901984A_UTS_Overview_And__Tech_Sep73 901984A UTS Overview And Tech Sep73
901984A_UTS_Overview_And__Tech_Sep73 901984A_UTS_Overview_And__Tech_Sep73
User Manual: 901984A_UTS_Overview_And__Tech_Sep73
Open the PDF directly: View PDF .
Page Count: 171
Download | |
Open PDF In Browser | View PDF |
Xerox Universal Time-Sharing System (UTS) Sigma :6 /7/9 Compute,. .'Overvlew and Index ;Technical Manual 9019 i84A Xerox Corporation 701 South Aviation Boulevard EI Segundo, California 90245 213679-4511 XEROX Xerox Universal Time-Sharing System [UTS) Sigma 6/7/9. Computers . Overview 'and Index Technical MCIlual First Edition 90 19 84A September 1973 Price: $6.00 © 1973. Xerox Corporation . Printed in U.S.A. NOTICE This publication provides an overview of UTS and an index to the complete set of UTS technical manuals. The overview reflects the COl version of UTS. The index reflects the BOl version. However, the index is largely applicable to the COl version as well. RELATED PUBLICATIONS Publication No. UTS Basic Control and Basic I/o Technical 90 1985 Manual UTS System and Memory Management Technical Manual 90 1986 UTS Symbiont and Job Management Technical Manual 90 1987 UTS Operator Communication and Monitor Services Technical Manual 90 19 88 UTS File Management Technical Manual t 90 1989 UTS Rei iabi lity and Maintainabi I ity Technical Manual UTS Interrupt Driven Tasks Technical Manual 90 19 90 t 90 19 91 UTS Initialization and Recovery Technical Manual 90 19 92 UTS Command Processors Technical Manual 90 19 93 UTS System Processors Technical Manual 90 19 94 UTS Data Bases Technical Manual' 90 19 95 t Not published as of the publication data given on the title page of this manual. Refer to the PAL Manual for current avai lobi lity. ii CONTENTS User State Queues ___________________ 48 Scheduler Operation _ _ _ _ _ _ _ _ __ 50 I/O Scheduling _ _ _ _ _ _ _ _ _ __ 54 Reentrancy _ _ _ _ _ _ _ _ _ _ _ __ 55 Batch Jobs _ _ _ _ _ _ _ _ _ _ _ __ 56 Memory Management ____________ 56 Physical Core Allocation _ _ _ _ _ __ 57 Job Step Control _ _ _ _ _ _ _ _ _ _ __ 58 Symbionts, Cooperatives, and Multibatch Scheduling (RBBAT) _ _ _ _ _ _ _ __ 61 Symbiont/Cooperatives _ _ _ _ _ _ _ __ 61 Multibatch Scheduler _ _ _ _ _ _ _ _ __ 62 Scheduling Algorithm ___________ 63 System Services _ _ _ _ _ _ _ _ _ _ _ __ 64 System Initialization _ _ _ _ _ _ _ _ __ 64 INITIAL _ _ _ _ _ _ _ _ _ _ __ 65 BOOTSUBR _ _ _ _ _ _ _ _ _ __ 68 GHOST1 _ _ _ _ _ _ _ _ _ __ 69 Operator Communications 73 Accounting and Performance Monitoring__ 74 Automatic Recovery 75 System Debugging 77 Error Logging, Diagnostic Device Access_ 78 User Service 79 File Management 79 Load-and-Link Command 80 Batch Debugging 81 INTRODUCTION The UTS Operating System _ _ _ _ _ _ _ __ Salient Characteristics _ _ _ _ _ _ _ __ Lineage _ _ _ _ _ _ _ _ _ _ _ _ __ Typical Hardware _ _ _ _ _ _ _ _ _ _ __ CONCEPTS 2 4 5 7 8 Jobs ____________________ 8 User _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 9 User Number _ _ _ _ _ _ _ _ _ _ _ _ _ _ 9 User ID _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 9 Job Step _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 9 Virtual Memory _ _ _ _ _ _ _ _ _ _ _ _ _ 10 JITs _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 12 Shared Programs _ _ _ _ _ _ _ _ _ _ _ _ 13 Public Programs _ _ _ _ _ _ _ _ _ _ _ _ _ 14 Fi I es and Accounts 15 Star Files _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 15 Libraries _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 17 UTS Structures _ _ _ _ _ _ _ _ _ _ _ _ _ 18 Logical Structure _ _ _ _ _ _ _ _ _ _ _ 19 . 20' Dynamic Structure Slave Level 20 Monitor Service Level 20 Schedul ing Level 20 MONITOR PHYSICAL STRUCTURE, CORE, SWAP, RAD, FILE, and SYSTEM TAPE LAYOUTS Core Memory _ _ _ _ _ _ _ _ _ _ _ _ _ _ System Residence and Swapping RAD ______ System Storage Swapping Storage _ _ _ _ _ _ _ _ _ _ _ Symbionts and Files _ _ _ _ _ _ _ _ _ _ _ File Structure System PO Tape Contents Root Size Resident Table Sizes _-'--_ _-~~---Typical Contents of UTS in Loadirig'Order _ __ Differences Between a Large and MiQimum Resident Monitor ________________ Monitor Size Increases D~e to SYSGEN Parameters _______________ Monitor Modules..,..:-_ _ _ _ _ _ _ _ _ _ _ _ Utility Processors~.,---_ _ _---'-_ _ _ _ _ _ _ BPM!UTS Equivalent Modules 22 22 24 24 28 29 30 33 83 85 86 87 88 89 91 99 100 UTS PROCESSORS MONITOR FUNCTIONAL STRUCTURE Basic I/o System _ _ _ _ _ _ _ _ _ _ _ _ I/o Queuing and Device Handlers Logical I/O Channels System Flow Terminal I/O (COC) System Management Schedul ing and Swapping Scheduler Inputs Scheduler Output Executive Language Processors _ _ _ _ _ _ _ _ LOGON Terminal Executive Language Contro I Card Interpreter System Management Processors Super Control RATES 35 36 36 38 40 42 44 44 44 45 F~RGE FILL ERR: LIST ERR:SUM iii 102 102 103 103 105 105 105 105 1M 106 107 107 Language Processors Execution Control Processors Link Load Delta FORTRAN Debug Package Utility Processors Edit Peripheral Conversion Language Sort/Merge 1400 Series Simulator SYSGEN DEFCOM 108 108 108 108 109 110 110 110 111 111 112 113 113 SYMCON ANALZ BATCH LABEL DRSP INDEX to UTS TECHNICAL MANUALS Key to Index Index by Item Index by Module iv 113 114 114 115 115 116 116 117 159 UTS TECHNICAL MANUAL SECTION BA 1/12/73 l'AGE 1 INTRODUCTION This document is designed to give the technically-oriented reader, who is assumed to have a general knowledge of large computer operating systems, an overview of UTS. It is assumed that the reader is familiar with the use of the system, knowing both the kinds of service which are provided and the language elements which the user uses to request these services. He should come away from the reading with a general knowledge of how UTS accomplishes the various requests made of it. He should also come away with an idea of .the parts into which the system is divided, both functionally and physically. Finally, he should be able to understand where to look, both in the technical documentation and in the listing of the code itself, when there is a need" for more detailed ~nowledge. . As can be seen from the table of contents, this overview comprises six major sections: The introductory section (of which this paragraph is a part) skims lightly over the system as a whole describing the services it provides, the salient characteristic of its implementation, the operating systems on which it is hased, and the hardware which is required for operation. The second section describes the concepts fundamental to UTS operation. It introduces some of the vocabulary used throughout the technical documentation of the system. In section three are gathered descriptions of how UTS formats all the storage elements under its control: core memory in both physical and virtual forms, secondary storage used for UTS residence and user swapping space, RAD and disc storage used for files of stored data, and the contents of the source