Digital PDFs
Documents
Guest
Register
Log In
AA-0998B-TB
May 1986
82 pages
Original
2.4MB
view
download
Document:
User Utilities Manual Jun86
Order Number:
AA-0998B-TB
Revision:
0
Pages:
82
Original Filename:
AA-0998B-TB_User_Utilities_Manual_Jun86.pdf
OCR Text
TOPS-10 User Utilities Manual Order Number: AA-0998B-TB June 1986 This manual contains descriptions of the TOPS-1 0 utilities, their formats, and their usage. This manual replaces the DECsystem-10 Utilities Manual (DEC-10-UTILA-A-D), dated March 1975. Operating System and Version: digital equipment corporation TOPS-10 V7.03 First Printing, March 1975 Revised, June 1 986 The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by Digital Equipment Corporation or its affiliated companies. Copyright © 1975, 1986 by Digital Equipment Corporation All Rights Reserved. Printed in U.S.A. The postpaid READER'S COMMENTS form on the last page of this document requests the user's critical evaluation to assist in preparing future documentation. The following are trademarks of Digital Equipment Corporation: DEC DEC/CMS DEC/MMS DECnet DECsystem-10 DECSYSTEM-20 DEC US DECwriter DIBOL EduSystem lAS MASSBUS PDP PDT RSTS RSX UNIBUS VAX VAXcluster VMS VT ~UrnUl1~U HOW TO ORDER ADDITIONAL DOCUMENTATION DIRECT MAIL ORDERS USA & PUERTO RICO* CANADA INTERNATIONAL Digital Equipment Corporation P.O. Box CS2008 Nashua, New Hampshire 03061 Digital Equipment of Canada Ltd. 100 Herzberg Road Kanata, Ontario K2K 2A6 Attn: Direct Order Desk Digital Equipment Corporation PSG Business Manager c/o Digital's local subsidiary or approved distributor In Continental USA and Puerto Rico call 800-258-1710. In New Hampshire, Alaska, and Hawaii call 603-884-6660. In Canada call 800-267-6215. * Any prepaid order from Puerto Rico must be placed with the local Digital subsidiary (809-754-7575). Internal orders should be placed through the Software Distribution Center (SDC), Digital Equipment Corporation, Westminster, Massachusetts 01473. CONTENTS PREFACE CHAPTER 1 SAVING AND RESTORING FILES USING BACKUP CHAPTER 2 CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR CHAPTER 3 GETTING CROSS-REFERENCE LISTINGS USING CREF CHAPTER 4 COMPARING FILES USING FILCOM CHAPTER 5 LISTING GLOBAL SYMBOLS USING GLOB CHAPTER 6 NETWORK FILE TRANSFER USING NFT CHAPTER 7 CONTROLLING SUBJOBS USING OPSER CHAPTER 8 LOCAL FILE TRANSFER USING PIP CHAPTER 9 LISTING DISK QUOTAS USING QUOLST le FORMATTING TEXT FILES USING RUNOFF CHAPTER 11 SETTING SEARCH LISTS USING SETSRC CHAPTER 12 DISPLAYING SYSTEM STATISTICS USING SYSDPY CHAPTER INDEX iii PREFACE This manual describes the user utilities available with TOPS-10. program descriptions are arranged alphabetically. The Before you read this manual, you should be familiar with TOPS-10 command usage, file specifications, and terminology. If you need to refer to any of the elements of the TOPS-10 command environment, read Chapter 1 of the TOPS-10 Operatin~ System Commands Manual. Before you attempt to use the programs described in this User Utilities Manual, you must be familiar with the following concepts: 0 monitor and user levels 0 special control characters 0 switches and arguments 0 file specifications 0 device names 0 wildcard constructions 0 search lists and directory paths CONVENTIONS USED IN THIS MANUAL The following conventions are used in this manual: Convention Meaning addr Program or location address. arg An argument to a command. core Referring to main (processor) memory. CTRL/x A control character. date A date in the form of two digits for the day, three letters for the month, and two digits for the year. (For example, 22-AUG-86 represents August 22, 1986.) date-time The date and time in the standard format. For example, l3-SEP-86:13:00:00 represents September 13, 1986 at one p.m •• density The density of a magnetic tape. v Convention Meaning dev: device-name devnn devnnu devu Any logical or physical device name. (You must include a colon (:) when a device name is part of a file specification.) [directory] A directory name. This can be either a UFD or an SFD. [d i r] expression A numeric expression. file.ext A file name per iod. file name A name of a file. file-spec A file specification dev:file.ext[directory]. fs File structure. hh:mm:ss The time of day using a 24-hour clock, hours, mm is minutes, and ss is seconds. id An identifier. job A job number. jobname The name of the job. letter An alphabetic character. line-number Referring to the number of the line. list A list of arguments. logical-name log..,.name log A logical device name, chosen by the user. memory The decimal number of memory words measured in K or P. (lK is equal to 1024 words; lP (page) is equal to 512 words. ) MFD A master file directory. <nnn> A protection code. nnnn A tape density. n A decimal number, such as a unit number. . . name . . A DECtape identifier. nodelist A list of all the systems in a network environment. PPN· A project-programmer number. program A program name. proj,prog A project-programmer number. and a file vi extension, written separated by the fo rmat: where hh in a is Convention Meaning [proj,prog] The name of a user-file directory. SFD A sub-file directory • spec A specification of a file. str A file structure name. /switch A command line modifier. time Referring to a time of day. UFD A user-file directory. v Version number. x A numeric or text variable. $ The symbol printed on your terminal when you press ESCape (or ALTmode) key. the A character that is printed when you press the CONTROL key while you type a character key. (For example, typing a CTRL/C prints AC at your terminal.) <CTRL/X) Indicates that you should press the CONTROL key at same time as the key indicated here by "x". <DEL> Indicates when you should press the key. <RET) Indicates when you should press the RETURN key. <ESC) Indicates when you should press the ESCape (or ALTmode) key. DELETE or the RUB OUT All examples, commands, switches, values, and arguments are shown in uppercase. This is for the sake of distinction. Examples are shown as they would appear on a terminal that does not have lowercase ability. vi i CHAPTER 1 SAVING AND RESTORING FILES USING BACKUP Function The BACKUP program saves disk files on magnetic tape and places all or some of these files back onto the disk. You can save your disk area on magnetic tape and restore all of your files or a subset of your files back to your area. You can also use this program to move your files from one system to another. Please refer to the TOPS-l~ Operator's Guide for detailed information about the BACKUP program. Format R BACKUP /command where: command is one of the BACKUP commands, which are in verb form. BACKUP prompts with a slash (/), after which you respond with one of three command types: o Action command o Status-setting command o Tape-positioning command Action Commands Action commands perform I/O on the tape specified in the last TAPE command. You must specify a tape using the TAPE command before you use an action command. TAPE is described under the status-setting commands for BACKUP. SAVE file-spec RESTORE file~spec Saves the specified disk tape. Restores the specified to disk. files tape on files CHECK file-spec Verifies that the tape and the disk files are the same. [N]PRINT file-spec Prints a directory of the entire tape specified by file-spec. N is an optional prefix indicating narrow. PRINT implies a NODIRECTORIES command; that is, no user directory names are printed. 1-1 SAVING AND RESTORING FILES USING BACKUP The file-spec arguments are optional. File specifications may have wildcards. You can specify input and output files in the form output=input, or you can specify input alone. Use commas to separate file-spec entries in a list5 If you do not supply an argument with defaults to a file-spec as follows: an action command, BACKUP o For anyone logged-in under [1,2], the default file spec is ALL:*.* [*,*,*,*,*,*,*]. This specifies all files on all UFOs, and all SFOs of all file structures, with no renaming. o For all other users, the default file spec is ALL:*.* [PPN,*,*,*,*,*] where PPN is the user's PPN. This specifies all files in the user's areas should be saved with a disk structure specified, and restored to the appropriate structure. Action Command Switches You can use the following switches in the file specification list for the action commands. These switches can be either permanent or temporary. Input files are those being transferred from disk to tape. Output files are those being transferred from tape to disk. /ABEFORE date On input file, includes only files accessed before the specified date. / ASINCE date On input file, includes only files accessed since the specified date. /BEFORE date-time On input file, includes only files created before the specified date-time. /ERNONE On input file, gives an error if no files match. /ERPROTECTION On input file, gives an error there is a protection failure. /ERSUPERSEOE On output file, does not restore a file from tape if it already exists on disk. /ESTIMATE n On output si ze (n). /LENGTH low:high On input file, includes the file only if file length is between low (minimum file size) and high (maximum file size). /MBEFORE nO:hh:mm:ss On input file, includes only files modified before date-time. nO represents the number of days. /MSINCE nO:hh:mm:ss On input file, includes only files modified since date-time. nO represents the number of days. /NOPHYSICAL On input or output file, logical names. 1-2 file, estimates if output uses the SAVING AND RESTORING FILES USING BACKUP /OKNONE On input file, does not give an error if no files match your file specification. /OKPROTECTION On input file, does error if there is failure. /OKSUPERSEDE On output file, always restores the file, even if the file is already on disk. /PHYSICAL On input or output any logical names. /PROTECTION nnn On output file, sets the protection code. /SINCE date-time On input file, includes only those files created since the specified date-time. /STRS On input file, examines structures for the file. /VERSION v On output file, sets number of the file. not give an a protection file, ignores the all version Runtime Commands You can issue the following runtime c.ommands during the execution of any action commands. BACKUP prompts with an exclamation point (1) when ready to accept a runtime command. DIRECTORIES Prints every directory processed. EXIT Exits from BACKUP when done. FILES Prints every processed. GO Continues after a STOP. HELP Lists BACKUP explanations. commands KILL Aborts execution action verb. of NODIRECTORIES Does not print processed. every NOFILES Does not print every file in directory processed. every PAUSE Does not done. when RESET Resets all status settings to their original defaults when done. SILENCE Stops printing every file. 1-3 exit file and from directory the and current directory BACKUP directory or SAVING AND RESTORING FILES USING BACKUP STOP Stops action temporarily; continued by GO. WHAT Displays status. current file can name be and Status-Setting Commands Status-setting commands specify one or future action commands. more parameters that affect ABEFORE date Includes only files accessed before the specified date. APPEND Appends to the existing list file. ASINCE date Includes only the files since the specified date. BEFORE date-time Includes only the files created and modified before the specified date-time. CPOINT Uses checkpoints. DATE75 Always accepts files with DATE75 problems. DELETE Deletes them. DENSITY nnnn Sets the tape density. The density, expressed in bits per inch (bpi), can be 299, 556, 899, 1699, or 6259. DIRECTORIES Prints each user's directory running. ENCRYPT Encrypts (codes) the files. This makes the files impossible to read without the keyword. ERRMAX n Set maximum number of recoverable tape errors. Default is 1~9. EXEMPT Exempts project-programmer numbers of the form [A,*] and [*,B], where A and B are less than 7, from date, time, and length restrictions. FILES Prints each running. INITIAL file Starts processing at the file. INTERCHANGE Runs in interchange mode. Interchange is used to copy files from one installation to another with no directory dependencies. 