TOAD -1 System Installation and Operation Manual for TOPS{20 SYSTEMS CORPORATION special purpose computer design, manufacturing, and sales 8420 154th Avenue NE Redmond, Washington 98052 (206) 869-9050 FAX: (206) 861-7863 DISCLAIMER This draft document is still changing. As of the date of publication below, the information included matches the way the system operates. Subsequent changes may invalidate parts of this manual. All material contained herein is proprietary to XKL Systems Corporation.
Copyright c 1995, 1996 XKL Systems Corporation. This document contains information which is protected by copyright. All rights are reserved. Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowed under the copyright laws. Restricted Rights Legend. Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.
iii Notice: The TOAD -1 System has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the (U.S.) FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructional manual, may cause harmful interference to radio communications.
iv
v Preface The TOAD -1 System Installation and Operation Manual for TOPS{20 describes the procedures for installing a new TOAD -1 System and customizing it to a particular network environment. This manual also brie y describes how to manage and operate the system, including such topics as generating tailored Galaxy software. In several places in this document, nouns (e.g., boot) are used as verbs and vice versa. This is done for conciseness at the expense of Standard English usage.
vi Chapter 5 Chapter 6 Appendix A Appendix B Appendix C Appendix D Appendix E of TOPS{20 for your network environment, the creation of login accounts for users, and the creation of le{storage directories. This chapter also discusses security considerations in the network environment, and the con guration of printers on the network. Additional materials are found in TOPS{20 System Manager's Guide .
vii TOPS{20 User's Guide provides an overview of the TOPS{20 system and its general capabil- ities. This guide is online in USERS.MEM. TOPS{20 Commands Reference Manual documents the commands handled by the TOPS{20 Exec. The online version is in COMMANDS.MEM. TOPS{20 User Utilities Guide, which documents the the programs Mail, Rdmail, Filcom, Cref, Maklib, Dumper, and Please. Of these, the documentation for Dumper is most relevent to the procedures in this Installation Manual.
viii characters you typed and to complete the command for you. If TOPS{20 recognizes the characters you typed, it completes as much of the command as it can this is called command recognition . When it cannot print any more, or does not recognize the characters you typed as part of a valid command, TOPS{20 rings the terminal bell (nowdays, this is generally a beep or similar noise) and waits for you to type additional characters.
ix This example shows that when you type \?", TOPS{20 tells you what kind of parameter the program wants to see. It then retypes your command, up to the point where you typed the question mark, and it awaits your further input. If you type accurately, the command lines shown in this manual will be accepted and interpreted correctly by TOPS{20. If you choose, you can use input recognition.
x Table 0.1: Typographical Conventions Symbol Ret Esc @ @@ ! !! $ ^X Typewriter Font Typewriter Font ^X Italic Font Spaces Small Caps fXjYjZg . . . Indicates The \Return" or \Enter" key. The \Escape", \ESC", \ALT", \ALTMODE", or \PREFIX" key. The TOPS{20 Exec program's prompt character as represented in this manual. Your actual prompt may di er, as the prompt can be set by each user. As delivered, your system will prompt with \Host@". The Exec's subcommand prompt.
xi Revision History 4 December 1995 to Present This revision list has been created and added to the manual. Class A warning has been added to the frontmatter and chapter 1. Language describing the emergency power o connection was changed. The installation procedure for the XTU{1 has been added. The chapter on Galaxy has been added. The frontmatter has been expanded. Figures depicting the machine and the 16{bit to 8{bit converter were added.
xii
CONTENTS xiii Contents Preface Revision History 1 Site Preparation 1.1 Electrical 1.1.1 Power Connection 1.1.2 Emergency Power O Connection 1.2 Air Conditioning 1.3 Network Environment 1.3.1 Terminal Server 1.3.2 Network Printer 1.
CONTENTS xiv 2.5.3 XNI -1 Ethernet Controller 2.5.4 XMG -1 Memory : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 3 Starting the System 3.1 Initial Boot 3.2 Other Boot Operations 3.3 Abnormal Conditions 3.3.1 Board Swapping 3.3.2 Backplane Swapping 3.3.
CONTENTS xv 5.7 Other Periodic Tasks 5.7.1 Accounting Data 5.7.2 The BS: directory 5.7.3 The SERR:ERROR.SYS le : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 6 Running the TOPS{20 UETP Package 6.1 Obtaining a Tape Drive 6.1.1 Systems without Tape Drive Allocation 6.1.
CONTENTS xvi A.19 Dumping on Non{fatal System Errors A.20 Disabling the Console Terminal for Operator Output A.21 Enabling the Access Control Program A.22 Setting Console Terminal Parameters A.23 Commands not Supported in the TOAD -1 System A.23.1 Assigning MSCP{served Disk Drives A.23.2 Cluster Data Gathering A.23.2.1 Cluster Information A.23.2.2 Cluster Sendalls A.23.3 The Magtape Command A.23.4 The Printer Command A.
1 Chapter 1 Site Preparation This chapter describes the requirements at the location where the TOAD -1 System is to be installed. 1.1 Electrical The two electrical requirements are that power be supplied to the system and, if the system is to be installed in a computer room, that a means be provided to disconnect electrical power (including battery power) from the system. 1.1.1 Power Connection The TOAD -1 System can be powered from either 110 VAC 20A or 220 VAC 10A, 50{60 Hz.
CHAPTER 1. SITE PREPARATION 2 the supply and output circuits of Uninterruptible Power Supply (UPS) systems installed within the computer room the disconnecting means shall disconnect the battery from its load1. When the TOAD -1 System is installed in a computer room, it must be attached to the Disconnecting Means. The back panel contains a connector for this purpose. That connector should be wired in parallel with any other devices that are connected to the EPO circuit (110/220VAC).
1.3. NETWORK ENVIRONMENT 3 1.3 Network Environment 1.3.1 Terminal Server The TOAD -1 System is designed to be part of a networked computing environment. Consequently, (nearly) all terminal connections to the system are virtual terminals, or TCP connections. These may originate in several ways: from another computer that supports TCP/IP, from a network terminal, or from a terminal server which provides TCP/IP support for RS{232 devices that do not have that capability.
CHAPTER 1. SITE PREPARATION 4 1.4 Radio Interference Notice: The TOAD -1 System has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the (U.S.) FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
5 Chapter 2 Physical Set Up This chapter describes how to unpack your TOAD -1 System and connect it to the world. You should receive the following items, depending on what you have ordered: The system main chassis, in a crate a xed to a pallet. The battery, in a shipping carton. Software, Manuals, and sundries. This carton contains the software (one DAT tape), one blank DAT tape, manuals (including this one), the system power cord (appropriate to your country), and the EPO cable.
CHAPTER 2. PHYSICAL SET UP 6 To unpack the system, remove all 5/16 inch bolts (ratchet driver and 1/2 inch socket) that hold the top and sides of the exterior packing box together. This will expose the interior packing crate, resting on the shipping pallet. Slide the crate o the pallet. Disassemble the interior packing crate by cutting the plastic strapping. This will leave you with a nice, shiny TOAD -1 System. Move the system cabinet to its nal position.
2.2. ASSEMBLY 7 Figure 2.
8 CHAPTER 2. PHYSICAL SET UP Facing the back of the machine (where the power cord attaches), the battery compartment is behind the perforated cover panel that occupies the right two{thirds of the lower section of the machine (to the right of the panel with the main AC breaker and power inlet). Remove the screws that secure the back cover panel remove the cover panel. Refer to Figure 2.1 which depicts the system with the battery compartment open.
2.4. EXTERNAL DEVICE CONNECTIONS 9 (and recharging power to) the battery. If this breaker is left o , the battery will not be available to keep the system running when line power fails, nor will the battery recharge. This breaker is tripped by an EPO event (see below) it must be reset manually after an EPO event. 2.3.2 Emergency Power O Provided the system is properly connected into a computer room Emergency Power O (EPO) circuit, as described in Section 1.1.
CHAPTER 2. PHYSICAL SET UP 10 Pin 1 2 3 4 7 8 20 22 Function Console Aux Frame Ground TxD (from XKL -1) RxD (to XKL -1) RTS (from XKL -1) Signal Ground CD (to XKL -1) DTR (from XKL -1) RI (to XKL -1) ? ? ? ? ? ? ? ? ? ? ? ? Table 2.1: RS{232 Connector Pin Assignment The auxiliary terminal port functions only when it is enabled by a console command see Section 4.3. 2.4.
2.4. EXTERNAL DEVICE CONNECTIONS 11 connector. (Beware: this connector is also used in many SCSI{1 applications, but most SCSI{1 cables are single{ended and these will not work properly with di erential SCSI devices.) To make the transition between di erent connectors and di erent bus widths, XKL has available an adapter box (XKL part number 30008{00001), which may be secured to the rear panel of the system cabinet.
CHAPTER 2. PHYSICAL SET UP 12 Figure 2.