system tape are included. Section four divides the system into functional groupings and describes the general techniques used to accomplish those functions. Section five reviews the functional structure of section four giving module-by-module names, sizes, and description of function performed. Finally, in section six, the processors which, together with the UTS monitor, make up the total system are functionally reviewed. UTS TECHNICAL MANUAL SECTION BA 1/12/73 PAGE 2 The UTS Operating System UTS is a multiple-user Sigma 6/7/9 operating system providing service for a maximum of 50-200 concurrent on-line terminals (a physical limitation of 512 lines is imposed by the hardware; system logic limits the number of concurrent terminals to 250, response and throughput impose a practical limit of 50-200 terminals depending on the load sUbmitted) and full multiprogrammed batch processing services with full resource control. It includes BPM-compatible management of consecutive-, key-indexed (ISAM-like), and random (direct) files (on either fixed-head disc (RAD) , disk pack, or magnetic tape). These files are use-protected by password and access designation. A symbiont (spooling) system services the low-speed peripherals (card equipment and line printers) asynchronously with other CPU functions to buffer I/O to and from secondary storage. Central to the operation of the system is the secondary storage, used for monitor and processor residence, symbiont buffers, swapping, and user information files. Users at the terminals may create, modify, compile, execute, and symbolically debug programs on-line in BASIC, FORTRAN, COBOL, METASY~mOL, and other languages. Through terminal batch entry the user may submit tasks to batch processing, where COBOL, SORT/MERGE, MANAGE, and other processors are available. Any program may be run in either on-line or batch environments: Memory mapping allows reentrant processors (which may be overlaid and may contain initial data areas) to be shared by terminal and batch users. Other shared processors of UTS are EDIT (a context editor), DELTA (a DDT-like machine-language debugger), FDP (a FORTRAN debugging package), a program loader and link-editor, PCL (a device-to-device transmission and conversion program), and both batch and on-line executive-level command processors. The system can easily admit additional shared processors for other languages or for specialized user services added at each installation. Batch jobs may be inserted either at the central site, from remote batch terminals, or from on-line consoles. On-line terminals make use of the output printers and punches via the symbiont mechanism; they may also access tape drives and private disk packs. 2 UTS TECHNICAL MANUAL SECTION BA 1/12/73 PAGE 3 Map access controls and write locks secure the system from its users and the users from one another. Through the map the full virtual address range is available for user programs, I/O buffering, shared libraries, and the operating system on machines with less than maximum memory. Multilevel queue scheduling for execution and swapping assures rapid response and overlap of computation with file I/O swapping. The map makes possible multiple user programs and shared processors in core, which contributes to efficient operation through the overlap of CPU execution with I/O. The map obviates the need for core shuffling or compaction. A comprehensive performance monitoring facility which instruments and displays a wide variety of internal counts and timings allows an installation manager to examine current operation and adjust system performance. Continuous operation is maintained by automatic error detection, reporting, and recovery. System recovery, which includes automatic failure analysis, maintains integrity of user files while providing automatic restart within one to three minutes. Printers, punches, card readers, and tapes are maintained with time-shared diagnostics duri~g system operation. System services allow on-line diagnostic programs for maintenance of all peripheral devices concurrent with system operation. UTS is delivered as a package which includes the following: 1. An operational system tape for a standard configuration. 2. A tape containing compressed decks, symbolic updates, and binary versions of each system module. 3. Tapes containing symbolic, binary, and object modules for the following language processors: BASIC, ~mTASYM OL, FORTRAN IV, SORT/~mRGE, the Extended FORTRAN IV Library, ANS COBOL, and 1401 Simulator. q. A full set of user and operations manuals for the system language processors. 5. A set of test cases to exercise and verify proper system operat~on. b. A de~ivery and document (-11 or -61) describing it all. 3 UTS TECHNICAL SECTION BA 1/12/73 PAGE 4 ~mNUAL Salient Characteristics Some especially following: noteworthy characteristics of UTS are the 1. Full use of hardware page mapping (equivalent to a relocation register per page) to provide for location of a user's program and data in an arbitrary set of physical core pages (512 words each). This makes it possible for a variable number of different sized program partitions to be concurrently resident in core memory and for the number and size of partitions to vary dynamically from moment-to-moment. 2. Use of the map to share the code portions of reentrant processors among concurrent users with attendant savings in core requirements and associated overhead. 3. Division of all programs into procedure and data areas separately protected with execute-only and read/write access codes. Access codes and write locks are used to protect users from another, to protect the system code from the user, and to prevent the system from writing in its own procedure area. 4. Identical treatment at the execution level of batch and on-line programs, which provides for multiprogramming of batch programs and of batch with on-line, and for file sharing between batch on-line programs. 5. Swapping of user programs as a whole (rather than demand paging) as regulated "by the swap scheduling algorithm. Unmodified pure procedure is never swapped out. 6. A multi-level queue scheduling discipline, which provides a cornmon algorithm controlling both execution and swap scheduling and which allows separate scheduling of terminal I/O, file I/O, interactive CPU requests, batch/compute-bound execution, and other special situations. Terminal I/O, for example, has a higher priority than file I/O or compute-bound execution. 7. Full overlapping of user and swap I/O with CPU execution through scheduling, provided that there is enough core in which to do the overlapping. 8. Complete automatic recovery system with primary attention to preservation of user files provides fast restart following hardware malfunction. 4 UTS TECHNICAL }1ANUAL SECTION BA 1/12/73 PAGE 5 9. Ability to create an installation-specific command processor to efficiently pass control to a subsystem and field all exits, errors, etc. 10. On-line diagnostics for card printers, tapes, and disk packs. 