1-4 disk files file accessed possible after name saving while while specified SAVING AND RESTORING FILES USING BACKUP LENGTH low:high Includes only files whose length is between low (minimum file size) and high (maximum file size). LIST file-spec While running, creates a listing file on file-spec. LIST produces the effect of a NODIRECTORIES command; that is, no user directories will be printed. MBEFORE date-time Includes only files that were moved or modified before the specified time. MESSAGE [NO]PREFIX Suppresses prefix. MESSAGE [NO]FIRST Suppresses the first error message text. of the MSINCE date-time Includes only files that have moved or modified since specified time. been the MULTI REEL Allows save. NOAPPEND Does not append list file. NOCPOINT Does not use checkpoints. NODATE75 Does not accept files with possible DATE75 problems. NODELETE Does not delete saving them. NODIRECTORIES Does not print each directory while running. NOENCRYPT Does not encrypt (code) NOEXEMPT Does not exempt PPNs of [* ,B] from restrictions. NOFILES Does not running. NOINTERCHANGE Does not run in interchange mode. NOLIST file Does not make a listing file. NOMULTIREEL Does not allow during the save. NOREPEAT Does not repeat a split file on the continuation tape. NOUSETI Does not run in USETI mode. NOWRITE Suppresses disk restore. 1-5 the multiple print error message line reels to the disk a during existing files each user's the files. [A,*] file multiple writing after and while reels during a SAVING AND RESTORING FILES USING BACKUP from a on the OPTION name Uses line BACKUP:name SWITCH.INI file. PARITY (EVEN,ODD) Sets the tape parity. REPEAT Repeats a split continuation tape. RESUME n Sets a checkpoint block number where processing resumes after a crash that occurred during a checkpointed SAVE or RESTORE. SILENCE Does not print file names directories while running. SINCE date-time Includes only those or modified since date-time. SORT DIRECTORIES x Sorts directories within each file structure in order of x when saving. x is ALPHABETICAL, LOCATION, or NONE. SORT FILES x Sorts files within each directory in the order of x. x is ALPHABETICAL, LOCATION, or NONE. SSNAME name Specifies the save-set name. ALL to include all save-sets. SUPERSEDE ALWAYS Restores all files from tape, superseding files on disk that have the same file name. SUPERSEDE NEVER Does not restore files that have the same name as an existing file. SUPERSEDE OLDER Restores only the files that are newer than the files on disk of the same name. TAPE MTxn: Uses tape unit MTxn:. If a magnetic tape drive has the logical name BACKUP, then the TAPE verb need not be specified. TPNUM x Sets the number of the (decimal) • UPROTECTION nnn Sets the protection code created directories. WRITE Writes onto disk during a RESTORE. This is the default action. 1-6 file or files created the specified tape for Use to x the SAVING AND RE~TORING FILES USING BACKUP Tape-Positioning Commands Use these commands before action commands or after action commands are finished processing. EOT volid-list Skips to the end-of-tape mark for each tape in the list. The volid-list is a list of the volume-identifications of each tape. REWIND volid-list Rewinds to the beginning of the tape for each tape in the list. SKIP n volid-list Skips the specified number of save sets forward for each tape in the list. SKIP 0 volid-list Backs up to current save the list. SKIP -n volid-list Skips the specified number of save sets backward for each tape in the list. UNLOAD volid-list Unloads each tape in the list its drive. Characteristics The BACKUP program: Places your terminal at user level. Destroys your core image. 1-7 the start of the set for each tape in from SAVING AND RESTORING FILES USING BACKUP Examples 1. To save the entire contents of DSKB: on magnetic tape and at the same time produce a directory listing, run BACKUP while logged in under [1,2] • • R BACKUP<RET> /TAPE MTA~<RET> /LIST DSK:BACKUP.LOG<RET> /SAVE DSKB:<RET> !1,2 DSKB 1,3 1,4 BACKUP prints each UFD as it begins to save files from that area. If the tape becomes full before the save is complete, BACKUP stops, types out the full file specification and block number of the current file being saved, unloads the magnetic tape and prints the following message: $BKPEOT REACHED EOT -- MOUNT NEW TAPE THEN TYPE "GO" When you type GO, BACKUP continues the save on the new A file can be split across tapes. 2. Copy the file FILE~MAC from tape to disk • • R BACKUP<RET> /TAPE MTB~<RET> /REWIND<RET> • /RESTORE FILEB.MAC=FILEA.MAC<RET) !1~,123 DSKB DONE /UNLOAD<RET> /"'C 1-8 tape. CHAPTER 2 CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR Function The CREDIR program creates directories and sub-file directories. CREDIR creates sub-file directories (SFDs) on any specified structures, and it automatically creates any necessary higher-level directories. If you do not specify a structure, CREDIR creates the SFD on every structure in your search list. You can use CREDIR to create ersatz device directories. CREDIR allows you to create directories on all structures associated with a specified ersatz device. As it creates each directory, CREDIR tells you the name of the unit and the protection code associated with the directory. Format R CREDIR Create directory: where: dev:[dir]/switch dev:[dir] is the device name and the directory specification. You can specify an ersatz device name. /switch can be any of the switches listed below. By default, CREDIR creates the directory on device DSK:. The system assigns the default protection code defined by the system manager. If no code was defined, <775> is the default. You can use program: the following the CREDIR /ALLOCATE:nnnn Specifies the number of allocated for the SFD. blocks /ERNONE Prints an error message if there are no files in the request. /ERPROTECTION Prints an error message if the request fails due to a protection code violation. /HELP:arg Prints the HELP text for the CREDIR program. You can specify S as the argument to get a list of the switches to the program. /IN:nnnn Specifies the logged-in quota. 2-1 switches to modify CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR t /NAME:name Specifies a mnemonic the directory. /NOOPTION Suppresses processing of the defaults from your SWITCH.INI file. /OKNONE Does not print an error message if there are no files that match a wildcard specification. /OKPROTECTION Does not print an error message if the SFD cannot be accessed because of a file protection violation. /OPTION:name Uses any lines in SWITCH.INI file that specified as CREDIR:name. your are /OUT:nnnn Specifies the for the SFD. quota /PHYSICAL Specifies that the device name is physical, and to ignore logical names. /PROTECTION:nnn Gives the SFD the protection you specify in nnn. /RUN: fi Ie-spec Runs the program when CREDIR running. /RUNCOR:n Runs the program you specified with /RUN in nK of memory when CREDIR has finished running. /RUNOFFSET:n Runs the program you specified with /RUN with an offset of n. If you omit the switch, the default is 0. If you specify the switch, but omit a value for n, the default is 1. If the offset is 1, the file uses an indirect command file. /STRS Searches for the SFD in all structures in your job~s search list, and uses every occurrence. Characteristics The CREDIR program: Destroys your core image. Requires LOGIN. Places your terminal at user level. 2-2 name logged-out you has for specified finished CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR Examples 1. The following example shows the creation and use and directory paths. Show a list of all extension .TST • the files in your UFD of an SFD with a file • DIRECT *.TST<RET> NUMB TST 109 TST FILL TST PAY3 TST TOTAL OF 9 <~55> dd-mmm-yy DSKC: [27,5434] 5 <~55> dd-mmm-yy 1 <~55> dd-mmm-yy 1 <~55> dd-mmm-yy 7 BLOCKS IN 4 FILES ON DSKC: [27,5434] Run the CREDIR program. Create a sub-file directory TEST. Use the /EXIT switch to exit from CREDIR • called • R CREDIR<RET> Create directory: [27,5434,TEST]<RET> CREATED DSKC:[27,5434,TEST].SFD/PROTECTION:775 Create directory: /EXIT Request a list of all your files named TEST • • DIR TEST.*<RET> 1 <~55> dd-mmm-yy DSKC: [27,5434] TEST FOR TEST SFD 1 <775> dd-mmm-yy TOTAL OF 2 BLOCKS IN 2 FILES ON DSKC: [27,5434] The directory shows an SFD named TEST. Use RENAME to transfer all files with the extension .TST from your UFD to your SFD • • RENAME [27,5434,TEST]=*.TST<RET> FILES RENAMED: DSKC:NUMB.TST DSKC:l~9.TST DSKC:FILL.TST DSKC:PAY3.TST Show that your UFD no longer extension .TST • contains the files with the the SFD • DIR *.TST<RET> %WLDNSF No such files as DSKC:*.TST[27,5434] Show that the [27,5434,TEST] • files have been transferred to • DIR [27,5434,TEST]<RET> NUMB TST ~ <~55> dd-mmm-yy DSKC:[27,5434,TEST] 109 TST 5 <~55> dd-mmm-yy FILL TST 1 <~55> dd-mmm-yy PAY3 TST 1 <~55> dd-mmm-yy TOTAL OF 7 BLOCKS IN 4 FILES ON DSKC: [27,5434,TEST] 2-3 CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR 2. The following example shows the use of CREDIR with switch /PROTECTION • the SCAN • R CREDIR<RET> Create directory: DSKB:["A,B,C]/PROTECTION:755<RET> CREATED DSKB:[27,4072,A] .SFD/PROTECTION:755 CREATED DSKB:[27,4072,A,B].SFD/PROTECTION:755 CREATED DSKB:[27,4072,A,B,C].SFD/PROTECTION:755 Create directory: /EXIT 2-4 CHAPTER 3 GETTING CROSS-REFERENCE LISTINGS USING CREF Function The CREF program produces a sequentially numbered assembly listing a program, and one or more of the following tables: as labels of o Cross reference table for all operands, such assignments and o Cross reference table for all user-defined operators, such as macro calls and OPDEFs o Cross reference table for all op codes and pseudo-ops. must specify the /0 switch to produce this table. You The cross-reference files are printed on the line printer if you have generated such files using the /CREF switch with a COMPILE, LOAD, The file containing the names of these DEBUG, or EXECUTE command. CREF files is then deleted so that subsequent CREF commands will not process them again. When the logical device name LPT: is assigned to a device other than the line printer, the CREF files are stored on that device with the same file name and the extension .LST. If output to the line printer is not currently spooled, you must set spooling before running CREF (see the SET SPOOL command in the TOPS-Ie Operating System Commands Manual) • Formats R CREF/switch * file spec CREF where: file-spec/switch file-spec is a valid file specification. When you supply a file specification, CREF produces a cross-referenced listing file for the specified file. If you do not give an argument to the command, CREF uses the argument saved from a previous COMPILE-class command. CREF prompts with an asterisk (*) when you use the R CREF command or if there is no stored argument. /switch is one or more of the following switches: /A Advances magtape by one file (may be repeated). /B Backspaces magtape by one file /C Cancels SWITCH.INI switch defaulting. 