon and the list- ing ofthe cor?‘tpi led program. Switch Meaning Default /ASCII The input is read in ASCII mode. /D029 The card deck is read in the old DEC-029 format. - This format is similar to ASCII format and is avai lable on off only in those installations that use DEC-029 format. /LIST A temporary listing file of the program is created. /PROTECT:nnn Specifies the protection to be set for the job (in octal). /SEQUENCE The program is read in conventional COBOL format on The file is preserved only until KJOB for the job. with sequence numbers in columns 1 through 6, and on comments beginning in column 73. When this switch is specified, the default width is 72. /SUPPRESS: ON or OFF /WIDTH:nn When ON is specified, trailing blanks are suppressed. on The maximum number of columns to be read. 80 They are not suppressed when OFF is specifi ed, If the specified width is less than 80, only that number of columns is read, the remaining columns are treated as blank. Normally this switch is used only when the /SUPPRESS switch is on. /026 The card deck is read in 026 card code. off Restrictions The /026 and /D029 switches apply only to card reader input. be read in ASCII code; otherwise, an error message is written terminated. Version 11 CDRSTK 3-12 Input from other devices must in the log file and the job is - 721 - COMMANDS 3.3.3 $DATA Function This card causes CDRSTK to copy data into a file on the user's disk area and to insert an EXECUTE monitor command into the control file, CDRSTK maintains a list of filenames of all source or relocatable programs that have been processed since the beginning of the job or the last $DATA card read. Each time a program is copied by the CDRSTK, its name is placed in the list and given an extension of .REL. When the $DATA card is read, CDRSTK places an EXECUTE command into the control file and copies the filenames of the programs into the EXECUTE command string. On the next $language card, CDRSTK clears the list of filenames so that the next entries into the list reflect only those filenames copied since the last $DATA command was read. When the job is run, the programs are loaded and executed, No compilation is performed because the programs are either in relocatable binary form or have been previously compiled because of the $language card. If two $DATA cards appear in a row, the same programs are reloaded and executed again. Loader switches can be passed to the LOADER by placing them in the command string. When it converts them to the standard CDRSTK places these switches in the EXECUTE command, LOADER switch format (i.e., % switch). $DATA (S, F) For instance, 7_ causes the following EXECUTE command to be generated .EXECUTE ... %S %F Card Format $DATA dev:name.ext [proj,progl /S ]/52. . ./Sn dev: = a file structure name. If omitted, DSK is assumed. . name.ext = the filename of the file to be created. If omitted, CDRSTK creates a unique filename of the form Qaa (aa = AA through ZZ) with the extension .CDR. It is recommended, however, that the user select a distinct name for each job that is in the Batch system simultaneously, so that he can distinguish the various output ' listings. [proj, prog] = the directory name if different from the one specified on the $JOB card. If omitted, the project—programmer number specified on the $JOB card is used. /S ]/52. . ;/Sn = switches that conirol the mode of reading and interpreting of the input medid, Version-11 CDRSTK S 3-13 COMMANDS =722 - Card Format (cont) Swiféh Meaning Default /ASCII The input stream is read in ASCII mode. on /BINARY The card deck is read in binary card form. off This switch is ordinarily not necessary because the first column of each card is checked for punches in rows 7 and 9. If these rows are puriched, the card is read in binary. /D029 The card deck is read in the old DEC-029 format. This formet is similar to ASCII format and is available only off for compatability with old decks. /IMAGE :n The card deck is read in image mode. The switch must be followed by a decimal number in the range 2 off through 80. This causes ensuing cards to be read in image mode until either end-of-file is reached or a card is read that contains punches in all rows of col- umn | and all rows in column n. The CDRSTK control commands are not recognized when cards are read in imcage mode, /PROTECT:nnn A protection of nnn (octal) is set for the file; if not - specified, the file is preserved only until a KJOB command for the job. /SUPPRESS: ON or OFF /WIDTH:nn When ON is specified, trailing spaces are suppressed. They are not suppressed when OFF is specified. The maximum number of columns to be read. If the specified width is less than 80, only that number of on 80 columns is read. The remaining columns are treated Nommaily, this switch is only used when the /SUPPRESS switch is on. For example, /WIDTH:72 as blanks. causes the CDRSTK to disregard columns 73 through 80 and to suppress any trailing spaces up to column 72, /026 The card deck is read in 026 card code. off The modes ASCII, 026, IMAGE, and D029 are mutually exclusive modes for interpreting Hollerith punches. When one of those modes is set, it remains in effect until changed (refer to the $SMODE cardl) or the end of file is reached. The defaults for all modes are reset by the next $MODE card or by individual switches in other control cards such as in the $DECK card. Requirements If the data is contained within the programs instead of being a separate file, a $DATA card or an EXECUTE command must be placed after the programs. otherwise. The program will not be executed - 723 - | COMMANDS Restrictions This card can be used only when the programs in the job have been entered with a $language card or $RELOCATABLE card, since CDRSTK maintains a list of the filenames of programs that are input with these commands. If the user wishes only to have the programs compiled, no. $DATA card or EXECUTE command should appear in the job. 3.3.4 $DECK Function This card causes CDRSTK to copy all statements up to the next control card into a data file. Card Format $DECK dev:name.ext [proj, prog] /S]/SZ' . ./Sn dev: = a file structure name. The default is normally DSK. name.ext = the user-assigned name and extension of the file to be created. If omitted, a unique filename in the form DECKaa (aa = AA through ZZ) is created by CDRSTK with the extension .CDR, It is recommended, however, that the user select a distinct name for each job that is in the Batch system simultaneously. [proj, progl = a disk area other than the one supplied on the $JOB card. the project-programmer number specified on the $JOB card is used. /S /S .../S If omitted, =switches that control the mode of readmg and interpreting of the input medld The Switches are identical to the switches described for the $DATA card. Restrictions The /BINARY, /026, /IMAGE, and /D029 switches apply only to card reader input. Input from other devices must be read.in ASCII code; otherwise an error message is written in the log file and the job is terminated. 3.3.5 $DUMP Function This card causes CDRSTK to insert a DUMP monitor command into the control file which invokes a dump, according to the arguments specified, when an error is detected by the Batch Controller. COMMANDS - 74 - Card Format $DUMP /command arg/command arg. .. The commands and their arguments are the same as described for the DUMP program. Chapter 2). Two of the commands useful to a Batch job are duplicated below. Command Argument ALL DUMP (Refer to Meaning Dumps the entire file. curp descriptor, Dumps the specified bytes in the current modes. curp descriptor, ... 3.3.6 $EOD Function This card terminates the input that is being copied into a data file by CDRSTK because of ~a preceding $DECK card. All control cards with the exception of $MODE perform this action, i.e., terminate the copying of input. CDRSTK ignores it. If input is not being copied and this card is read, $EOD is only necessary when the user wishes to place a line of input which is not a CDRSTK control card after input that is being copied into a data file. g_qrd Format $EOD 3.3.7 $ERROR $NOERROR Furiction These cards are used to aid the Batch Controller in processing errors. They cause CDRSTK to insert an . IF statement into the control file; e.g., .IF (ERROR) or .IF (NOERROR). Refer to Paragraph 3.4.5 for an explanation of the .IF statement. These cards must appear at the point at which the error occurs. : COMMANDS ’ =725 Card Formats $ ERROR statement $ NOERROR statement If statement = an executable monitor or batch command preceded by a period. t statemen the label, t statemen a to go to er Controll Batch the directs t statemen the s command of e sequenc the in label line and any related lines must be included at the place the user wants it executed. For example, ' $FORTRAN TEST1 $ERROR .GOTO A $DATA TEST1DA $ERROR .GOTO A A: CONT $FORTRAN TEST2 3.3.8 $FORTRAN or $F40 ' - ; Function This card causes CDRSTK to copy the named FORTRAN program onto disk and to insertg aof the beginnin COMPILE monitor command into the control file. ‘The card is placed at the temporary relo= and d compile is program d specifie the run, is job the When program. source be made permancan files listing and binary The catable binary and listing files are created. be preserved by can file source The n. protectio their change to them ent if the user renames output. job's the means of the /PROTECT switch. The listing file is printed as part of in the command Processor switches can be passed to the FORTRAN compiler by includining them E com~COMPIL the position their es determin string command the in position string. Their mand generated by CDRSTK. For example, $FORTRAN (A, S; D) /NOLIST results in the following COMPILE command .COMPILE /COMPILE DECKII.F4 (A,S,D) /NOLIST Refer to Paragraph 1.5.7 for a description of the FORTRAN procéssor switches. Version 11 CDRSTK 3-17 COMMANDS - 726 - Card Format $FORTRAN dev:namext . [proj, prog] (processor switches) /S]/SZ' . ./Sn $F40 dev:name.ext [proj, prog] (processor switche s) /S]/S2 .. '/Sn dev: = a file structure name. If omitted, DSK is assumed. name.ext = the name of the file to be created on disk. If omitted, CDRSTK assigns a unique filename of the form DECKa a (where aa = AA through ZZ) with the extension -F4. It is recommended, however, that the user select a distinct name for each job in the Batch system simultaneously. [proj, prog; = a directory name other than that specified on the $JOB card. the project-programmer number on the $JOB card is used. If omitted, (processor switches) = the switches to be passed to the FORTRAN compiler. They must be enclosed in parentheses and the slash cannot appear in connection with these switches, /S]/S .++/S = the switches that control the mode of input ing ofzrhe «:oi?'lpiled program. Switch interpretation and the list- Meaning Default /ASCII The input is read in ASCII mode. /CREF A cross-referenced listing file is create d to be pro- on off cessed by the CREF program. /D029 The card deck is read in the old DEC-0 29 format. This format is similar to ASCII and is availa ble only in those off _installations that use DEC-029 format . /LIST A temporary listing file of the program is created. /M on The MACRO coding is included in the output listing. /NOLIST off No listing file of the program is create /PROTECT:nnn The protection to be set for the file (in octal). d. off The file is preserved only until KJOB for /SUPPRESS: ON or OFF /WIDTH:nn the job. When ON is speciffied, trailing blanks are They are not suppressed when OFF is suppressed. specified. The maximum number of columns to be read. If the spec:fied width is less than 80, only that number of 72 columns is read. as blank. The remaining columns are treated Normally this switch is only used when the /SUPPRESS switch is on. /026 The card deck is read in 026 card code. off Restrictions The /026 and /D029 switches apply only to card reader input. Input from other devices must be read in ASCII codcle; otherwise, an error message is written in the log file and the job is terminated. Version 11 CDRSTK ~727 - : COMMANDS 3.3.9 $JOB Function This card, in conjunction with the $PASSWORD card (if required), causes CDRSTK to create a control file and a log file on disk into which commands are placed for the Batch Controller. The filename of the control file is the name of the job specified in the command string, and the extension is .CTL., CDRSTK also uses this name as the filename of the log file with an extension of .LOG. If the jobname is omitted from the command string, CDRSTK creates a unique name for the control file and log file. It is recommended, however, that the user select a distinct name for each job that is in the Batch system simultaneously, so that he can distin- guish the various output listings. In general, the jobname used on input appears in the output queves. CDRSTK adds the control and log files to the directory of the specified project— programmer number. The user may specify a wildcard designation (*) for the programmer number in the $JOB card, for example, ] or $JOB FLEX [4] $JOB FLEX[4, This.specificati.on causes CDRSTK to look at ACCT.SYS (an administrative file) in order to determine if the wildcard option is allowed for this project. If it is, CDRSTK provides a unique programmer number within the project. If it is not allowed, CDRSTK returns an error message and continues with the next job. Card Format $JOB name [proj, prog] /S]/SZ' . ./Sn name = the user-assiQned name for the job; if omitted, CDRSTK creates a unique name of the form JOBaaa (aaa = AAA through ZZZ) for the control and log files. [proj, prog] = the project-programmer number of the user who submitted the job. This argument is required. A space or comma can separate this argument from the jobname. /51/52' . ./Sn = switches taken from the following group. These switches are optional. _ Switch /AFTER:dd~mmm=yy hhmm Default Meaning The job cannot be run until after the speci- None The job cannot be run until after the input None fied date and time. The resulting AFTER time must be less than the DEADLINE time. /AFTER:+tt time plus the number of minutes indicated by tt. /CARDS:nnk 4 ~ The maximum number of cards (up to 10K) that can be punched by the job (in decimal). 