11. A comprehensive file management system which organizations: reader, card punch, includes line three Random (direct) Contiguous pre-allocated set of 512-word granules accessed by relative granule number. Content is managed entirely by the user program. Consecutive A collection of variable length logical records physically blocked into granules by the system. Access is tape-like: sequential, forward, reverse or spacing. Allocation is dynamically limited only by the size of physical devices on the system. Key-indexed (ISru~-like) Collection of variable length logical records each of which has an associated key (name). Access is either by key or sequentially or a mixture. A tiered tree index provides for fast access by key to any record. Allocation is dynamically limited only by the size of physical devices on the system. Lineage UTS is the latest member of a family of operating systems, or monitors, for the XEROX 6/7/9 line of computers. Because each is built upon its predecessor, each takes advantage of much of the experienced code of the preceding systems. From time to time portions of the monitor are rewritten to add facility, improve performance, enhance maintainability, reduce size, or some combinations of these. When this happens the common line makes it possible to apply the improvement to all monitors in the line. Broad-brush characteristics of each system are given below. 5 _lIl'S TECHNICAL MANUAL SECTION BA 1/12/73 PAGE 6 BCM, the Basic Control Monitor, provides device handlers for XEROX peripheral devices and an I/O enqueueing routine which synchronizes requests and provides for error recovery. Two monitor families distinguished by their file management systems, arose from this common ancestor. RBM, the Real-time Batch Monitor, added simple job scheduling for batch jobs, and a basic file management system as well as real-time services. A new version of the I/O queueing routines and device handlers were added which improved real-time performance. They also replaced their counterparts in BPM, BTM, and UTS.' n BPM, the Batch Processing Monitor, is a major full-service operating system for a single stream of batch jobs. Real-time services allow concurrent process control and other high response needs. Symbionts concurrently spool card-to-disk and disk-to-printer or punch. A full file management system is included with access methods for consecutive files, indexed sequential files (called KEYED), and pre-allocated direct files (called RANDOM). A Control Command Interpreter (CCI) processes the job control language to allow the user to call processors for compilation, assembly, loading, and execution, and to assign logical I/O units (DCBs) to physical devices or files on RAD or disk pack. BTM, the Batch Timesharing Monitor, added to the full BPM batch service a single fixed partition of memory for terminal users. Editing, debugging, and various interactive languages serve the terminal user through a terminal command language. Since BTM does not make use of the memory map, it may be used on Sigma 5,. 6, 7, 8, or 9 computers. It is limited by its two partition design. UTS utilizes the hardware memory map to provide for a variable number of variable-sized memory partitions that do not require relocation after being moved into physical memory. Having several user programs in core increases the probability that the system can find concurrent'computing to overlap with swapping and file I/O. The map also makes it possible to share the code portions of processors (e.g., BASIC, FORTRAN) in concurrent use. Because the executing partitions need not be confined to on-line users, UTS contains ~ basic multiprogramming facility for batch jobs. Up to 1'6 simultaneous batch streams are multiprogr::ammed with full control over physical resources, such as tapes, to prevent inter-job lockup. New and improved processors for on-line interactive use are provided in UTS. 6 UTS TECHNICAL MANUAL SECTION BA 1/12/73 PAGE Typical Hardware A typical UTS hardware configuration would include the following: Sigma 6/7/9 CPU with 256-page map 64K-128K word core memory High speed swapping RAD File RAD and/or disk pack Tape units Card punch, card reader, line printer Operator's console 8 - 512 teletype, typewriter, or CRT terminals 7 7 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE 8 CONCEPTS Jobs -The UTS scheduling unit is the JOB or USER (see below). As each terminal user calls up or as a batch job is selected for execution, the job becomes active. For each active job, UTS maintains in core records in the form of user-associated tables that allow the job to be scheduled and swapped. Also, associated with each active job is a Job Information Table (JIT) which is the first page of each job both in core and on the swapping RAD. It contains accounting information, memory map, swap storage addresses, and other information. There are three kinds of jobs in UTS: BATCH, ON-LINE, and GHOST. Batch jobs arrive via the input symbiont from a local card reader, a remote card reader, or an on-line terminal. They may be scheduled in the same way as on-line jobs, or in other ways, at the discretion of the system manager. The Control Command Interpreter (CCI) is the shared processor thAt reads and acts upon the control command stream (!commands) for batch jobs. On-line jobs are terminal-initiated and generally assume interaction with a user at a keyboard-type device. The Terminal Executive Language (TEL) processor handles control commands for on-line jobs. Additionally, a user may build his awn command processor. Ghost jobs are operator- or progra~initiated by naming the program load module to be "forked" to and do not have card or terminal input streams, although they may read command files or take commands from the operator's console. Ghost jobs are used in UTS for the following: initialization, operator key-in commands, file backUp, hardware error log processing, certain diagnostics, performance monitoring, secondary storage (file space) granule allocation, multibatch scheduling, and remote batch and input symbiont processing. 