3-1 (may be repeated). GETTING CROSS-REFERENCE LISTINGS USING CREF /D Permits default SWITCH.INI file. switches /H Types the HELP text for CREF. /K Does not list user-defined symbol tables. /M Suppresses user macros, OPDEFs, and symbol table. /0 Lists the opcodes. /P Preserves (does not delete) /R Restarts listing and prompts for line number. /S Suppresses tables. /W Rewinds tape. /Z Deletes the current contents of the DECtape directory. program listing you specified in your input files. and lists only symbol Characteristics The CREF program: Leaves your terminal at monitor level. Destroys your core image. Requires LOGIN. Examples 1. Compile the files contained in the command produce CREF listing files on the disk • file PROMAC and • COMPILE/CREF@PROMAC<RET> FORTRAN: INPUTI MAIN. FORTRAN: INPUT2 MAIN •. Process and list the cross-referenced listing files produced by the COMPILE command. The argument is the stored argument that was used in the COMPILE command • • SET SPOOL LPT<RET> .CREF<RET> CREF:INPUTI CREF:INPUT2 3-2 GETTING CROSS-REFERENCE LISTINGS USING CREF 2. Compile and load the files contained in the command file CONALL. Produce a loader map with the file name NAME and CREF files on disk • • LOAD/CREF/MAP:NAME@CONALL<RET> MACRO: HIGH MACRO: SHARE EXIT Assign the logical name LPT to magnetic tape unit 1. the CREF files on MTA1: to be output at a later time • • ASSIGN MTAl LPT<RET> MTA261 ASSIGNED .CREF<RET> CREF: HIGH CREF: SHARE 3-3 Store CHAPTER 4 COMPARING FILES USING FILCOM Function The FILCOM program compares two files and displays any differences. Generally, this comparison is line-by-line for ASCII files and word-by-word for binary files. FILCOM determines the type of comparlson to use by examining either the switches specified in the command string or the extensions of the files. Switches always take precedence over file extensions. Format R FILCOM *output-file-spec=input-file-spec,input-file-spec/switch * is the FILCOM prompt, file-spec is a valid file specification, output-file-spec specifies the name and area on which the results should be stored, and input-file-spec is a list of the files to be compared. where: The FILCOM program takes the following defaults if you the above information: omit some of o If you omit the output specification, the output device is assumed to be TTY:. If you omit the output file specification, you must still type the equal sign. o If you specify only the output file name, the default device is DSK:. o If you omit the output file name, the second input file name is used,' unless it is null. In this case, the file name FILCOM is used. o If you omit the output file extension, .SCM is used source compare and .BCM is used on a binary compare. o If you omit the [directory] in e~ther the input or output file specifications, your default directory is assumed. o If you omit an input device name, it is assumed to be DSK:. o If you omit the file name of the second taken from the first input file. 4-1 input file, output on it a is COMPARING FILES USING FILCOM o You must place a dot following the file name of the second input file to explicitly indicate a null extension if the extension of the first input file is not nUll. For example, to compare FILE.MAC and FILE. (that is, with null extension), use the following command string: R FI LCOM<RET> *=FILE.MAC,FILE. o The second input file specification cannot be null unless a binary compare is being performed. In a binary compare, if the first input file is not followed by a comma and a second input file descriptor, the input file is compared to a zero file and is output in its entirety. This gives you a method of listing a binary file. (Refer to Example 4.) /switch is one of the options listed below. A switch can follow the input file-specs. The following switches are used for a binary file comparison: /E Creates file in executable format. /H Prints a list of switches from device HLP:). /nL Specifies the lower limit for a partial binary compare (n is an octal number). This switch, when used with the /nU switch, allows a binary file to be compared only within the specified limits. /Q Prints the message ?FILES ARE DIFFERENT when the files are different, but does not list the differences. This switch is useful when you test batch control files for differences but do not want a log file of these differences. /nU Specifies the upper limit for a partial binary compare (n is an octal number). This switch, when used with the /nL switch, allows a binary file to be compared only within the specified limits. /W Compares files in binary mode without expanding the files first. This switch is used to compare two binary files with ASCII extensions. /X Expands .SAV files before comparing them in binary mode. This action removes differences resulting from zero compression. available (help If you did not specify any switches in the command string, compares the files in the mode the extension implies. recognizes the following extensions as binary: .APL .BUG .DBS .HGH .QUC • REL .SAV .SVE .UNV .ATR .CAL .DCR • LOW .QUD .RIM .SCH .SYM .XPN .BAC .CHN .DMP .MSB .QUE .RMT .SFD .SYS .BIN .DAE .EXE .OVL .QUF .RTB .SHR • UFD 4-2 text FILCOM FILCOM COMPARING FILES USING FILCOM Binary files are compared word by word, starting at word 0, except for the following cases: o Files with extensions .SHR and .HGH are assumed to be high-segment files. Because the word count starts at 400000, upper and lower limits, if used, must be greater than (or equal to in the case of the lower limit) 400000. o Files with extensions .SAV, .LOW, and .SVE are assumed to be compressed core image files and are expanded before comparing. o Files with the extension .EXE format. are assumed to be in .EXE Conflicts are resolved by switches or defaults. If a conflict arises in the absence of switches, the files are assumed to be ordinary binary files. The following switches are used for an ASCII source file comparison: /A Compares files in ASCII mode. This switch is used to force comparison of two files to be done in ASCII. /B Compares blank lines. lines are ignored. /C Ignores comments (all text on a line following a semicolon) and spacing (spaces and tabs). A line consisting entirely of comments or spacing is not treated as if it were a blank line; differences in such lines are not ignored. /H Prints a list of switches from device HLP:). /nL Specifies the number of lines that determine a match (n is an octal number). A match means that n successive lines in each input file have been found to be identical. When a match is found, all differences occurring before the match and after the previous match are listed. In addition, the first line of the current match is listed after the differences, to help you locate the place within each file at which the differences occurred. The default value for n is 3. 4-3 Without this switch, available (help blank text COMPARING FILES USING FILCOM /0 Instructs FILCOM to include a label and offset in the differences listing for ASCII files. There are three types of messages. One message is: [;At top of file + nL] nL, a decimal number, represents the number of lines from the top of the file that the difference occurs. If a difference occurs at the top of the file, nL is not listed. Another message is: [;At Label + nL] Label is the MACRO label closest to the difference and nL represents the decimal number of lines away from the label that the difference occurs. If the difference occurs at the label, nL is not listed. The message for PDP-II files is: [;At Label + nL + following label name] Label is the local label name in the form nn$, nL represents the decimal number of lines from the local label where the difference occurs, and following label name is the name of the block label. The block label name is listed as further help in locating the difference, since local label names are not always unique. If the difference occurs at the label, nL + following label name are not listed. The label name for all labels must be in the first ten characters of the line. Label name refers to file 1. /Q Prints the message ?FILES ARE DIFFERENT, when files are different, but does not list differences. /S Ignores spaces and tabs. /T Instructs FILCOM to generate output even if no differences are found. Ordinarily, FILCOM does not produce a list of differences if there are no differences in the files. /U Compares in update mode. This means that the output file consists of the second input file with vertical bars (or backslashes for 64-character printers) next to the lines that differ from the first input file. Any lines found in the first input file but not in the second are designated by a bullet (0). This feature is useful when updating a document because the changes made to the latest edition are flagged with change bars in the left margin. The latest edition of the document is the second input file. 4-4 the the COMPARING FILES USING FILCOM FILCOM Output In most cases, headers consisting of the device, file name, extension, and creation date of each input file are listed before the differences are listed. However, headers do not appear on output from the /U switch (update mode on source compare). Output from a source compare has the following notation column of the output after the headers: in the left of the n)m n is the number of the input file, and m is the input file (re fe r to the examples) • page number The right column lists the differences occurring between matches in the input files. Following the list of differences, a line identical in each file is listed for reference purposes. The output from the /U switch differs from the above-described output in that the output file created is the second input file with vertical bars in the left column next to the lines that are different from the first input file. The output from a binary compare prints the following line on the output device when FILCOM encounters a difference between the two input files: octal loc 1st file-word 2nd file-word XOR of both words If the exclusive OR (XOR) of the two words differs only in the right half, the third word listed is the absolute value of the difference of the two right halves. This usually indicates an address that changed. If one input file is shorter than the other, after the end of file is encountered on the shorter file, the remainder of the longer file is listed. Characteristics The FILCOM program: Places your terminal at user level. Destroys your core image. Requires LOGIN. 4-5 COMPARING FILES USING FILCOM Examples 1. You have the following two ASCII files on disk: .TYPE FILE1.TST<RET> A B C D E F G H I J K L M N o P Q R S T U V W X Y Z .TYPE FILE2.TST<RET> A B C G H I 1 2 3 N o P Q R S T U V 4 5 W X Y Z 4-6 COMPARING FILES USING FILCOM To compare the two files and print the terminal, use the following sequence. differences on your Run the FILCOM program • • R FILCOM(RET> Compare the two files on disk and output the differences on your terminal. By default, three consecutive identical lines determine a match. *=FILEl.TST,FILE2.TST(RET> FILE 1) DSKC:FILEl.TST[27,5434] CREATED: 0825 dd-mmm-yyyy FILE 2) DSKC:FILE2.TST[27,5434] CREATED: 0826 dd-mmm-yyyy 1)1 1 D E 1) 1) F G **** 2)1 G ************** 1)1 J 1) K L 1) M 1) N 1) **** 1 2)1 2) 2 2) 3 N 2) ************** 1)1 **** 2)1 2) 2) W 4 5 W ************** %FILES ARE DIFFERENT 4-7 COMPARING FILES USING FILCOM 2. To compare the two files and print the differences on the line printer, use the following command. In this example the number of successive lines that determines a match has been set to four with the /4L switch. */4L = FILE1.TST,FILE2.TST(RET) FILE I} DSKC:FILE1.TST[27,5434] CREATED 0825 dd-mmm-yyyy FILE 2) DSKC:FILE2.TST[27,5434] CREATED 0826 dd-mmm-yyyy 1)1 1) I} 1) 1) D E F G H 1) I J 1) 1) 1) 1) K L M 1) N **** 2}1 G 2) H 2) I 2) 1 2} 2 2} 3 2} N ************** 1}1 W **** 2}1 4 2} 5 2} W ************** %FTLES ARE DIFFERENT 4-8 COMPARING FILES USING FILCOM 3. To compare the two files so that the second input file is output with vertical bars in the left column next to the lines that differ from the first input file, use the following command sequence: .R FILCOM<RET> */U=FILEl.TST,FILE2.TST<RET> A B C G H I 1 2 3 N o P Q R S T U V 4 5 W X Y Z %FILES ARE DIFFERENT File number two is displayed. The lines with vertical indicate the differences between the two flles. 4-9 bars CHAPTER 5 LISTING GLOBAL SYMBOLS USING GLOB Function The GLOB program reads multiple binary files and produces an alphabetical cross-referenced list of all the global symbols (symbols accessible to other programs) that it encounters. This program also searches files in library search mode, checking for global symbols, if the program file was loaded by LINK in library search mode. (See the LINK manual.) The GLOB program has two phases of operation: 1. phase one scans the input files and builds an internal symbol table. 