[Info-vax] Network mailbox

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Fri Oct 28 18:33:19 EDT 2011


In article <j8f4td$5f9$1 at speranza.aioe.org>, Snowshoe <no at spam.please> writes:
>Very interesting.  I get the same results for a channel created via 
>OPEN/READ/WRITE X REMOTE::MBA1234: but for the program's read mailbox 
>channel I see this:
>
>PRIM_DEV:       0C0C2001        REC,NET,AVL,IDV,ODV
>BKPBITS:        60410100        ACCESSED,SQO,NORECLK,DAP_OPEN,DAP
>BKPBITSEXT:     00000000
>BLN:            5C      92.             BID:            0B      11.
>MODE:           03
>IOS:            00000001                ASBADDR:        7B005DD0
>IOS2:           0000                    WAIT_Q_FLINK:   00000000
>IOS4:           000005B3                WAIT_Q_BLINK:   00000000
>ATJNLBUF:       00000000                RU_STALL_ASB:   00000000
>FSBPTR:         00000000        AGENT_MODE:     03      ACCESS_MODE:    03
>SHR:            00
>IRAB_LNK:       7AFC1480                CHNL:           0100
>FAC:            02      GET
>ORGCASE:        00              Sequential
>LAST_FAB:       00020000                NWA_PTR:        7AFC3C00
>IFI:            0001                    ECHO_ISI:       0000
>FWA_PTR:        7AFC0200
>BDB_FLNK:       7AFC1800                DEVBUFSIZ:      00001200    4608.
>BDB_BLNK:       7AFC1800                RTDEQ:          0000
>RFMORG:         03              VFC
>RAT:            04              PRN
>LRL:            0000           0.       HBK_DISK:       00000000
>FFB:            0000           0.       EBK_DISK:       00000000
>FSZ:            02             2.       BKS:            00             0.
>DEQ:            0000           0.       MRS:            0000           0.
>GBC16:          0000                   0.
>GBC32:          00000000               0.
>RECATTR_FLAGS:  00
>HBK:            00000000              0.
>EBK:            00000000              0.
>USED_BLKS:      00000000                USED_BKTS:      00000000
>GBC_RQST:       00000000              0.
>RNS_LEN:        00000000                LOCK_BDB:       00000000
>SFSB_PTR:       00000000                AVLCL:          00000001 
>        1.
>GBSB_PTR:       00000000
>PAR_LOCK_ID:    00000000                FILE_LOCK_MODE: 00 
>UNOWNED
>AS_DEV:         0C0C2001                BLBFLNK:        00000000
>ASDEVBSIZ:      00000100                BLBBLNK:        00000000
>GS_STARTVA:     0000000000000000        GS_ENDVA:       0000000000000000
>GBH_PTR:        0000000000000000        GS_RQST_SZ:     0000000000000000
>AI_JFB:         00000000                BI_JFB:         00000000
>JOURNAL:        00             0.       BUFFER_OFFSET:  0000           0.
>RU_ACTIVE:      00             0.
>RUFB_LNK:       00000000                RU_HANDLE:      00000000
>ATJNLBUF:       00000000                JNLBDB:         00000000
>JNLFLG:         00
>RECVRFLGS:      00
>JNLFLG2:        00
>EXTJNLBUF:      00000000                RLB_FL_FLINK:   7AFC0074
>BDB_REUSE_CNT:  00000000                RLB_FL_BLINK:   7AFC0074
>RECORD_CNT:     0000000000000000        DATA_BYTES:     0000000000000000
>RESERVED1:      00000000                RESERVED2:      00000000
>
>SHOW PROCESS/RMS=(IFAB,PIO) doesn't find it at all but SHOW 
------------------------^^^
PIO will get you process permanent structures (ie.DCL). For program/image
structures, leave off the PIO.


>PROCESS/RMS=(IFAB) does.  That must be a clue.  I'm not so strong with 
>RMS but I guess I know what I will be studying this weekend.

-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

All your spirit rack abuses, come to haunt you back by day.
All your Byzantine excuses, given time, given you away.



More information about the Info-vax mailing list