8 ~ TECHNICAL MANUAL SECTION BB 1/12/73 PAGE 9 User, User Number, User 10 The term USER is often used to describe a UTS job. Users are either terminal users, batch jobs, or ghost jobs. Each user is assigned a unique humber at job entry which is carried in his JIT, printed on terminal page headings, and listed with every user-associated message that is typed at the operator's console. The number is also referred to as the user 10 (or system ID) and is used by the operator to send messages, to abort or otherwise affect the user's job. A different, but associated value, user number, is used to index scheduler control tables when jobs are active. Job Step Each job, whether under terminal control or submitted through the batch stream, is divided into a set of sequential increments called job steps. For example, a FORTRAN compile and execute job divides into three job steps: a compilation, a load operation, and the execution. Common information carried across all steps is the accounting and limit information carried in JIT (CPU time, elapsed time, pages out, cards in, tapes used, RAn space accumulated, etc.), and DCR assignment information carried in a special RAD record called the ASSIGN/MERGE record. The latter is the accumulation of information from all the ASSIGN cards or SET commands which have occurred previously in the job stream. At each job step, control returns to the user's associated command processor. For batch jobs, all control cards occur between job steps and are read by CCI. For on-line, TEL reads and acts on all commands issued to it between steps and, in certain cases, during interruptions within job steps. At the end of each job step, the user's core memory areas are released to the system's common pool, as are the corresponding spaces on the swap device. Thus, only the JIT accounting information, COOP buffers, and the DCB ASSIGN/MERGE records (plus files created by the steps) are carried from step to step. 9 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE 10 Virtual Memory Virtual memory is the logical memory seen by the user or other mapped program running under UTS. Instruction addresses of the program are virtual memory addresses. During program execution a hardware map register relates each virtual memory page (user addresses) to a page in real physical core memory. UTS keeps track of physical memory and assigns it as appropriate to individual users by establishing the contents of the map. Physical pages are associated on user program request either for an explicit page or implicitly when a program is called for and requires memory for residence. Unassigned pages are filled with the physical page address of a write-protected monitor page. This protects the system from erroneous references in master-mapped routines. The map frees the monitor to choose any physical page to satisfy a request for virtual space at a g1ven location. Thus, programs rema1n at the same virtual (logical) location and requirement for moving programs in core and relocating them are removed. A program may be placed in any available collection of physical memory pages. also permits sharing of the pure program procedure portions of commonly used system processors. (It is also possible to share data areas but this feature is only used for monitor data.) Programs requesting shared processors are connected via the map to a single in-core copy. Separate data areas are provided for each instance of execution of a shared processor. Programs which do not modify themselves may be shared in this map-reentrant way by separating them into data and pure procedure sections. ~mpping UTS takes full advantage of the extended memory capabilities offered with'the Sigma 9, and may use up to 512K words to hold the monitor and user programs. User program area size may be as large as 64K and additionally have up to 12K of context area. UTS has over 40 shared processors including ordinary shared processors, their overlays, monitor overlays, shared command processors, a shared debugger, and shared run-time libraries. Shared processors may be added or replaced during system operation by use of the processor DRSP. Figure BB-1 shows how several users, each with his own virtual memory, might be mapped when they are all in the same physical core. 10 UTS TECHNICAL MANUAL SECTION 88 J/12/73 Figure 88-1 - Relation of Several Users l Virtual Memory to the Sigma Physical Iv\emory Monitor Overlay JIT Virtual Mernor User 1 DeB PAGE 11 Data Shared Processor Physical Memory Vi rtua I Memoryr-----r----;f~-",------+-~-+-~I..---+----~-+----------, User 2 -. ~ I. User 3 • • • ! I T.'. fI User n J is the physical JIT for unmapped programs. Map cell s for: Virtual Pages not used are set to X l 20 1 i Vi rtual Pages assigned a swap image but not yet a core page contain X1221. 11 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE 12 Each user has a separate JIT, DCBs, Data, and other memory areas which are private to him and his execution. User 1 and User 2 share a single processor as indicated by the fact that their maps point to the same places in physical memory. Similarly, User 1 and User 3 share a single monitor overlay. User n has his own private program resident in the same virtual space which Users 1 and 2 are using for a shared processor. JITs The Job Information Table (JIT) is the central record keeping place for information related to each job. Accounting information, the memory map image, disc addresses for the job's image on swap image on swap device, the I/O command chain used for swapping, a DCB for terminal use (H:UC) and one for miscellaneous functions (M:XX), control command buffers, and the user-related push stack are some of the important elements stored in this table. JIT is mapped. The CPU accounting clock ticks subjectively into one user's JIT or another depending on how the map is set. The monitor pushes temporary data into a user-related stack depending on how the map is set. In fact, much of the monitor, the file system for example, need not be and is not aware of which user it is working for, rather it is mapped to the appropriate user via the hardware ~ap. A master JIT exists virtual space where unmapped programs, for example. All therefore, recorded in the physical space corresponding to the all JITS are located. This JIT is used by all the symbiont system, and interrupt processing, CPU accounting for symbiont operation is, in the master JIT. Each user is assigned a JIT in order to create the job. Depending on the source of the job, a JIT may be created which is appropriate to 1) an on-line, 2) a batch, or 3) a ghost program. The JIT for KEYIN, the operator's command language, holds in its push stack the entire program for KEYIN operation: a call for the KEYIN overlay and a self-destructive exit. The JIT disc address is the scheduler's "handle" which allows retrieval of the job when needed from the swap device. This address is kept in a core-resident table along with the job-scheduling information. 