2. Phase two produces output based on the symbol table. Because of these phases, you can enter commands to GLOB in one of two ways. The first way is to specify one command string containing both the output and input specifications. (This is the command string form~t most system programs accept.) The second is to separate the command string into a series of input commands and output commands. Formats R GLOB *output file-spec=input fl1e-spec(/switch,/switch)<ESC> where: * is the GLOB prompt, and /switch is one or switches listed below. R GLOB followed by one or more input commands in the form: file-spec, file-spec, ••• <RET> and then one or more output commands in the form: output file-spec=<ESC> 5-1 more of the LISTING GLOBAL SYMBOLS USING GLOB When you separate your input to GLOB into input commands and output commands, th~ input commands contain only input specifications. The output commands contain only output specifications. Each output command causes a listing to be generated; any number of listings can be printed from the symbol table generated from the current input files, as long as no input commands occur after the first output command. When GLOB encounters an input command after output has been generated, it destroys the current symbol table and begins a ne~ one. An ESCape (or ALTmode) terminates the command input and signals GLOB to print the cross-referenced listing. A listing is not printed until GLOB encounters an ESCape. Press ESCape at the end of the command string shown in command format 1 or at the end of each output command shown in command format 2. If you omit some of the information in a takes the following defaults: GLOB command, the program o If the device is omitted, it is assumed to be DSK:. However, if the entire output specification is omitted, the output device is TTY:. o If the output file name is omitted, it is the name of the last input file on the line (Command Format 1) or is GLOB if the line contains only output commands (Command Format 2). The input file names are required. o If the output extension is omitted, .GLB is used. If the input extension is omitted, it is assumed to be .REL, unless the null extension is explicitly specified by a dot following the file name. o If the directory area [directory] is directory is used. omitted, your default Switches to GLOB control the type of global listings to be printed. If you issue several switches, enclose them in parentheses. Only the most recently specified switch (except for L, M, P, Q, and X, which are always in effect) is in effect at any given time. If you do not specify any switches, GLOB prints all global symbols. The switches and their functions are: IA Prints all global symbols. switches are specified. IE Prints only erroneous (multiply defined symbols. IF IH Prints nonrelocatable (fixed) symbols only. Prints a list HLP:GLOB.HLP. of the This is the default switches or if no undefined) available from IL Scans programs only if they contain globals previously defined and not yet satisfied (library search mode) • 1M Turns off scanning mode resulting from the IL switch. IN IP Prints only symbols that are never referenced. Prints all routines that define a symbol to have the same value. The routine that defines the symbol first is printed, followed by a plus (+) sign. Subsequent routines that define the symbol are printed, preceded by a plus sign. 5-2 LISTING GLOBAL SYMBOLS USING GLOB /Q Suppresses the printing of subsequent routines, which result from the /P switch. /R Prints only relocatable symbols. /S Prints symbols with nonconflicting defined in more than one program. /X Suppresses the header page when the output device is not your terminal, and includes the header when it is your terminal. Without this switch, the header is printed on all devices except your terminal. values defining that are Output from GLOB The listing header is in the format: Flags Symbol Octal Value Defined Referenced The flags are: Flags Meaning M Multiply-defined symbol (shows all values). N Never referred to (was not declared external in any the binary programs) • S Multiply specified symbol (that is, defined in more than one program but with nonconflicting values). The name of the first program in which the symbol was encountered is followed by a plus sign. U Undefined symbol. of Symbols are listed in alphabetical order according to their ASCII collating sequence. An apostrophe (') follows the octal value of a relocatable symbol. The value is then relative to the beginning of the program in which the symbol is defined. Characteristics The GLOB program: Requires LOGIN. Places your terminal at user level. Destroys your core image. 5-3 LISTING GLOBAL SYMBOLS USING GLOB Example Run the GLOB program, and print all global symbols in the program MAIN (on DSK:), and SUB40 and SUB50 (on DTA2:) on the line printer. Each symbol is printed with its value, the program in which it is defined, all programs in which it is referenced, and any error flags • • R GLOB<RET> *LPT:=MAIN.REL,DTA2:SUB40,SUB50<ESC> The programs to NUMBER.REL and DSK: • be scanned are BATCH.REL and DATA.REL on DTA4, CLASS.REL on DTA6:, and MATH.REL and LIBRAR.REL on *DTA4:BATCH.REL,DATA.REL,DTA6:NUMBER.REL,CLASS.REL<RET> *DSK:MATH.REL,LIBRAR.REL<RET> Print only nonrelocatable symbols on the line printer. *LPT:=/F4<ESC> Print only relocatable symbols default directory. in the file named SYMBOL in your *DSK:SYMBOL=/R<ESC> Print all erroneous symbols on the terminal. symbol appearing in the program SUBRTE. *TTY:=/E<ESC> U EXTSYM SUBRTE Return to monitor level. *"C 5-4 EXTSYM is an undefined CHAPTER 6 NETWORK FILE TRANSFER USING NFT Function The Network File Transfer (NFT) utility allows you to access files residing on DECnet hosts that provide network file access capabilities. By using NFT, you can perform a variety of operations such as copying, deleting, renaming, or listing files; listing directories; and submitting files to a batch system. NFT allows you to perform operations at the local host as well as at a remote host. You may also use NFT to copy a file from one remote host to another. NFT processes text files, programs, data files, control files, or other sequential file. However, only ASCII file transfers supported between a TOPS-10 host and a non-TOPS-10 host. any are Format R NFT * command output-file-spec = input-file-spec/switches where: command is one of the NFT commands described below. file-spec is one or more standard file specifications. Depending on the command, either the output-file-spec or both file-specs may be omitted. /switch is one or more of the switches described below. /ASCII Transf~rs in ASCII mode. Use the /ASCII switch for all ASCII file transfers to or from a non-TOPS-10 host. /[NO]BAUD Does [not] print the baud rate of data transfer in the totals summary. This switch applies to the COpy and TYPE commands only. The default for network transfers is /BAUD, /NOBAUD is the default for local transfers. /BINARY Transfers in binary mode. Use the /BINARY switch for all file transfers between TOPS-10 hosts. /[NO]MOAN Does [not] issue general warning complaints. Use the /MOAN switch to instruct NFT to issue warnings when it encounters a dubious condition. Such a condition typically requires NFT to make a guess (for example, in a file copy operation, the data type or data byte size) in order to complete the command. The default is /NOMOAN. 6-1 NETWORK FILE TRANSFER USING NFT /[NO]OKERROR Use the /[NO]OKERROR switch to control whether NFT aborts the command if an error occurs. /OKERROR directs NFT to ignore file access and I/O errors, issuing warning messages. /NOOKERROR instructs NFT to abort the current command on the first occurrence of a file access or I/O error. The default setting is /NOOKERROR. /TOTALS [ : list] Use the /TOTALS switch to control the totals summary displayed at the end of the command execution. The various TOTALS quantities (files, errors, baud rate, and so on) can be individually controlled by specifying the :list argument. If a quantity-name is preceded with a NO, that quantity will not be listed. If more than one quantity is specified, separate them with commas, and enclose the list with parentheses. /TOTALS or /TOTALS:ALL directs NFT to print a totals summary of all applicable quantities at the completion (successful or otherwise) of the current command. /TOTALS:NONE instructs NFT to omit the summary. The /TOTALS quantities are: - List 0 BITS bits. the total number of data 0 BYTES - List the bytes. total number of data 0 WORDS - List the total number words. of o RECORDS records. the total number of o BLOCKS List the 128-word blocks. total number of o PAGES - List the total number of Sl2-word pages. o FILES - List the total number of files. o BAUD - List the effective rate (bits per second). o ERRORS List the execution errors. The default FI LES, and arguments. 6-2 List total data 36-bit transfer number of quantities are WORDS, BLOCKS, BAUD. NFT ignores inappropriate NETWORK FILE TRANSFER USING NFT /USERID: id Use this switch to specify the access information (userid, account, and password) when using NFT for a non-TOPS-l0 host. You include the /USERID switch with the file specification of the remote file. If you omit an argument from the switch, NFT prompts you for that argument. If the remote host does not require the information, you can press the <RET> key. The form of the /USERID switch is: /USERID:uid:acct:psw where uid is user-name, acct is an account string, and p'sw is a password. If you omit the account or password argument, you must still include its preceding colon (:). For example, if you omit the password: /USERID:smith:l776: NFT prompts you for it. You then password, which NFT does not echo. supply a NFT automatically prompts you for access information if you include /USERID without arguments in the form: NFT /USERID You can include this command and switch in your SWITCH. INI file. If you include arguments with the /USERID switch in SWITCH.INI, you are specifying a particular userid. You can override this switch setting by including an explicit /USERID:uid switch on a command line to NFT. You can also use the SET DEFAULT command to specify access information for one or all remote nodes. Defaults set this way apply for the duration of the current NFT session. For a TOPS-l0 remote file, you can omit the PPN if the userid and the project-programmer number are identical. For example, you can enter: *DIRECT IRIS:;[27,777]/USERID:27,777::FQO as: *DIRECT IRIS:;/USERID:27,777::FOO 6-3 NETWORK FILE TRANSFER USING NFT The NFT commands are: Command Action COpy [output file-spec=] input file-spec Copies files from: local node to remote node local node to local node remote node to local node remote node to remote node DELETE file-spec(s) Deletes files remote node. DIRECT [output file-spec=] input file-spec Lists the directory from the specified node. EXIT Exits from NFT. HELP Displays a list of NFT commands. PRINT file-spec Prints a file at the specified node. NFT does not check that the file is actually printed at a remote node. The file must be located at the node in an acceptable format; and print spooling must be available at the node. RENAME output file-spec(s)= input file-spec SET DEFAULT [node::=] /USERID[:uid[:acct[:psw]]] from a local or Changes the name or attributes of a file. Valid only for nodes that support remote renaming. Sets the defaults for the access information for one or more remote nodes. The defaults remain in effect until you change them using another SET DEFAULT command or exit from NFT. NFT applies the defaults in SWITCH.INI after it sets the defaults from the SET DEFAULT command. SUBMIT file-spec Submits a batch control file or a command file on a local or remote node. NFT does not check that the file is actually submitted. The control/command file must be at the node in an acceptable formatJ and the batch or command file facility must be supported and available at the node. TYPE [output file-spec=] input file-spec Displays the specified file on your terminal. 