0 K is optional. (continued on next page) COMMANDS -728 - Card Format (cont) Switch /CHARGE:aa Meanir:g None Maximum amount of core (in decimal) that can 25K (aa = name of the account). / CORE:nnk be used by the job up to the maximum allowed by the installation. K is optional. /DEADLINE:dd-mmm=yy hhmm Default The job is charged to a user-specified account The job must be completed by the specified date and time. None The resulting DEADLINE time must be greater than the AFTER time. /DEADLINE :+#t The job must be started by the indicated number of minutes after it is input. /DEPEND:nn Initicl interjob dependency count (in decimal). /FEET:nn The number of feet of paper tape that will be punched by the job. /LOCATE:Snn Specifies the remote station of the job and where the output is to be sent. None The station where the cards were input, /NAME:aa The user's name in up to 12 characters. None /PAGES:nn The maximum number of pages in decimal to be printed by the job, including the log file 100 and compilation listing. /PRIORITY:nn The external priority of the job; the highest priority that can be specified is 62 (decimal). /PROTECT:nnn The protection (in octal) for the job, the control file, and the log file. Preserved only until KJOB is given for the job. /RESTART:0 or 1 If 0, the job cannot be restarted by the operator. The job can be restarted if 1 is specified. The job should not be restartable if there are changes to the permanent file directory. /TIME:hh:mm:ss The limit placed on the amount of CPU time used by the job. /TPLOT:mm The number of minutes of plotter time that the job will use. /UNIQUE:0 or 1 If 1, only one Batch job at a time is run using the specified directory. If 0, any number of 0 5.0 (5 minutes) Batch jobs can be run at the same time using the specified directory. Requirements The $JOB card must immediately follow the $SEQUENCE card, or be the first card if the $SEQUENCE card is not required. 3-20 COMMANDS -729 - 3.3.10 $MACRO Function disk and is placed designafed MACRO program ontoinserts This card causes the CDRSTK to copyam.the When a COMPL LE it card, the reads TK at the beginning of the source progrfile and copiesCDRS on the file the into m progra O MACR the monitor command into the control is run, the program is assembled and a temporary relocatspecified disk area. When the jobare created. The binary and listing files can be made perable binary file and listing files preserved by e their protection. The source file isoutput manent if the user renames them to chang . listing fileis printed as part of the job's means of the /PROTECT switch. The in the command the MACRO assembler by includinginthem Processor switches can be passed to nd ILE comCOMP the on positi their ines determ string in the comma string. Their position le mand generated by CDRSTK. For examp Q) S, , $MACRO /PROTECT:055 (W results in Q) /UIST S,, _COMPILE /COMPILE DECKCB.MAC /PROTECT:055 (W Card Format $MACRO dev:name .ext [proj, progl (processor switches) /51/52' . ./Sn dev: = a file structure name. If omitted, DSK is assumed. K assigns a created on disk. If omitted, CDRSTsion name. ext = the name of the file to be(aa .MAC, exten the with ZZ) gh = AA throu unique filename in the form DECKaa the However, it is recommended that the user select a distinct name for each job in Batch system simultaneously. that specified on the $JOB card. If omitted, [proj, prog] = a directory name other than $JOB card is used. “the project-programmer number on the to the MACRO assembler. They must (processor switches) = the switches to be passed appear in connection with these cannot be enclosed in parentheses and the slash ' switches. /S'I/S .. ./Sn ~ the switches that conirol the mode of input interpretafion and the ing of 2H’xe assembled program. Switch /ASCIl | / CREF Meaning The input is read in ASCII mode. A cross—referenced listing file is created to be pro- list- Default on off cessed by the CREF program. (continued on next page) Version 11 CDRSTK 3=21 COMMANDS - 730 - Card Format (cont) Switch Meaning /D029 E)efou It The card deck is read in the old DEC=029 format. This format is similar to ASCII and available those installations that use DEC=029 format. off only in JLIST A temporary listing file of the program is created. /NOUST No listing file of the program is created. /PROTECT :nnn The protection to be set for the file (in octal). /SUPPRESS:: When ON is specified, trailing blanks are suppressed. When OFF is specified, they are not suppre ssed. on off The file is preserved only until KJOB for the job. ON or OFF /WIDTH:nn The maximum number of columns to be typed. If the specified width is less than 80, only that number of columns is read. The remaining columns are treated as blank. Normally, this switch is used only when on 80 the /SUPPRESS switch is on. /026 The card deck is read in 026 card code. off Restrictions The /026 and /D029 switches a pply only to card reader input. Input from other device s must be read in ASCII code; otherwise, an error messag e is written in the log file and the job is terminated. 3.3.11 $MODE Function This card causes CDRSTK to chan ge the mode in which it is interpreting the input stream. The $MODE card can be placed anywhere after the $PASSWORD card in the command seque nce and is termin ated by arother $MODE card or the command does not terminate the end-of-file (which terminates the job). copying of input preced ed by a $DECK card. This Card Format SMODE /5./5,.../5 /S]/S .. ./Sr = switches that control the mode media. of readin g and interpreting of the input These: switches are identical to the switches des 3-22 cribed for the $DATA card. - 731 - COMMANDS ' Restrictions The mode switches /026, /IMAGE, /D029, and /BINARY can be used only for card input. Input from other devices is always read as ASCII code. Thus, the only switches that can be used with the $MODE card for devices other than the card reader are /SUPPRESS and /WIDTH. 3.3.12 $PASSWORD Function This card contains the password associated with the project-programmer number specified in the $JOB card. If the password does not match the password stored in the system for the speci- fied project=programmer number, CDRSTK does not create any files and aborts the job. Use of this command is an installation opfion. Card Format $PASSWORD password password = 1 to é character passwo‘rd. Requirements If the $PASSWORD card is required, it must immediately follow the $JOB card. v 3.3.13 $RELOCATABLE rd # Function This card causes CDRSTK to copy a relocatable binary program from cards to a file on the user's disk area. The cards are read in binary mode. \ Card Format $RELOCATABLE dev :name. ext [proi,prog]‘ /S] dev: = a file structure name. If omitted, DSK is assumed. name . ext = the name of the file into which the program is copied. If the filename is omitted, CDRSTK creates a unique name in the form DECKaa (aa = AA through ZZ). It is recommended that the user select a distinct name for each job in the Batch system simultaneously. If the extension is omitted, .REL is assumed. : ' (continued on next page) 3-23 -732 - COMMANDS Card Format (cont) [proj, prog] = the disk directory if different from the one specified on the $JOB card. If omitted, the project-programmer number on the $JOB card is assumed. /S] = /PROTECT:nnn (octal) The protection for the file to be created. If not specified, the file is preserved only until a KJOB command for the job is executed. Restrictions Relocatable binary programs can only be read when the input is from cards. The program following this command must be read in binary; the mode cannot be changed until a nonbinary file is copied. If an attempt is made to change the mode, an error message will be issued and the job will be aborted. 3.3.14 I $SEQUENCE Function This card specifies the job's unique sequence number. quirements of the particular installation. The use of this card depends on the re~ _C_c_u;d Format $SEQUENCE n n = a decimal number Requirements If the installation requires this command, it must be the first card in the input stream. 3.4 BATCON CONTROL FILE COMMANDS Ordinarily the Batch Controller reads the control file in a sequential manner. The commands described in this section can appear in the control file to interrupt the sequential processing of the control file in order to specify error recovery. If an error occurs in the job, the Batch Controller is notified of the error; the user has the option of including several methods of error recovery. The user may include an .IF command in the control file. When the error occurs, the Batch Controller examines the next monitor level line in the control file for an .IF command to determine what action 3-24 - 733 - COMMANDS | to take on the error. It does not search past the next executable monitor line in the control file for the .IF command; therefore, if this command is used, it must be the next monitor command in the control file. If the user does not wish to include an .IF command, he may include two types of error recovery rou= fines in the control fi le, one type labeled %ERR (error processing for non-system programs) and the other labeled %CERR (error processing for cémpilers and system programs). A system program is one found on a device specified in the SYS search list in [1,4]. If SYS is assigned as a logical device name, the programs are considered user programs, not system programs. After an error occurs in the job and the next executable monitor line in the control file is not an. .IF statement, the Batch Controller searches for the labeled error recovery control lines and processes the statements following these labels. These routines may be placed anywhere in the control file. Once the Batch Controller has processed the routine, it continues from that point in the control file; it does not read backwards over sections of the control file skipped in searching for the error routines. The following example shows the use of a %ERR error recovery routine. .COMPILE SAMPLE /LISTJ «MOUNT MTA:3 /VID:42936,) ' EXECUTE,) D ISMOUNT R SORT)) 3 OR@ 4 UAT/kau/Kl.lm) *MUMP« SRT«F +QUEUE MUMP «SKT ) %ERR: «CLOSE) DUMP) DISMOUNT 3. #F IN: «DELETE FOR®4.DATJ Depending on the type of error found,: the following operations are performed; If a compilation error - the program is compiled, WM the tape is mounted, the program begins execution, the output is closed, NOO occurs, only the compilation and the listing result. a quick dump of core is taken, No tape is mounted. If an execution error results, the tape is dismounted, and the file FOR04.DAT is deleted. If a SORT error occurs, the program compiles, the tape is mounted, the program is executed, and the NO O A WN - file FORO4.DAT is deleted. Finally, if no errors result, the program is compiled, the tape is mounted, the program is executed, the tape is dismounted, the sort is performed, MUMP. SRT is printed, and the file FORO4.DAT is deleted. 3-25 COMMANDS -734 - When the user is bypassing CDRSTK and creating his own control file, he may place a %FIN af the end of the control file. (CDRSTK, in creating the control file, automatically places a %FIN at the end.) This label is used for cleanup purposes, e.g., deleting the input files. In creating the control file, the user may place other %FIN's at various points in the file for periodic cleanup of his job. For | example, this label is used in a special kind of error recovery. If the time allocated to the job runs to the maximum limit specified in the $JOB command (refer to Paragraph 3.3.9) or by the Batch system, the user is given an additional 10% of his allocated time to cleanup his job before it is aborted. Because the user includes a %FIN, cleanup is performed and the resulis of the job's processing are not dost when the job is aborted. The user should be careful in using the %FIN in the control file because if the Batch Controller is searching for an error recovery routine and %FIN is placed before a %ERR or %CERR, the %FIN is executed and the Batch Controller assumes the error recovery routine has been satisfied and does not search any longer for %ERR or %CERR. bypass a %FIN label. Furthermore, a . GOTO label cannot Therefore, the best place to put a %FIN is as the last line in the control file. If an error occurs in the job and the user either was not running a system program or has not included an .IF command or error recovery control lines, the Batch Coniroller initiates a standard quick dump of the user's core area and terminates the job (refer to the DUMP command in Chapter 2). The Batch Controller also initiates a dump if it is searching for a %ERR and reads a %FIN instead. 3.4.1 .BACKTO Function The .BACKTO command is used by Batch users to interrupt the sequential reading of the control file by the Batch Controller. Conirol is transferred in a backward direction. This command can be used with a .IF command to specify transfer of control to an error routine. Command Format .BACKTO label label = label of a statement in the control file. This label is from one to six alpha- numeric characters terminated with a colon and must not begin with a % character. When the .BACKTO command is encountered, the Batch Controller searches for the labeled statement and transfers control to it. If the statement is not found, the job is terminated. 3-26 - 735 - ) COMMANDS 3.4.2 .CHKPNT Function ry when a Batch job is terminated abnorThe . CHKPNT.command is used to aid in error recove ds as desired can be placed in the comman NT _CHKP many As mally. by a system failure. , the program begins at the location control file. When the job is restarted after the failureing of the program. of the last . CHKPNT command instead of at the beginn Command Format .CHKPNT label . to five alphalabel = label of a statement in the control file._ This label is fromin one control file, it the t statemen the with appears label the When numeric characters. (e.g., must be followed by a double colon instead of the usual single colon label :: statement). 3.4.3 .ERROR Function The .ERROR command causes the Batch Controller fo recognize a message beginning with the specified character.as an error in the job. Command Format .ERROR character character = the beginning character of the line that is fo be recognized as aniserror (e.g., %). If this argument is not specified, a ? af the beginning of a line con= sidered as an error. 