12 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE 13 Shared Programs There are six distinct kinds of shared programs in UTS: 1. Ordinary shared processors (FORTRAN, BASIC, PCL, LOAD) 2. Overlays of the ordinary shared processors 3. Special shared processors (TEL, LINK) 4. Shared debuggers (DELTA) 5. Public libraries (FORTRAN run-time library, FDP) 6. Monitor overlays (OPEN, labeled tape routines, KEYIN) Ordinary shared processors occupy the same virtual memory as user programs. Special shared processors, shared debuggers, and public libraries occupy (and are overlaid in) dedicated high virtual memory and may be associated with user programs or ordinary shared processors. The processors CCI, TEL, and LOGON which require store access to JIT are granted that special privilege. Although user programs may have large complex tree structures in both data and procedure sections, ordinary shared processors are restricted to a single overlay level in the procedure area only. However, they may have any number of overlays within that level. All changeable data must be in the root segment (unlike the overlays of unshared programs, which may have data in the overlays). Data is initialized at the same time the shared processor is called, and thereafter is associated with each user of that processor and swapped in and out with him. Shared processors overlays. of other than ordinary type may not have Shared processors are not limited to programs provided by XEROX. The facilities may be effectively used whenever a program has a high probability of common usage. Service bureaus, for example, may use the mechanism for proprietary packages, and corporate installations may use it for programs with a high frequency of use. 13 UTS TECHNICAL SECTION BB ~~NUAL 1/12/73 PAGE 14 UTS processors may be shared processors when they are named during SYSGEN and contain shareable pure procedure (reentrant code) or when they are added during system operation using the program DRSP. Data areas of the processor which will be user-associated are initialized at first entry. A shared processor has the following special charastics: 1. Its name is known to the system at SYSGEN time or provided by DRSP and is stored in resident tables. 2. It has dedicated residency on swap system initialization or by DRSP. 3. A single copy of requesting users. the pure storage procedure is established shared at by all Any program which meets the restrictions may be established as a shared processor by naming it at SYSGEN, which causes the file , copy of the program from the :SYS account to be written on the swapping RAD and its name placed in shared processor tables in resident monitor core during system initialization. The program is then available through high-speed swapping I/O. DRSP accomplishes a similar task during system operation. The file copy of the program is retained for recovery purposes and may be run as an unshared program under DELTA for development and debugging purposes. If the load module in the :SYS account is replaced, the shared copy of the program on the swapping device is updated to the newer version in the event of a system recovery. Public Programs A program whose load module is in the :SYS account is a public program in the sense that it may be called either by a control card containing the ! symbOl and the program name or by entry of the program name in response to a TEL prompt (!) for commands. Each user of a public program has his own copy of the program. If a program name refers both to a shared processor and to a load module in :SYS, then the shared copy is used. 14 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE 15 Files and Accounts Upon the basic physical I/O management routines of UTS/BTM/BPM systems is built a file management system which is used not only by the users and processors of the system but also by the system itself. Read, write, open, close, and other command directives of this "file system" are issued by users and processors via CAL instructions. The monitor itself may issue CALs as a user does or may BAL directly to the routines through internal interfaces. with minor exceptions, all temporary storage needed by the monitor is managed by this file system. Files may be either consecutive or key-indexed and consist of a variable number of variable length records. Records may be read from key-indexed files by name or in a sequential manner. Unlike the file management of many systems, space is acquired from a general pool and files may expand indefinitely in size restricted only by the physical size of the secondary storage av~i1able. A third type of file, called RANDOH, pre-allocates a fixed amount of space at open time and is read or written addressing by relative granule number. This type of file is not used by the monitor for any of its I/O. All files are divided into and cataloged by account. Authorization to read or write a file within a given account is granted on an account basis. Each user must establish an account under which he runs at logon time. Logon account, therefore, establishes control with respect to the file system and should not be confused with accounts established by the installation for fiscal purposes or with the "accounting" records produced at the end of each job to record time, core use, I/O activity, and other resource utilization. Accounting routines which gather this information have nothing to do with file accounts. Star Files Processes within the monitor, including the loaders and CCI, which require files of temporary intermediate information place this information in files which are called star files. These files are special with respect to their handling by file management since they are not entered into the file directory, and are special in their naming convention and in handling at job logoff. 15 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE The file name of star files is constructed of three characters: the first two are the halfword user 10 which is included to assure that the file has a name unique in the system. (Two distinct files will therefore be created and used by a shared processor or monitor component executing concurrently for two different users.) The third character of the file name is assigned to the process using the file. The file named idD for example is a file used by the monitor batch debugging facility to temporarily save MODIFY and SNAP commands. Note that the star file names are often referred to with the ID in lower case and the following character in upper case to indicate that 10 is substituted at file creation time. Star files and their use in UTS are as follows: idS Binary file of ROMs from card input formed by eCI (and the tree table) so that the Loader may make its two passes. idD Batch debugging commands - MODIFYs, SNAPs, etc. idL Load module output file created by LOADER or LINK when a LM file is not explicitly named. idG Assembler or compiler output ROM file used when the GO option is specified. The default file assignment of the M:GO DCB. idR Assembler ROM output for LINK if no explicit file is given. R is exactly equivalent to B with respect to the file system. idT File containing the names of all files which have been marked for release at job end by the M:TFILE operation. idN Load and Link files 16 16 UT~ TECHNICAL MANUAL SECTION BB 1/12/73 17 PAGE Libraries There are three kinds of program libraries provided in UTS: 1. Relocatable Object Module (ROM) libraries (computer or assembler output) which may be private to a user's account or public by placement in the system account. 