Technical data

9.12.3 Recovering Lost Files . . .................................... 9–72
9.12.4 Erasing Old Home Blocks .................................. 9–73
9.12.5 Creating a Disk Usage File ................................. 9–73
9.13 Using Mount Verification for Recovery ........................... 9–73
9.13.1 Understanding Mount Verification ............................ 9–73
9.13.2 Using Mount Verification ................................... 9–74
9.13.2.1 Enabling Mount Verification . ............................ 9–75
9.13.2.2 Controlling Timeout Periods for Mount Verification . ........... 9–75
9.13.2.3 Recovering from Offline Errors ........................... 9–75
9.13.2.4 Recovering from Write-Lock Errors ........................ 9–76
9.13.2.5 Canceling Mount Verification . ............................ 9–77
9.14 Using Interrupt Priority Level C (IPC) ........................... 9–77
9.14.1 Recalculating Quorum . .................................... 9–78
9.14.2 Canceling Mount Verification ................................ 9–79
9.14.3 Entering the Debugger. .................................... 9–80
9.15 Using the Bad Block Locator Utility to Detect Media Errors........... 9–80
10 Using Files and Directories
10.1 Understanding Extended File Specifications Features ................ 10–1
10.1.1 Using Extended File Specifications ........................... 10–2
10.1.2 Setting Users’ Expectations of Extended File Specifications ........ 10–3
10.1.2.1 New Extended File Specifications Characteristics . . ........... 10–3
10.1.2.2 ODS-2 and ODS-5 Used Together ......................... 10–5
10.1.2.3 Architecture-Related Notes . . ............................ 10–8
10.2 Controlling Access to ODS-5 Volumes ............................ 10–9
10.2.1 Preventing VAX Users from Accessing an ODS-5 Volume .......... 10–9
10.2.2 Preventing an Untested Application from Accessing an ODS-5
Volume ................................................. 10–10
10.3 Using DCL Commands with Files . . . ............................ 10–11
10.4 Getting File Information . . .................................... 10–11
10.5 Protecting Files . ............................................ 10–13
10.5.1 Understanding File Protection Concepts ....................... 10–13
10.5.2 Displaying File Ownership and Protection . . . ................... 10–14
10.5.3 Protecting Disk Files . . .................................... 10–15
10.5.3.1 Setting Default Disk File Protection ....................... 10–16
10.5.3.2 Setting Explicit Disk File Protection ....................... 10–16
10.5.3.3 Modifying Disk File Protection Characteristics ............... 10–18
10.5.3.3.1 Changing File Protection Characteristics ................. 10–18
10.5.3.3.2 Using the SET FILE Command ........................ 10–19
10.5.4 Protecting Disk Directories ................................. 10–20
10.5.4.1 Changing Directory UIC Protection Characteristics . ........... 10–21
10.5.4.2 Changing Default ACL Protection ......................... 10–21
10.5.5 Protecting Magnetic Tape Files . . ............................ 10–22
10.6 Accessing Disk Files.......................................... 10–22
10.7 Accessing Tape Files ......................................... 10–23
10.7.1 Understanding Tape File Names . ............................ 10–23
10.7.2 Locating Standard-Labeled Tape Files ......................... 10–24
10.7.3 Using Wildcard Characters with Tape Volumes .................. 10–25
10.7.4 Reading Files on Tape Volumes . . ............................ 10–26
10.7.5 Writing Files to Tape Volumes . . . ............................ 10–26
10.7.5.1 Writing New Files That Overwrite Existing Files . . ........... 10–26
10.7.5.2 Appending or Updating Files . ............................ 10–27
10.8 Copying and Transferring Files ................................. 10–28
xii