3.4.4 .GOTO Function of the control The .GOTO command is used by Batch users to interrupt the sequential reading command may This n. directio forward a in ed transferr is Control file by the Batch Controller. routfine. an error be used with a .IF command to specify transfer of control to Version 6 BATCON 3-27 COMMANDS - 736 - Command Format .GOTO label label = label of a statement in the control file. is from one to six alpahnumeric characters with a % character. The label appearing in the control file terminated with o colon and must not begin When the . GOTO command is encountered, the Batch Controller searches for the labeled statement and transfers control to it. If the statement is not found before trol file is reached, the job is terminated. the end of the con- Examples X TEST.MAC /L «IF (ERROR) «GOTO A QUEUE GOTO .GOTO A B~ LFT:=TFST .MAC ' * R HBeas 3.4.5 l F R —— Function The .IF command is used by Batch users to Batch Controller recognizes the existence aid the Batch Controller in processing errors. The of an error when it encounters a line beginn ing with a question mark that is cutput from the job to the log file or a line that begins with the character specified in the . ERROR comman d. When the error occurs, this comma nd must be the next monitor level command in the control file. Command Format IF (condition) statement (condition) = ERROR or NOERROR. The parentheses must be included. statement = an executable monito r or batch command preceded by a period. If the specified conditior is true, the statem ent is executed. If the specified condition is not true, the Batch Controller processes the next line in the control file. 3-28 -737 - COMMANDS 3.4.6 . NOERROR Function " The . NOERROR command instructs the Batch Controller to ignore all errors (including messages ' beginning with a question mark) in the job. ever, the message This is especially useful in TECO searches. ' How- ?TIME LIMIT EXCEEDED always indicates that an error exists. & Command Format .NOERROR 3.4.7 .NOOPERATOR Function The .NOOPERATOR command designates that no messages from the job are to be output to the controlling terminal. Command Format .NOOPERATOR 3.4.8 . OPERATOR Function The . OPERATOR command makes it possible for the job, or a program within the job, to communicate with the operator. Any message from the job, starting with the specified character (refer to Chapter 4), is typed on the conirolling terminal. The job then waits for operator intervention and the operator's answer restarts the job. (continued on next page) 3-29 COMMANDS -738 - Function (cont) When the . OPERATOR command is in effect, the Batch Controller ignores an .IF statement un- less the . NOOPERATOR command is given first, and proceeds to search for an error recovery routine labeled with either %ERR: or %CERR: (refer to Paragraph 3.4). This action is taken in order to minimize output to the operator in case of an unexpected transfer of control. However, when an error occurs, the Batch Controller preserves the error status across the . NOOPERATOR command and looks for the .IF statement as the next monitor-level command. an .IF statement following a . NOOPERATOR command will be executed. In other words, Refer to the follow- ing examples. In the example below, the .IF statement will be ignored. JOFERATOR KN +IF 7 TFSPRG (EKKOK) «GOTO TAG However, in the following example, the .IF statement will be executed. CPERATOR KIUIN % - TESFKG NOOPFRATOR «IF (FREOK) +30TC TAG Command Format . OPERATOR character character = the beginning character of the line that is to be sent to the operator (e.g., %). If this argument is not specified, $ at the beginning of the line is assumed. 3.4.9 .REQUEUE » Function The .REQUEUE commard indicates to the Batch Controller that the job is to be requeued, instead of terminated, after an error. It is normally used with the .IF (ERROR) command (e.g., IF (ERROR) .REQUEUE). The {ob is restarted after a default requeue time at the specified label in the control file. Command Format .REQUEUE label Version 6 BATCON 3-30 COMMANDS -739 - 3.4.10 .REVIVE Function The .REVIVE command causes all output from the job to be placed in the log file. Command Format .REVIVE 3.4.11 .SILENCE Function error messages fo the log file. The .SILENCE command suppresses all output from the job except that begin with a question those be will file log the in g appearin lines only This means that the mark. - : ¢ Command Format .SILENCE 3.5 JOB OUTPUT The output from a usef's job is normally in the form of printed listings containing the user's job output, compi lation listings, any memory dumps requested by the user or initiated by the Batch Contro”er, and from the log file indicating the processing performed by the programs in the Batch system. The results the job and the log filé are automatically placed in the queue for the line printer spooler, LPTSPL, unless the job was submitted with the /OUTPUT:O switch. However, the user can output to any device in the system. When a user program specifies a slow=speed spooling device, the Batch system places the output into a queue for the appropriate spooler. If the user wishes specific files o be output to particular spooled devices outside of his programs, he can include the QUEUE monitor commands in his control file to specify the output device and any additional parameters that he wishes. Compilation listings are produced from the $language control cards unless the user specifies otherwise. These listings are automatically spooled to the line printer. } The user can also include the COMPILE C monitor command in his job with switches to produce listings. 3-31 COMMANDS - 740 - The user can include any of the monitor DUMP commands or the ory dumps during program testing. CDRSTK card $DUMP to request mem~ Under normal error conditions, the Batch Controller performs an automatic two-page dump for the user (refer to Paragraph 3.4). 3.5.1 The Log File As part of its processing, CDRSTK creates a log file for each job so that the user can examine the processing performed by the CDRSTK and BATCON programs. output. The log file is the first part of the job's. CDRSTK enters a record of its own processing, any errors detected, and any operator inter- ventions. When the job is run, the Batch Controller places additional messages into the log file, in- cluding each line of the control file as it is passed to the job, any error conditions, and any operator actions. The LOGOUT program abpends an accounting summary message to the log file when the terminates. tem (refer to the KJOB command in Chapter 2). Note that the log file is appended to for jobs of the same name; thus it may be necessary to delete this file before running another 3.5.1.1 job This message is similar fo the message received when an interactive user logs off the sys- CDRSTK Messages - CDRSTK places six kinds of messages each message is identified by the time that CDRSTK placed tifying word in columns 1 through 16. job with the same name. into the log file. The first line of the message into the file and by an iden~ The identifier for each kind-of message is taken from the following group: DATE -~ gives the date, system name, CDRSTK versi on, and the input device. STACK -~ identifies any CDRSTK nonerror message. STERR -- identifies any CDRSTK error message. CARD == describes any card image not in an error message STSUM -- identifies the summary message at the end of STOPR -~ describes any operator actions that occurred . the CDRSTK's processing. during the CDRSTK's processing. The first entry in the log file always contains the identifie r DATE and a message giving the date, the system name, the current version of CDRSTK, and the input device; for example, 10:20:06 DATE 13-MAY-71 5S03C System 40 CDRSTK version 7 device CDR1 The $SEQUENCE and the $JOB commands are the next two is never printed for reasons of security. lines printed. The $PASSWORD command When the end-of-file is read, CDRSTK prints a summary mes- sage giving the number of cards read, the number of files and blocks written, and the number of each type of error that occurred. The summary is also placed in the system accounting of the job summary is given below. 3-32 file. An example - 741 - COMMANDS " 1125:38 STSUM End-of=File after 423 cards, 3 files (40 blocks) written | 4 Hollerith errors (nonfatal) 2 Binary Sequence errors (fatal) Job Aborted by CDRSTK Between the beginning and ending messages, CDRSTK prints any operator actions as they occur, some of nonerror mesnonerror messages, and reports of errors it has detected. The following are examples: sages from CDRSTK. CARD $JOB TESTA, [10,225] STOPR JOB STOPPED BY OPERATOR STOPR CONTINUED BY OPERATOR 3.5.1.2 CDRSTK Error Reporting = CDRSTK places messages in the log file that describe errors that have occurred during its processing. The following errors are detected, and their degree of severity is as specified: S0 Q0 U0 - Fatal Errors Error on the $JOB card. Error on the $PASSWORD card. Unrecognizable command on a CDRSTK confrol card. Error in & parameter on a CDRSTK control card. Binary sequence error ~ issued a maximum of five times per deck. ~ Improper code (binary rather than Hollerith, or vice versa). Nonfatal » Errors a. b. Hollerith error (invalid punch). Missing end-of=file card: Error messages are issued by CDRSTK to the log file either up to the first fatal error, or, for nonfatal errors, up to a maximum of 200 errors or errors on 10% of the total card count, whichever is greater. However, CDRSTK continues processing the job up to the end-of-file. The following are examples of error messages placed in the log file by CDRSTK. JOB ABORTED BY OPERATOR JOB ABORTED -~ HOLLERITH ERRORS CARD #ann FATAL CARD | CARD #nnn COL #nnn CARD #nnn CARD SEQUENCE ERROR CARD #nnn SWITCH ERROR CARD #nnn MODE ERROR NON=-BINARY CARD IN BINARY DECK 3-33 COMMANDS - 742 - Each card-reading error results in a message which includes the first card column in error, the deck number and columns 1 through 30 of the $DECK card, and the card number within the deck and within the job. The faulty card image appears on the next line with a backward slash (\) indicating the col- umn in error. 11:15:05 STERR Hollerith error at col. 7 of card 241, card 73 in deck 2 (SFORTRAN MAIN) 3 \ORMAT (‘FOO") € 3.5.1.3 Batch Controller Messages = The Batch Controller messages are similar to those of the Stacker. The times followed by an identifying notation are placed in columns 1 through 16 of the first line of each message. The identifiers for the Batch Controller messages are described in the list below: BVERS -~ denotes the version of BATCON. BDATE -- identifies the date BATCON processed the job. BATCH -- identifies any Batch Controller nonerror message. BAOPR -- describes any operator action. BAERR -~ denotes any Batch Controller error message: MONTR -- identifies a line input or output at monitor level. USER -~ describes any line input or output at user level. BASUM =~ gives the Batch Controller summary message. The first line in the log file printed by the Batch Controller is the version number. As each line in the control file is read, it is printed in the log file as well as being passed to the user program the monitor. Any time that the operator performs some action that affects the records it in the log file. a monitor command. or to job, the Batch Controller The BATCON program enters amessage in the log file every time it generates For example, if a fatal error occurs in the job and the user has not included an .IF statement, a %ERR routine or a %CERR routine in the control file, the Batch Controller generates a DUMP command. It also generates a LOGIN and a KJOB monitor command for each job. Any errors in the input that are detected by the Batch Controlle r are printed in the log file. 3.5.1.4 Batch Controller Error Reporting = The Batch Controller places the identifier BAERR line that it detects as being an error. on any The errors that are detected are listed below; the first three are fatal errors. a. Missing condition (ERROR or NOERROR) or missing statement in Missing statement label in the . GOTO or c. an .IF statement. BACKTO command. The labeled statement in a . GOTO command cannot be found after the . GOTO or before the .BACKTO command in the control file. d. Use of the ATTACH, DETACH, SEND, CCONT, and CSTART monitor commands. 3-34 \ COMMANDS - 743 - Most user error conditions are not flagged by the Batch Controller, they are passed to the monitor where they are flagged as errors. 3.6 SAMPLE JOBS The following sample job setups illustrate the versatility of the Batch System. The first example, Figure 3=2, shows a setup to list a card deck with the QUEUE monitor command. $PASSW SAMPLE E J. JONES §J40B TEST1[15,27]/NAM 10-0730 Figure 3-2 Sample Job #1 The second example, Figure 3-3, produces a CREF listing of a MACRO deck whether or not errors occur in the program. The third example, Figure 3-4, illustrates the use of error processing commands. 3=35 COMMANDS - 744 - L $PASSWORD HENRY $J0B OUT [30,40]/NAME: H. MURES! 10-0728 Figure 3=-3 Sample Job #2 / 1 Y n' OR ANYTHING j +GOTO A ® —] = TESTX 1 B: .R CREF —, 10-0727 Figure 34 Sample Job #3 3-36 COMMANDS - 745 - Figfire 3-5 illustrates ¢ MACRO assembly, two FORTRAN compilations, and execution of all three programs, and shows how monitor commands are entered along with the programs and the Stacker control cards. e ] . 1 /- DIRECTORY FORTRAN SOURCE PROGRAM / $DECK ABL2, F4 +COMPILE /C ABL 1.F4/LIST $EOD Z = PR MACRO SOURCE PROGRAM 5 $DECK TEMPR. MAC $PASSWORD ABCDE $J0B ABLE [17,127] /CORE: 2K $SEQUENCE 9999 10-0726 Figure 3=5 Sample Job #4 3=-37 COMMANDS =746 - Figure 3-6 shows a simple SOUP vpdat e. files are on DECtape and the correction Three base fi les are copied from cards from DEC is on paper tape. I | ' ] *DISMOUNT DTA,PTR I *DSK:[ll,128],LPT=-DSKI,DSN[H,1 27]| /'R FED /DSK:[HJZ?].LPTZ-—DSKZ,FOOZ,F'TRil /R cam j $DECK BASE 3.MAC a *MOUNT PTR: ; PAPERTAPE j -MOUNT DTA: FOO/VIDZS152‘I $PASSWORD MIKEL $J0B SuPD[22,567] /AFTERZEI $ SEQUENCE 840 Figure 3-6 Sample Job #5 3-38 to disk. The user - 747 - COMMANDS , CHAPTER 4 : SYSTEM DIAGNOSTIC MESSAGES AND ERROR CODES The following conventions are used in describing the system diagnostic messages: dev represents a legal device name.~ . file structure name represents a legal file structure name. file.ext represents a legal filename and extension. adr represenfs a user address. n represents a number. abc represents a disk unit or drive. X : switch represents an alphabetic character represents a switch. Most messages returned to the user fall in one of five categories. These categories are determined by the beginning character of the message. 2 of the start of the message indicates a fatal error message. % at the start of the message represents an advisory or warning message. [ ot the beginning of the message indicates a comment line. $ at the beginning of the message represents an operator/job communication line. A response is expected. ' (quote) ot the beginning of the message represents a comment fo the operator. No response is expected. ‘ Programs and/or commands causing the error message are given in parentheses. (Note that the ONCE- only messages have been removed and placed in ONCE.RNO in the DECsystem-10 Software Notebooks.) The descriptive text given with the message indicates what action the user should take when he receives the message. He can, if necessary, notify the operator of any problems that he is having by issuing the SEND, PLEASE, or R GRIPE command. COMMANDS 4.1 - 748 - SYSTEM DIAGNOSTIC MESSAGES The typein is typed back preceded and follow ed by ? The monitor encountered an incorrect charac ter (e.g., a letter in a numeric argument). incorrect character appears immediately before the second ?. The For example: .CORE ABC PCORE A? ACCOUNTING SYSTEM FAILURE. . . A program could not append an entry to (LOGIN, LOGOUT). the accounting file. Notify the operator. YADDRESS CHECK FOR DEVICE dev (1) The monitor checked a user address 6n a UUO and found it to be oo large (>C(. JBREL)) or too small (<C(.JBPF1)); in other words, the address lies outside the bounds of the user program (2) The SAVed file is too large for the core (GET). ' assigned, or the file is not a core image file. $ALL AREAS ON BACKUF The BACKUP program has processed all now closing the associated files. of the project-programmer numbers specif ied and is (BACKUP). ?ALREADY ASSIGNED TO JOB n The device is already assigned to another user's job (job n)." ?AMBIGUOUS ABBREVIATION A command or switch has been abbreviated ?ARGS ARE: to the point that it is not unique. (COMP I L). DAY, RUN, WAIT, READ, WRITE, VERSI ON, ALL, NONE The user either did nct type an argument or command string. typed an illegal argument in the SET WATC H dev: ASSIGNED The device has been successfully assigned to the user's job. ?ASSIGNED TO JOB LIV PV If there is more thar one device of the fype specified, the numbers of the other jobs that have the same type of device are output, unless the user assigning the device has the specified type. In this case, ?DEVICE ASSIGNED TO JOB is output. ?ATTACH TO USER JOB FAILED DAEMON could not attach to the user's job. 4-2 (DAEMON). all the devices of - 749 - | - COMMANDS $BACKUP COMPLETED AT time The BACKUP program has successfully completed. (BACKUP). 