6-4 NETWORK FILE TRANSFER USING NFT In addition to the standard commands, commands called DAP-mode commands are available. They are the DDELET (delete), DDIREC (direct), DRENAM (rename), and DSUBMI (submit) commands. You can use these commands to quickly manipulate a single file on a single host, or if the remote host does not appear to accept the standard NFT command. If you use these commands, you can include only one input file specification. These commands may execute faster than the standard commands because they do not have the same command scanning and checking as the standard commands. In some cases, they may not give the same amount or type of information a~ the standard commands. All NFT and DAP-mode commands described above work between TOPS-10 hosts, and with your files on the local host. However, a command works on a non-TOPS-10 host only if that host has also implemented that facility. For example, you can copy files between a TOPS-10 host and a VMS host because both hosts have implemented the COpy facility. For those commands with input and/or output file specifications, the defaults for the command string are listed below. Though most of the defaults are the same for all the commands, some commands have different defaults. The exceptions are noted with each field's default. Field Default node local node all remote nodes for SET DEFAULT unchanged for RENAME output device DSK: for local node, none for remote node TTY: for DIRECT and TYPE output unchanged for RENAME output directory no explicit directory unchanged for RENAME output file name output input - input file name generated name for DIRECT unchanged for RENAME output input - input file type DIR for DIRECT unchanged for RENAME file type I/O mode * must be specified for DELETE * must be specified for DELETE CTL for SUBMIT none for PRINT file creation mode, assumed to be ASCII ASCII for DIRECT and TYPE Characteristics The NFT program: Requires LOGIN. Destroys your core image. Leaves your terminal at user level. 6-5 NETWORK FILE TRANSFER USING NFT Examples 1. Copy a file from the local node to a remote VMS host. Override the /USERID specified in your SWITCH.INI file • • R NFT *COPY ROSE::/USER=PLANNI For remote ROSE::*.* User-id: BARSTOW Account: Password: ROSE::COMMUNITY:[BARSTOW]PLANNI •• 2 <= DSKC:[52,654]PLANNI Total of 398 words in 4 blocks in 1 file at 2. 2~395 baud Copy a file from a TOPS-2~ host to a RSTS host while logged in on a TOPS-l~ host. You must specify a /USERID switch for each remote host • • R NFT *COPY LILY::/USER=DAISY::PLANNING-GUIDE/USER For remote DAISY::PLANNING-GUIDE.* User-id: THRING Account: Password: For remote LILY::*.* User-id: 15,177 Account: Passwo rd : LILY::SY:[15,177]PLANNI <= DAISY::PS:[THRING]PLANNING-GUIDE •• 5 Total of 483 words in 4 blocks in 1 file at 5851 baud 3. Delete all the files with name UUOSYM from a directory on a host. You must include the /USERID switch, but need not explicitly specify the directory because it is the same as the userid • TOPS-2~ • R NFT *DELETE DAISY::UUOSYM.*/USER For remote DAISY::UUOSYM.* User-id: THRING Account: Password: DAISY::PS:[THRING]UUOSYM.REL.I DAISY::PS:[THRING]UUOSYM.UNV.l Total of 33 blocks in 2 files 6-6 NETWORK FILE TRANSFER USING NFT 4. Access a directory not your own on a remote TOPS-10 host called IRIS. Since your account on the system allows you read access to the directory, you can specify the other directory and your userid and read the directory • • R NFT *DIRECT IRIS::[I7,353]/USER For remote IRIS::[I7,353]*.* User-id: 27,777 Account: Password: IRIS::DSKA:[I,2]DSKA.BAK IRIS::DSKA:[I,2]DSKAI.FUL IRIS::DSKA:[I,2]INC.BAK IRIS::DSKA:[I,2]FUL.BAK IRIS::DSKA:[I,2]DSKA.INC IRIS::DSKA:[I,2]INC.MIC IRIS::DSKA:[I,2]FUL.MIC Total of 7 files 5. To access accounts with different access information on several remote nodes, set the default access information for all of them • • R NFT *SET DEFAULT ROSE::=/USER:BARSTOW:HAHA:HOHUM *SET DEFAULT IRIS::=/USER:27,777:WRITER:FOFUM *SET DEFAULT LILY::=/USER:15,177:SCHOLAR:FEEFI *SET DEFAULT DAISY::=/USER *COPY ROSE::=DAISY::FCC.~SC For remote DAISY::FCC.ASC.* User-id:thing Account: Password: 6. Submit a command file to the VMS command file processor on host ROSE:. You have included a /USERID switch for that host in your SWITCH.INI file so you do not have to include that switch in the command string • • R NFT *SUBMIT ROSE::ABVAX.CTL ROSE::COMMUNITY:[BARSTOW]ABVAX.CTL.l Total of 1 file 6-7 CHAPTER 7 CONTROLLING SUBJOBS USING OPSER Function The OPSER program allows you to control up to 14 subjobs from your terminal. OPSER acts as the supervisor of the subjobs by passing monitor-level or user-level commands to all or to selected subjobs. OPSER can retrieve output from the various subjobs. OPSER subjobs run on pseudo-terminals (PTYs). It performs all pseudo-terminal initialization. You provide the subjob name and either an OPSER-provided subjob number or a user-assigned name. System programs or your programs that require a dedicated terminal can be run as subjobs of OPSER. By running jobs on PTYs, OPSER maintains an I/O link between you and the running jobs. Format R OPSER *:command where: An asterisk (*) is the OPSER prompt if no subjobs are in use or if subjobs are waiting for commands. OPSER responds with an exclamation point when a subjob is running. You can enter commands whenever OPSER is operating. Each command must be preceded by a colon and may be abbreviated to a unique set of characters. Commands to OPSER and their functions are: Command Function :AUTO/hh:mm filename Processes the named file as a list of interactive commands. The AUTO file is terminated by either an end-of-file or the operator typing a line on the console. AUTO files may call other files, including themselves. The optional /hh:mm switch sets the time to run the auto file. If this time has passed, the AUTO file runs immediately. :AUTO/+hh:mm filename Processes the AUTO file after the amount of time specified by the +hh:mm has elapsed. :AUTO/>hh:mm filename Processes the AUTO file at the next occurrence of hh:mm. 7-1 CONTROLLING SUBJOBS USING OPSER Command Function :AUTO/<hh:mm filename Does not process the AUTO file if time has already gone past hh:mm. ~B Sends ~O (CTRL/O) to the subjob. Returns you to monitor level even if you have active subjobs running. Use the :EXIT command (described below) in most cases. :CLOSE Closes the log file new one. :CONTINUE Continues processing the AUTO file after it has been interrupted by a CTRL/C. This allows you to gain control of a subjob during AUTO file processing. :CURRENT Displays the name of the current subjob, if defined; otherwise, displays the number of the current subjob. Output from another subjob does not affect the definition of the current subjob. : DAYTIME Displays the current date and time. :DEFINE xxx=n Associates the symbol xxx as the name for subjob n. The symbol B is reserved for the subjob running BATCON. :DEVICE dev:1og:n Assigns the device (dev:), and logical name (log) to subjob n. The logical name is optional, but you must include a null field if the logical name is omitted, for example, :DEVICE CDR::3. The REENTER command aborts the request. :ERROR n,m,p Displays only error messages. (That is, ignores nonerror messages from subjob n.) Printing resumes with the : REVIVE command. :EXIT Exits to the monitor if subjobs are not in use; otherwise, give a list of those that are running. This should be used instead of CTRL/C, because :EXIT does not return your job to monitor level if there are any active subjobs. (Also refer to :MONITOR.) :FREE Displays the first free subjob number. :HELP Displays text that OPSER commands. :JCONT n Continues the specified currently halted job. :KILL n,m,p Logs out the specified subjobs. identical to :KJOB. 7-2 without opening briefly a explains This is CONTROLLING SUBJOBS USING OPSER Command Function :KJOB n,m,p Logs out the specified all files. :LOGIN proj,prog Logs in a new subjob. If you do not type a project-programmer number, OPSER assumes your project-programmer number. :MONITOR Exits to the monitor, are running. :MSGLVL n Determines whether the response to the :WHAT command includes the JOBSTS bits. If n=~, the bits are included. If n=l, they are eliminated. If you do not specify n, the JOBSTS bits are not included. :QUEUE <line> Initiates the first free subjob and sends the typed-in line to the system queue manager. :RESOURCES Displays the list system resources. :REVIVE n Resumes normal echoing of output from subjob n (that is, clears the effects of :SILENCE, :TSILENCE, and :ERROR for subjob n). :SCHED Displays the schedule bits as set by the operator. subjobs, even of if the saving subjobs available Bit Meaning ~ Regular timesharing. I No further LOGINs except from CTY. 2 No further LOG INs from remote terminals, and no answering of data sets. 4 Batch jobs only. l~~ Device MOUNTs can be done operator intervention. 2~~ Unspooling allowed. 4~~ No operator coverage. 10~0 No automatic down-line nodes. without loading of :SEND Simulates the SEND command, sending a line of text to the operator's terminal. :SILENCE n Suppresses all output from subjob n. :SLOGIN proj,prog Logs one subjob in response. If project-programmer yours. 7-3 but suppresses its you omit the number, OPSER uses CONTROLLING SUBJOBS USING OPSER Command Function :STOP n Puts the specified subjob at monitor level. This is equivalent to typing two CTRL/Cs in interactive mode. :SYSTAT x Runs SYSTAT with argument x over the first free subjob. The argument can be any valid SYSTAT argument. (Refer to the TOPS-l~ Operatin~ System Commands Manual.) The argument IS optional. :TIME Displays the total running time since the last :TIME command, followed by the integrated product of running time and core size. :TLOG file-spec Creates a log file with the specified nama. If the file already exists, a message is printed to determine whether the existing file should be superseded. If not, OPSER appends the file to the existing one. Default for file-spec is OPSER.LOG on DSK:. :TSILENCE n Suppresses all output from subjob n (same as the :SILENCE command) but places entries into the log file. :TTYTST Tests this terminal by printing all the ASCII characters between octal 4~ and 174, inclusive. :WHAT n,m,p Prints the status of the specified subjobs on the terminal. The status includes a SYSTAT with the time, the time of the last input and the last output, a listing of the JOBSTS bits depending upon the value of :MSGLVL, and the time of the next timed AUTO file. :WHERE devn: Prints the node number of physical location. When a subjob number (indicated by n, m, following ways: or name p), you the device's is required in a command string can specify the subjob in any of the o Omit it, in which case the last subjob typed into is used. o Specify ALL, in which case all active subjobs are implied. o Specify a decimal number, or a list of numbers separated by commas, from ~ to the OPSER limit, which designates that particular subjob number. o Specify a name, or a previously assigned command. list of names separated by commas, to a particular subjob with the :DEFINE 7-4 CONTROLLING SUBJOBS USING OPSER Characteristics The OPSER program: Requires LOGIN. Destroys your core image. Places your terminal at user level. Example The following is an example of an automatic startup file • • TYPE SYS:TTY4.ATO<RET> :TLOG DSKN:OPSER4.LOG :SLOG :DEF Ll= :SLOG :DEF L0= :SLOG :DEF M= :SLOG :DEF B= : TS I LEN .ALL LI-AS LPTl Ll-R LPTSPL LI-FREEZ LI-MLIMIT 5000 7-5 CHAPTER 8 LOCAL FILE TRANSFER USING PIP Function The PIP program transfers files between standard IIO devices at the local system. It can perform simple editing and magnetic tape control operations during transfer operations. Format R PIP * output file-spec(s)/switches = input file-spec(s)/switches where: * is the PIP prompt; output file-spec and input file-spec are file specifications which may include wildcards; and = (equals sign) separates the output from the input files. You must include this, even if you omit either file specification. Iswitch is one or more of the options described below. Each description includes any restrictions on combining that switch with other switches. Switch Meaning