[Info-vax] Network mailbox

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Fri Oct 28 14:57:02 EDT 2011


In article <j8es32$cdd$1 at speranza.aioe.org>, Snowshoe <no at spam.please> writes:
>On 10/28/2011 2:03 PM, VAXman- @SendSpamHere.ORG wrote:
>> In article<j8eq7o$71k$1 at speranza.aioe.org>, Snowshoe<no at spam.please>  writes:
>>> I am using $GET and $PUT for the DECnet connection. I suspect I am using
>>> it incorrectly somehow.  The snippet of code reads data from a local
>>> mailbox and writes it (using $PUT) a remote mailbox at the other end of
>>> a DECnet link.
>>
>> That should work.
>
>Yes it should.
>
>>> Another piece of code gets messages (using $GET) from a remote mailbox
>>> via DECnet and writes it to a local mailbox.
>>
>> That too.
>>
>>
>> I just created a mailbox in DCL with the following on node QUISP::
>
><snip DCL test>
>
>I did something similar, actually reading the VAX program's output 
>mailbox using DCL reads and it works fine. I even did this as a proof of 
>concept to the customer engineer who wants this done.
>
>DCL knows how to talk to a mailbox over a network. I don't. How can I 
>figure out exactly how DCL does it? Extremely frustrating.


Well, there's always the source listings but, for those without, SDA is a
great tool.

SDA> SET PROCESS/INDEX=<n>	; index of process with open remote mbx
SDA> SHOW PROCESS/CHANNEL
                            Process active channels
                            -----------------------

Channel    CCB     Window     Status    Device/file accessed
-------    ---     ------     ------    --------------------
  0010  7FF7E000  00000000              $1$DKA900:
  0020  7FF7E020  81784494              NET15540:
  0050  7FF7E080  81647880              DSA0:[VMS$COMMON.SYSEXE]DCL.EXE;1 (section file)
  0060  7FF7E0A0  8163C280              DSA0:[VMS$COMMON.SYSLIB]DCLTABLES.EXE;631 (section file)
  0080  7FF7E0E0  00000000  Busy        FTA201:
  0090  7FF7E100  00000000              FTA201:

  Total number of open channels : 6.

SDA> SHOW PROCESS/RMS=(IFAB,PIO) ; PIO because its process I/O
... go through list to find the IFB with channel => 0020 => NET15540:
IFAB Address: 7B0C2C08  IFI: 0003       Organization: Sequential
------------


PRIM_DEV:       0C0C2001        REC,NET,AVL,IDV,ODV
BKPBITS:        64480140        PPF_IMAGE,ACCESSED,WRTACC,NORECLK,PIO_FILE,DAP_OPEN,DAP <== FAB$V_SQO
BKPBITSEXT:     00000000
BLN:            4E      78.             BID:            0B      11.
MODE:           01
IOS:            00000001                ASBADDR:        7B13BE80
IOS2:           0000                    WAIT_Q_FLINK:   00000000
IOS4:           00000001                WAIT_Q_BLINK:   00000000
ATJNLBUF:       00000000                RU_STALL_ASB:   00000000
FSBPTR:         00000000        AGENT_MODE:     03      ACCESS_MODE:    03
SHR:            00
IRAB_LNK:       7B0C7650                CHNL:           0020
FAC:            0F      PUT,GET,DEL,UPD                                    <== FAB$L_FAC
ORGCASE:        00              Sequential                                 <== FAB$B_ORG
LAST_FAB:       7FF8BEC0                NWA_PTR:        7B0C9E00
IFI:            8003                    ECHO_ISI:       0000
FWA_PTR:        7B0C6400
BDB_FLNK:       7B0C7760                DEVBUFSIZ:      00000400    1024.
BDB_BLNK:       7B0C7760                RTDEQ:          0000
RFMORG:         03              VFC                                        <== FAB$B_RFM
RAT:            04              PRN                                        <== FAB$B_RAT
LRL:            0000           0.       HBK_DISK:       00000000
FFB:            0000           0.       EBK_DISK:       00000000
FSZ:            02             2.       BKS:            00             0.
DEQ:            0000           0.       MRS:            0000           0.
GBC:            0000           0.
HBK:            00000000              0.
EBK:            00000000              0.
RNS_LEN:        00000000                LOCK_BDB:       00000000
SFSB_PTR:       00000000                AVLCL:          00000001               1.
GBSB_PTR:       00000000
PAR_LOCK_ID:    00000000                FILE_LOCK_MODE: 00              UNOWNED
AS_DEV:         0C0C2001                BLBFLNK:        00000000
ASDEVBSIZ:      00000100                BLBBLNK:        00000000
GS_STARTVA:     00000000                GS_ENDVA:       00000000
GBH_PTR:        00000000                AI_JFB:         00000000
BI_JFB:         00000000                AT_JFB:         00000000
JOURNAL:        00             0.       BUFFER_OFFSET:  0000           0.
RU_ACTIVE:      00             0.
RUFB_LNK:       00000000                RU_HANDLE:      00000000
ATJNLBUF:       00000000                JNLBDB:         00000000
JNLFLG:         00
RECVRFLGS:      00
JNLFLG2:        00
EXTJNLBUF:      00000000                RLB_FL_FLINK:   7B0C2C74
BDB_REUSE_CNT:  00000000                RLB_FL_BLINK:   7B0C2C74
RECORD_CNT:     0000000000000000        DATA_BYTES:     0000000000000000
RESERVED1:      00000000                RESERVED2:      00000000

-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

All your spirit rack abuses, come to haunt you back by day.
All your Byzantine excuses, given time, given you away.



More information about the Info-vax mailing list