2BAD DENSITY The value given with the DENSITY command was not valid: (RESTORE). ?BAD DIRECTORY FOR DEVICE DTAn kind of error. This The system cannot read or write the DECtape directory without gettingorsome a use DECtape that error often occurs when the user tries to write on a write~locked tape has never been written on. ?BATCH ONLY The command issued can only be given by a batch job. BLOCK NOT FREE M specifies a unit or file structure logical block that is not free. (ALCFIL). n BLOCKS ALREADY ALLOCATED The file already exists. The new specification replaces, rather than updates, the old specification. (ALCFIL). ?n1K BLOCKS OF CORE NEEDED The user's current core allocation is less than the contents of . JBFF, ?BOMB OUT The location within INITIA that detected the error will be in AC 15 and the console lights. , (INITIA). 2BOOTSTRAP LOADER IS NOT IN COPY; TRY /L An attempt was made to write the bootstrap loader onto a DECtape via the /T switch before the loader was loaded into a core buffer and preserved with the COPY' core image. (COPY program). 2BOOTSTRAP LOADER WILL NOT FIT IN 3 BLOCKS The user's bootstrap loader is too big to fit into blocks 0, 1, and 2 of the output DECtape. (COPY program). 2BUFFER CAPACITY EXCEEDED AND NO CORE AVAILABLE The buffer is not large enough to handle the number of lines required for looking ahead for matches, and additional core is not available. (FILCOM). 2BUSY command The terminal addressed is not communicating with the monitor (i.e., it is accepting a JCONT). or returning output from a command). The operator's terminal is never busy. (SEND, 4-3 COMMANDS - 750 - ?CANNOT DO 1/O AS REQUESTED L Input (or output) connot be performed on one of the devices specified for input (output). For example, input may have been requested for a device that can only do output. (FUDGE2). ?CANNOT DO OUTPUT TO DEVICE dev Output was attempted to a device that can only do input, or to a device assigned a logical nome. (QUEUE). ?CANNOT PROCESS EXTERNAL SYMBOLS External symbols were encountered while loading the bootstrap loader with the /L switch. (COPY program). ?CANNOT PROCESS HIGH SEG'S While loading the boctstrap loader with the /L switch, high segment code was encountered. (COPY program). ?CANNOT REATTACH FROM A BATCH SUBJOB Batch jobs are not allowed to reattach their jobs. (REATTA). $9%CANT ACCESS COMMAND FILE - CONTINUING The command recovery file is not being created. This file contains information as to how much of the user's command has been processed and how much is remaining. Without this file, the user must start at the beginning if the system crashes. (BACKUP, RESTORE). ?CANT ACCESS DEVICE dev The device specified cannot be INITed. The device is either in use or has an error, such as, being off-line. The user should request another device, or check this device for errors. (BACKUP, RESTORE). $%CANT ACCESS -INDEX DEVICE - CONTINUING dev The device specified for the index file cannot be INITed and an index file is not being created. The user can start over if he wants to create an index file. (BACKUP, RESTORE). ?CANT ACCESS SYSTEM FILES ACCT.SYS could not be read. Only the operator may LOGIN until ACCT. SYS is ready. Consult the operator. (LOGIN). ' ?CANT ADD TO YOUR FILE STRUCTURE SEARCH LIST n n is the error code from STRUUO when trying to add a file structure to search list. (LOGIN). ?CANT ATT TO JOB The project-programmer number specified is not that of the owner project-programmer number was not given when it was incorrect. (ATTACH). 4-4 of the desired job, the required, or the PASSWORD given was -751- COMMANDS ?dev CANT BE REASSIGNED (1) The job's controlling terminal cannot be reassigned, or (2) the logical name would be dup=~ licated, or (3) the logical name is a physical device name in the system and the job reassigning the device is either logged-in under a different project-programmer number or does not have operator privileges. (REASSIGN). ?CANT CONTINUE The job was terminated due to (1) all ERROR IN JOB messages (except for HALT), (2) the EXIT UUO, (3) the CLOSE command, or (4) the REA command when the device was INITed, and the user attempted to continue his program at the point at which I/O was terminated. job cannot be continued. CANT CREATE NEW FILE STRUCTURE SEARCH LIST The monitor cannot create a new file structure search list. ?CANT DECIPHER COMMAND The command typed isnot recognized by the BACKUP program. (BACKUP, RESTORE). ?CANT DECIPHER THAT ‘ There is a syntax error in the command string. (MOUNT, DISMOUNT, FILE). ?CANT DET DEV The user is not logged-in under [1,2]. ? CANT ENTER OUTPUT FILE n file descriptor The ENTER fo write the output file failed; n is the disk error code. (DUMP). ?CANT EXPAND TABLE xxxx The DUMP program ran out of core in attempting to expand the indicated table. (DUMP). ?CANT FIND INPUT FILE n file descriptor DUMP cannot locate the file specified as the input file; n is the disk error code. (DUMP). ?CANT FIND FILE file.ext The specified file could not be found. ?CANT GET SWAPPING PARAMETERS DAEMON tried to obtain the job's swapping parameters and failed. (DAEMON). ?CANT GET SWAPPING POINTER FOR JOB DAEMON tried to obtain the pointer to the user's job on the swapping space and could not because the GETTAB UUO failed. (DAEMON). The COMMANDS - 752 - ?CANT GET USERS PPN DAEMON tried to obtain the user's project~programmer number and could not because a GETTAB UUO failed. (DAEMON). ?CANT OPEN file structure name The file structure is mounted but cannot be opened. already exist. (LOGIN). No UFD is created, though one may - ?CANT OPEN CHANNEL FOR DEVICE dev The OPEN on the channel for the named device failed. (BACKUP, RESTORE). 2 CANT OPEN DEVICE dev The specified device does not exist or it is assigned to another user . (DAEMON), ?CANT OPEN INDEX FILE The OPEN failed for the index file. (BACKUP, RESTORE). ?CANT OPEN SWAP UNIT abc DAEMON attempted tc use the indicated swapping unit and failed. (DAEMON). ?CANT RELEASE UFD INTERLOCK FOR dev [p,p] The UFD interlock cannot be released for the named device. (BACKUP). ?CANT RENAME -FILE PRESERVED An attempt was made via the /DISPOSE:RENAME switch to delete a preserved file (i.e., a file whose owner's field is greater than 0). (QUEUE). ?CANT SET OUR SEARCH LIST DAEMON tried to set its search list and failed in its attempt. (DAEMON). P?CANT SET SEARCH UST = USER'S DAEMON attempted to set its file structure search list to be the same as the user's search list. (DAEMON). ?COMMAND ERROR General catch-all error response for most commands. The syntax of the command is in error, and the command carnot be deciphered. BWN — In FILCOM, one of the following errors occurred in the last command string typed. There is no separator (« or =) between the output and input specifications. The input specification is completely null. The two input files are not separated by a comma. A file descriptor consists of characters other than alphanumeric characters. (continued on next page) 4-6 COMMANDS o N OO - 753 - FILCOM does not recognize the specified switch. is not in standard format, i.e., [proj,prog]. The project-programmer number The value of the specified switch is not octal. The first input file is followed by a comma but the second input file is null. ?COMMAND SYNTAX ERROR TYPE /H FOR HELP An illegdl command string was entered. (GLOB). ?COMMA REQUIRED IN DIRECTORY ' A project=programmer number has been specified without the separating. comma. (DUMP, QUEUE, BACKUP, RESTORE). CONT BY OPR by the operator. This message appears on the console of the job The job has been continued- being continued. (JCONT). ?CONTROL AND LOG FILES MU.ST BE DISTINCT The control file cannot be the same file as the log file. (QUEUE). ?2K CORE NEEDED AND NOT AVAILABLE FILCOM needs 2K of core to initialize 1/O devices and this core is not available from the : : monitor. (FILCOM). 9%CPUn OPR1 ACTION REQUESTED The Job's CPU specification includes a CPU which is not running or is not scheduling jobs. The monitor remembers the specification and uses the CPU as soon as it is started. If at least one CPU is running, the message is printed only once, since the job can run on another CPU. ?DAEMON FILE MUST BE WRITTEN ON A DISK The device specified was a nondisk device. (DAEMON). ?DAEMON NOT RUNNING The DAEMON program has not been initialized. It must be started by the operator to allow the DUMP and DCORE commands to operate. (DUMP, DCORE). ?DETACH UUO FAILED | | DAEMON could not detach itself from the TTY. Note that DAEMON does not detach itself if it is loaded with DDT. (DAEMON), ?DATA ERROR ON DEVICE PTR A read error has occurred on the paper-tape reader. (COPY program). 4-7 COMMANDS - 754 - ?DESTINATION DEVICE ERROR An 1/O error occurred on the output device. (GLOB). , ?DEVICE CANT BE REASSIGNED (1) The job's controlling terminal cannot be reassigned, (2) the logical name would be duplicated, or (3) the logical name is a physical device name and the job reassigning the device is either logged in under a different project-programmer number or is not the operator. ?DEVICE ERROR ON OUTPUT DEVICE A write error has occurred on the output file. (FUDGE2). ?DEVICE INIT FAILURE The specified device has been assigned to another job or does not exist. (COPY program). ?DEVICE MTAn NEEDS A WRITE RING, INSERT ONE AND TYPE <CR> This message is returned by the BACKUP and RESTORE programs. ?DEVICE MUST BE A DECTAPE The only device that can be specified in the COPY command string is the DECtape. (COPY program). ?DEVICE dev NOT A DIRECTORY DEVICE This message is returned by the BACKUP program. ?DEVICE NOT ASSIGNABLE A non-privileged user cannot assign the requested device because it belongs to the restricted pool of devices. (ASSIGN). The user should try to assign the device with the MOUNT command. ?DEVICE NOT AVAILABLE Specified device cannot be initialized because another user is using it or because it does not exist. ?DEVICE WILDCARD ILLEGAL The wildcard construction cannot be used in the device specification. BACKUP, RESTORE). (DUMP, QUEUE, ?DIALOG MODE NOT SUPPORTED The capability of interactive dialogue with the user has not been implemented. (QUEUE). ?DIRECTORY FULL ON OUTPUT DEVICE There is no room in the file directory on the output device to add the updated file (nondisk devices only). (FUDGE2). 4-8 - 755 device name DISMOUNTED , | COMMANDS ] The DISMOUNT command has completed. . ?device name DISMOUNT INCOMPLETE The DISMOUNT command was unsuccessful. In most cases, the reasons for failure have already been listed by nonerror messages. DONT KNOW CTY LINE NUMBER The DCORE command cannot be typed on CTY. (DAEMON). ?DOUBLE DEVICE ILLEGAL Two device names appeared-in a row without an intervening filename, or two colons appeared in o row, e.g., LPT:PTP: or DSKA ::FILEX. (DUMP, QUEUE). 2DOUBLE DIRECTORY 1LLEGAL Two directory names cannot appear without an intervening filename. (DUMP, QUEUE). ?DOUBLE EXTENSION ILLEGAL Two extensions cannot appear without an intervening fi lename or comma. (DUMP, QUEUE). ?DOUBLE FILENAME ILLEGAL Two filenames appeared in a row, or two periods appeared in a row; e.g., Q TESTI TESTZ or TEXTX..MAC. (DUMP, QUEUE). DPAn NO DRIVE AVAILABLE ON THIS CONTROLLER The drives on the specified controller are all in use: (MOUNT). ?DSK CANT BE REASSIGNED An attempt was made to reassign the prototype disk device.data block (DDB). ?DSKCHR FAILURE n ON UNIT abc The DSKCHR UUO gave an unexpec’red error refurn; n is the disk error code. Notify the operator. (DAEMON, KJOB). %END OF TAPE id ON dev . * PLEASE MOUNT TAPE id+1 AND TYPE <CR> TO CONTINUE: This message is sent to the operator. (RESTORE). %END OF TAPE id ON dev - PLEASE MOUNT NEXT TAPE AND TYPE <CR> TO CONTINUE This message is sent to the operator. (BACKUP). 4=9 COMMANDS =756 - %END OF TAPE n ON MTAnR AT fime The end of the tape has been reached. (RESTORE). DPA’ $END OF TAPE n ON MTA> x AT time DSK This message appears in the log file. (BACKUP). ?ENTER ERROR n ?DIRECTORY FULL No additional files can be added to the directory of the output (GLOB). device; n is the disk error code. ?ENTER FAILURE The DECtape directory is full (i.e., there is no room for the file to be written on the DECtape). ?ENTER FAILURE n The output filename is null; n is the error code for an illegal filename (nondisk devices only). "(FUDGE2). ?ENTER FAILURE FOR INDEX FILE The ENTER failed for the index file. (BACKUP). ?ENTER FAILURE IN QUEUE MANAGER QUEUE was unable to enter the files into the output queve. PENTER FAILURE n ON {CLL DAEMON (QUEUE). } FILE The ENTER to write the file failed; n is the disk error code. PENTRY BLOCK TOO LARGE PROGRAM name The entry block of the named program is too large for the FUDGE2 entry table, which allows for 100 entry names. FUDGE2 can be reassembled with o larger table. (FUDGE2). ?ERROR CLOSING OUTPUT, STATUS = n An 1/0 error occurred while closing the file on disk; n is the disk error code. (DUMP). ?ERROR IN JOB n A fatal error occurred in the job or in the monitor while servicing the job. usually precedes a one-line description of the error. 4-10 This typeout COMMANDS - 757 ?EXCEED LOG-OUT m QUOTA BY n BLOCKS The total number of blocks for all the user's files exceeds the maximum permitted value (m) by the indicated amount n. The user may use PIP or the DELETE command to remove files. Until the user is under the limit, he cannot dismount the file structure. (DISMOUNT). ?EXECUTION DELETED A program is prevented from being executed because of errors detected during assembly, compilation, or loading. Loading is performed, but the loader exits to the monitor without starting execution. (LOADER). ?EXPECTED FORMAT 1S "NNNK" = 16K to 256K The core~bank specified while processing the /T switch is not within the acceptable range or does not terminate with the letter K; e.g., 32 is not acceptable; 32K is. (COPY program). %FAILURE ON { ENTER L FOR ERROR FILE--CONTINUING The error file could not be generated. The BACKUP program is continuing without one. (BACKUP). ?FAILURE ON INIT OPEN FOR LOG FILE ' The log file could not be generated. (BACKUP, RESTORE). %FAILURE OUTPUTTING ERROR FILE-~CONTINUING The error file could not be output. The BACKUP program is.continuing ifs processing. (BACKUP, RESTORE). [pro, prog] | \eny £OR devpret,p %EAILURE { READING CREATING The UED for the named device could not be read (BACKUP) or created (RESTORE). %FAILURE TO INTERLOCK UFD FOR dev [proj,prog] The UED interlock for the named device failed. (BACKUP). file structure name FILE ERRORS EXIST One of the files in a file structure has an error status, as flagged in the UFD of that file » structure. (LOGIN). ?FILENAME ALREADY IN USE The specified file already exists. (COMPIL). ?FILENAME REQUIRED FOR INPUT QUEUE A file cannot be entered into the Batch input queve without a filename. (QUEUE). 