IA Does not split lines between output buffers; starts each line with a new word. Used for FORTRAN ASCII input. This switch may be used with IC, IE, /G, 1M, IN, 10, IQ, IS, IV, and IZ. IB IC Copies in binary mode. IG, 1M, IP, IQ, and IX. This switch is legal with Deletes trailing spaces and converts multiple spaces to tabs. You can use this switch with lA, IE, IG, IJ, 1M, IN, 10, IQ, IS, IT, and IZ. IV, IW, IX, 10 Deletes one or more files from the destination device. You can only specify a destination device in the command string. You may use the IX switch with 10. IE For card reader input, ignores card sequence numbers. In other words, this switch replaces characters in columns 73-80 with spaces. This switch can be used with the lA, IC, IG, IJ, 1M, IN, 10, IQ, IS, IX, and IZ switches. IF Gives a limited (fast) version of the directory You may not use any for the specified device. other switches with this one. 8-1 LOCAL FILE TRANSFER USING PIP Switch Meaning IG Ignores IIO errors and continue processing after issuing an error message. This switch is always legal. IH Copies in image binary mode. IG, 1M, IX, and IZ. You can use can use this IH with II Copies in image mode. You with IG, 1M, IX, and IZ. switch IJ Converts non-printing control characters to control-character format for terminal output. That is, e"'l, <CTRL/A), is output as ,. A. lA, IC, IE, 1M, IW, and IX are permitted with this switch. IL Lists the directory for the specified device. may only use IZ with this switch. ( Mx) Magnetic tape switches, enclosed in parentheses. They are listed below. You may not use 10, IF, or IU with this switch. You Switch Meaning (M8 ) (M5) (M2) ( ME) (M#nA) 80e bpi density (default value) 556 bpi density 2ee bpi density Even parity (odd parity is default) Advance tape reel n files. #n omitted means one file. Backspace tape reel n files. #n omitted means one file. Advance tape reel n records. #n omitted means one record. Backspace tape reel n records. #n omitted means one record. Rewind tape reel. Skip to logical end-of-tape. Rewind and unload. Mark end-of-file. ( M#nB) ( M#nD) ( M#nP) (MW) (MT) (MU) (MF) IN Deletes line sequence numbers from an ASCII file. If tab follows the sequence number, deletes the tab also. You may use lA, IC, IE, IG, 1M, IQ, IX, and IZ with this switch. 10 Resequences or adds line sequence numbers to an ASCII file, incrementing by 1. You may use lA, IC, IE, IG, 1M, IX, and IZ with this switch. IP Converts FORTRAN format control characters for line printer listing. You may use IB and IZ with this switch. IQ Lists a device. IV. IR summary of switches on the specified You may not use IQ with 10, IF, IR, and Renames the source file to the name of destination file. IX may be used with IR. 8-2 the LOCAL FILE TRANSFER USING PIP Switch Meaning IS Resequences or adds line sequence ASCII file, incrementing by 10. IZ are all valid with IS. IT Deletes trailing spaces from the transferred file. Keeps one space and the line termintor for an all-space line. You may use IC, IS, and IZ with this switch. IU IV Obsolete. numbers to an lA, IC, IT, and Matches angle brackets. If there is an unmatched angle bracket, creates a file listing those lines with unmatched angle brackets. You may use IG, 1M, and IZ with IV. IC and IZ are legal with IW Converts tabs to spaces. this switch. Ix and IDX Copies the specified files without concatenating the files. IDX copies all but the specified files. If you omit the IX switch, PIP concatenates the files while copying. You may not use IF or IL with this switch. IY IZ Obsolete. Zeroes the directory of the destination device. PIP attempts to delete all the files named in the directory, depending on the protection codes. You may not use this switch with ID or IR. PIP can transfer files in either ASCII or binary mode. PIP uses the file extension in the file specification to determine which mode to use. Whenever possible, PIP transfers files in a binary mode since it is faster. The binary modes are: binary, image, and image binary. PIP performs a specific series of tests on a file extension to determine the mode to use during a transfer operation. for: o The presence of a data mode switch. PIP goes to the next test. o The presence of a known (standard) file extension that specifies a binary mode of transfer. If no binary extensions are found, PIP goes to the next test. o The input and the output devices specified, to determine if they are capable of handling binary data. If either of the devices cannot handle binary, the transfer is made in ASCII mode. If both devices can handle binary data, PIP goes to the next test. o The presence of the IX switch in the command string; if it is found, the transfer is made in binary mode. If an X option is not found, PIP goes to the next test. o The presence of commas (non-delimiters) in the command string; if commas are found, ASCII mode is indicated. If no commas are found, the transfer is made in binary mode. 8-3 If no switch in order PIP looks is found, LOCAL FILE TRANSFER USING PIP Characteristics The PIP program: Requires LOGIN. Destroys your core image. Places your terminal at user level Examples 1. Run PIP, and list your directory on your terminal • • R PIP *TTY:/L= 2. Transfer files from area [11,7] concatenation. to your directory without *DSK:/X=DSK:[11,7]filea.rel,filea.mac 3. Combine all the files on the tape on MTA0: your directory. into one file in *DSK:TAPE.MAC=MTA0:* 4. Rename the file MONI.MAC to MONI.CBL *DSK:MONI.CBL/R=MONI.MAC 5. Change the directory access code of [57,123] to <222>. *DSKA:[57,123].UFD<222>/R=[57,123].UFD 6. Transfer a file from MTA1: parity. to MTA2: at 200 bpi with even *MTA2:(M2E)=MTA1:(ME2) 7. Backspace MTA0: to the start of the previous file. equivalent to (M#lB). *MTA0: (M~) = 8. Backspace MTA2: to the start of the current file. *MTA2: (M#0B)= 8-4 (MB) is CHAPTER 9 LISTING DISK QUOTAS USING QUOLST Function The QUOLST program prints the amount of disk space used and the amount left on each file structure in your search list. In addition, it prints the amount of space the file structures have left for all users. The information printed on your terminal is: o The structure name. o The number of blocks allocated. o The number of blocks left in the logged-in logged-out quota, and on the structure. Format R QUOLST Characteristics The QUOLST program: Destroys your core image. Leaves your terminal at monitor level. Example .R QUOLST<RET> USER: STR DSKC: DSKB: 27,5434 USED 1355 " LEFT: (IN) 8645 1"""" (OUT) 3645 5""" 9-1 (SYS) 61995 9687" quota, in the CHAPTER 1&1) FORMATTING TEXT FILES USING RUNOFF Function The RUNOFF program formats text files using commands you insert into a file. You create the file and insert the RUNOFF commands using one of the standard TOPS-1&1) text editors.· Format R RUNOFF *file-spec where: * is the RUNOFF prompt; file-spec is a file specification with standard defaults and wildcard features. The normal extension for a file that RUNOFF processes is .RNO. The processed file has an extension of .MEM. You can queue this file to a line printer, or display it on your terminal. The commands listed below are inserted into the text file to cause RUNOFF to perform some action. All RUNOFF commands begin with a period (.). You can abbreviate all commands. Some commands require either numeric or text arguments. In either instance, you type the command, one space, and then the argument. When you have several commands to input, you can list all of them on one line, separating them with periods. However, if the first command has a comment or takes text as its argument, you must use a semicolon to separate the commands. Comments must be preceded by an exclamation po int (!). Command Function • APPENDIX "text" Starts appendix with "text" as its name • • AUTOPARAGRAPH Treats leading spaces as new paragraph • .AUTOTABLE Treats lines without leading new paragraph. spaces as .BEGIN BAR Starts a change bar, which the left hand margin. appears in • BLANK n Skips n lines • • BREAK Starts a new output line • • CENTER n Centers the next line around column n/2 • • CHAPTER "text" Starts chapter with text as name • 112J-l FORMATTING TEXT FILES USING RUNOFF Command Function • COMMENT Ignores this command. .CONTROL CHARACTERS Allows control characters the text. • DISABLE BAR Ignores change bars • .DO INDEX "title" Outputs title. • ELSE Changes sense of IF/IFNOT • • ENABLE BAR Allows change bars • • ENDIF name Ends conditional input • • END BAR Ends change bar • .END FOOTNOTE Ends a footnote definition. .END LIST Ends a list. • END LITERAL Ends a literal block of text • • END NOTE Ends a NOTE command • .END SELECTION Stops selection prefix. • END SUBPAGE Stops subpage numbering (resumes page) • • FIGURE n Makes space for n-line figure • .FIGURE DEFERRED n Same as FIGURE except the figure may on next page. .FILL Resumes line. • FIRST TITLE Includes title on first page • • FLAGS ALL Enables existing flag characters • .FLAGS type "ch" Changes flag character of the type to "ch". • FOOTNOTE n Starts n-line footnote • .HEADER x Issues "page" in case x, where UPPER, LOWER, or MIXED case. .HEADER LEVEL n Starts section at level n (1-5); rest is name. .IF Starts name. if VARIANT .IFNOT name Starts conditional input if not name. VARIANT • INDENT n Indents next line n spaces • 10-2 index filling with rest until and conditional to print in of line as single line each justifying input be specified x is FORMATTING TEXT FILES USING RUNOFF Command Function • INDEX Inserts rest of this line in index • • JUSTIFY Resumes justifying text • .LEFT n Starts next line marg in. • LEFT MARGIN n Sets left margin • • LIST n Starts list of items with spacing n • • LIST ELEMENT Starts of item in a list • • LITERAL n Starts a literal block of text long. • LOWER CASE Starts footnotes and text in lower case • • NO AUTOPARAGRAPH Stops autoparagraph mode • • NO AUTOTABLE Stops autotable mode • • NO CONTROL CHARACTERS Does not allow control characters • • NO FILL Stops fill and justify • .NO FLAGS ALL Disables existing flag characters except • and !. .NO FLAGS type Does not use flag specified type. • NO HEADER Suppresses page headers • • NO JUSTIFY Stops justifying • • NO NUMBER Stops page numbering • • NO PAGING Stops splitting into pages • .NO PERIOD Stops double spacing after period, exclamation point, semicolon, colon, and question mark. • NO SELECTION Accepts all text as input • • NO SPACE Suppresses space on this end of line • • NO SUBTITLE Suppresses subtitles • .NOTE text Starts indented note with heading "text" centered. If you omit "text," RUNOFF uses the heading NOTE. • NUMBER n Resumes page numbering at page n • • NUMBER APPENDIX n Sets appendix number to n • • NUMBER CHAPTER n Sets chapter number to n • • NUMBER INDEX Sets chapter number to "INDEX" • 10-3 n columns from n characters left lines of the FORMATTING TEXT FILES USING RUNOFF Command Function • NUMBER LEVEL Sets next HEADER LEVEL to a, b, c, ••• a, b, c, ••• • NUMBER LIST d, c Sets list counter depth d to c • • NUMBER PAGE n Resumes page numbering at page n • .NUMBER SUBPAGE ch Sets subpage number to ch (A-Z) • • PAGE Starts new page. .PAGE SIZE n,m • PAPER SIZE n,m Sets page size to n lines by m columns Sets paper size to n lines by m columns • • PAGING Resumes breaking into pages • .PARAGRAPH n, v, t Starts a new paragraph, indented n spaces, starting v blank lines below the previous paragraph, and having t as the TEST PAGE value. .PERIOD Double spaces after period, exclamation point, semicolon, colon, and question mark. • PRINT INDEX Starts printing index • .RIGHT n Right adjusts next line n of the margin. • RIGHT MARGIN n Sets right margin to n • .SELECTION string Sets selection string. • SKIP n Skips n*spacing lines • • SPACING n Sets spacing (default=l) • • STANDARD n Sets standard setup of width n • .SUBINDEX Indexes with sub-indices. • SUBPAGE Starts subpage numbering • • SUBTITLE or .SUBTTL Uses rest of line as subtitle • 19-4 n#" used columns to left delimit FORMATTING TEXT FILES USING RUNOFF While inputting your text, you have the option of including special characters to alter the case and mode operations. You type these characters immediately before the word or group of words you want to arrange. Just like RUNOFF commands, these special characters do not appear in your output after running RUNOFF. Special text characters include: Flag Character Function Underscore (_) Takes next character as text. Ci r cum flex ( . . ) Uppercases next character. Back-slash (\) Lowercases next character. Number sign (#) Treats as an expandable space. Ampersand (&) Underlines next character. Less-than «) Capitalizes the following word. Greater-than (» Indexes the following word. Exclamation point (1) Ends footnote or begins comment. Period (.) Treats what follows as a RUNOFF command. Semicolon (i) Used to separate multiple commands. Characteristics The RUNOFF program: Requires LOGIN. Destroys your core image. Places your terminal at user level. 