2.4. EXTERNAL DEVICE CONNECTIONS 13 than the 68{pin connector.) Slide the \ear" of the converter box under the loosened screw, replace the screw that was removed, and tighten both screws. Attach the tape drive to the SCSI bus as follows: use the short 16{bit di erential SCSI cable from an XRH -1 port3 to the converter box. Use the long 8{bit di erential SCSI cable from the converter box to the tape.
CHAPTER 2. PHYSICAL SET UP 14 peripherals ordered from XKL, to be added to an existing system, will come with appropriate directions. 2.4.4 Network Four independent connections to the IEEE 802.3 standard Ethernet are supported on each XNI -1. Each connection can be made via twisted pair (10{Base{T) or via an AUI device. The AUI connection is used when a port is connected to a Media Access Unit (MAU) either directly or with an AUI cable.
2.5. INDICATOR LAMPS AND JUMPERS 15 2.5.1 XKL -1 Processor Above each RS{232 port connector is a green lamp that is turned on when that port is activated. The indicator for the console port will normally be on. The indicator for the auxiliary console port will be on only when that port is activated see Section 4.3. In the lower part of the XKL -1 module board cover, a single red lamp, labeled \Fault", indicates the occurrence of a microcode or private memory (MemA) parity error.
16 CHAPTER 2. PHYSICAL SET UP 2.5.3 XNI -1 Ethernet Controller The red \Fault" lamp indicates a microcode parity error on the XNI -1. If it blinks continuously or stays on, the module is faulty. Each port is decorated with 5 lamps to indicate the status of that port. These lamps all turn on brie y when power is applied and when the operating system resets the controller. On each port, the \Link Pol" lamp should be on.
17 Chapter 3 Starting the System This chapter describes what you should see on the console terminal when rst starting a TOAD -1 System. Console commands , i.e., commands that can be typed on the console and auxiliary console only, to boot the operating system are described. Before turning the power on, be sure that the installation steps described in Chapter 2 have been completed. Connect a console terminal to the TOAD -1 System's console port, and turn on the console terminal.
CHAPTER 3. STARTING THE SYSTEM 18 Tape MTA0: 3./ 8. : Direct Access "SEAGATE ", "ST15150W ", "0017" Serial number: 00658476 Structure PS:(BS), 0. of 1. unit Begin AUTO-BOOT delay, type ^C to abort or any other key to proceed now] Note: The memory testing takes about 5 minutes (for each 32 M word module). As long as the program displays the \spinner", which is a succession of characters that appear to spin, progress is being made.
3.1. INITIAL BOOT 19 If there is no auto{boot structure, you must specify a structure name in the Boot command.1 If there is no bootable structure at all, you can boot from tape, by supplying an explicit boot target (e.g., mta0:) The le to be booted must be the next one on the tape (usually the rst). If the auto{boot process is allowed to continue, the typeout will look similar to that depicted below. The underlined portions represent responses that you must type on the terminal.
CHAPTER 3. STARTING THE SYSTEM 20 Enter the date and time in the form \mm-dd-yy hhmm" or as shown in the example. Type Ret to tell TOPS{20 to go on. TOPS{20 will repeat the date back to you and ask for con rmation. If you have entered the correct date, type \Y" and Ret otherwise, type \N" and Ret and TOPS{20 will ask for the date and time again.
3.1.
CHAPTER 3. STARTING THE SYSTEM 22 Once the system comes up to this point, you can log in as Operator. Type to start the Exec the Exec will print a brief banner line and prompt with the \@" character. Type the Login command: @login operator xkl-toad Ret As you type this command, the initial password, xkl{toad , will not echo to the output your terminal should look like the following: Your TOAD from XKL, TOPS-20 Monitor 7(102113)-1 @login operator End of COMAND.CMD.
3.3. ABNORMAL CONDITIONS 23 For some console commands, the TOPS{20 system must be stopped. Such commands, if attempted at the XKL-1> prompt, will result in an error message in that case, the running program (TOPS{20) can be stopped by the command: XKL-1>Halt XKL-1 Ret Once the program is stopped, all console commands are possible.
24 CHAPTER 3. STARTING THE SYSTEM In this case, the best thing to do is to change the ID ROM on the backplane. Otherwise, boot the system by manually specifying the structure from which to boot. As TOPS{20 starts, it will be unable to nd the right structure automatically, so it will ask for a structure name. When TOPS{20 is running, use the CheckD program to rede ne the auto{boot system ID for your boot structure see Appendix C. 3.3.3 Disk Structure Problems See Section 5.3, page 41.
25 Chapter 4 System Administration This chapter covers some of the most important aspects of customizing TOPS{20 to serve your user community. Topics covered include the con guration of TOPS{20 for your network environment, the creation of login accounts for users, and the creation of le{storage directories. This chapter also discusses security considerations in the network environment, and the con guration of printers on the network. 4.1 Con guring TOPS{20 4.1.
CHAPTER 4. SYSTEM ADMINISTRATION 26 the next time the system is rebooted. These les are generally protected from being changed by unprivileged users. Thus, to e ect the changes described below, you must be use a privileged user name, e.g., Operator, and have the privileges active, via the Exec command: @enable ! Note that after you use the Enable command, the Exec changes its prompt character from \@" to \!". The di erent prompt helps to remind you that whatever privileges you have are now active.
4.1. CONFIGURING TOPS{20 27 BS:MONNAM.TXT This le contains one line of text that begins the announcement text output to a terminal when it rst connects to the system.
CHAPTER 4. SYSTEM ADMINISTRATION 28 separate le so that they can be invoked at need, without the overhead of a full startup via the SYSTEM.CMD le. BS:LOGIN.CMD This le contains commands that are executed on behalf of each job at the time it is logged in. These commands take e ect before any commands in the user's LOGIN.CMD or COMAND.CMD les, described in Section 4.2. BS:COMAND.
4.1. CONFIGURING TOPS{20 29 nea#0, 198.55.36.131, ethernet, logical-network-mask:255.255.255.0, packet-size:1500, preferred nea#1, 192.94.202.40, ethernet, logical-network-mask:255.255.255.240, packet-size:1500, preferred nea#2, 192.94.202.230, ethernet, logical-network-mask:255.255.255.240, packet-size:1500, preferred Changes may be made to this le while the system is running.
CHAPTER 4. SYSTEM ADMINISTRATION 30 4.2 Users, Directories, and Accounts A user is a person. A person gains access to TOPS{20 through the Exec program's Login command. In Login, the user identi es himself or herself by supplying a user{name and a password. Once logged{in, a user has a job which is connected to a directory . A directory is a repository for les. A user{name is a name, assigned to the user by the system administrator, which identi es the login directory for the user.
4.2. USERS, DIRECTORIES, AND ACCOUNTS 31 The commands in LOGIN.CMD are processed only when a user logs in the commands in this le should have job{wide application. Commands in COMAND.CMD are processed at login (after LOGIN.CMD) and any time a new Exec command interpreter program is started. In cases where a user should no longer be allowed to use a directory to log in, use the Build command to add the frozen attribute to the directory.
CHAPTER 4. SYSTEM ADMINISTRATION 32 directories) to which it should be delivered. The details of how to do this are covered in the documentation on the particular mailer being used. 4.2.4 De ning Directories As noted in the previous section, a directory is a repository for les. In many installations, shared data is stored in les that do not belong to any individual user. Such les may be stored in les{only directories.
4.4. SECURITY CONSIDERATIONS 33 The auxiliary port may be turned on only through the console port it may be turned o from either port. Both the Define and Set commands apply immediately they di er in that the state established by the Define command persists (and is re{established) after a power shutdown. Thus, in installations where the auxiliary port is to be active at all times, the console command: XKL-1%Define auxiliary-port on Ret should be given.
CHAPTER 4. SYSTEM ADMINISTRATION 34 4.4.2 Security Procedures Other ways to reduce the threat of unauthorized access to the system and to data on it are: Change the password for Operator. This user{name, de ned on all TOPS{20 systems, is a well{known point of attack. The default password for this directory is likewise well{known thus, anyone might attempt a Telnet connection to a TOAD -1 System, and log in.
4.5. NETWORK PRINTERS 35 these commands can leak information about logged{in user{names or system data to an unauthorized person.4 If this level of leakage is unacceptable, the next defense is to permit only authorized incoming Telnet connections, and deny all others.
CHAPTER 4. SYSTEM ADMINISTRATION 36 Public Net LL LL Auth-1 Island Net Auth-2 LL LL Host-a Host-b Host-c Private Net Host-d Figure 4.
4.5. NETWORK PRINTERS 37 4.5.1 Printing on a Printer Attached to a Terminal Server To print on a printer attached to a terminal server, you need to have a copy of the Lptspl spooler running for each local printer queue that accesses it. This usually is achieved by running enough copies of Lptspl under one job controlled by Sysjob. De ne a system{wide logical name LAZPTn : with the value TCP:.
CHAPTER 4. SYSTEM ADMINISTRATION 38 both times ensures that the printer knows that a new job is starting, even if the preceding one terminated abnormally or came from some other system that did not observe these niceties. 4.5.2 Printing to a Remote Printer Queue or a Networked Printer To print to a remote printer queue, or to print to a printer directly attached to the network,6 you need to have a copy of the Tcpspl spooler running for each local printer queue that accesses it.
