[Info-vax] Network mailbox
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Fri Oct 28 14:57:02 EDT 2011
In article <j8es32$cdd$1 at speranza.aioe.org>, Snowshoe <no at spam.please> writes:
>On 10/28/2011 2:03 PM, VAXman- @SendSpamHere.ORG wrote:
>> In article<j8eq7o$71k$1 at speranza.aioe.org>, Snowshoe<no at spam.please> writes:
>>> I am using $GET and $PUT for the DECnet connection. I suspect I am using
>>> it incorrectly somehow. The snippet of code reads data from a local
>>> mailbox and writes it (using $PUT) a remote mailbox at the other end of
>>> a DECnet link.
>>
>> That should work.
>
>Yes it should.
>
>>> Another piece of code gets messages (using $GET) from a remote mailbox
>>> via DECnet and writes it to a local mailbox.
>>
>> That too.
>>
>>
>> I just created a mailbox in DCL with the following on node QUISP::
>
><snip DCL test>
>
>I did something similar, actually reading the VAX program's output
>mailbox using DCL reads and it works fine. I even did this as a proof of
>concept to the customer engineer who wants this done.
>
>DCL knows how to talk to a mailbox over a network. I don't. How can I
>figure out exactly how DCL does it? Extremely frustrating.
Well, there's always the source listings but, for those without, SDA is a
great tool.
SDA> SET PROCESS/INDEX=<n> ; index of process with open remote mbx
SDA> SHOW PROCESS/CHANNEL
Process active channels
-----------------------
Channel CCB Window Status Device/file accessed
------- --- ------ ------ --------------------
0010 7FF7E000 00000000 $1$DKA900:
0020 7FF7E020 81784494 NET15540:
0050 7FF7E080 81647880 DSA0:[VMS$COMMON.SYSEXE]DCL.EXE;1 (section file)
0060 7FF7E0A0 8163C280 DSA0:[VMS$COMMON.SYSLIB]DCLTABLES.EXE;631 (section file)
0080 7FF7E0E0 00000000 Busy FTA201:
0090 7FF7E100 00000000 FTA201:
Total number of open channels : 6.
SDA> SHOW PROCESS/RMS=(IFAB,PIO) ; PIO because its process I/O
... go through list to find the IFB with channel => 0020 => NET15540:
IFAB Address: 7B0C2C08 IFI: 0003 Organization: Sequential
------------
PRIM_DEV: 0C0C2001 REC,NET,AVL,IDV,ODV
BKPBITS: 64480140 PPF_IMAGE,ACCESSED,WRTACC,NORECLK,PIO_FILE,DAP_OPEN,DAP <== FAB$V_SQO
BKPBITSEXT: 00000000
BLN: 4E 78. BID: 0B 11.
MODE: 01
IOS: 00000001 ASBADDR: 7B13BE80
IOS2: 0000 WAIT_Q_FLINK: 00000000
IOS4: 00000001 WAIT_Q_BLINK: 00000000
ATJNLBUF: 00000000 RU_STALL_ASB: 00000000
FSBPTR: 00000000 AGENT_MODE: 03 ACCESS_MODE: 03
SHR: 00
IRAB_LNK: 7B0C7650 CHNL: 0020
FAC: 0F PUT,GET,DEL,UPD <== FAB$L_FAC
ORGCASE: 00 Sequential <== FAB$B_ORG
LAST_FAB: 7FF8BEC0 NWA_PTR: 7B0C9E00
IFI: 8003 ECHO_ISI: 0000
FWA_PTR: 7B0C6400
BDB_FLNK: 7B0C7760 DEVBUFSIZ: 00000400 1024.
BDB_BLNK: 7B0C7760 RTDEQ: 0000
RFMORG: 03 VFC <== FAB$B_RFM
RAT: 04 PRN <== FAB$B_RAT
LRL: 0000 0. HBK_DISK: 00000000
FFB: 0000 0. EBK_DISK: 00000000
FSZ: 02 2. BKS: 00 0.
DEQ: 0000 0. MRS: 0000 0.
GBC: 0000 0.
HBK: 00000000 0.
EBK: 00000000 0.
RNS_LEN: 00000000 LOCK_BDB: 00000000
SFSB_PTR: 00000000 AVLCL: 00000001 1.
GBSB_PTR: 00000000
PAR_LOCK_ID: 00000000 FILE_LOCK_MODE: 00 UNOWNED
AS_DEV: 0C0C2001 BLBFLNK: 00000000
ASDEVBSIZ: 00000100 BLBBLNK: 00000000
GS_STARTVA: 00000000 GS_ENDVA: 00000000
GBH_PTR: 00000000 AI_JFB: 00000000
BI_JFB: 00000000 AT_JFB: 00000000
JOURNAL: 00 0. BUFFER_OFFSET: 0000 0.
RU_ACTIVE: 00 0.
RUFB_LNK: 00000000 RU_HANDLE: 00000000
ATJNLBUF: 00000000 JNLBDB: 00000000
JNLFLG: 00
RECVRFLGS: 00
JNLFLG2: 00
EXTJNLBUF: 00000000 RLB_FL_FLINK: 7B0C2C74
BDB_REUSE_CNT: 00000000 RLB_FL_BLINK: 7B0C2C74
RECORD_CNT: 0000000000000000 DATA_BYTES: 0000000000000000
RESERVED1: 00000000 RESERVED2: 00000000
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
All your spirit rack abuses, come to haunt you back by day.
All your Byzantine excuses, given time, given you away.
More information about the Info-vax
mailing list