4-11 - COMMANDS - 758 - ?FILE n NOT IN SAV FORMAT The user indicated via the /X switch that the file is to be expanded but the specified not in compressed file format. (FILCOM). file is N is either 1 or 2 indicating the first file or the second file. ?FILE n READ ERROR An error has occurred on either the first or second input device. (FILCOM). PFILE SWITCHES ILLEGAL IN OUTPUT FILE File switches cannot cppear on the left of the equal sign, i.e., in the output specification. (QUEUE). ?(3) FILE WAS BEING MODIFIED-file. ext Another user is modifying the file. (COMPIL). ?(0) FILE WAS NOT FOUND-file.ext The named file could not be located. (COMPIL). ?FORMAT OR READ ERROR IN AUXACC.SYS LOGIN unexpectedly found an end-of=file or an error in AUXACC.SYS. Notify the operator. (LOGIN). ' file.ext FOUND BAD BY FAILSAFE READING MTA The file in the file structure has an error status as flagged in the UFD (LOGIN). of the file structure. FROM JOB n An informative message telling the user the job number to which the console from which the console is detaching. (ATTACH, DETACH). was attached or ' ?FUDGE2 SYNTAX ERROR An illegal command string was entered; for example, the left arrow was omitted or a program name was specified for the output file. (FUDGE2). ?GIVING BACK TOO MUCH CORE An infernal problem in the DUMP program. specialist. (DUMP). Notify your system programmer or software ?HALT AT USER adr The user's program executed a HALT instruction at adr. at the effective address of the HALT instruction. 4-12 Typing CONTINUE resumes execution COMMANDS - 759 file.ext HARDWARE DATA READ ERROR DETECTED ture. (LOGIN). file.ext HARDWARE DATA WRITE ERROR DETECTED (LOGIN). The file has a hardware data read error flagged in the UFD of the file struc The file has a hardware data write error flagged in the UFD of the fi le structure. d after it is referenced, the system decides nd within a certaintsperio If a device doesisnotnotrespo functioning and outpu this message. ?HUNG DEVICE dev " that the device ape. (BACKUP). ?1LLEGAL BACKUP DEVICE The BACKUP operations can be done only on disk, magnetic tape, and DECt ?1LLEGAL BLOCK TYPE trap loader with the /L‘ switch, an unrecogni While loading the boots(CO PY program). countered by COPY. 21LLEGAL COMMAND SYNTAX CHARACTER x The character x is used incorrectly in the command string. (QUEUE, zable block type was en- BACKUP). 21LLEGAL DATA MODE FOR DEVICE dev AT USER adr The data mode specified‘ for a device in the user's program is illegal, such as dump mode for the terminal. 2drive ILLEGAL DRIVE NAME d by the user is in).conflict with the unit or controller type The drive specifiestruc ture. (MOUNT units of the file required by the cannot be used by a 21LLEGAL IN BATCH JOB The ATTACH, DETACH,' SEND, CCONT, and CSTART monitor commands batch job. ?ALLEGAL JOB NUMBER iguration. The job number is too large or is not defined in this conf 21LLEGAL QUEUE DEVICE UE). The queue name specified cannot be used with the given switch. (QUE . (QUEUE). 2ILLEGAL QUEUE NAME xxx The queve is not one of the system queuves, or the queue is a logical name 4-13 COMMANDS - 760 - ?ILLEGAL TO CREATE REQ UEST FOR SOMEONE ELSE Only the operator logged in unde r 1,2 can create queveing reque TILLEGAL UUO AT USER st for other users. (QUEUE). adr An illegal UUO was executed at user location adr. 2ILL INST. AT USER adr An illegal operation code was encountered in the user's prog ram. ?ILL MEM REF AT USER adr An illegal memory reference was made by the user's program. If this message occurred on a memory write, the error is at adr-1 since the prog ram counter has been advanced. If it occyrred on a memory read , then the illegal instructio n is probably in location adr. The user should use the E command to first examine location adr-1 and then location adr in order to determine the illegal instr uction. The index registers may also ?INDEX FILE CANNOT GO have to be examined. TO A LISTING DEVICE This message is returned by the BACKUP and RESTORE programs. ?INPUT AND OUTPUT DECT APES MAY NOT BE THE SAM E DEVICE The COPY program performs its operations on an input DECt ape and an output DECtape. . (COPY program). ' DECtapes cannot be the same ?INPUT (or OUTPUT) BLOCK These TOO LARGE A DECtape block number great er than 1101 g Was encountered. (COPY: program). 2INPUT (or QUTPUT ) CHECKS UM OR PARITY ERROR A read (or write) error has been ?INPUT DEVICE dev CANNOT detected. ,(COPY program). DO OUTPUT AT USER adr . Output was attempted on a devi ce that can only do input (e.g. ?INPUT (or OUTPUT) DEVICE , the card reader). ERROR The DECtape control unit has detected the loss of data or a missed block. (COPY prog ram). ?INPUT DEVICE NOT A DISK The input specifications in a QUEUE command must be disk files. (QUEUE). ?INPUT ERROR An 1/0 error occurred while rewritten. (COMPIL). reading a temporary command 4-14 file from the disk. File should be COMMANDS =761 2INPUT ERROR = file.ext FILE NOT FOUND The specified file could not be found on the input device. (FILCOM). file.UFD ‘ %INPUT ERROR DSKn ( file.MFD ) [proj, prog] file.SFD not The BACKUP program cannot access the entries in the named directory. These entries will next the to g advancin by continues program be saved on the BACKUP medium. The BACKUP . directory. (BACKUP). ?INPUT ERROR, STATUS =n An 1/0 error occurred while reading the file from disk; n is the disk error code. A new INPUT command causes a new LOOKUP to be done. (DUMP, DAEMON). 2INPUT FAILED FOR FILE DSKn file.ext [proj, prog] ) The INPUT failed for the specified file. (BACKUP, RESTORE). 2INPUT (or OUTPUT) PREMATURE END OF FILE it. This may When copying a DECtape, COPY encountered the end of file before it expected program). happen when copying a PDP~9 DECtape to a PDP-10 DECtape. (COPY ?INSUFFICIENT CORE FOR QUEUE There is not enough core in system at the time of the KJOB command to make an output . queve entry. (QUEUE). ?INVALID ARGUMENT The argument specified on a BACKSPACE or PARITY command is unknown. (BACKUP, RESTORE). ;GPINVALID ENTRY - TRY AGAIN ation An illegal project-programmer number or password was entered and did not match identific . (LOGIN) password. and number er programm projecthis retype to is user The in system. ?1/0 TO UNASSIGNED CHANNEL AT USER adr An attempt was made to do an OUTPUT, IN PUT, OUT, or IN to a device that the user's pro- gram has not initialized. CHARACTER H } 2x ,1S AN ILLEGAL {SWITC An illegal character or switch was encountered in the command string. (FUDGE2). 2symbol IS A MULTIPLY DEFINED LOCAL - The named symbol is in more than one symbol table with different values. (DUMP). 4-15 COMMANDS -762 - ?symbol IS AN UNDEFINED SYMBOL The named symbol is not in DUMPF's symbol table. (DUMP). ?symbol IS AN UNDEFINED SYMBOL TABLE NAME The named symbol table has not been loaded with an XTRACT command. (DUMP). ?JOB CAPACITY EXCEEDED This message is received by a user who attempts to login after the maximum number of jobs that the system has been set to handle has been initiated. The user should login in at a later time. (LOGIN). ?2JOB NOT WAITING ) The job specified is not waiting to be continued. (JCONT). JOB SAVED The output is completed. JOBn USER [p,p] LOGGED OFF TTY n AT hhmm dd-mm=~yy DELETED <ALL> n FILES SAVED <ALL> n FILES m TOTAL BLOCKS USED ANOTHER JOB STILL LOGGED IN UNDER {p,pl RUNTIME n MIN m SEC This information is typed as user logs off successfully. opposed to blocks written. MNote that m is total blocks allocated as Therefore, it is always greater than or equal to the number of blocks written. Files are allocated in units of blocks called clusters. The system administra~tor selects the cluster size for each file structure, usually one block per cluster for FH file structures, and 5 or 10 blocks per cluster for DP file structures. (KJOB). ?LANGUAGE PROCESSOR CONFLICT The use of the + corstruction has resulted in a mixture of source languages. (COMPIL). ?LEVEL D ONLY The command issued is available only in 5-series monitors. ?UNKAGE ERROR - RUN UUO An 1/O error occurred while reading a program from the device SYS:. (COMPIL). %LISTING DEVICE OUTPUT ERROR, STATUS = The device specified for the output has an error. A new OUT command selecti ng a new file can be given or an OUT and APPEND command sequence to try again. (DUMP). ?LISTING ENTER FAILURE n The ENTER to write the output file fai led; n is the disk error code. 4-16 (QUEUE). - 763 - COMMANDS 2LISTING OPEN FAILURE ON DEVICE dev The OPEN failed on device dev. (QUEUE). ? LOCKED-OUT BY OPERATOR The operator is preventing any new daccesses to the file' structure in order that it may be re- moved. (MOUNT). file structure name LOGGED OUT QUOTA n EXCEEDED BY m BLOCKS is greater than his logged out quota. The duser The user's allocation on the file structure named allowe to must go through the CONFIRM dialogue and delete files until he is under the quota log off. (KJOB, LOGOUT). %LOGICAL NAME WAS IN USE, DEVICE dev ASSIGNED d name to another device. The logical name is cleare The user previously assigned this logical second . from the first device and assigned to the ?LOGIN PLEASE in has been typed to the monitor; it cannof A command that requires the user to be logged . accepted until the user performs a LOGIN be 2LOGIN PLEASE TO USE SWITCH CREATE The user must be logged in to make a new entry into a system queve. (QUEUE). 2LOOKUP ERROR n ?file.ext FILE NOT FOUND B) The named file cannot be found in the directory on the specified device. (GLO 9%LOOKUP ERROR DSKn file [proj, progl The BACKUP or RESTORE program cannot access the indica: ted file and continues to the next file. (BACKUP, RESTORE). ' 2LOOKUP FAILED, "BSLDR.REL" by skipping . REL. While processing the /L switch, COPY could not find the bootstrap loader named BSLDR (COPY program). 2 LOOKUP FAILURE The LOOKUP to read the disk file failed. This message is followed by a line: explaining reason for failure. (FUDGE2). 2file structure name LOOKUP FAI LURE n The LOOKUP to read the file failed; n is the disk error code. 4-17 the COMMANDS - 764 - ?LOOKUP FAILURE FOR INPUT FILE n file DUMP cannot read the input file. (DUMP). ?LOOKUP FAILURE n ON DAEMON FILE The LOOKUP to read the DAEMON file fai led; n is the disk error code. (DAEMON). ?MAX = n A value was specified for an argument that is greater than the maximum value (n) allowed. (DUMP). ?MAY NOT LOGIN AS MFD PPN No one can login as [1, 1] because this number is the project=programmer number of the MFD . (LOGIN). LOCAL ' ) TMAY NOT LOGIN { DATA SET BATCH JOB SUBJOB N REMOTE . REMOTE CTY OR OPR ) ACCT. SYS entry does not permit the projec t-programmer number to login at the termina being used. (LOGIN). l that is ?MAY NOT LOGOUT WITH FILE STRUCT URES FOR LOGICAL NAMES A file structure in the job's search list is assign names are recognized. ed a logical name, and only physical device The user should deassign the logicak names. (KJOB, LOGOUT). ?MEM PAR ERROR AT USER PC adr The processor detected a memory parity error cuting. in the low or high segment while the job was The adr is the address of the PC stored the parity error. exe- by the hardware rather than the user address The operator also receives an error message giving of the range of absolute ad- dresses in case memory reconfiguration is necessa ry. DAEMON is awakened in order to record the pertinent information about the error for field service personnel. The user must start a new copy of his program by typing the appropriate monitor command R, RUN, or GET. He should not start the progra m over by typing START, since the error is likely to reoccur or the~program operate with incorrect data. 2MFD {E%KUP} FAILURE The MFD cannot be accessed. (BACKUP). ?MORE THAN ONE { OUTPUT}DEVICE ILLEGAL INPUT Files for the BACKUP operations can be (BACKUP, RESTORE). taken from or written to only one device 4-18 at a time. COMMANDS =765 - . ?MORE THAN ONE OUTPUT FILE ILLEGAL Only one output queue~name may be specified in the QUEUE command string. (QUEUE). device MOUNTED The device is mounted and ready for use. The MOUNT command has completed. If a file structure was mounted, a list of the unit ID's and the drives on which they are mounted is output. (MOUNT). ?device MOUNT INCOMPLETE The MOUNT command has not completed successfully. In most cases, the reasons for failure have already been listed by nonerror messages. In a Batch job, MOUNT INCOMPLETE not preceded by a message may indicate that the user is attempting to mount a spooled device without executing a SET SPOOL command to unspool the device. The user must have unspool privileges in his accounting file entry in order to unspool and mount spooled devices. ?MUST BE IN OWNER'S PROJECT FOR'SING‘LE ACCESS The user may not request single-access (/SINGLE switch) unless he has the same project num- ber as the owner of the file structure. This requirement is enforced since a user with si ngle access may execute super-USETI/USETO UUOs. (MOUNT). name MUST NOT BE A LOGICAL NAME The structure named contains the operator request queue (3,3.UFD) and must not be the logical ' name for some other structure. (MOUNT). ?file structure name MUST NOT BE WRITE-PROTECTED The named structure is being used to queue requests to the operator and therefore may not be write~-protected, SETSRC may be used to change the protection. (MOUNT, DISMOUNT, FILE). NAME: The ACCT.SYS entry for this project-programmer number requires the user to type a name which matches the one in ACCT.SYS in order to login. (LOGIN). ?NEED 5.03 OR LATER FOR REATTACH COMMAND The REATTA program depends on UUOs available in the 5.03 release of the monitor. The user attempted to run the program using an older monitor. (REATTA). ?NESTING TOO DEEP The @ construction exceeds a depth of nine and may be due to a loop of @ command files. ' (COMPIL). ?NO CORE ASSIGNED No core was allocated when the GET command was given and no core argument was specified in the GET. NO DIFFERENCES ENCOUNTERED No differences were found between the two input files. (FILCOM). 4-19 COMMANDS - 766 - ?(1) NO DIRECTORY FOR PROJECT-PROGRAMMER NUMBER ~ file.ext A UFD does not exist for the requested project-programmer number. (COMPIL). ?NO END BLOCK ENCOUNTERED The last block of the bootstrap loader program must be an end block (refer to the MACRO manual). (COPY program). ?NO ENTRY IN AUXACC.5YS NC SEARCH LIST OR UFDS CREATED If the user has no entry in AUXACC.SYS, LOGIN does not creaie UFDS or a search list. User is logged-in and has UFDs if they existed previously. He may write only on file structures that have UFDs or read all file structures. He may also create a file structure search list with SETSRC. The user can create UFDs on those file structures for which he has an enfry in QUOTA.SYS by using the MOUNT command. (LOGIN). NO ENTRY IN QUOTA.SYS The user may utilize the file structure, but no UFD is created if he does already have one. (MOUNT). %NO INFO ON "name" The user specified a feature that has no available documentation. (HELP). ?NO INPUT DEVICE SPECIFIED SPECIFY INPUT DEVICE NOW: An input device name was not specified prior to the START command. (RESTORE). ?NO MODIFIER ALLOWED IN SWITCH switch The switch specified cannot have an argument. (QUEUE). NONE PENDING None of the user's requests to the operator are pending. ?NON-EXISTENT DRIVE DPAn The user has specified a drive that does not exist in the system. (MOUNT). %NON-EXISTENT FILE input specification The file specified for input could not be found. is specified for the file. (QUEUE). ?NON-EX MEM AT USER adr Usually due to an error in the monitor. 