39 Chapter 5 System Operation This chapter describes some of the tasks that are required occasionally: shutting down timesharing, rebooting, rebooting for stand{alone operation le system tasks: creating a le structure, creating directories, backing up a le structure, checking le system consistency, rebuilding a le system from a back up tape, and formatting a disk. Further, tape back up policies are described, as are a set of periodic tasks. 5.
CHAPTER 5. SYSTEM OPERATION 40 5.2 Booting the System The usual boot process is accomplished by typing the console command: XKL-1%Boot Ret The Boot command loads an executable le into memory and starts the program. By default, i.e., in the absence of parameters, the Boot command loads the le MONITR.EXE from the auto{boot structure. The default le name, i.e., the le name that Boot uses when none is speci ed in the command, can be changed.
5.3. FILE SYSTEM 41 XKL-1%boot /start:+3 Ret Using default string: ""] Structure PS:] Directory ] Directory ] File PS:MONITR.EXE.1] Loading .................] File entry vector is at 1,,161, length is 5] PDVA at 1,,141077] Filled through LPN 2126] Starting at 1,,164] KDDT DBUGSW/ 0 2 Ret Type \DBUGSW", slash, \2" and 161 Esc g PS mounted] . . . The Esc will echo as \$". press Return. This procedure sets the debugging ag to 2 and starts TOPS{20.
CHAPTER 5. SYSTEM OPERATION 42 Arguing for multiple small structures is the notion that each is independent, each can be backed up independently, and the failure of one does not mean the loss of data on the others. In favor of large structures is the idea that one structure is easier to allocate and to manage than several. A new disk structure is created using the CheckD program. If your disk(s) is(are) not yet formatted, see Section 5.3.8.
5.3. FILE SYSTEM 43 5.3.2 Creating Directories As mentioned in Section 4.2.1, the Exec command Build is used to create or change a directory. For directories that are to be used only for data storage (not used as login accounts), the attribute les{only should be set during the Build operation. 5.3.3 File and Directory Protection Every le and directory has a protection number that tells exactly who can do what to that le or directory.
CHAPTER 5. SYSTEM OPERATION 44 To display the protections of your les, use the Vdirectory (verbose directory) command, or the command with the Protection subcommand.
5.3. FILE SYSTEM 45 Figure 5.1: .MIC File for System Back Up @rewind mta0: @set tape format high-density @copy bs:monitr.exe mta0: page 40 Do not use Save: see Section 5.2, @copy system:exec.exe mta0: @copy sys:dluser.exe mta0: @dluser *structure ps: *dump ps-dluser.dat *exit @copy ps-dluser.dat mta0: @copy sys:dumper.exe mta0: @set tape format core-dump @dumper *tape mta0: *ssname PS: Back Up *save ps:<*>*.*.* ps:<*>*.*.* *rewind *exit @kmic 5.3.
CHAPTER 5. SYSTEM OPERATION 46 for Dluser, which contains the directory structure information fth, the Dumper program, which can restore data into those directories sixth and last, Dumper's saveset which contains the data. The procedure outlined above is most appropriate for the boot structure. Other structures can be backed up using the same procedure, or, for structures other than the boot structure, the copies of the \.
5.3. FILE SYSTEM 47 Does the structure have good home blocks? The console command: XKL-1%Show home-blocks Ret will display the structure name if the home blocks are good. If the home blocks are bad, you probably need to rebuild the entire structure. If the structure has good home blocks, can you boot, i.e., load an operating system, from the structure? If you can, then the and directories are intact.
CHAPTER 5. SYSTEM OPERATION 48 By answering \no" to this question, you avoid the path that wipes out the entire structure (which is the path to take when rebuilding from tape). Instead, the system will ask about other tasks it could perform relating to the system structure (i.e., the boot structure). After mounting the system structure, TOPS{20 will continue the dialogue by asking Reconstruct ROOT-DIRECTORY? and Rebuild Bit Table? Either question accepts a \yes" or \no" response.
5.3. FILE SYSTEM 49 , and . 4. The system swapping space (the area allocated for the movement, by the monitor, of pages between memory and disk). Note See the TOPS{20 System Manager's Guide for a detailed explanation of all the above. Later, you will reload data into the newly{initialized system from tape. If you decide to rebuild a structure, you need two things: a crash{recovery tape, and the details of where the target disk is attached.
CHAPTER 5. SYSTEM OPERATION 50 XKL-1%rewind mta0: Ret XKL-1%boot mta0:/start:+1 Ret Using tape MTA0: at 2./0./3./0.] Loading .................] File entry vector is at 1,,161, length is 5] PDVA at 1,,141077] Filled through LPN 2125] Starting at 1,,162] For additional information type "?" to any of the following questions.] Do you want to replace the file system on the system structure? To create the system structure, type \YES" and Ret .
5.3. FILE SYSTEM 51 If you collected data previously via the console command: XKL-1%Show Configuration Mass Ret you will have to translate \slot" and \bus" to a TOPS{20 channel number this is explained in Section 5.3.1, page 42.
CHAPTER 5. SYSTEM OPERATION 52 The default swapping space is 100000 pages. This re ects the growth of programs due to extended addressing and the use of high{level languages, the expanded memory capacity of the system, and the desire for more simultaneous users. It can be reduced cautiously. It can be expanded to about 250000. We recommend that you take the default.
5.3. FILE SYSTEM 53 At this point the new structure has been de ned, initialized, and mounted. TOPS{20 is running, but there are no les on the disk. If the disk unit is freshly formatted, TOPS{20 will complain that there are no BAT blocks. If this happens, respond \Yes" and Ret . ? PS unit 0 has no BAT blocks.
CHAPTER 5. SYSTEM OPERATION 54 Why reload? 6-Oct-95 13:20:00 BUGINF: NOADDR - Failed to find SYSTEM:INTERNET.ADDRESS file Job: 0, User: OPERATOR 6-Oct-95 13:20:00 BUGINF: NOHSTN - Failed to find host names SYSTEM:HOSTS.TXT Job: 0, User: OPERATOR New Build new structure Ret Problem with ACCOUNTS-TABLE.
5.3. FILE SYSTEM 55 @ You are now logged in as Operator, a privileged user{name. Enable the privileges, so that you will be able to write les on other directories. You have already read the rst two les from the tape. (Those were the monitor and the Exec.) The third le is the executable image of the Dluser program. We shall run Dluser from tape and rebuild the structure's directories according to the data found in the fourth tape le.
CHAPTER 5. SYSTEM OPERATION 56 The next stage of reconstructing the disk is to use Dumper to restore all the les from the crash{ recovery tape. Dumper is rather particular about the names of the les it will restore: it needs to be told the structure name from which the data were saved and, if di erent, the name of the structure onto which they are to be restored. If you don't know the name of the structure from which the data were saved, the name \DSK*:" will match any name.
5.3. FILE SYSTEM !makdmp 57 Ret MAKDMP>create bs:dump.exe 32 Mwords MAKDMP>exit ! Ret Ret Note If at some future time, you add more main memory to the system, please recreate the DUMP.EXE le, sized to accomodate the additional memory. Various system services were missing from the disk when the system was started consequently, they are not running. It is generally a good idea to shut the system down (see Section 5.1, page 39) and reboot before going much further.
CHAPTER 5. SYSTEM OPERATION 58 Use the console command: XKL-1%format slot bus target Ret to begin the format process.6 The format command will proceed through a dialogue to be sure that you have the right disk. For the high{capacity disks that XKL supplies, the formatting operation can take more than an hour, during which the system won't do anything else. Following the rst format phase (called \hard format"), the second format operation (\soft format") will happen automatically.
5.5. TAPE HANDLING 59 5.5 Tape Handling To read industry{standard tapes, the TOAD -1 System can be ordered with the XTU{1 nine{track tape subsystem. Many sites will have such tapes that archive data of considerable age. XKL recommends that this data be transferred to new DAT (or DLT) cartridges, for several reasons: 1. To make sure that the data can still be read from the archive tapes. 2. To capture the archival data on a more robust and more compact medium. 3. To reduce the volume of archive storage.
CHAPTER 5. SYSTEM OPERATION 60 5.7 Other Periodic Tasks This section describes some tasks that should be performed periodically. 5.7.1 Accounting Data TOPS{20 collects accounting data from which the system manager can determine which users are consuming CPU and related resources. Data is recorded in BS:SYSTEM-DATA.BIN, the accounting le, for such events as log in, log out, printing, checkpoints, and system reloads. Data is logged to the accounting le via the USAGE JSYS.
5.7. OTHER PERIODIC TASKS 61 The le ORION-SYSTEM.LOG is the current log le for the program Orion. This le contains a log of system reloads, etc. The les ORION-SYSTEM-LOG.nnn are old versions of Orion's log. Generally, they have no intrinsic value: they are a record of requests to the operator and operator responses. Sometimes problems in queue management can be discovered and corrected by reference to this log. A new log is started when the CLOSE LOG command is given in the Opr program. 5.7.