10-5 FORMATTING TEXT FILES USING RUNOFF Examples 1. Use the .LIST and .LIST ELEMENT commands to create a list • • NF. LS .LEiPage numbers on every page except the first, .LEiSpacing 1 between lines, .LEiFi11 and justify, .LEiTab stops 9,17,25,33,41,49,57,65, .LEiLeft margin 9, .LEiRight margin 69, .LEiPage size - Width 69 characters, Length 58 lines • • ELS Your output would look like the following: 2. 1. Page numbers on every page except the first, 2. Spacing 1 between lines, 3. Fill and justify, 4. Tab stops 9,17,25,33,41,49,57,65, 5. Left margin 9, 6. Right margin 69, 7. Page size - Width 6~ characters, Length 58 lines. To get header levels in your text, you can insert commands in your text as follows: .FLAG CAPITALIZE .CHAPTER EXAMPLE 5 .HL 1 FIRST LEVEL OF SECTION 1 The command .<HEADER <LEVEL starts a section at the level specified and takes the following text as the header."The n can be in the range from 1 to 5 • • HL 1 SECOND LEVEL OF SECTION 1 The sections are incremented by 1, and the number is output in the form i.j.k.l.m.ttIf this is a chapter oriented document, the i is the chapter numberitotherwise, the i is the number of the .<HI 1 level • • HL 1 THIRD LEVEL OF SECTION 1 This command acts as .SKIP 3i.NOFILL .<BREAK .<TEST <PAGE 9i.<BLANK 3 .SKIP 3;.FILL followed by the section number.,,<HEADER <LEVEL<S 1 AND 2 end with a .<BREAK.#t<HEADER <LEVEL<S 3, 4, AND 5 end with a space dash space combination (_.-_.). 19-6 FORMATTING TEXT FILES USING RUNOFF Your output would look like: CHAPTER 1 EXAMPLE 5 1.1 FIRST LEVEL OF SECTION 1 The command .HEADER LEVEL starts a section at the level specified and takes the following text as the header. The n can be in the range from 1 to 5. 1.2 SECOND LEVEL OF SECTION 1 The sections are incremented by 1, and the number is output in the form i.j.k.l.m. If this is a chapter oriented document, the 1 1S the chapter number; otherwise, the i is the number of the .HL 1 level. 1.3 THIRD LEVEL OF SECTION 1 This command acts as .BREAK .TEST PAGE 9;.BLANK 3 followed by the section number. HEADER LEVELS 1 and 2 end with a .BREAK. HEADER LEVELS 3, 4, and 5 end with a space dash space combination (i-i). 10-7 CHAPTER 11 SETTING SEARCH LISTS USING SETSRC Function You can use the SETSRC program to change your job search list or the system search list. You must be logged in under [1,2] to create a new system search list. A search list is the order of the file structures that are to be searched whenever you implicitly or explicitly specify the generic device DSK:. The system manager originally defines the search list to include the file structures that you can access. With the SETSRC program, you can alter the search list by adding or deleting file structures. The search list is of the form: fsl:, fs2:, fs3:, FENCE, fs4: where: fs is the name of the file structure. The file structures on the left of the FENCE form the active search list and represent the generic device DSK: for your job. The active search list is a list of the file structures that the monitor searches, and the order in which the file structures are to be searched. The search goes from left to right. The files to the right of the FENCE compose the passive search list and represent the file structures that were once in the active search list. File structures-are kept in the passive search list so that quotas can be checked on a DISMOUNT or KJOB command; these structures are not searched. The FENCE is the boundary between the active and passive search lists. You can change the job's search list by adding or deleting file structures, using the MOUNT and DISMOUNT commands. Because the SETSRC program does not create a UFD if one does not exist, use the MOUNT command to create a UFD. Refer to the TOPS-l~ Operating System Commands Manual for a description of the MOUNT and DISMOUNT commands. 11-1 SETTING SEARCH LISTS USING SETSRC Format R SETSRC *command/switch When the program prompt (*) appears, you can respond with any following commands: of the Command Function A fs1, fs2, ••• Adds one or more file structures to the existing active search list. The file structures (with any switches) are appended to the beginning or the end of the active search list according to the following specifications: o If no asterisk appears in the specifications (for example, fs1, fs2) or if an asterisk appears before the file structure names (for example, *,fs1, fs2), the file structures are added to the end of the search list. o If an asterisk follows the file structure names (for example, fs1, fs2, *,), the file structures are added to the beginning of the search list. o If the asterisk appears in the middle of the file structures (for example, fs1, *, fs2), the file structures before the asterisk are added to the beginning of the search list and the file structures after the asterisk are added to the end. C fs1,fs2, ••• Creates a new search list for this job. Any file structures in the current search list that are not in the new list are moved to the passive search list. CP[dir] Creates a new default directory path. You must specify the new path with this command. CS fs1,fs2, ••• Creates a new system search list (that is, the file structure search list for device SYS:). You must be logged in under [1,2] to use this command. H Prints information (HELP) about the available commands. M/switch Modifies the current search list and DSK: specification by altering the switch settings for individual file structures. This command does not add or remove file structures from the search list. R fs1,fs2, ••• Removes file structures from the search list. They are placed into the passive search list, so that on subsequent LOGOUTs or DISMOUNTs, quota limits can be checked. This command does not affect ersatz devices. 11-2 SETTING SEARCH LISTS USING SETSRC Command Function T Prints the job search list. TP Prints the default directory path. TS Prints the system search list. You can use the following switches in the SETSRC command string. Switches that modify file structures must appear immediately after the file structure name that· they modify. Other switches can appear anywhere in the command string. The switches can be abbreviated as long as the abbreviation is unique. Switch Function /CREATE Allows new files to be created on the file structure. This is the default. /LIB:[proj,prog] Used with the C or M command only, /LIB sets the job's library directory to the UFD [proj,prog] and adds it to your DSK: specification. This means that if a file is not found in your directories in your search list, the library directory will then be searched for the file. If you only type LIB: [PPN] to SETSRC, it interprets this as M/LIB. /NEW Adds the directory [1,5] to your SYS: specification. This means that when the system directory is searched, the directory [1,5] will be searched before the directory [1,4]. This switch can be typed in directly as a command by omitting the C or M command and the slash (NEW is equivalent to M/NEW). /NOCREATE Does not allow new files to be created on the file structure when you specify DSK:, but allows files to be superseded. Files can be created on the file structure if you specify the file structure name explicitly. You may specify this switch as /N. /NOLIB Removes the library directory from your DSK: specification. This switch is only valid with the C or M command. /NONEW Removes the [1,5] directory from your SYS: specification. This switch is only valid with the C or M command. /NOSCAN Cancels the scan switch for the directory path. You can use this switch only with the CP command. If you type NOSCAN at the prompt, SETSRC interprets it as CP[dir]/NOSCAN. /NOSYS Removes the SYS: specification from your DSK: specification. This switch is only valid with the C or M command. 11-3 SETTING SEARCH LISTS USING SETSRC Switch Function /NOWRITE Does not allow writing on the file structure for this job (that is, the file structure is read-only). You may specify this switch as /R. /SCAN Sets the scan switch for the directory path. When you search for a file, scanning allows the search to include higher-level SFDs and the UFD. You can use this switch only with the CP command. If you type SCAN at the prompt, SETSRC interprets it as CP[dir]/SCAN. /SYS Adds the SYS: specification to your DSK: specification. If a file cannot be found in your directories in your search list or in your library directory (if /LIB:[proj,prog] has been specified), the system directory [1,4] will then be searched for the file. This switch can be typed in directly as a command by omitting the C or M command and the slash. For example, SYS is equivalent to M/SYS. /WRITE Allows writing on the This is the default. Characteristics The SETSRC program: Places your terminal at user level. Destroys your core image. 11-4 file structure. SETTING SEARCH LISTS USING SETSRC Example Your search list is defined as DSKB: • • R SETSRC<RET> *T<RET> * DSKB :, FENCE Add DSKA: to the end of the search list. *A DSKA: <RET> Your search list is now defined as DSKB:,DSKA:. *T<RET> DSKB:,DSKA:,FENCE Add DSKC: to the beginning of the search list. *A DSKC:,*<RET> *T<RET> DSKC:,DSKB:,DSKA:,FENCE Remove DSKA: from the search list. *R DSKA:<RET> *T<RET> DSKC:,DSKB:,FENCE,DSKA~ Disable writing on DSKB:. *M DSKB:/NOWRITE<RET> Set your library directory specification. to [27,500] and add it to your DSK: *M/LIB:[27,500]<RET> Add SYS: to your search list. *SYS<RET> *T<RET> /LIB:[27,500]/SYS DSKC:,DSKB:/NOWRITE,FENCE,DSKA: Your DSK: and SYS: search list. specifications are listed first, followed by your *TS<RET> The system search list is defined as DSKA:,DSKB:,DSKC:. *DSKA:,DSKB:,DSKC: 11-5 CHAPTER 12 DISPLAYING SYSTEM STATISTICS USING SYSDPY Function The SYSDPY program allows you to display system status and the status of network links and user jobs, formatted for your particular type of terminal. SYSDPY features a display-oriented output format with many commands for controlling the types of information to include in the display. When you first start the SYSDPY program, it displays the status of the user jobs and the system statistics. It is ready to receive user commands at any time. Your commands are not echoed on the screen, but are reflected in the changes in the display. Format To start the SYSDPY program, type the R command followed by the special version of SYSDPY that is designed for your type of terminal. The different version of SYSDPY and the terminal types for which they are designed are: Version Terminal SYSDPA SYSDPB SYSDPY SYSVBX SYSV50 SYSV52 SYSV61 SYSANS SYSDLT SYSHLZ DIGITAL VT05A DIGITAL VT05B (2400 baud) DIGITAL VT06 (Datapoint 3300) DIGITAL VB10C graphics display DIGITAL VT50 DIGITAL VT52 DIGITAL VT61 DIGITAL VT100 or other ANSI terminal Delta Data Telterm Hazeltine 2000 Any unprivileged user can run SYSDPY, but the output of certain system statistics is restricted to privileged jobs only. If you are logged in as [1,2], or your job has Spy privileges, you can use all available SYSDPY commands. When SYSDPY first starts running, it displays the normal job and system status (equivalent to the N command). At any time, you can type any of the one-letter commands described below, which change either the type of information displayed, or allow you to control the display of information. The file DOC:SYSDPY.MAN contains a full description of the information in the various displays. You do not need to press RETURN after you type a SYSDPY command. To exit from SYSDPY, type <CTRL/Z> or <CTRL/C>. 