4-20 This message is not output if the /NEW switch - 767 - COMMANDS 2NO OPR.JOB FOR THIS REQUEST An operator request has been issued, but there is no OMOUNT running and enabled to service the request. The request is still queued unless the /PAUSE switch was given. ?NO OUTPUT DEVICE SPECIFIED SPECIFY OUTPUT DEVICE NOW: An output device name was not specified prior to the START command. (BACKUP). ?NO PRIVILEGES TO SET CPU The user does not have the privilege bits set by LOGIN from ACCT.SYS to change the CPU specification. The user should request that these privilege bits be set by the system manager. ?NO PRIVS TO UNSPOOL The user does not have privileges to unspool devices, and the operator has not set bit 28 in the STATES word. ' ?NO REMOTE USERS. TRY AGAIN LATER The operator has used the SET SCHEDULE command to prevent LOGINs from remote terminals. The message of the day is still typed. (LOGIN). NO ROOM IN QUEUE, TRY AGAIN LATER There is no room in the queue for the user's request to be sent to the operator. (MOUNT). 2(14) NO ROOM OR QUOTA EXCEEDED - file. ext There is no room on the file structure or the user's quota on the file structure has been exceeded. %NO RUNNING CPUS IN SPECIFICATION If none of the CPUs in the job's CPU specification are running, the user receives this message ' every minufe until the CPU is started or he fypes a new SET CPU command. ?NO START ADR Starting address or reenter address is zero, because the user failed to specify the starting address in the END statement of the source program or in the START command. However, an im= plicit starting address of 0 may be specified. ?NO SUCH DEVICE The device name does not exist or was not assigned to this job. ?NO SUCH JOB An attempt was made to attach to a job that has not been initialized. ?NO SUCH STR A nonexistent file structure was specified_. (KJOB). 4-21 COMMANDS - 768 - ?NO SUCH TTY The terminal number is not part of the system configuration. ?NO SUCH UNIT The unit does not exist or all units of this type are in use. ?NOT A JOB The job number is not assigned to any currently running job. (ATTACH, DSK, JCONT). There is no job logged in at this terminal. (CONTINUE). ?2NOT A SAVE FILE - The file is not a core image file. ?NOT A SPOOLING DEVICE The device specified is not one of the spooling devices (LPT, CDP, CDR, PTP, PLT). ?NOT A STR = TRY AGAIN The file structure specified is not recognized by the monitor. ?NOT ATTY The device name given is not a teminal. (REATTA). ?drive NOT AVAILABLE The drive indicated by the user is not currently available. (MOUNT) . ?command NOT CODED A command that is not in this version of DUMP was specified in the command string. (DUMP). ?NOT ENOUGH ARGUMENTS An insufficient number of files of one type has been specified . (FUDGE2). ?NOT ENOUGH CORE The system cannot sup;ply enough core to use as buffers or to read in a system (COMPIL). program. NOT ENOUGH DRIVES AVAILABLE There are currently nct enough drives of the right type to mount the file structure. (MOUNT). NOT ENOUGH TABLE SPACE FOR SWAPPING UNITS There are more swapping units than DAEMON allowed (DAEMON). 4-22 for. DAEMON should be reassembled. o - 769 - COMMANDS ?dev file.ext program NOT FOUND or in the file specified. 1f a program name The file or the program was not found on the device m names in the command string appear in progra the that is printed, this message may indicate the file. Therefore, the program may actually ce within a sequence different from their sequen ect sequence in the command string. (FUDGE2). incorr the of e becaus missed exist but was ?file. SAV NOT FOUND . The program file requested cannot be found on the s.‘ysfem device or the specified device drive NOT READY write-locked when write~enabled was reThe indicated drive is either off-line or physically T). quested. The operator will be notified. (MOUN 2NOT YET SUPPORTED COMMAND CODE switch A switch has been specified that is not implemented. (QUEUE). NO UFD CREATED The user may access the file structure, but he cannot write in his disk area since he has no UFD. (MOUNT). ?NULL DEVICE ILLEGAL A colon has been found without a preceding device name. (QUEUE, BACKUP, RESTORE). of an expression, & non-existent location was specified when While computing the value (DUMP) . PNXM adr referencing the input file. “?nk OF CORE NEEDED or ?nP OF CORE NEEDED n is the size being requested for the segment There is insufficient free core to load the files; sum of the high and low segments). This mesthat failed (either high or low segment, not the has been exceeded or the core for this job has for the system sage occurs when the virtual coretype and CORE.) to determine what core has been exceedofed,core should user been exceeded. The unit the is which words 1024 whether the high or low segment was too big. K denotes unif of “allocation on a KA10-based system, and P denotes 512 words (one page) which is the allocation on a KI10-based system. | 2 OFFSET = 1000 TO 777600 (OCTAL) ‘The offset specified by the user is not within the acceptable range. (COPY program). 2 ONLY BATCH USERS MAY LOGIN. TRY AGAIN LATER command to prevent LOGINSs, except for BATCH The operator-has used the SET SCHEDULE typed. (LOGIN). jobs. The message of the day is still 4-23 COMMANDS =770 - ? OPEN FAILED FOR DEVICE dev The OPEN for the named device failed . (BACKUP, RESTORE). ?OPEN FAILURE ON DATA DEVI CE dev The OPEN on the specified device fajled . (DUMP), OPERATOR BUSY, HANG ON PLEASE. The user must wait for the operator to become available. OPERATOR NOTIFIED (1) The operator is available and the user may continue typing his message. (PLEAS E). (2) A request is queued to the operator to perform a specified action. (MOUNT, DISMO UNT). OPERATOR REQUESTED TO MOUN T UNITS A request is queued to the operator to mount and ready the packs on the proper drives. (MOUNT). OPERATOR REQUESTED TO READY DRIVE S One or more drives (as specified by previo us messages) are not ready. the operator. (MOUNT), OPERATOR REQUESTED TO REMOVE PACKS A request to physically remove the packs OTHER USERS - CANNOT SINGLE A request is queued to has been queued to the operator. (DISM OUNT), ACCESS Other users are currently using the file structure that has been specified with the single~access switch (/SINGLE). The switch is ignore d. (MOUNT). OTHER USERS - CANT REMOVE A DISMOUNT command requesting issued and there are other users of physical removal (/REMOV switc h) of a pack has been the pack. The switch s ignored. (DISMOUNT) . OTHER USERS SAME PPN A program has determined that other programmer number. (LOGIN, jobs are currently logged=in under the KJOB). same project- ?0OUT OF BOUNDS The specified adr is not in the user's user does not have privileges to ? OUTPUT DEVICE dev CANNOT core area, or the high segment is write -protected the file that initialized the high segment. (D, E). DO INPUT AT USER adr An attempt was made to input from an output device (e.g., the line printe r). 4-24 and the COMMANDS -771 ? OUTPUT DEVICE ERROR An error has occurred on the output device. (FI LCOM). ? OUTPUT ERROR An 1/0 error occurred while writing a femporary command file on disk. (COMPIL). ? OUTPUT ERROR, STATUS =n An 1/0 error occurred while writing the file on disk; n is the disk error code. (DAEMON). 2 OUTPUT INITIALIZATION ERROR : The output device cannot be initialized for one of the following reasons 1. The device doe not exist or is assigned to another job. . 2. The device is not an output device. - 3. The file cannot be placed on the output device. (FILCOM). PASSWORD: s that in the ACCT.SYS entry for this project- a The user must i'ypé o PASSWORD which matche e PASSWORD security. If the user is at programmer number. Echoing is suppressed to preserv ed by a sequence of random over=typed half-duplex (local copy) terminal, this message is replac(LOGI N). characters, over which the user types his PASSWORD. PAUSE. .. (1C TO QUIT, CR TO CONT) operator action is about to be requested.feed1C The /PAUSE switch has been specified,t isand-an operator. Carriage return-line d queue aborts the command before the reques the requestfois the queued to the operator. (DISMOUNT). allows the command to continue, and 2PC OUT OF BOUNDS AT USER adr An illegal transfer has been made by the user program to user location adr. ?PLEASE KJOB OR DETACH Attempt was made to LOGIN a job when the user already has a job initialized af that terminal. (LOGIN). | ?PLEASE LOGIN AS [OPR] ON. The operator is the only person that can initialize DAEMON by typing R DAEM ? PLEASE TYPE 1C FIRST A command which would start a job has been issued after a CSTART or CCONT. ? PPN HAS EXPIRED mer number. The expiration date of the project-program The current date is greater than the date (LOGIN). er. manag system the by ed is chang user may not login until expiration 4~25 COMMANDS =772 - ?PROGRAM ERROR WHILE RESETTING MASTE R DEVICE FUDGE2 cannot find the master device or cannot (FUDGE2). find the program on the master device. ?PROJECT 1 MAY NOT BE PTY Project 1 is never allowed to login over a pseudo ~TTY. PPROTECTION FAILURE DSK file.ext (LOGIN). [prof, prog] The user does not have access to the specifi ed disk areas for either a read or a write. (BACKUP, RESTORE). ' ?(2) PROTECTION FAILURE - file.ext There was a protection failure or the directo ry on DECtape had no room for the file. (COMPI L). ?PTR INIT FAILURE The logical device PTR is not available or could not otherwise be initialized. (COPY program). QUOTA. SYS LOOKUP FAILURE The LOOKUP to read QUOTA.SYS failed . (MOUNT). QUOTA. SYS NOT ON STRUCTURE QUOTA. SYS is not part of this structure. UFD will be created. (MOUNT). The user may still use the file structure, but no QUOTA. SYS READ ERROR An I/0 error occurred while reading QUOT A.SYS. (MOUNT), QUOTA. SYS WRONG FORMAT VERSI ON Wrong version of QUOTA.SYS is on (MOUNT). %READ ERROR DSKn file [prej, the file structure being mounted. Consult the operator. prog] The BACKUP or RESTQRE program cannot input the designated file. (BACKUP, RESTCRE). ?file structure name RENAME FAILURE n The RENAME to change the protection of the file failed; n is the disk error LOGOUT). ?(4) RENAME FILENAME ALREADY EXISTS - file.ext The new filename on a RENAME comma nd already exists. (COMPIL). 4-26 code. (KJOB, - 773 - COMMANDS , REQUEST STORED n COMMANDS IN QUEUE to be performed when possible. nis has been placed in a queue MOUN The request typed by the user queue T, DISMOUNT). for all users. (FILE, the number of requests in the - ?REQUIRES DEVICE NAME The device name or file structure name is required with the MOUNT and DISMOUNT commands. $RESTOR COMPLETED AT time The RESTORE program has successfully completed. (RESTORE). ?RIGHT BRACKET REQUIRED IN DIRECTORY The project-programmer number must be enclosed in square brackets. (QUEUE). %SEARCH LIST DOES NOT ALLOW CREATES to the user on which he can write. Run MOUNT or There are no file structures availablenecess ary. (LOGIN). SETSRC to modify the search list as %SEARCH LIST ERROR [proj, prog] tto obtain the search list for the named projec The BACKUP or RESTORE program is unable UP, (BACK r. numbe mer ogram ct-pr proje ces to the next programmer number. The program advan ‘ RESTORE). DSK: search list that are available to the user. He can run There are no file structures in the his search list. (LOGIN). %SEARCH LIST IS EMPTY the SETSRC program to modify ASINGLE-ACCESS BY JOBn The file structure is already single access by the indicated user. (MOUNT). file.ext SOFTWARE CHECKSUM OR REDUNDANCY ERROR The file has no error as flagged in the UFD of the file structure. (LOGIN). ?SOME OTHER TIME ed to The user is not scheduled to LOGIN at this time. He should try again when he is allow login. (LOGIN). 2SORRY, CANT OPEN DSK, PLEASE CALL THE OPERATOR This message is returned from the GRIPE program. 2SORRY, CANT WRITE IN COMPLAINT AREA, PLEASE CALL THE OPERATOR This message is returned from the GRIPE program. 4-27 COMMANDS =774 - ?SORRY, COMPLAINT BASKET IS FULL, PLEASE CALL THE OPERATOR This message is returned from the GRIPE program. ?50RRY, NO UFD FOR COMPLAIN T BASK ET, PLEASE CALL THE OPERATOR . This message is returred from the GRIPE program. START OF { BACKUP } VERSION n AT time YEAR nn DAY dd RESTORE The BACKUP or RESTORE program is beginning its processing. (BACKUP, RESTORE). ?STATION NOT IN CONTACT The requested staticn is not in conta ct with the central station. (LOC ATE), ?STATION NUMBER INVALID The requested station number is not recognized by the system. (LOC ATE). STRUCTURE ALREADY MOUNTED The requested file structure alrea dy exists and does not need to be physically mounted. (MOUNT). ?STRUCTURE NOT IN STRLST.SYS The file structure name does not exist in the system administrator's file SYS:S TRLST.SYS and, therefore, is not defined for the syste m. The operator or administrator may be requested to défine the file structure by adding it to STRLST.SYS with the REACT program. (MOUNT). ?STRUUO FAILURE The STRUUO UUO gave an error return. Notify the operator. (KJOB, LOGO UT). %SUPERSEDING EXISTING FILE A warning message indicating that being superseded. a file already exists with the speci fied name. (TECO). 7%SWAP READ ERROR UNIT cbe This file is STATUS = n An 1/0 error occurred while readi DAEMON file as read. (DCO RE). ng the swapping space. The data is written into the ?SWITCH ERROR An illegal switch specification was given. (COPY program). ?switch SWITCH ILLEGAL The switch specified cannot be used with the given queue name . (QUEUE, BACKUP, RESTORE) . ?SWITCH VALUE TOO LARGE x The value given to the switch excee ds the maximum value. (QUEUE). 4-28 COMMANDS =775 ?SYNTAX ERROR There is a syntax error in the command string. Check for incorrect parentheses or two operators ' inarow. | ?SYSSTR FAILURE : | The SYSSTR UUO gave an error return. Notify the operator. (KJOB, LOGOUT). ?SYSTEM ERROR = xxxxxx System errors designate operator or system errors and are not a direct fault of the user. They are typed for possible diagnostic used. ?SYSTEM NOT AVAILABLE The operator has used the SET SCHED command to prevent LOGINs from timesharing terminals. The message of the day is still typed. (LOGIN). ?TABLE OVERFLOW - CORE UUO FAILED TRYING TO EXPAND TO xxx The GLOB program requested additional core from the monitor, but none was available. (GLOB). ?THIS MONITOR WAS ByJILT FOR A xxx AND WILL NOT RUN PROPERLY ON A yyy The monitor is not running on the machine for which it was built. xxx and yyy are PDP=6, KA10, or KI10. ?TIME LUMIT EXCEEDED The time limit allocated for the job has been reached. The job is stopped and the terminal is refurned to monitor mode. TIMESHARING WILL CEASE IN m HOURS n MINUTES The KSYS command (OPSER) or SET KSYS UUO has been issued in order to stop timesharing on the system at the indicated time. ?TOO FEW ARGUMENTS A command has been typed, but necessary arguments are missing. ?TOO MANY FILENAMES OR PROGRAM NAMES More than 40 program names or filenames were specufled in the command string. The user should separate the job into several segments. (FUDGE2). ?2TOO MANY FILE STRUCTURES The number of file structures exceeds the capacity of the monitor data base. The current limif is ]410. (ONCE ONLY). 