62 CHAPTER 5.
63 Chapter 6 Running the TOPS{20 UETP Package This chapter describes how to run the User Environment Test Package (Uetp). This program performs a cursory check of the system. Uetp starts a number of tests that can run either once or repeatedly. The source les are kept in the directory , while the temporary data les and results of the tests are stored in the directory . For more information on Uetp, see the User Environment Test Package Reference Manual .
CHAPTER 6. RUNNING THE TOPS{20 UETP PACKAGE 64 6.1.
6.1. OBTAINING A TAPE DRIVE MTA3: 65 AVR: Yes, Write: Yes, Unlabeled Unloaded AVR: Yes OPR> Before mounting the tape, you should rst make a free drive unavailable to timesharing users. Use the command: OPR>SET TAPE-DRIVE MTAn : UNAVAILABLE Ret to do this, where n represents the unit number of an unloaded unit.
CHAPTER 6. RUNNING THE TOPS{20 UETP PACKAGE 66 !assign mta0: ! Ret Error: If the device is assigned to another job, the system prints the message: ?MTA0: Already assigned to job Go nd a di erent drive that is unloaded. n 6.1.3 Using a Logical Name for the Tape Drive This section is optional. You may consider following this procedure if the tape unit that you are using is not MTA0:. Most of this manual is written as though the tape unit that you are using is MTA0:.
6.2. RUNNING THE STANDARD TESTS 67 . End of SET-UP.CMD.1 ! Connect to the directory that contains the standard tests: !Connect PS: ! Ret To start the Uetp program, use the Run command. The program prints the prompt \UETP>": !RUN UETP.EXE dd-mmm-yy UETP> Ret hh:mm:ss User Environment Test Package ] Error: If Uetp stops with the message \?You must have IPCF privileges ...", use the Exec's BUILD command to add the IPCF capability to your directory.
68 CHAPTER 6. RUNNING THE TOPS{20 UETP PACKAGE MTA0 VER Enabled 0:15 START VERIFY hh:mm:ss END VERIFY hh:mm:ss 0 0 0 Note If any messages appear between the \Start" message and the \End" message, there are errors in the les you received. Do not proceed any further. The last two messages signify the beginning and ending of the test. If the rst test (VERIFY) nishes without error, go on.
6.3. RUNNING OPTIONAL TESTS START START START END END END RANCBL RANFOR MTA2 RANCBL RANFOR MTA2 69 hh:mm:ss hh:mm:ss hh:mm:ss hh:mm:ss hh:mm:ss hh:mm:ss If messages other than those shown in the example appear, the tests generating the messages have failed.
CHAPTER 6. RUNNING THE TOPS{20 UETP PACKAGE 70 UETP>Enable FORTRA Ret hh:mm:ss ENABLE COMPLETED] UETP> 2. Type an Enable command for each product you wish to test. 3. Type the Begin command to start the tests: Ret UETP>Begin hh:mm:ss UETP> BEGIN COMPLETED] The Begin command starts the standard tests and all the optional software tests you enabled. The Uetp starts all the tests immediately.
6.4. DELETING TEMPORARY DIRECTORIES RANCBL VER RANFOR VER MTA2 VER Ended Ended Ended 0:15 0:15 0:15 1 1 1 0 0 0 71 0 0 0 dd-mmm-yy hh:mm:ss dd-mmm-yy hh:mm:ss dd-mmm-yy hh:mm:ss Note that all tests are reported as \Ended". To exit from the Uetp program, type the Exit command. The Exec prints its enabled prompt \!": UETP>Exit ! Ret Error: If you try to exit while there are tests still running, Uetp will print the message %You still have tests running. "ABORT ALL" before exiting.
CHAPTER 6. RUNNING THE TOPS{20 UETP PACKAGE 72 If your system uses tape drive allocation, return the tape drive to the pool of allocatable units.
6.5. RELEASE THE TAPE DRIVE 73 Table 6.
74 CHAPTER 6.
75 Appendix A 7{CONFIG.CMD Commands This appendix describes the system con guration command le, SYSTEM:7-CONFIG.CMD, giving a detailed list of the con guration commands and their parameters. This appendix describes how to declare the system name, change the system defaults for system devices, accounting, performance improvements, scheduler controls, le archiving and migration, and control other system functions.
APPENDIX A. 7{CONFIG.CMD COMMANDS 76 System level messages Network information File archiving and migration O -line structures Memory dumps Cluster data gathering MSCP-served disk drives The le can include comments. Comments are preceded by the exclamation point \!" character and they continue through the end of the line. Your system comes with a sample BS:7-SETSPD.CMD le which you should edit to adapt to your site's requirements. A.
A.3. DEFINING MAGNETIC TAPE LOGICAL UNIT NUMBERS 77 TOPS{20: Edit, a line{oriented editor, and TV, a screen{oriented editor. If you want users to use, e.g., the TV program, replace the existing de nition of EDITOR: by the command line: DEFINE EDITOR: SYS:TV.EXE in the con guration command le. By de ning the logical name EDITOR: for their own jobs, users can override your choice of default editor, as long as the editor they specify is available at your installation.
APPENDIX A. 7{CONFIG.CMD COMMANDS 78 Figure A.
A.4. DEFINING THE LOCAL TIME ZONE 79 Notes A unit serial number is a 10{character string. Be sure to enter all ten characters, including leading or trailing blanks, if needed. In the example above, the serial number of the disk, unit 5 on channel 0, is \00050221 ", which includes two trailing blank spaces. The maker and model string in the command parameter must be 24 characters. You must put blank spaces in the parameter precisely where they appear in the Sysdpy screen.
APPENDIX A. 7{CONFIG.CMD COMMANDS 80 Automatic Off On Change at the time now prescribed by law in the USA. Turn on DST at the rst Sunday in April and return to standard time at the last Sunday in October. This is the most convenient option in most states of the USA (excepting Arizona, Hawaii, and parts of Indiana), subject to the whims of Congress. Do not do DST conversions. Use this option if DST is never observed, or during Standard Time in countries where the \Automatic" algorithm does not apply.
A.7. ACCOUNT VALIDATION 81 Note If the default is taken, users are allowed to change some of their directory parameters with the Exec's @SET DIRECTORY ... commands. A.7 Account Validation You have the option of requiring all users to enter a valid account name when they are logging in to the system. If you decide to require valid accounts, you must remove the command: DISABLE ACCOUNT-VALIDATION from the con guration le absent that command, the system will default to enable account validation.
APPENDIX A. 7{CONFIG.CMD COMMANDS 82 Note You should enable working set swapping only if your system runs large compute{bound jobs. However, if your system runs many interactive jobs or if you are unsure which description better ts your system, take the default: DISABLE WORKING-SET-PRELOADING Preloading the working{set is more helpful in systems that have small main memory con gurations. This is not likely the case in a TOAD -1 System. A.
A.9. SCHEDULER CONTROLS 83 BATCH-BACKGROUND to the con guration command le. This command speci es that all batch jobs run on the lowest priority queue, also known as background queue. This means that after processing all interactive jobs, the scheduler selects and runs batch jobs waiting in the queue. Do not use this command if you enable the class scheduler. A.9.3 Class Scheduling You can use class scheduling to divide your system's CPU time among di erent classes of jobs.
APPENDIX A. 7{CONFIG.CMD COMMANDS 84 The commands shown in the following example divide 75% of the system's CPU time among three classes of jobs. For example, the command CREATE 1 .20 speci es that jobs running under accounts in class 1 are to be given a total of 20% of your system's CPU time. You must supply the correct class numbers and percentages for your own system. CREATE 1 .20 CREATE 2 .40 CREATE 3 .
A.11. TAPE DRIVE ALLOCATION 85 A.10.1 Archive Tape Recycle Period TOPS{20 provides a feature that allows o {line storage of selected les on magnetic tape for long periods of time. You can specify how long these les are to be saved by inserting a command into the con guration command le stating, in days, the recycle period of the tapes. For example, to save archival les on tape for ve years, you would enter the command: ARCHIVE-TAPE-RECYCLE-PERIOD 1825 (because 5 years at 365 days/year is 1825 days).
APPENDIX A. 7{CONFIG.CMD COMMANDS 86 to the con guration command le. If you do not give this command, the system will treat improperly mounted labeled tapes as unlabeled tapes it will continue processing them. That is, the system default is TAPE-RECOGNITION-ERRORS REGARD-AS-UNLABELED A.12 Accounting Shift Changes The accounting facility allows you to provide varied billing rates for system use at di erent times.
A.14. NETWORK INFORMATION 87 The level 1 messages are System name going down in....] Shutdown canceled] Deleted les will be expunged from system structure in 30 seconds] System structure expunge completed] To allow the system to send either type of message to users, add the command Enable for each type. The Disable command will prevent the system from sending either type of message.