2. Load Module (LM) librarios (loader output) which may also be either publicly or privately held (these are formed by the Loader in :DIC and :LIB files as described in the UTS System Management Reference Manual) • 3. Shared libraries (in absolute form) which are publicly shared by all concurrent users. Association of libraries with a user program is carried out by one of the loaders, either the one-pass on-line loader, LINK or the two-pass overlay loader, LOAD. LINK does not include LM loading in its capabilities. Both loaders associate programs with the shared libraries either on explicit command or implicitly by knowing that certain unsatisfied references can be found in a particular library (e.g., 9INITIAL is to be found in the FORTRAN run-time shared library). Shared libraries are created and absolutized at SYSGEN time. consist of three elments each: of the library They 1. The instructions (pure procedure) which will be the shared part, routines 2. An unitialized data area which provides local library context to each user at a fixed virtual address, and 3. A symbol table (REF/DEF stack) which enables the Loader to provide direct linkages to the library from the user program. Two shared libraries are supplied with each UTS system: a standard set of FORTRAN run-time routines (excepting only complex and hyperbolic functions), and the same standard set, together with the FORTRAN Debug Package (FOP). 17 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE UTS Structures The UTS Operating System may be divided into the resident monitor with its overlays and the processing programs without which it would be skeletal. As shown in Figure BB-2, the processors may be thought of on two levels: first, on the executive level, are the command processors. These shared processors, of which TEL, CCI, LOGON, and EASY are examples, pass control to other processors on error command. They are returned to in the case of errors and aborts or exits in the other processors 1 secondly is a level containing user programs, language processors, utility programs, and management control processors. On this level, any special privileges required are granted to the user job. The monitor and all processors except the application processors, language processors, FDP, libraries, are termed the control program and are those programs delivered with a UTS release. (As a matter of convenience, the latest versions of the FORTRAN Library and the language processors Meta-Symbol, FORTRAN, and BASIC are included in a UTS release.) 18 18 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE 19 Figure BB-2 - UTS Logical Structure Monitor Basic Control Scheduling & Swapping Memory Management ~ile Management P'ob Step Control r,rerminal I/O Symbionts & Coop. Sys. Integrity (Recovery) ILOGON/LOGOF, System l1anagemen t rocessors SUPER ONTROL RATES PURGE ILL RR:T.IST RR: SU1-i o DUMP OLINIT SPM UMMARY RSP I Initialization & Startup Operator Communication Batch Debugging System Debugging' Load-and-Link Read-Time Serve (proposed) Remote Batch Serve I EASY Language Processors FORT. IV Metasymb. BASIC ANS-COBOL MANAGE FLAG Terminal Exec. Language (TEL) j Exec. Control Processors Link Load DELTA FDP Libraries (FORTRAN) 19 Utility Processors Edit PCL SYSGEN DE FC OM SYMCON ANALZ BATCH Command Interpreter (CCI) ~ontrol ~pplication Processors SORT/MERGE 1401 SIM OMS GPDS SL-1 CIRC UTS TECHNICAL MANUAL SECTION DB 1/12/73 PAGE Dynamic Structure Another way of viewing UTS is through the dynamics of its operation. Here we see three levels: the slave program level, the monitor service level for carrying out the users' requests, and the scheduiing level where the decision for next user is made. Slave Level This level includes all programs that run in the nAPPED, SLAVE mode (parts of some specifically privileged programs on this level may run in master mode). Batch and on-line user programs, with their shared public libraries, language processors, such as FORTRAN and COBOL, and the special processors of the system, such as CeI, TEL, LINK, and DELTA, all fall into this category. Programs operating at the slave level are always mapped and are protected from others in core by the access codes and write-locks of the hardware. Monitor services for I/O and other services are provided via CAL instructions which pass control to the monitor service level. Monitor Service Level The second logical level of UTS provides for service of CAL instructions, processing of machine traps, I/O interrupts, clock interrupts, and external interrupts. Operation at this level is always in the ~mSTER mode and may be either mapped or unmapped. Code at this level is largely resident in core memory and is divided into data and pure procedure sections. Write locks are set so that the procedure area can never be written even by the monitor itself. After the called service program is executed, exit is made to the scheduling level. Scheduling Level The third logical level of UTS controls scheduling of machine operations by making an appropriate selection for a swap between the swapping device and core memory, followed by selection of the next user for execution. Map, access codes, PSD and general registers are then loaded and control goes to the selected slave program. This logical organization of UTS is shown in the diagram of Figure BB-3. 20 20 UTS TECHNICAL MANUAL SECTION BB 1/12/73 PAGE 21 Figure BB-3 - UTS Dynamic Organization Users Slave Level Processors with Special Status Processors On-line jobs Batch jobs Ghost jobs BASIC FORTRAN EDIT COBOL PCL TEL,CCI,EASY LINK, LOAD DELTA, PDP, RUNNER LOGON/LOGOFF Libraries, SUPER CONTROL Diagnostics ERR:LlST ERR: SUr-1 DRSP User Requests Async ronous Events Traps f\o.) Honitor Service Level Program & machine errors; System recovery Clock Time slice 9uantumi External lOO ! I' cac Processing for error recovery & retries; /\ Char. interrupts cac ~r.minal Read & Write Start more I/O Schedulin Level Entere w1th event codes descr1b1ng act1v1ty. Four general duties: 1) Schedule for swap 2) Schedule for execution 3) Load map and access codes 4) Return to selected slave program CALS '" Read, Wri te , . CALs, Aborts, Open, Special Close Exits (Associate Process, IOQ Link, Run, Program, Fetch, DCB r·1ERGE 1 Get & Rep lace Pages; Control Access; , i UTS TECHNICAh MANUAL SECTION BC 1/12/73 PAGE 22 CORE, SWAP RAD, FILE, AND SYSTEM TAPE LAYOUTS Core Memory UTS makes full use of Sigma 6/7/9 mapping hardware, access protection, write locks, and Sigma 9 extended memory in allocating available physical core pages to users. Physical core pages are allocated to users at their request. At system boot time the physical size of the actual memory is determined by referencing all memory and linking existing pages into an available pool. Thus, it is possible to remove core from service by turning off the physical boxes so long as the available physical memory is contiguous from address zero. Use of the map obviates the need for program relocation or physical moves. Full protection is provided, not only of the monitor from the users but also of one user from another, the monitor from itself, and each user from himself. All programs including the monitor itself are divided into procedure and data. The procedure area is protected by write-locks or access codes, or both, against inadvertent stores. The strategy of write-lock usage to protect master mode programs are as follows: See the Sigma 7 Reference Manual for a complete description of locks and keys, but remember that a key is associated with each program through the PSD and a lock is attached to each core memory page. Keys and locks control only store accesses. A key of 00 fits any lock; a lock of zero is "unlocked"; otherwise, the key must match to permit a store. 