4-29 - COMMANDS = 776 - ?TOO MANY NAMES or ?TOO MANY SWITCHES Command string complexity exceeds table space in the COMPIL program. (COMPIL). ?TRANSMISSION ERROR During a SAVE, GET, or RUN command, the system received parity errors from the device, or was unable to read the user's file in some other way. This can be as simple as trying to write on a write~locked tape. ?TRANSMISSION ERROR ON INPUT DEVICE dev A transmission error has occurred while reading data from the specified device. (FUDGE2). ?TRIED TO OVERWRITE DATA WORD After writing the core image file, DAEMON backs up to overwrite a word not known pre- ~ viously (e.g., the length of the category). In overwriting the word, DAEMON encountered a deviation from the standard pattern used in originally writing the word. (DAEMON). ?TRY LARGER ARG The specified argument is too small for the program. output. (CORE). This message is followed by the standard ?TTYn ALREADY ATTACHED Job number is erroneous and is attached to another console, or another user is attached to the iob. ?TTY IN USE The terminal requestec! is already controlling a job or is otherwise in use. (REATTA). TYPE CORE BANK OR OFFSET FOR DTBOOT On a /T switch, COPY asks for a core bank or offset for the bootstrap loader. is 16K to 256K and the offset is 1000 to 777600 octal. (COPY program). The core bank ' TYPE H FOR HELP An unintelligible response or command has been typed. Either the filename or the CONFIRM: message is repeated} depending upon what was typed. (KJOB). ?UFD ENTER FAILURE n Failure in trying to create UFD; n is the disk error code. Notify the operator. (LOGIN). %UFD ERROR DSKn [proj, prog] The BACKUP or RESTORE program cannot access the UFD (LOOKUP failure). the next UFD. (BACKUP, RESTORE). 4-30 It advances to ‘ ~777 - COMMANDS ?file structure name UFD INTERLOCK BUSY Could not get UFD interlock when trying to set up a UFD. The UFD is not currently set up. Notify the operator. (LOGIN). ?UFD LOOKUP FAILURE n A failure occurred in setting up a UFD; n is the disk error code. Notify the operator. (LOGIN). ?UFD OUTPUT FAILURE n The output failed when trying to create the UFD (4-series); n is the software channel status. (LOGIN). ' ' ?file structure name UFD READ ERROR, STATUS = n A read error occurred while reading the user's UFD on the file structure. Status n tells which error occurred. Notify the operator. (KJOB, LOGOUT). ?UFD RENAME FAILURE n | A failure occurred in setting up a UFD; n is the disk error code. Notify the operator. (LOGIN). ?UNDEFINED SWITCH switch _ | The specified switch is either undefined or not unique. (MOUNT, DISMOUNT). . 2UNEQUAL NUMBER OF MASTER AND TRANSACTION PROGRAMS On a replace request, the number of master programs (or files) does not equal the number of transaction programs (or files). (FUDGE2). UNIT abc ALREADY MOUNTED ON DRIVE DPAn The file structure is already mounted but is on different drives than the user specified. ' (MOUNT). ‘ 2UNKNOWN COMMAND The monitor passed a command to COMPIL which COMPIL does not recognize. (COMPIL). 2UNKNOWN DEFAULT FOR SWITCH switch The default condition is not known for the specified switch. (DUMP, QUEUE). ?UNKNOWN OR INVALID COMMAND - TYPE GO TO CONTINUE This message is typed by the BACKUP and RESTORE programs. | 2UNKNOWN SWITCH switch . The switch named has been mistyped. (DUMP, QUEUE). 4-31 COMMANDS - 778 - 2UNKNOWN SWITCH VALUE n The argument specified with the switch has been mistyped. (DUMP, QUEUE). ?UNRECOGNIZABLE SWITCH An ambiguous or undefined word followed a slash. (COMPIL). ?UUJO AT USER adr This message accompanies many error messages and indicates the location of the UUQ that was the last instruction the user program executed before the error occurred. n VERIFICATION ERRORS On a word by word comparison requested via the /V switch, n discrepancies have been detected between the input DECtape and output DECtape. (COPY program). WAITING... A request has been queued to the operator and the command is waiting for the operator to com- plete the request. IF the user does not want to wait for completion of the operator's action, he can type control-C without aborting the command. The operator action will still be com- pleted. Later a DISMOUNT/CHECK or MOUNT/CHECK can be given to check for completion. (MOUNT, DISMOUNT). WAIT PLS The system’s primary accounting file FACT.SYS was busy. It is retried for ten seconds before FACT.XO01 is tried. This message can appear if many users are logging in simultaneously. (LOGIN, KJOB, LOGOUT). %WARNING -}NPUT REQUEST USES ONLY TWO ENTRIES Only two files can be specified in the input queue request, the control file and the log file. (QUEUE). IWARNING NO INDEX ON OUTPUT FILE-CONTINUING The user has changed the structure of the index library file when deleting, appending, or inserting, thereby invalidating the index. The index has been removed from the new file. Reindexing is required. (FUDGE2). ?dev WASNT ASSIGNED The device is not currently assigned to the user's job and cannot be deassigned or reassigned by the job. 2WASNT DET The specified device is not detached. 4-32 COMMANDS -779 NAME 2WILDCARD ILLEGAL IN INPUT QUEUE FILE DIRECTORY EXTENSION ' E). The wildcard construction cannot be used when specifying the Batch input queve. (QUEU NAME 2WILDCARD ILLEGAL IN OUTPUT { DIRECTORY EXTENSION E). The wildcard construction cannot be used in the output queue specification. (QUEU 2WRITE LOCK ERROR An attempt was made to write on a write-locked DECtape. (COPY progrdm). 2WRONG FORMAT FOR SYMBOL m :symbol and a symbol name did not follow the A symbol was given in the format progra followed by a symbol. (DUMP). in other words, the colon must be colon; 2WRONG FORMAT VERSION NUMBER IN SYSTEM FILES YSis on the system. Consult the operator so that he SYS or AUXAtingCC.S Wrong version oftoACCT. files. (LOGIN). change the accoun can run REACT . YOU ARE LOGGED IN AS n,m ammer number (project, #), this message informs him of When a user logs in with a uniquethatprogr LOGIN assigned. (LOGIN). the project-programmer number 2Y OU DONT HAVE PRIVILEGES TO WRITE {géiMON} FILE The user attempted to write in a file to which he did not have access. (DAEMON). ?1+1nK CORE. VIR. CORE LEFT =0 in use (i.e., there isno avail~If allocated to timesharing isandallthen The swapping space or the coreshould attempt to login again. s, wait a few minute able virtual core). The user this message still appears, it should be reported fo the operator. m+n/p CORE VIR. CORE LEFT =v Key: m = number of blocks in low segment. n = number of blocks in high segment. ' ‘ al user core unless limited by operator, or p = maximum core per job. (Maximum physicstem10 Monitor Calls)). there are jobs locked in core (refer to DECsy e. v = number of K blocks unassigned in core and on the swapping devic which is the unit of core allocation on ona KA10Note that nK represents 1024-word blocks a KI10based system, and nP respresents 512-w' ord blocks which is the' unit of allocation based system. 4-33 COMMANDS 4.2 - 780 - ERROR CODES The following error codes are returned in ACon RUN and GETSEG UUOs, in location E + argument blocks of LOOKIJP, ENTER , and RENAME UUOs, and in extended LOOKUP, ENTER, and RENA ME UUOs. the right half of location E + 3 on The codes are defined in the S. MAC monitor file. Table 4-1 . Error Codes Symbol 1 on 4-word Code Explanation ERFNF% 0 File not found, illegal filename (0,*), or filenames do not match (UPDATE). ERIPP% 1 UFD does not exist on specified file rect project-programmer number.) structures. ERPRT% Protection failure or directory full on ERFBM% File being modified (ENTER). ERAEF% Already existing filename (RENAME) or differ DTA. ent i lename (ENTER ofter LOOKUP). ERISU% 5 ERTRN% 6 (Incor- lllegal sequence of UUOs (RENAME with neither LOOKUP nor ENTER, LOOKUP after ENTER). a. Transmission, device, or data error (RUN, GETSEG only). b. Hardware-detected device or datq error tected while reading the UFD RIB or data block. c. de- UED Software-detected data inconsistenc y error detected while reading the UFD or file RIB. ERNSF% 7 Not a saved file (RUN, GETSEG only). ERNEC% 10 ERDNA% Not enough core (RUN, GETSEG only). 11 Device not available (RUN, GETSEG only). ERNSD% 12 No such device (RUN, GETSEG only). ERILU% 13 Illegal UUO (GETSEG only). capability. ERNRM% 14 No roem on this file structure or quota exceeded overdrawn quota not considered). ERWLK% 15 Write-lock error. ERNET% 16 Not enough table space in free core ERPOA% 17 Partial allocation only. ERBNF% 20 Block not free on allocated position. No two~register relocation Cannot write on file structure. of monitor. (continued on next page) 4-34 - 781 - | COMMANDS Takle 4-1 (Cont) Error Codes Symbol Code ERNSD% 21 ERDNE% 22 ERSNF% 23 . 24 ERLVL% 25 ‘Cannot supersede an existing directory (ENTER), Cannot delete a non-empty directory (RENAME). ' ERSLE% Explanation Sub=-directory not found (some SFD in the specified path was not found). Search list empty (LOOKUP or ENTER was performed on generic device DSK and the search list is empty). Cannot create a SFD nested deeper than the maximum allowed level of nesting. ERNCE% 26 No file structure in the job's search list has both the no- " create bit and the write=lock bit equal to zero and has the UFD or SFD specified by the default or explicit path (ENTER on generic device DSK only). ERSNS% 27 A GETSEG from a locked low segment is not for a high segment that is a dormant, active, or idle segment. 4-35 COMMANDS -782 - - 783 COMMANDS APPENDIX A STANDARD FILENAME EXTENSIONS Table A-1 Filename Extensions Meaning Filename Extension AID Source file in AID language Source Source file in BLISS-11 Output from the BASIC Compiler Backup file from TECO or LINED Source file in BASIC language Source Object Source Source | Blurb file Source file in BLISS language - Saved to show a program error CAL data and program files "Source file in COBOL language Alternate convention for command file (@ com- ASCII Source Object Object Source ALG ALP ATO B10 Source file in ALGOL |anguagé Printer forhs alignment OPSER automatic command file - Source file in BLISS-10 BCM BIN BKP Listing file created by FILCOM (binary compare) Binary file for PDP-8 (DC68A) Index file created by the BACKUP program B11 BAC BAK BAS BLB BLI BUG CAL CBL CCL CCO CcDpP CKP Type of File mand file construction for programs other than COMPIL) Source ASCII ASCII Source ASCIl1 Object ASCIl ASCII Listing of modifications to non resident software Spooled output for card punch ASCIl ASCII, Binary operating system Binary Checkpoint core image file created by COBOL (continued on next page) COMMANDS ..784_ Table A-1 (Cont) Filename Extensions Filename Extension Meaning Type of File CHN CHAIN file CMD Command file for indirect commands (@ Object tion for COMPIL) construc~ ASCII CMP Complaint file by GRIPE ASCII COR Correction file for SOUP ASClI CRF CREF (cross-reference) input file ASClI CTL MP batch control file DAE Default output for DAEMON-taken DAT Data (FORTRAN) file DDT Input file to FILDDT DIR Directory from FILE command or DIREC ASCII DMP COBOL compiler dump file ASCII DOC Listing of modifications to the most recent version of the software DSE Directory sorted by extension ASCII DSF Directory sorted by filename ASCII ERR Error message file F4 Source file in FORTRAN language FAL Source Source file in FAIL language "FLO Source English language flowchart ASCII FRM Blank form for handwritten records ASCII FUD FUDGE2 listing output HGH Nonsharable high segment of a two-s ASCII core dumps Binary ASCII, Binary ASClI T program ASCII - ASCII gram (created by SAVE command) ASCII egment proObject HLP Help files containing switch explanations IDA COBOL ISAM data file IDX Index file of a COBOL ISAM file INI Initialization file LAP Cutput from the LISP compiler LIB ASCII COBOL source library ASCII LOG MP batch log file , etc. ASCII ASCII, Binary ASCII, SIXBIT ASCI1, Binary ASCII (continued on next page) A-2 COMMANDS - 785 - ’ - Table A=1 (Cont) Filename Extensions LOW Type of File Meaning Filename Extension Low segment of a two-segment program (created by SAVE command) Object LPT Spooled output for line printer ASCIl LSD Default output for DUMP program ASCII LSP Source file in LISP ianguage Source LSQ Queve listing created by QUEUE program ASCII LST Listing data created by assemblers and compilers ASCII MAC Source file in MACRO language MAN Manual (documen_i‘afion) file ASCII MAP Loader map file ASCI MEM Memorandum file ASCII ‘ Source MIM ~ Snapshot of MIMIC simulator Binary MSB Music compiler binary output Object - MUS Music compiler input Source OLD Backup source program Source OPR Installation and assembly instructions ASCII OWVR COBOL overlay file Object PAL Source file in PAL 10 (PDP-8 assembler) . Source P11 Source program in MACXI| language Source PLT Spooled output for plotter ASCII PTP Spooled output for paper=tape punch BAK files (all xx) ASCII, Binary ASCII Queve request file Master queue and request file Binary PL1 Qxx QUD QUE QUF “REL RIM RMT RNC RND Source file in PL1 language . Queved data file Relocatable binary file RIM loader file Read-in mode (RIM) format file (PIP) RUNOFF input for producing a . CCO file RUNOFF input for producing a .DOC file Source ASCII, Binary/ Binary Object Object Object ASCII ASCII COMMANDS - 786 - Table A-1 (Cont) Filename Extensions Filename Extension Meaning Type of File RNO Programming specifications in RUNOFF input ASCII RNP RUNOFF input for producing a . OPR file ASCII RSP Scripf.response time log file ASCII RST Index file created by the RESTORE program ASCII RTB Read-in mode (RIM10B) format file (PIP) Object SAV Low segment from a one-segment program (created by SAVE command) Object SCM Listing file created by FILCOM (source compare) ASCII SCP SCRIPT control file ASCII SEQ Sequential COBOL data file, input to ISAM program ASCII, SFD Subfile directory (restricted usage) Binary SHR Sharable high segment file of a two~segment pro- SIXBIT gram (created by SAVE command) Object SNO Source file in SNOBOL language Source SNP Snapshot of disk by DSKLST SRC Source files ASCII SVE .SAVed file from a single user monitor Object SYS Special system files Binary TEC TECO macro ASCII TEM Temporary files ASCII, Binary TMP Temporary files ASCII, Binary TXT Text file ASCII UFD User file directory (restricted usage) Binary UPD Updates flagged in margin (FILCOM) ASCII WCH SCRIPT monitor (WATCH) file ASCII XPN Expanded save file (FILEX) Object A-4 ' ASCII COMMANDS . =787 APPENDIX B CARD CODES Table B-1 ASCII Card Codes Code Punches ASCII Character Octal Code Punches 00 12-0-9-8-1 @ 100 8-4 Octal NULL Character Card Card ASCII 101 A 12-9-1 01 CTRL-A 102 B 12-9-2 02 CTRL-B 103 C 12-9-3 03 CTRL-C 104 D 9-7 04 CTRL-D 105 E 0-9-8-5 05 CTRL-E 106 F 0-9-8-6 06 F CTRL107 G -7 0-9-8 07 CTRL-G 110 H 11-9-6 10 CTRL-H 111 I 12-9-5 At TAB 112 .oJ 0-9-5 12 LF 113 K -3 12-9-8 13 VT 114 L 12-9-8-4 14 FF 115 M -5 12-9-8 15 CR 116 N -6 12-9-8 16 CTRL-N 117 O 12-9-8-7 17 CTRL-O 120 P 12-11-9-8-1 20 CTRL-P 121 Q 11-9-1 21 CTRL-Q 122 R 11-9-2 22 CTRL-R 123 S 11-9-3 23 CTRL-S 124 T 9-8-4 24 CTRL-T 125 U 9-8-5 25 CTRL-U 126 \% 9-2 26 CTRL-V 127 W 0-2-6 27 CTRL-W 130 X 11-9-8 30 CTRL-X 131 Y 11-9-8-1 31 CTRL-Y 132 Z 9-8~7 32 CTRL-Z 133 [ 0-9-7 33 ESCAPE 134 \ 11-9-8-4 34 CTRL-\" 135 ] 11-9-8-5 35 CTRL-] 136 A t -6 11-9-8 36 CTRL-1 137 _ -7 11-9-8 37 CTRL=+ 140 \ 40 SPACE al. termin a on NOTE: The ASCII character ESCAPE (octal 33) is also CTRL-[ B-1 12-1 12-2 12-3 12-4 12-5 12-6 12-7 12-8 12-9 11-1 11-2. 