APPENDIX A. 7{CONFIG.CMD COMMANDS 88 This is the default (with a timeout interval of one minute). You need only to enter a command in the con guration command le if you want to change the timeout interval (between 1 and 15 minutes) or to turn the o {line structure facility o . The command to turn o the o {line structures facility is Disable Offline-Structures . This example shows how to change the o -line structures timeout interval to ve minutes: Enable Offline-Structures 05:00 A.
A.17. PREVENTING FAST LOGIN 89 A.17 Preventing Fast Login By using the /FAST switch with the LOGIN command, users can bypass processing of the LOGIN.CMD and COMAND.CMD les, which may be set up to limit users' computing environments. For example, sets of users may be allowed only to read mail or run some particular application program. You can prevent fast logins by entering the command: DISABLE FAST-LOGIN-OPTION in the con guration command le. Fast login is in e ect by default.
APPENDIX A. 7{CONFIG.CMD COMMANDS 90 A.18.3 Disallowing Certain Passwords You can make certain combinations of characters illegal for use as passwords. Perhaps they would be too easily guessed by an intruder. You can place such words in the le SYSTEM:PASSWORD.DICTIONARY and have them automatically matched against newly supplied passwords. See the TOPS{20 System Manager's Guide for details on how to setup the le.
A.20. DISABLING THE CONSOLE TERMINAL FOR OPERATOR OUTPUT 91 A.20 Disabling the Console Terminal for Operator Output The Enable Job0-CTY-Output command is in e ect by default. It allows the operator to receive messages at the console terminal about system resources, such as when disk space is low on the system structure or when swapping space is low. If you do not want these messages to be displayed on the console terminal, put the command: Disable Job0-CTY-Output in the con guration command le. A.
APPENDIX A. 7{CONFIG.CMD COMMANDS 92 You can specify that input on the console terminal is to be ignored when the line is inactive. When input is being ignored and characters are typed, no (bell) is sent, as is the normal case when characters are typed on an inactive line. The command is TERMINAL 0 NOBELL (Other keywords are recognized in the TERMINAL command, but they have no de ned e ect in the TOAD -1 System.) A.
A.23. COMMANDS NOT SUPPORTED IN THE TOAD -1 SYSTEM 93 The Dontcare command speci es that no coordination is needed for the speci ed drive. Enter the Allow command for each disk drive to be served by MSCP. The commands shown are only examples: you must determine the correct de nitions for your system. ALLOW ALLOW RP06 RP20 1243 3327 A.23.2 Cluster Data Gathering Note Clusters are releated to CFS, Common File System, and are not implemented in the TOAD -1 System.
APPENDIX A. 7{CONFIG.CMD COMMANDS 94 ENABLE CLUSTER-SENDALLS However, if you decide not to receive cluster sendalls, you must enter the command: DISABLE CLUSTER-SENDALLS in the con guration command le. (This feature is not totally turned o , since Galaxy components are allowed to perform cluster sendalls when necessary.) A.23.3 The Magtape Command The command Magtape, in DEC's TOPS{20 implementations, performs a function analogous to the SCSI-Tape command.
A.24. RUNNING SETSPD INTERACTIVELY DONTCARE EXIT NODE RESTRICT TAPE-RECOGNITION-ERRORS TERMINAL 7-SETSPD$Daylight On Ret 7-SETSPD$exit TOED:< >! ENABLE MAGTAPE PRINTER SCSI-TAPE TAPE-RECYCLE-PERIOD TIMEZONE Ret Note Some commands recognized by Setspd are not implemented in the TOAD -1 System version of TOPS{20. Among these are commands pertaining to CFS (the Common File Server) and MSCP (the Mass Storage Control Protocol).
96 APPENDIX A. 7{CONFIG.
97 Appendix B OPR Commands This appendix describes the commands available in the Opr program. The Opr program is the general operator interface to TOPS{20. Queues for printing and batch processing are managed through this interface. Service requests, from users or from the programs they run, are satis ed by operator intervention and response via this program. Abort this command allows you to terminate a job request which is in progress on an input or output device or in a batch stream.
APPENDIX B. OPR COMMANDS 98 Backspace allows you to reprint previously output pages in the le currently printing on the line printer. OPR>BACKSPACE PRINTER Cancel /Pages: Ret number of pages allows you to cancel any job request that is processing or is waiting to be processed, or any mount request for a tape or disk structure.
99 Enter f Tape-drives j tape drive name : g Class-scheduling /Class-assignments: fAccount j Policy-programg Class-scheduling /Windfall: f Allocated j Withheld g Automatic-volume-recognition File-retrieval-waits Logging Output-display Queue-requests fAll j Batch j File j Mount j NCP j Printer j Userg allows you to enter an alternative command processor for an application type. application type Ret where application type must be de ned by the Galgen program.
APPENDIX B. OPR COMMANDS 100 Push allows you to leave Opr command level and enter (a new) TOPS{20 Exec command level. You must give the Exec's POP command to return to Opr command level. Ret OPR>PUSH Release allows you to release a job request that was held with the Hold command. Report OPR>RELEASE keyword f request id j user name j * g Ret Batch-jobs Printer-jobs allows you to make journal entries into the system error le.
101 Show Scheduler Structure structure name : tape drive name : Tape-drive Terminal allows you to display various types of information as de ned by the available keywords.
APPENDIX B. OPR COMMANDS 102 Take allows you to execute a series of OPR commands from a speci ed command le.
103 Appendix C CheckD Commands The CheckD program is used for a variety of bookkeeping chores related to the maintenance of TOPS{20 le systems. This annotated listing of the command set o ers some indications of how the commands are actually used to maintain and change the con guration of the le storage system. Check the bit table or the directories on a disk structure. The check bit table function can be performed only for a structure that is mounted for the exclusive use of CheckD.
APPENDIX C. CHECKD COMMANDS 104 Con gure permits the user to change the setting of particular CheckD variables. These variables control di erent aspects of CheckD's function. The value of these variables can be displayed with the show configuration command. CheckD>Configure feature f on j offg where \feature" is one of the following: Create allows entries to be deleted as well as added in BAT{edit mode. Otherwise, entries may only be added.
105 { Dismount halt-on-dump-errors If both this ag and Read{Parameters are set, TDBoot will not reboot the system unless the memory dump of a crashed system can be completed. data-cache causes the system to use the XRH -1 write data cache for this structure. do-not-care allows the system to mount this structure, even if an unknown system has a direct access path to it. Otherwise, the system will not mount a structure if it can be accessed by an unknown system.
APPENDIX C. CHECKD COMMANDS 106 Push Read invokes a command interpreter (i.e., the Exec). To get back into CheckD, the Exec command is pop. reads structure (or unit) information from special regions of the disk. Data is read from the speci ed unit or from all units of the speci ed structure and translated to human{readable form.
107 Set properties of a mounted structure. In contrast to the Define command, Set changes the properties immediately, but does not change them permanently. CheckD>Set Show Ret dismount-in-progress Set or clear the \dismount in progress" state. While a structure is marked \dismount in progress", any request to increment the structure mount count will be denied. domestic Set or clear domestic status of structure. regulated Set (clear) regulation for this structure.
108 APPENDIX C.
109 Appendix D TOPS{20 Start Up Operations This appendix documents the general order in which TOPS{20 initializes itself and system services. The second section describes system variables that control various facilities. D.1 TOPS{20 Initialization Initialize system memory, establish memory maps, the CSTs, the other sections needed for the operating system. Locate and mount the system structure.
APPENDIX D. TOPS{20 START UP OPERATIONS 110 Call SERINI to initialize SERR:ERROR.SYS Call MNTINI to read the le SYSTEM:INTERNET.ADDRESS and initialize the multi{net device. MNTINI also reads SYSTEM:HOSTS.TXT, unless the debugging ag, DBUGSW, contains the value 2 or more, in which case MNTINI reads SYSTEM:HOSTS.DEBUG instead. Call INTINI to read SYSTEM:INTERNET.GATEWAYS and initialize processing of Internet Protocol (IP). TOPS{20 then runs SYSTEM:n -SETSPD.
D.2. TOPS{20 SYSTEM VARIABLES 111 { Proceed with normal CHKR duties. Fork 0 becomes the DDMP fork. D.2 TOPS{20 System Variables The following system variables a ect the overall behavior of TOPS{20. These can be changed by patching2 BS:MONITR.EXE and rebooting, or they can be changed at boot time by entering KDDT before the system starts (see Section 5.2.1). DBUGSW =0 Normal 6= 0 Keep KDDT locked down (i.e., present in memory). Breakpoint on BUGHLT. Don't release fork lock after timeout.
112 APPENDIX D.
113 Appendix E Generating a Tailored Batch and Spooling System This appendix describes how to generate a TOPS{20 batch and spooling (Galaxy) system speci cally tailored for your installation. To do this, you must have already installed a standard Release 6 Galaxy system. The standard Galaxy system is satisfactory for most sites. However, you can use the steps in this appendix if you need to generate a Galaxy system having di erent parameters from the standard one.