1• A key of" 11 is never used nor is a lock of 10. 2. The monitor operates with a key of 01 and thus may store in a. b. c. its own data area (lock = 01). any batch, on-line, or shared processor core (lock = 01). a reserved area for resident real-time data (lock = 00) • It may not store in a. b. 3. its own procedure (lock = 11). pure procedure of resident real-time (lock = 11). User programs operate with a key of 00 but in mapped/slaves mode so that protection is provided by the access controls. 22 UTS TECHNICAL MANUAL SECTION BC 1/12/73 PAGE 23 4. A key of 10 is reserved for resident real-time. It may store only in its own data area (lock = 00). It may not store anYHhere else (lock = 01 and 11). 5. Write-locks are initialized only once (at system startup) and are not changed thereafter except when running under control of EXECUTIVE DELTA where they are used to enable data breakpoints. A typical layout of physical memory is shown in Figure BC-1. The access code of each virtual memory page controls references made by slave mode programs (user programs and shared processors). Full access and map images are retained in the JIT of each user and are loaded when the user gains control. TEL, CCI, and LOGON are given special write access to JIT and other job context areas. In examining the virtual and physical memory layouts to determine the protections, the reader should recall that although the map applies to all addressing operations when the map bit of the PSD is on, address protection depends on the master/slave bit. In slave mode, the access test is made first and then the write-key write-lock test. In master mode, the access test is skipped. The layout of virtual memory that applies to user programs and ordinary shared processors is shown in Figure BC-2. Virtual core addresses shown are those appropriate for a typical system. More (or less) physical core may be established for the resident monitor at SYSGEN time depending on installation needs, such as the requirement for special device handlers or other options. The bound at which the one-pass Loader (LINK) places the user program is adjustable by assembly parameter in LINK. 23 SECTION BC 1/12/73 PAGE 24 UTS TECHNICAL MANUAL Typical contents of the various areas together with number of pages used are as follows: Context Area Available Area Special Area Job Information Table (1-2) User programs, data, and symbol tables. Special shared processor and data: DCBs (1-n) Ordinary shared proces~ors including: LINK File Buffers (4-n) Root segment DELTA ('\ COOP Buffers (0-2) Initial Data TEL Overlay Area FDP Public Libraries Monitor Overlay (1-6) Virtual pages which have no physical core page associated and are mapped into a resident monitor page (20) that is write-locked and protected by the no-access (11) code. Thus, slave mode programs are denied access through the access mode, and attempts to store at these virtual addresses by a master mode program are protected by write-locks. System Residence and Swapping RAD In UTS, the system resides on the swapping RAD or disk pack. Allocation of. components of the operating system on this system device is accomplished at the time the system is booted from a PO tape. The initial portions of the RAD contain enough information to accomplish a complete restart after quiescence or a recovery in event of system failure. This device is also allocated dynamically to individual user jobs as they are swapped between bursts of activity which require core residence and use of the CPU or an lOP. System Storage Table BC-1 lists the system components and shared processors appearing on the system/swap device. Two categories are listed: the area provided by the boot-from-tape process, and the area constructed from system files by the initializer GHOST1. This latter area is used by recovery for a core dump area and is reconstructed by the initializer following each recovery. The remaining portion of the system device is dedicated to user-swap space. 24 o -------- ---- end -_._--- -------- :n co c.., CD Contents Resident realtime programs and data On-line Jobs, Batch Jobs, Shared Processors, Nonresident Monitor Overl ays (Master mode) Res i den t Mon itor (Proposed) '" () I -I "'< ~. n Data Program Data Program 0 ~ CD 01 Keys 3 .., 0 10 00 "'< r- - 0 Locks 01 01 11 00 "'< 11 --0 c -.--~- j 0 Mapping Unmapped Mapped Mapped or Unmapped 0 VI n 0 CD .-~~-- _ .. _-- r---------. - - - - - - - - - - - Use Mode Master ~--.-. - - .. ~ ----. .. ~ - _.- - _. -- ---_. ~-. -_. -. . - - . - .- Slave Note that the system is protected from users by access codes, not locks and keys. Note that key = 11 and lock = 10 are never used. .-. --_._--- Master or Slave - C -I 1 ~ -I ?) :c Z -» () r- ~ » z C » r- o Figure 8C-2 - Typical User - Program Virtual Memory Layout (Not to Scale) 48K -- - --_. _. - -- ..- - - - - - - - - - _ - - - - - - __ - . - - --- 112K 128K - _ _- ---Special area Avai lable Area (LINK Loader) for special Monitor Context M sh ared pro96K . - - ' ' - - --_ _-_._----Area Area ~ cessors and Program o lOb Delta Data Area U I ranes Code Symbol ~ (DELTA, (pure II Mon J Program; Dynamic! Unallo- ! Common procedure) Table Q LINK, TEL, IDeBs !Buffers Overlay Data Program cated ! P I Area FDP} Data !; Pages . PaJO es :i ages Area 6 Var ! Var T - 32K .... ~-- .. .. -.~ - - - - .. - -_ .. - .. .. 0 i:T1 User Access ~I""__- none - - -•••. - read t.!..read (first I --I~"'i~. pag~=--.-- ' nonerwrite . I I.t i ii I 'l .;.none-. write--.i!.. execute +-read i I ton~ C -I or execute Vl -f m () :c / Z () r------------------------------------------ - » Available Area (LOAD Loader) r- I ~ Program' Dynamic' Unallo- ICommon _ Delta' Program Data ' t d i Code I Pages: ca e i Pages ..... 1'0...... Symbol 1 Pages! Tables I 1_ Z ~ - - r- write--....~xecute+write+ none_~write~ read M l all, to allocated to allocated physical page or to a protected locked monitor page physical page Access Codes 11 10 none - no access of any kind permitted read - read access on Iy 01 00 -1 ~'" ~;:::; ~ m,,;j "0 W execute - execute and read access write - write,' execute, and read permitted z UTS TECHNICAL MANUAL SECTION BC 1/12/73 PAGE 27 Table BC-1 - Contents of System Portion of the Swapping RAD A. Items Written During System Boot 1. Disc bootstrap routine (Sectors 0-1). 