11-3 11-4 11-5 11-6 11-7 11-8 11-9 0-2 0-3 0-4 0-5 0-6 0-7 0-8 0-9 12-8-2 0-8-2 11-8-2 11-8-7 0-8-5 8-1 COMMANDS - 788 - Table B-1 (Cont) ASCII Card Codes ASCII Character | Octal 42 $ 44 % & ' ( ) * Punches 41 " # Card Code 43 Octal Code Card Punches 12-8-7 8-7 b 142 12-0-2 11-8-3 d 144 12-0-4 a 8-3 45 0-8-4 46 12 47 50 51 52 ASCII Character c 141 143 12-0-1 12-0-3 e 145 f 12-0-5 146 12-0-6 8-5 12-8-5 11-8-5 11-8-4 g h i i 147 150 151 152 12-0-7 12-0-8 12-0-9 12-11-1 + 53 12-8-6 , k 54 0-8-3 153 12-11-2 | 154 12-11-3 - 55 11 . m 56 155 12-8-3 12-11-4 n 156 12-11-5 / 0 57 0-1 60 0 1 61 2 | 62 2 3 4 63 3 64 4 5 65 6 5 66 6 67 7 7 8 o p 157 160 12-11-6 12-11-7 q 161 r 12-11-8 162 12-11-9 s 163 11-0-2 164 1) 11-0-3 165 v 166 11-0-4 w 167 t 11-0-5 11-0-6 70 8 71 9 X 170 11-0-7 : y 72 8-2 171 11-0-8 ; z 73 172 11-8-6 11-0-9 { 173 12-0 9 < 74 12-8-4 = | 75 8-6 174 12-11 } 175 11-0 > 76 ? 0-8-6 77 ~ 0-8-7 176 DEL 11-0-1 177 12-9-7 NOTE: The ASCII characters } and ~ (octal 175 and 176) are treated by the monitor as ALTmode which is often considered to be the same as ESCAPE, COMMANDS - 789 Table B-2 DEC-029 Card Codes Character SPACE | " # $ % & ! ( ) * + . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? Octal Code 40 41 42 43 44 45 46 Card 11-8-2 8-7 8-3 100 101 102 103 8-4 12-1 12-2 12-3 0-8-4 E 105 12-5 11-8-3 12 60 61 62 63. 64 65 66 67 70 71 72 73 74 75 76 77 D F 104 106 G H I J K 107 110 111 112 113 11 M 115 0-1 o 55 57 Punches @ A B . C 8-5 12-8-5 11-8-5 11-8-4 12-8-6 56 Card Code Punches 47 50 51 52 53 54 Octal Character 0-8-3 12-8-3 0 1 2 3 4 5 6 7 8 9 8-2 11-8-6 12-8-4 8-6 0-8-6 0-8-7 L N 114 116 117 12-4 12-6 12-7 12-8 12-9 11-1 11-2 11-3 11-4 11-5 11-6 P Q R S T U \Y% W X Y Z 120 121 122 123 124 125 126 127 130 131 132 11-7 11-8 11-9 0-2 0-3° 0-4 0-5 0-6 0-7 0-8 0-9 \ ] t N - 134 135 136 137 11-8-7 0-8-2 12-8-7 0-8-5 [ NOTE: Octal codes 0-37 and 140-177 are the same as in ASCII, 133 12-8-2 COMMANDS - 790 - Table B-3 DEC-026 Card Codes Character Octal Card Code SPACE 40 ! " 41 12-8-7 42 0-8--5 $ 44 # 43 ‘ Punches Character 0-8-6 Card Code Punches @ 100 A 8-4 101 B 12-1 102 12-2 D 104 12-4 C 11-8-3 Octal 103 12-3 % 45 & 0-8-7 46 E 11-8=7 105 F 12-5 106 12-6 ' ( 47 8-6 50 0-8-4 G 107 H 110 12-7 12-8 ) 51 * 12-8-4 52 I 11-8-4 111 J 12-9 112 11-1 + 53 12 ‘ K 54 113 0-8-3 11-2 L 114 11-3 - 55 11 . M 56 115 12-8-3 11-4 N 116 11-5 / 0 57 0-1 60 0o ] 61 2 1 62 2 O P - 117 11-6 120 11-7 Q 121 11-8 R 122 11-9 3 63 4 3 64 S 4 123 T 0-2 124 0-3 0-4 5 65 é 5 66 U 6 125 A\ 7 126 0-5 W 127 0-6 0-7 7 67 8 70 9 8 71 X 9 130 : Y 72 131 11-8-2/11-0 0-8 ; Z 73 132 0-9 0-8-2 < 74 [ 12-8-6 133 11-8-5 \ 134 8-7 = 75 > 8-3 76 Ia 135 12-8-5 ? 11-8-6 77 ) 12-8-2/12-0 136 - 8-5 137 8-2 NOTE: Octal codes 0-37 and 140-177 are the same as in ASCII. COMMANDS =791 - ~ APPENDIX C TEMPORARY FILES ing system. The temporary files in Table €-1 are used by various programs in the DECsystem-10 comput These files are in the following form: nnn xxx.TMP where nnn is the user's job number in decimal, with leading zeroes to make three digits, and XXX specifies the use of the file. Table C-1 Temporary Files Meaning Name nnn ALG.TMP Read by ALGOL and contains one line for each program to be compiled. It may also contain the command NAME! which causes ALGOL to transfer control to the named program. nnn AS1.TMP nnn AS2.TMP nnn AS3.TMP nnn BLI.TMP nnn COB.TMP Written, read, and deleted by COBOL and contains input to the COBOL assembler. ' Read by BLISS and contains one line for each program to be compiled. Read by COBOL and contains one line for each program to be compiled. It may also contain the command NAME! which causes COBOL to transfer control to the named program. nnn CPY.TMP nnn CRE.TMP Written, read, and deleted by COBOL and contains copies of source files with library routines inserted. Read by CREF and contains commands for each file which has produced a CREF listing on the disk. COMPIL also reads this file each time a new CREF listing is generated to prevent multiple requests for the same file and to prevent discarding other requests that may not yet have been listed. nnn DAE.TMP nnn DMP.TMP Written by DAEMON to be read by DUMP. Read by DUMP as an input command file. COMMANDS -792 - Table C-1 (Cont) Temporary Files Name Meaning nnn EDS. TMP Used by COMPIL to store the arguments of the most recent EDIT, CREATE, TECO, or MAKE command. nnn EDT. TMP Written by COMPIL and read by LINED or TECO. It contains a command for each EDIT, CREATE, TECO, or MAKE command. For the MAKE or CREATE commands, it contains the command S file.ext [p, p] For TECO or EDIT commands, it contains the comman d S file.ext [p,p] » nnn ERA. TMP nnn FOR.TMP Written, read, and deleted by COBOL and is the error file. Read by FORTRAN and contains one line for compiled. each program to be It may also contain the command NAME! which FORTRAN fto transfer control to the named program causes - . nnn GEN, TMP Written, read, and deleted by COBOL and contains the output synfax processing. nnn KJO.TMP Read by KJOB as an input command file. nnn LGO.TMP Read by LOGOUT as an input command file. nnn LIN, TMP of ) Created by LINED and contains output file until the rename process. nnn LIT. TMP Written, read, and deleted by COBOL and contains copy of the literal pool. nnn LOA.TMP Read by LOADER and contains commands necessa nnn MAC.TMP Read by MACRO and contains one line for each program to be It may also contain the command NAME! which causes MACRO to transfer control to the named program . ry for loading. assembled. nnn P11.TMP Read by MACX11 (the PDP-11 assembler for the PD‘P-]O) and con=- tains one line for each program to be assembl ed. nnn PLS.TMP nnn PIP, TMP Read by PLEASE as an input command file. Read by PIP and contains commands to implement commands that run PIP, the COMPI L~class nnn QUE.TMP Read by QUEUE as an input command file. nnn Read by RUNOFF and contains commands for each file which has produced a RUNOFF listing on the disk. RNO. TMP nnn SO01.TMP Written, read; and deleted by COBOL and contains the intermediate sorted results of the data. nnn SVC.TMP nnn SNO. TMP Used by COMPLL to store the arguments of the most recent COMPILE, LOAD, EXECUTE, or DEBUG command. Read by SNOBOL and contains one line for each program to be compiled. (continued on next page) C-2 COMMANDS -793 Table C-1 (Cont) Temporary Files Name nnn TEC.TMP nnn TMP,TMP nnn XFO.TMP nnn XFR.TMP Meaning process. Created by TECO and contains output file until the rename Created by LINED during the rename process. Created by FILEX as a result of the Q switch on the output side. Created by FILEX as a result of the Q switch on the input side. COMMANDS - 794 - COMMANDS -795 - APPENDIX D SAVE AND SSAVE COMMANDS l | ual Before writing SAVed or LOW files in response to SAVE and SSAVE commands (refer to the individ ting concommand descriptions in Chapter 2), the monitor compresses the user's core image by elimina and is used to save space on secutive blocks of zeroes. This technique is known as zero~-compression high segfile media. Low segment files are zero~compressed on devices DTA, MTA, and DSK, but ment files are not because the high segment.can be shared at the time of the command. SAVed files are ordinary binary files and can be copied using the /B switch in PIP. Files with the The LOW or SAV extension may be read in dump mode, but must be reexpanded before being run. be used monitor expands the file after input on a RUN, R, or GET command. The FILEX program may to expand the file for other purposes. pairs and The data format of a zero-compressed SAVed file consists of a series of IOWDs and data block .JBSA. is ferminated by a JRST A where A is the program starting address as specified by the contents of The format is as follows: XWD -nt, adr 1-1 XWD -n2, adr 2-1 XWD -nN, adr N-1 . } nl WORDS } n2 WORDS } nN WORDS JRST A 10-0544 ' D-1 COMMANDS =796 - Each IOWD describes the length of the followi ng data block and the original location of the data in core. The LH of the IOWD can be positive in which case the number of words is taken as the number of words greater than 128K, SAVed files are read into the user's core area starting at location .JBSAV and then are expanded to occupy the original relative locations. If the Ffirst word read is not an IOWD and is positive, format, noncompressed saved file is assume d and no expansi an old- on is performed. A SAVE command issued to magnetic tape writes a. ahigh segment (possibly null) b. anEOF c. a low segment (possibly null) d. an EOF. (=] [+ [=] =] (] HiIGH SEGMENT on [ (] —— NULL HiGH SEGMENT o] =] 5] (o) LOW SEGMENT ] [ - 2] [Eo7) —y J LOW SEGMENT The monitor does not determine the file size of 10-0540 a low segment on a GET from magnetic tape; therefo re, a user must always specify a core argumen t or have enough core assigned to his job for the file. To save file space, only the high segment up through the highest nonzero location (relative to high segment origin) loaded, as specified in the LH of JBHRL, will be written by the SAVE command. LH is zero (high segment created by CORE or REMAP If UUO) or DDT is present, the entire high segment will be written. The LOADER indicates to the SAVE command how low segment by setting the LH of .JBCOR to the much data was loaded above the job data area in the highest location in the low segment that was not plicitly loaded with data (either zero or nonzero). ex— Most programs are written so that only the high segment .confai ns nonzero data. In this case, SAVE and SSAVE write only the high segments. This also saves file space and 1/O time with the GET A number of locations in the job data area need data in the low segment. command. to be initialized on a GET, although there is no other The SAVE command copies these locations into the first 10g locations of the ~ D=2 - 797 - _ COMMANDS high segment, provided it is not sharable. The locations are referred to as the vestigial job data area (refer to DECsystem-10 Monitor Ca||s, Chapter 1). Therefore, the LOADER will load high segment programs starting at location 4000]0 To prevent user confusion, SAVE and SSAVE delete a previous file with the extension .SHR or .HGH; therefore, SAVE deletes a file with the extension .SHR and SSAVE deletes a file with the extension .HGH. SAVE and SSAVE commands also delete files with the extension .LOW, if the high segment was the only segment written. The regular access rights of the seved file indicate whether a user can perform a GET, R, or RUN command. These commands assume that the user wants to execute (bu’; not modify) the high segment, independent of the access rights of the file used to initialize the segment. The monitor always enables the hardware user-mode write protect to prevent the user program from sforing into the segment in- advertently. To debug a reentrant system program, the user should make a private, nonsharable copy, rather than modify the shared version and possibly cause harm to other users. To make a private, nonsharable copy, the following commands are used: GET prog SAVE GET . Writes a file in the uselr directory as nonsharable. The high segment in the user's addressing space remains sharable. Overlays the sharable program with the nonsharable one from the user's directory. Now the user can make patches while other users share the version in the library. If the user is debugging a sharable program in his UFD with the D command or the DDT program., it is recommended that the progrdm be nonsharable instead of sharable. The reason for this is that the user may wish to modify the high segment during the debugging phase and later reinitialize the original unmodified high segment from the file with a GET command. However, si.nce the high segment is sharable, the monitor will not do 1/O into it, will not reinitialize it from the disk file,‘and the user will receive the modified high segment instead. NOTE DDT modifies the high segment when it inserts breakpoints. The following examples are the incorrect and correct methods of debugging a sharable program. After the debugging phase is completed, the SSAVE command should be used to save the program, COMMANDS - 798 - - Example 1: Incorrect Method ) <NFRUG prog FXECUTICN 1C 2SSAVE ) » <GET ) ;SAVE should be used in debugging | JOB, SETUF F 400010 0810 /777777 717777 00O @) oF 490107 @ © GET) JOR_SETUP : ) F annn1a 4ARN10/7 00 Example 2: ;not the original 777777 777777 Correct Method sPEBUG prog ) FXECUT ION tC «SAVE ) SGET JOR _SETUP E 400m1a ) . 0016/777777 777777 D 8 3 ) oF W10/ 0 0 SGFT JOB _SETUP £ oanan1a ) QAR /777777 111777 ;the original file Note that there are applications for a sharable data segment when the modified version of the sharable segment is wanted rather thar the original segment as initialized from the file. The SSAVE command is then used. A SAVE of a one-segment prcegram and a SSAVE of a two-segment program of the same name can coexist in the same directory, and the monitor keeps the two versions separate. This allows for a common i- brary, of reentrant and non-reentrant versions of the same system programs to service both the PDP-6 and the DECsystem-10. mand. A sharable program may be superseded into the directory by the SSAVE com- The monitor clears the high segment in its table of sharable segments in use but does not remove the segment from the addressing space of users currently using it. Only the users doing a GET, R, or RUN command or a RUN or GETSEG UUO have the new sharable version. When the SAVE or SSAVE command is used to save a sharable program with only a high file, the moni- tor does not modify the vestigial job data area. This prohibits unauthorized users from modifying the first 10 locations of a shared segment by executing a SAVE or SSAVE command. This restriction does COMMANDS - 799 - file after the high file, not exist if a low file is also written, because the GET commar;d reads the low version number of a so that the real job data area locations are set from the low file. To change the are used. sharable two-segment program with only a high file, the following commands GET prog: SAVE GET D nnn mmm 137 SSAVE The SAVE command makes the program non-sharable so that the vestigial job data area by the SSAVE. + D=5 can be modified COMMANDS - 800 -
Home
Privacy and Data
Site structure and layout ©2025 Majenko Technologies