114 5. 6. 7. 8. APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM Copy all the old Galaxy les from their current area (usually SYSTEM:) to some other area. Copy all the new Galaxy les from the build area to SYSTEM:. Start up the components of the new Galaxy system. Delete the .EXE les of the old Galaxy system when the new batch system is operating correctly. If you want to be cautious, you can save the old .EXE les on tape or in a backup directory. You may delete the Galaxy source les.
E.1. RESTORING THE GALAXY SOURCE FILES 115 Obtain a tape drive by following the procedure described in Section 6.1. Create directories to hold the Galaxy source les. Although you can give the directories any name, it will be easiest to use the names , , and because these are the names of the directories on tape. If the directories and do not already exist, they must be built also.
APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM 116 The \Preserve" subcommand allows the subdirectory to be created without regard for the superior directory's disk quota or subdirectory quota. If it does not already exist, build the directory : !Build Ret The system displays either \ New]" if the directory does not already exist, or \ Old]" if the directory exists. The subcommand prompt, \!!" follows.
E.1. RESTORING THE GALAXY SOURCE FILES 117 If it does not already exist, build the directory : !Build Ret The system displays either \ New]" if the directory does not already exist, or \ Old]" if the directory exists. The subcommand prompt, \!!" follows. If the system displays \ Old]", type to stop the build process: the directory already exists. Otherwise, create it.
118 APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM DUMPER>Tape MTA0: Ret DUMPER>Account system-default DUMPER> Ret To restore the Galaxy sources, type the Restore command shown below. If you are restoring to a structure other than PS:, use the name of that structure where \PS:" appears in the Restore command that follows: DUMPER>Restore DSK*:*.*.* PS:<*>*.*.* Saveset "SHIP: BOOT TAPE" 18-Mar-96 1400 Loading files into PS: Loading files into PS:
E.1. RESTORING THE GALAXY SOURCE FILES !Unload MTA0: 119 Ret The tape drive unloads the tape onto the source reel. You can now remove the Ship tape from the tape drive. After you unload the tape from the drive, return the tape drive to the pool of available resources by following the procedure described in Section 6.5, page 71. E.1.2 Verify To verify that you have restored all the source les for Galaxy type the command: !Information disk-usage
120 APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM E.2 Running the GALGEN Program Run the Galgen program to create the Galaxy con guration le, PS:GALCNF.MAC, which will contain the parameters describing the tailored Galaxy system you are building. Be sure you run Galgen Version 6, which is the latest version. Connect to the build area: !Connect ! Ret Type Galgen and press Ret .
E.2. RUNNING THE GALGEN PROGRAM 121 You have the option of a long dialogue, in which Galgen explains the choices it o ers you, or a short one, in which only the choices themselves are displayed. If you are an experienced user of Galgen, you may want the short dialogue, which is faster in this case, press the Ret key and skip ahead. To request the long dialogue with Galgen, type LONG and press the Ret key.
122 APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM Operator log filename(3-20 Characters) OPERATOR-SYSTEM] Ret Users can specify a priority for their batch and spooling requests with the /PRIORITY switch. The allowable values on this parameter range between 1 (representing lowest priority) and 63 (representing the highest). The following two questions relate to this switch. The first question requests the maximum priority which may be specified by a non-privileged user.
E.2.
124 APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM The batch user can specify a maximum runtime for his batch job using the /TIME switch. If he does not specify this switch, the following default will be used: Default batch job runtime limit(5-9999 seconds) 300] Ret Every batch job has maximum limits for each type of spooled output. These limits can be set by the batch user with appropriate switches to the SUBMIT command.
E.2. RUNNING THE GALGEN PROGRAM Number of file header pages(0-5) 2] 125 Ret The user can specify a special form for a print request with the /FORMS switch. If this switch is not specified, the following default will be used. Name for standard output forms(4-6 Characters) NORMAL] Ret The number of characters that uniquely identify a form is compared with the current form name to determine if a forms change is required for a specific user request.
126 APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM with the remote node when in fact it does not. Do you want NEBULA ACK/RESPONSE ACK messages enabled?(YES,NO) NO] Ret Miscellaneous Defaults and Parameters ------------- -------- --- ---------The questions in this section refer to general GALAXY parameters. The following section establishes default bias and disk spooler unit conversion factors.
E.3. ASSEMBLING THE NEW GALAXY SYSTEM SJ SJ SJ SJ SJ SJ SJ ! 0: 0: 0: 0: 0: 0: 0: 15:20:48 Batch-Stream 1 -- Started -- 15:20:48 OPR> 15:20:49 Batch-Stream 2 -- Started -- 127 Batch-Stream 0 -- Begin -Job GALAXY Req #170 for OPERATOR Error: If the le GALAXY.CTL cannot be found, it may be because you neglected to !Take If so, do the Take now resubmit the batch request. Batch.
128 APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM E.4 Shutting Down the Old GALAXY System Once you have checked the .LOG les to be sure that no errors occurred during the build procedure, you are ready to stop all old Galaxy programs and start the new ones. Perform the following steps to do so.
E.4.
APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM 130 !^ Espeak Ret Please type SYSJOB commands - end with ^Z] You should stop all the components referenced in the SYSTEM:SYSJOB.RUN le. You should also stop Batcon, which normally runs as a separate job under Sysjob. Follow the example to stop the Galaxy components.
E.5. STARTING UP THE NEW GALAXY SYSTEM !Build PS: New] !! Ret ! 131 Ret This creates a directory with default characteristics, after which you return to TOPS{20 command level. Now copy the old Galaxy components to the newly{built directory: !COPY SYSTEM:QUASAR.EXE PS:* Ret PS:QUASAR.EXE.1 => PS:QUASAR.EXE.1 OK] ! Repeat the Copy command as many times as necessary to copy all the les of our present Galaxy system into PS:.
APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM 132 Note If you restored the Galaxy source les to a directory other than PS:, use that directory name in the following steps. Copy the QUASAR.EXE component of the new Galaxy system into the system area: !COPY PS:QUASAR.EXE PS:QUASAR.EXE PS:QUASAR.EXE.1 => PS:QUASAR.EXE.
E.5.
134 APPENDIX E. GENERATING A TAILORED BATCH AND SPOOLING SYSTEM OPR>Show Status Ret OPR> 16:54:57 -- System Device Status -Batch-Stream Status: Strm Status ---- --------------0 Idle 1 Idle 2 Idle Printer Status: Unit Status ---- --------------0 Idle OPR> To end the OPR program, type the Exit command: OPR>Exit ! Ret E.6 Making Your New GALAXY System Permanent Once your new system is successfully running, you may want to delete all the les from PS:
E.6. MAKING YOUR NEW GALAXY SYSTEM PERMANENT Note If your Galaxy les are in a directory other than PS:, use that directory name in place of \PS:" in the Delete command.
136 APPENDIX E.
137 Appendix F TDBOOT Command Summary The contents of this appendix have been created mechanically from the online help texts contained within the TDBoot program. Hopefully, this approach encourages the accuracy and completeness of both this printed form and the online help texts. Because this is automatically generated, the typographical conventions used in this appendix vary slightly from those found elsewhere in this manual. This appendix re ects TDBoot Version 3.1(111)-1. F.
APPENDIX F. TDBOOT COMMAND SUMMARY 138 If no argument is speci ed, the default boot string is used (see the \DEFINE BOOT" command). If no structure, node, \#", \MTAnnn:", or operating system tape speci er is speci ed, a TOPS{20 structure is located whose AUTOMATIC{ STARTUP parameter has been set to this system's ID number. If none is found, the TOPS{10 structure with the name beginning with \DSK" and the lowest letter \x" (starting at \A") is used.
F.1. MACRO{CONSOLE COMMANDS 139 Enable caching of loaded pages. This switch implies /CST. The cachable bit is set in all CST entries. Do not use this option if the loaded program uses direct I/O between system memory and the XRH or XNI unless the program clears the appropriate cachable bits in the CST rst. This switch must be speci ed with the rst program loaded into memory. /CST When loading the program into memory, create a CST.
APPENDIX F. TDBOOT COMMAND SUMMARY 140 /REWIND Rewind the SCSI device before performing the requested operation. /START:address After loading the speci ed program, start it at the address supplied. If the address begins with a \+" is is interpreted as an entry{vector o set. /W CLEAR \/W" is a synonym for \/REWIND", provided for backwards compatibility. Clear various system variables. CLEAR ADDRESS-BREAK Clear any address break set for the current program. CLEAR CACHE Clear CPU cache.
F.1. MACRO{CONSOLE COMMANDS 141 of PMOVEM even though it is slower. Use this if you think there are problems with the pager. Paging will automatically be disabled if the PAGER{TEST startup parameter is disabled, or if there were initialization errors. Since using the cache requires using the pager, caching is implicitly disabled if paging is disabled. CLEAR NVRAM Clear entire saved system con guration and reinitialize. C ONTINUE] address] DAYTIME DDT DEFINE Resume running an interrupted program.