12-1 DISPLAYING SYSTEM STATISTICS USING SYSDPY If you need help, type H. This either lists a help file (SYS:SYSDPY.HLP, if it exists) or prints a short listing of available commands. Commands to SYSDPY are: A Changes SYSDPY's normal scroll setting to no-scroll. SYSDPY usually scrolls through the display, advancing one screenful each update pass. (Refer to the + and - commands.) C Displays the DECnet link status for system. E Displays Ethernet status. This includes all Ethernet channels, all KLNI controllers, and enabled protocol types. The E command summarizes datagram traffic and the free queue errors. F Lists file system statistics for each disk unit in the system. This information includes I/O counts, error summaries, structure membership, and a summary of swapping units. H Lists the help text. I Lists incremental statistics, which are changes in certain values since the last update cycle. The values incremented are: system uptime, job runtimes, disk reads and writes, CPU statistics, network I/O (byte) counts, TTY I/O counts, and network message counts. A + (plus sign) immediately preceding the uptime value indicates incremental mode. J Lists jobs only, without any system statistics. listed in columns. K Displays CI network information, including open paths to nodes on the CI network, packet transmission and reception counts, and port recoverable error counts. L Writes the contents of the screen to the file LPT:SYSDPY.LOG[-]. SYSDPY logs the screen each time it is updated. If this log file already exists, SYSDPY appends the new data to it. A form feed separates each screen. Typing <CTRL/Z> to SYSDPY closes the file. M Lists normal job data and an expanded memory summary showing both virtual and physical job memory usage. The M job display does not show system statistics. N Lists the default statistics, which include a column of job status information, and a column of system status information. Some of the system statistics listed are CPU idle and lost time, and available disk structures. a Suppresses statistics from [1,2] jobs for the J, N, and M displays. A second a command resumes display of [1,2] jobs. Q Lists the system queues, just as the QUEUE program does, but in DPY mode. This command requires GALAXY Version 4 or later. R Refreshes the entire screen immediately. SYSDPY automatically refreshes the screen at various intervals, depending on the terminal in use. The R command resets the automatic refresh counter. 12-2 all open links on The jobs the are DISPLAYING SYSTEM STATISTICS USING SYSDPY S Changes the SYSDPY display from the default to the disk reads, disk writes, and the user name for all jobs listed in the N display. SYSDPY resumes displaying system statistics when you type the S command a second time. T Displays ANF network topology and the NCL numbers associated with each node. This display requires PEEK or Spy privileges. V Attempts to lock SYSDPY in memory and run it in a high priority run queue (HPQ). In addition, SYSDPY updates the screen once per second, unless you previously set the update time to another value (using the W command). A second V command clears the lock and HPQ setting, and restores the update time to ten seconds. If you issued a SET HPQ command before running SYSDPY, the V command locks the job, but doesn't change the HPQ. SYSDPY automatically clears the V state after l~~~ update cycles, or if you issue a Q command. The system does not issue an error message if SYSDPY fails to lock or run in HPQ. This command requires LOCK or HPQ privileges. nW Sets the wait time between screen updates to n seconds. The default update time is ten seconds, and one second for the V display. You may specify n as any number between ~ and 6~. Zero means one clock tick. If you do not specify a time, SYSDPY assumes the defaul t wa it time of ten 'seconds. Z Lists all known LAT servers and some LAT traffic statistics. \ Displays ANF network statistics. This information includes the number of network messages sent and received according to message type (such as DATA or NEIGHBORS), a histogram of the data messages sent and received as a function (log base 2) of the data message size, and network free core usage. * Displays the DECnet node status for all nodes in the DECnet network. Use the A command to change the display from all network nodes to just those nodes with active links. Use the ~ command (described below) to change the display from all known nodes to only those nodes with which the local node has had contact. n+ Advances the screen by n lines or n jobs, depending on the current display. If you do not specify n, SYSDPY advances one screen. When you type the + command, you clear auto-scroll (refer to the A command) • n- Scrolls the screen backwards by n lines or jobs, depending on the current display. If you do not specify n, SYSDPY reverses one screen. When you type the command, you clear auto-scroll (refer to the A command). Displays idle jobs or DECnet nodes, depending on the current display. Typing the ! command again stops display of idle jobs or nodes. Changes the listing in the "Where" column of the job display from the PTY number to the controlling job number of a job being controlled by another job. % Changes the listing in the "Runtime" column of the job display from the actual runtime to the percentage of the CPU that the runtime represents. 12-3 DISPLAYING SYSTEM STATISTICS USING SYSDPY Eliminates certain statistics from the display. For the N display, the first part of the system statistics are eliminated, for a DECnet display, non-valid delay time nodes are not shown, and for the F display, error summary information is not included. <ESC> Freezes the current screen until you type another command. SPACE Updates the screen display immediately, but any SYSDPY parameters. does not change Characteristics The SYSDPY program: Destroys your core image. Requi res LOGIN. Places your terminal at user level. Example Run SYSDPY on a VT100 terminal to examine job and system statistics. SYSDPY continually scrolls through this information; you can type a command at any time to alter the display • • R SYSANS<RET> Job Who Where What 'P State Runtime This is RN212A DEC19 TRISMP 17 19,6916 114 STECO 199 RN 99:99.89 dd-mmm-yy hh:mm:ss UP:91:94:29 18 [OPR] 181 HS S ge:99.99 J4 FAL (+) 10 OV LS UPTIME CTX UUO DBL CSH 19 [OPR] 157 HB V 99:99.99 CPU9 9 47 9 99:11.36 0424 NML 11 139 9 12 29 [OPR] 0424 NETMAI 58 ED 99:99.99 CPU1 9 16 9 99:11.35 4 54 9 4 21 [OPR] 31 OPR 96 HB S 99:99.99 CPU2 (Not Running) 22 [OPR] 0424 PSTHRU 14 HB S 99:99.99 DSKI DSKO SWPI SWPO MTAI MTAO 23 [OPR] 0424 MIC 21 HS 99:99.99 CPU9 193 21 269 58 9 9 24 [OPR] 0424 MIC ge:99.99 CPU1 21 HSI 47 78 317 144 9 9 25 39,5579 129 NE'IWOR 28 "c S 99:99.99 ANF In:167 Out:787 Cor:2693 26 [OPR] 0424 DTELDR 17 HS 99:99.99 DCN In:248 OUt:199 Blk:19/89=13% 185 HS 99:9~.9~ ETH In:1178 Out:151 27 [OPR] J4 FAL Dgm: 12/2 28 1~,6926 124 RL211A 595 "c S 99:99.99 TTY In:6 Out:498 Cnk:1775/2669=67% 29 [SELF] 123 MS 326 HB 99:99.99 IPCF S:9 Out:3 W/P:9/9 126 SYSANS 24 RN+ 99:99.2~ Mem:512/1965 Shr:559 JRN:5/5/32 39 [SELF] 31 39,6993 125 D6TQ3 84 "c S 99:9~.99 Use:3952/4741 Swp:2756/39468 ASR:.24 32 1~,6~26 127 DIP 37 "c S 99:9~.99 KSYS:+1D1~:45 HDE:19 POK:41/8 33 39,5739 32 DTECO 455 TINV 99:99.26 Job:39/1~~ Det:16 34 19,6962 121 DIRECT 66 "c S 99:99.99 Struc Mnt Free Struc Mnt Free 35 19,791 J13 MACRO 137 RN 99:94.88 BLKX 19 16995 RENG 142429 2 37 19,6962 132 DTECO 123 "CNS 99:9~.99 DSKA DSKP 12 7589 295519 3 STECO 171 RN 38 19,6936 4 99:99.21 AP19 1 129165 DSKC 16 74249 ge:99.25 BLKK 52 [OPR] 115 SYSANS 19 HS+ 13 111939 DSKR 191129 1 53 [OPR] 116 OPR 96 HB S 99:99.99 DSKZ 554173 BLKY 191535 8 9 Now type the E command to SYSDPY to examine Ethernet status. type the command, it does not echo on your terminal. E 12-4 When you DISPLAYING SYSTEM STATISTICS USING SYSDPY Ethernet Status of RL226A DEC10 Development dd-mmm-yy hh:mm:ss UP:05:00:46 Chan/Kont ETH-0 NI-0 NI-l State Online Online Online Protocol 60-04 LAT 90-00 Loopback 60-02 RmtCon -Inf60-01 DNA/MOP 60-03 DECnet -Inf- State Online Onl ine Online Online Online Online Online E-Net Address AA-00-04-00-6E-IC AA-00-03-03-00-22 AA-00-03-03-00-13 Kont NI-0 NI-0 NI-0 NI-0 NI-l User System System System Job 17 Ctx 1 Job 17 Ctx 1 System Job 23 Ctx 1 Exit from SYSDPY by typing <CTRL/Z>. 12-5 DgmXmt 35048 34395 653 DgmRcv 107327 100269 7058 DgmXmt 34365 0 30 0 0 653 0 DgmRcv 97026 2 3239 0 2 7058 0 FQE 5 0 0 0 0 3 0 INDEX Accessing tapes, 1-1 Action commands, 1-1 runtime commands, 1-3 swi tches, 1-2 Active search list, 11-1 ANF network topology, 12-3 ASCII source file comparison, 4-3 Assembly listing, 3-1 AUTO files, 7-1 Backing up files, 1-1 BACKUP examples, 1-8 prompts, 1-3 Baud rate, 6-1 Binary file comparison, 4-2 files, 5-1 mode, 6-1 transfer modes, 8-3 FILCOM examples, 4-6 program, 4-1 File Access Listener (FAL) , 6-1 File transfer, 6-1 Flags in GLOB output, 5-3 GLOB example, 5-4 program, 5-1 Global symbols, 5-1 High-segment files, 4-3 Listing global symbols, 5-1 Local file transfer, 8-1 Logged-in quota, 2-1 Logged-out quota, 2-2 MACRO label, 4-4 Changing directory paths, 11-2 CI network information, 12-2 Commands to NFT, 6-4 to OPSER, 7-1 to RUNOFF, 10-1 to SETSRC, 11-2 to SYSDPY, 12-2 Comparing files, 4-1 Compressed core image files, 4-3 Creating directories, 2-1 CREDIR examples, 2-3 switches, 2-1 Cross-referenced listings, 3-1 Relocatable symbols, 5-2 Restoring files, 1-1 Running subjobs, 7-1 Data Access Protocol (DAP), 6-1 DECnet, 6-1, 12-2 Defaults for GLOB, 5-2 Directories, 2-1 Directory paths, 11-2 Disks, 9-1 Displaying system statistics, 12-1 Search lists, 2-1, 11-1 Spooled output, 3-1 Status-setting commands, 1-4 Sub-file directories (SFDS), 2-1 SWITCH.INI file, 2-2 Symbol tables, 5-1 SYSDPY versions, 12-1 System status, 12-1 Ersatz devices, 2-1 Ethernet, 12-2 FENCE, 11-1 Network File Transfer, 6-1 OPSER program, 7-1 Output from FILCOM, 4-5 from GLOB, 5-3 Passive search list, 11-1 Pseudo-terminals (PTYs), 7-1 QUOLST program, 9-1 Tape positioning, 1-7 Text formatting, 10-1 User id, 6-3 User-file directories (UFDs), 2-1, 11-1 Index-l TOPS-10 User Utilities Manual AA-09988-T8 READER'S COMMENTS NOTE: This form is for document comments only. DIGITAL will use comments submitted on this form at the company's discretion. If you require a written reply and are eligible to receive one under Software Performance Report (SPR) service, submit your comments on an SPR form. Did you find this manual understandable, usable, and well organized? Please make suggestions for improvement. Did you find errors in this manual? If so, specify the error and the page number. Please indicate the type of user jreader that you most nearly represent: [J Assembly language programmer o Higher-level language programmer [] Occasional programmer (experienced) [J User with little programming experience [J Student programmer LJ Other (please specify) Name _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ Date _________________ Organization _ _ _ _ _ _- - - - - - - - - - - - - - - - - - - - - - Street __- -________- - - - - - - - - - - - - - - - - - - - - - - - - City ~---------------------- State _ _ _ _ _ _ Zip Code _ _ __ or Country Do Not Tear - Fold Here and Tape - - - - - - - - - - - No Postage Necessary if Mailed in the United States BUSINESS REPLY MAIL FIRST CLASS PERMIT NO.33 MAYNARD MASS. POSTAGE WILL BE PAID BY ADDRESSEE SOFTWARE PUBLICATIONS 200 FOREST STREET MR01-2/L 12 MARLBOROUGH, MA 01752 III"", II, II, ••• 11 •••• 1.11.1 •• 1.1 •• 1.1 •• 11 ••••• 1.11 - - Do Not Tear - Fold Here - - - - - - - - - - - - - - - - - - - - - <IJ c: :.::l "'0 ~ ..- o ~ Q/J § :;: I:; u I
Home
Privacy and Data
Site structure and layout ©2025 Majenko Technologies