APPENDIX F. TDBOOT COMMAND SUMMARY 142 nonvolatile RAM. DEFINE DAYLIGHT-SAVINGS De ne the default daylight savings handling. When the processor is intialized, this value is copied into dynamic storage (same as the \SET DAYLIGHT{SAVINGS" command). This value is saved in nonvolatile RAM. DEFINE DAYLIGHT-SAVINGS ALWAYS Always process date and time with daylight savings time in e ect. This may be useful if the AUTOMATIC setting is not appropriate for your site.
F.1. MACRO{CONSOLE COMMANDS 143 mal delay time in seconds (range 0{255). This value is used for multi{processor synchronization. This value is saved in nonvolatile RAM. DEFINE TIMEZONE hh:mm De ne the local timezone as the speci ed number of decimal hours and minutes di erent from Greenwich. The value may be between {12:00 and 12:00 inclusive. Timezones west of Greenwich are negative, while timezones east of Greenwich are positive.
APPENDIX F. TDBOOT COMMAND SUMMARY 144 D EPOSIT] PC address Set the current program counter. The argument is the address at which to continue program execution. Care should be used when manipulating the program counter, because this may adversely a ect program operation. D EPOSIT] REGISTER n data Write data into the current{context registers. The rst argument is an octal register number (0{17). The second argument is the data to be written to the register.
F.1. MACRO{CONSOLE COMMANDS 145 only for disk devices. The path for a TOPS{20 disk has the following format: str:
name.typ.gen Any unspeci ed le elds are default from the following le speci cation: MONITR.EXE.* The path for a TOPS{10 structure has the following format: str:name.ext p,pn,sub] Any unspeci ed le elds are default from the following le speci cation: SYSTEM.EXE 1,4] /CREATION Print date and time of creation for each le. /LENGTH Print length for each le.APPENDIX F. TDBOOT COMMAND SUMMARY 146 DUMP path The syntax of the path argument to the DUMP command is the same as for the BOOT command. The default DUMP string is speci ed via the DEFINE DUMP command. If a structure is used, the remaining le elds are defaulted from the following le speci cation for TOPS{20: DUMP.EXE.0 or the following le speci cation for TOPS{10: CRASH.EXE 1,4] DUMP switches Switches should be entered after all other arguments.
F.1. MACRO{CONSOLE COMMANDS 147 \/W" is a synonym for \/REWIND", provided for backwards compatibility. ENABLE Enable various system startup parameters. Provide a list of parameter names separated by commas. ENABLE AUTO-BOOT The AUTO{BOOT startup parameter. If this paramenter is enabled at startup, after a short delay (see DEFINE AUTO{BOOT{DELAY), the system will attempt to boot automatically using the defaults set up via the DEFINE BOOT command. ENABLE BUS-POLL The BUS{POLL startup parameter.
APPENDIX F. TDBOOT COMMAND SUMMARY 148 ENABLE TEST-MEMORY The TEST{MEMORY startup parameter. If this parameter is enabled at startup, the system will perform a diagnostic check of the system memory. Prior to other testing, the static memory tests are performed (see TEST MEMORY/STATIC). If the PAGER{TEST and CACHE{TEST parameters are enabled, then the combined tests are performed (see TEST MEMORY/COMBINED). ENABLE * This is a simple abbreviation used to ENABLE or DISABLE all startup parameters.
F.1. MACRO{CONSOLE COMMANDS 149 E XAMINE] MASS-STORAGE slot COMMUNICATIONS-REGION Print the contents of the mass{storage controller communications region register. The optional argument speci es an o set (0{7) in the communications region whose contents is printed as well. E XAMINE] MASS-STORAGE slot DRAM Print the contents of the speci ed DRAM address of the speci ed mass{ storage controller. The next argument is the address of the entry to read in the mass{storage controller DRAM.
APPENDIX F. TDBOOT COMMAND SUMMARY 150 E XAMINE] NETWORK slot STATUS Print the contents of the status register of the speci ed network controller. E XAMINE] NEXT n] Print the logically next value of the preceding EXAMINE or DEPOSIT command, whichever was most recent. The optional argument is a decimal repeat count. This is the default if no arguments are speci ed after the EXAMINE command. E XAMINE] NVRAM address Print the contents of the speci ed byte in the nonvolatile RAM.
F.1. MACRO{CONSOLE COMMANDS 151 user virtual address. The /DETAIL switch prints the details of the virtual address resolution. /DETAIL Include a detailed printout of the virtual address resolution process while preforming the requested operation. This is useful for determining the source of a page fault or other error when referencing the speci ed virtual address. E XAMINE] * EXIT FORMAT Examine the macro PC, ags, context, PI, and current register block. Resume running an interrupted program.
APPENDIX F. TDBOOT COMMAND SUMMARY 152 /TYPE:keyword Select a speci c format algorithm. The following algorithms are available: GENERIC HP SEAGATE Default format algorithm Algorithm applied to Hewlett{Packard drives Algorithm applied to Seagate drives GET path] H ALT] HELP INTERRUPT LIST GET is an alternate name for the LOAD command. Stop the currently running program. Certain commands are allowed only when the program is halted. The program may be resumed using the CONTINUE command.
F.1. MACRO{CONSOLE COMMANDS 153 LIST PARAMETERS Print the saved parameter settings stored in nonvolatile RAM. LIST SCSI-IDS Print the static SCSI target ID number for each SCSI bus on each mass{storage controller in the system stored in nonvolatile RAM. LIST SYNC-DELAY Print the synchronization delay in seconds for this processor stored in nonvolatile RAM. LIST TIMEZONE Print the static local TIMEZONE value stored in nonvolatile RAM.
APPENDIX F. TDBOOT COMMAND SUMMARY 154 Shut down the speci ed mass{storage controllers. The mass{storage controllers will attempt to complete all outstanding requests and ush their caches back to disk. RESET BUS Reset all bus devices except this CPU. /HARD Reset the speci ed device(s) in a hard manner. A hard reset may not wait for data transfers to be completed, and thus could discard data destined for the disk or network. /SHUTDOWN Shut down the speci ed mass{storage controllers.
F.1. MACRO{CONSOLE COMMANDS 155 /HARD Reset the speci ed device(s) in a hard manner. A hard reset may not wait for data transfers to be completed, and thus could discard data destined for the disk or network. /SHUTDOWN Shut down the speci ed mass{storage controllers. The mass{storage controllers will attempt to complete all outstanding requests and ush their caches back to disk. RESET MEMORY Reset only memories.
APPENDIX F. TDBOOT COMMAND SUMMARY 156 are speci ed after the RESET command. /HARD Reset the speci ed device(s) in a hard manner. A hard reset may not wait for data transfers to be completed, and thus could discard data destined for the disk or network. /SHUTDOWN Shut down the speci ed mass{storage controllers. The mass{storage controllers will attempt to complete all outstanding requests and ush their caches back to disk.
F.1. MACRO{CONSOLE COMMANDS 157 Check the CPU cache for data patterns. The rst argument is the search data to be matched against any cache data entry. The optional second argument is the mask to be anded with the cache data entry before comparing it to the search data. If the second argument is not speci ed, it defaults to all ones. SCAN CACHE ERRORS Check the CPU cache memory for errors.
APPENDIX F. TDBOOT COMMAND SUMMARY 158 to be matched against any pager data entry. The optional second argument is the mask to be anded with the pager data entry before comparing it to the search data. If the second argument is not speci ed, it defaults to all ones. SCAN PAGER ERRORS Check the CPU pager for errors. Each pager line and set is examined and any pager data or tag parity, or both pager sets match errors are printed.
F.1. MACRO{CONSOLE COMMANDS 159 /USER Select an address break when the speci ed address is accessed in user mode. /WRITE Select an address break when data is written to the speci ed address. SET CONFIGURATION Explicitly con gure various parts of the machine. SET CONFIGURATION slot The \slot" argument is a decimal slot number (0{15) indicating the single slot to con gure. That slot will be polled and the results saved in the dynamic con guration database for that slot.
APPENDIX F. TDBOOT COMMAND SUMMARY 160 memory accesses even though they are slower. Use this if you think there are problems with the cache. Caching will automatically be disabled if the CACHE{TEST startup parameter is disabled, or if there were initialization errors. Since using the cache requires using the pager, caching is implicitly disabled if paging is disabled (PAGER{TEST is disabled, or /NOPAGING was speci ed). /NOCLEAR Disable clearing memory after con guration and testing.
F.1. MACRO{CONSOLE COMMANDS 161 SET CONFIGURATION * Perform the default system con guration which includes the BUS, MEMORY, and MASS{STORAGE. This is the default if no arguments are speci ed after the SET CONFIGURATION command. SET DAYLIGHT-SAVINGS Set default daylight savings handling. SET DAYLIGHT-SAVINGS ALWAYS Always process date and time with daylight savings time in e ect. This may be useful if the AUTOMATIC setting is not appropriate for your site.
APPENDIX F. TDBOOT COMMAND SUMMARY 162 SHOW ADDRESS-BREAK Print the contents of the program address break register. SHOW AUXILIARY-PORT Print the current state of the auxiliary terminal port. SHOW CAPACITY This command prints the capacity of all or selected direct{access devices. This is similar to the \SHOW CONFIGURATION MASS{STORAGE ... /CAPACITY" command, except that it includes only direct{access devices.
F.1. MACRO{CONSOLE COMMANDS 163 SHOW CONFIGURATION MASS-STORAGE Show only the con guration of mass{storage controllers. SHOW CONFIGURATION MASS-STORAGE arguments The following arguments may be used to include a subset of the mass{ storage devices: slot bus target{id The \slot" argument speci es a mass{storage controller, the \bus" argument speci es a SCSI bus, and the \id" argument speci es a SCSI target id number. All arguments are in decimal.
APPENDIX F. TDBOOT COMMAND SUMMARY 164 Show only the con guration of network controllers. SHOW CONFIGURATION NETWORK arguments The following arguments may be used to include a subset of the network ports: slot port The \slot" argument speci es a network controller, and the \port" argument speci es a network port. A missing argument or \*" will select all slots or ports corresponding to the argument. SHOW CONFIGURATION NETWORK switches Switches should be entered after all other arguments.
F.1. MACRO{CONSOLE COMMANDS 165 devices: slot bus target{id The \slot" argument speci es a mass{storage controller, the \bus" argument speci es a SCSI bus, and the \id" argument speci es a SCSI target id number. All arguments are in decimal. A missing argument or \*" will select all slots, buses, or ids corresponding to the argument. SHOW MEMORY-STATUS slot] Print all or selected memory status.
APPENDIX F. TDBOOT COMMAND SUMMARY 166 default, all executive pages (those mapped via the EPT) will be printed. /EXEC Limit information printout to executive pages (those mapped via the EPT). /NOPAGE-INFO Suppress printout of information on pages in each section. With this switch, only information about sections is printed. /SECTION:n Limit printout to the speci ed section. The argument is an octal section number (0{7776). /USER Limit information printout to user pages (those mapped via the UPT).
F.1. MACRO{CONSOLE COMMANDS 167 context are zeroed before starting, which starts in EXEC mode. If you do not wish the ags and context to be zeroed, consider using the \DEPOSIT FLAGS n " and \CONTINUE pc " commands. The optional switch /DEBUG will set CF%DBG in the control ags (WCTRLF/RCTRLF), and can be used to tell a program (such as the monitor) to run in debug mode. Perform testing of speci c processor components and/or devices. A slot number or a keyword may be entered.
APPENDIX F. TDBOOT COMMAND SUMMARY 168 /QUIET Suppress informational output during testing. You will still get output if an error occurs. /SAMPLES:n The argument speci es the number of samples to take before computing average and variance. The default value is 100. TEST MASS-STORAGE Perform the mass{storage controller tests on all or selected mass{storage controllers and SCSI devices.
F.1. MACRO{CONSOLE COMMANDS 169 /ENDING-OFFSET:n Specify the ending word o set to use for data transfers. The argument is the o set backward from the end of the cache line of the last word to transfer (e.g., /ENDING{OFFSET:7 would transfer only the rst word of the cache line at the end of the transfer). This can be used to test transfers which end in the middle of a cache line. /FLOATING-ZEROS Test using a oating{zeros data pattern. /FLOATING-ONES Test using a oating{ones data pattern.
APPENDIX F. TDBOOT COMMAND SUMMARY 170 /RONLY During data tests, do read, but no write or compare. /STARTING-OFFSET:n Specify the starting word o set to use for data transfers. The argument is the o set forward from the beginning of the cache line of the rst word to transfer (e.g., /BEGINNING{OFFSET:7 would begin the transfer with the last word of the cache line). This can be used to test transfers which start in the middle of a cache line.
F.1. MACRO{CONSOLE COMMANDS 171 /DATA Select the memory data test. If no memory tests are selected, all are performed. A \D" is printed to indicate that the data test is being initialized. During initialization, each word is written with the negative of its bus address word (BAW) minus two. A \d" is printed to indicate that the data{test compare has started. Each word of memory is checked to verify that it still contains the correct data. /NOCACHING Disable use of the cache to accelerate the operation.
APPENDIX F. TDBOOT COMMAND SUMMARY 172 TEST NETWORK Perform diagnostic tests on the speci ed network controllers. TEST NETWORK arguments The following arguments may be used to test a subset of the network ports: slot port The \slot" argument speci es a network controller, and the \port" argument speci es a network port. A missing argument or \*" will select all slots or ports corresponding to the argument. TEST NETWORK switches Switches should be entered after all other arguments.
F.2. MICRO{CONSOLE COMMANDS 173 Unload the speci ed SCSI device (usually a tape or other removable medium). The device is speci ed using one of the following formats: # slot bus target unit] MTAnnn: channel, controller, unit To specify an explicit SCSI nexus To specify a SCSI tape by its sequential nexus position Operating system tape speci er VDIRECTORY path] This is a shorthand for the \DIRECTORY args /LONG" command. See the \DIRECTORY" command for a full description of the arguments. F.
APPENDIX F. TDBOOT COMMAND SUMMARY 174 next \.E" command. The following is a summary of the deposit commands: Command Description .D .D .D .D .D .D .D .D .D .D .
F.2. MICRO{CONSOLE COMMANDS 175 system con guration. .D O mode address data Perform a diagnostic write cycle. The rst argument is loaded into the cache mode. The second argument is loaded into the internal DPM address register. The third argument is loaded into the IABUS latches. A DPM write cycle is performed. .D P address Store into the macro PC. This is similar to the .S command, but the macro program is not continued. .
APPENDIX F. TDBOOT COMMAND SUMMARY 176 .E A address Examine locations in MemA. The argument is the 13{bit address (0{17777). .E D baw Perform a status request cycle on the system bus (also know as an I/O space read). The argument is the bus address word (BAW) to read. Bit 0 controls cache access. Bit 0 should not be set with this command. .E F .E I Examine the internal processor ags and context.
F.2. MICRO{CONSOLE COMMANDS 177 Perform a diagnostic{read cycle and print the resulting contents of IABUS. The rst argument is loaded into the cache mode the second argument is loaded into the internal DPM address register. .E O D mode address Perform a diagnostic{read cycle and print the resulting contents of DPM. The rst argument is loaded into the cache mode the second argument is loaded into the internal DPM address register. .E O N mode address Perform a diagnostic{read with no output.
APPENDIX F. TDBOOT COMMAND SUMMARY 178 following commands examine all 16 (decimal) current{context registers: .E R 0 .R 17 E The rst command examines register 0, while the second command examines the next 17 (octal) registers in sequence. .S address .T Start the processor executing instructions. The argument is a 30{bit address specifying the intial PC. Perform various low{level tests which are di cult or impossible to perform using macro{ code, or when macro{code execution is not operational.
F.2. MICRO{CONSOLE COMMANDS 179 as follows: Bit 0 1 2 3 4 5 6 7 Mask Description 400000000000 200000000000 100000000000 040000000000 020000000000 010000000000 004000000000 002000000000 AC fault Thermal fault Battery bad Battery low Need power asserted on backplane Not used, should be zero Backplane wedged Always set .T C baw Perform a variety of cache/memory interaction tests. The argument is the base bus address word (BAW) of the memory locations to use.
APPENDIX F. TDBOOT COMMAND SUMMARY 180 second argument is the shift amount. The third argument is the mask. .T U baw Perform the invalidate and ush tests on the CPU cache. The argument is the base bus address word (BAW) of the memory locations to use. The addresses used are BAW through BAW+377777. Since this test uses the right half of the BAW as a counter, it should have bits 18:35 set to zero. If a test fails, the address, actual, and expected data are printed and the test is terminated.
Index 181 Index Accounts, 30, 81, 83 Acj program, 91 Actgen program, 81 Argument, viii Auto{Boot Structure, see Boot Structure Auxiliary Console, 9, 32 Disk File Structures, 41 Disks, 10 Disks, formatting, 57 Backup policy, 58 Battery installation, 6 Boot Structure, 18, 24, 40, 48, 76, 88, 103, 104, 109 Bootstrapping, 17 BS:, 76 File Access Group, 43 Other, 43 Owner, 43 File Back Up, 45 File protection, 43 File Structures, 41 Finger Program, 31 Cables, external tape drive, 11 Cables, SCSI, 11 Capabili
Index 182 Operator Privilege, 31 Operator, system, 97 OPR program, 97 Other File Access, 43 Owner File Access, 43 Parameter, viii Password, 33 Password, operator, 22, 55 Password, user, 30, 33 Passwords, 89 Power, AC, 1 Power, emergency cuto , 1 Printer, UNIX, 38 Printers, network, 3, 35 Printers, shared, 3, 35 Privileges, 31, 80 PS:, 76 Public Structure, 76, 88 Rack mounting, 6 Recognition, Command, vii SCSI cables, 11 SCSI connectors, 10 SCSI standard, 13 SCSI Target IDs, 13 Security, 33 Setspd program,