2. Space for ALLOCAT JIT, AJIT (Sectors 2-5). 3. Master JIT (Sectors 6-7). 4. ALLOCAT data, including HGPs, the granule bit maps. allocation 5. ALLOCAT procedure - the granule allocation ghost program. 6. GHOST1, the system initializer. 7. Space for new or replaced monitor overlays (six each per MOSPACE). pages 8. Nine monitor overlays - Open Files (OPEN), Close Files (CLOSE), Label Tape (LTAPE), Operator Keyins (KEYIN), Load-and-Link (LDLNK), Batch Debugs (DEBUG), multilevel index creator (MUL), Device and Type CALs (IODTYPR), and miscellaneous routines (MISOV). B. 9. RECOVERY, the system failure recovery and restart routines. 10. XDELTA, the executive system debugger. 11. UTS Monitor Root, in absolute core image format. Items Written by GHOST1. The shared processors are built according to specifications in monitor tables provided by SYSGEN. XEROX shared processors established automatically by SYSGEN are as follows: CCI, TEL, LOGON LOGON, LOADER BASIC, l.fETASYMBOL, FORTRAN EDIT, PCL, DELTA, BATCH FILL, RUNNER GHOST1, DRSP FORTRAN Public Library, FDP 27 UTS TECHNICAL MANUAL SECTION Be 1/12/73 PAGE 28 Swapping Storage Users (batch and on-line) are removed from core to a dedicated area of secondary storage (RAD or disk pack) when core storage is required for higher priority users. A bit table (SGP) is used to keep track of the availability of each granule (two sectors = 512 words) on the RAD. In this table, a zero is used to indicate that the granule is in use (assigned to a user) and a one is used to indicate that the granule is available. Users are assigned, in groups of four, a sufficient number of page-size granules to accommodate their current use. The assignment is done in such a way that command chaining of the I/O can order the granules to be fetched for a single user with a minimum latency. That is, each user's pages are spread evenly over the set of available granules so that data will be transmitted in every disc sector passed over when the user is swapped. The records of disc granules associated with each user are kept in the user's Job Information Table (JIT), which is kept on the s\-lap device when the user is not in core. The disc location of the JIT is kept in core by the scheduler. The device layout is such that suf~icient ti~e is available after the user's JIT arrives from the swap device for the system to set up the I/O command chain contained therein for swapping the reaminder of the user program. , The amount of secondary storage assigned to swapping is a parameter of SYSGEN. The number of active (batch and on-line) users that the system can accommodate is limited by the space allocated for swapping and the total size of all active users. If the swap device is a disk pack, each user is allocated one or two cylinders during SYSGEN. The system still uses the RAD SGP and allocates swapping storage in terms of granules. The exception is the swap I/O routine which obtains the user's cylinder number from a resident table and epecially sets up disk pack command lists to perform I/O to continuous granules on cylinders. 28 UTS TECHNICAL ~·1ANUAL SECTION Be 1/12/73 PAGE 29 Symbionts and Files RAns and disk packs are Each RAD or pack except symbiont area (PER) and of each kind of storage the PER and PFA are not pools, except that when space. divided into page size (512 words) granules. for the system (swap) RAn is divided into a a file area (PFA). At SYSGEN, the proportion on each device is specified. Once generated exchangeable: they form separate allocation PER is exhausted, PFA is used for symbiont For each device, SYSGEN provides an allocation table which contains a bit per granule on the device. These tables are collectively referred to as the HGP, although technically, HGP, the Head of Granule Pool, is a cell containing the address of the first of a linked chain of allocation tables. Also, contained in each allocation table are pointers dividing the PER and PFA area and constants defining the number of granules per track and other device-specific parameters. These allocation tables reside in and are manipulated by the ghost program, ALLOCAT, which is called occasionally to fill or empty stacks of available granules in core memory. Granules required for file addition or released when files are deleted are taken from the stacks of available granules. When the stacks' contents exceed pre-established thresholds, then the ALLOCAT Ghost is called to refresh them to an optimum level. 29 UTS TECHNICAL MANUAL SECTION BC 1/12/73 PAGE 30 File Structure A file may be organized as consecutive, keyed, or random. In a consecutive file, the records may be accessed only in the sequence in which they were orginally written. In a keyed file, each record has an associated name or key. Records in a keyed file may be accessed directly by specific key values or sequentially, according to their order in the file. A random file consists of contiguous granules rather than a group of records. Random files are accessed by granule number relative to the beginning of the file. A disk file resides on the Monitor's secondary storage. UTS uses both the RAD and disk pack devices for secondary storage. Any combination of these devices can be defined for a UTS system at SYSGEN time. A disk pack device has dismountable volumes and can be declared either a public or private device at SYSGEN time, while a disk device, not having dismountable volumes, can only be declared a public device. A public disk pack has only one volume that can be recognized by UTS, and that volume must be mounted at all times while the system is active. A private disk pack device has any number of dismountable volumes that can be recognized by UTS. The Monitor requires that only those volumes needed for execution of the user's job be made available and be mounted. A public file resides on public devices (RAD and/or disk pack); a private file resides on private disk pack volumes. A private volume set is defined as a collection of removable volumes that the user has grouped together containing any number of files with any type of organization (consecutive, keyed, or random). All files in a private set must belong to the same account. A private volume set is identified by the volume serial numbers specified in the SN option of the lASSIGN command when the first file is written on the set. Volumes may be added to the set by entering a new volume serial number in the" SN list, but a volume may not be removed. Keyed and consecutive file space is allocated.on a demand basis as the file is being created or updated, therefore such files do not necessarily exist in· contiguous areas on a RAD or disk pack device and can exist on many different physical devices. Random file space is allocated when the file is opened for output. The size of a random file can never be changed. 30 UTS TECHNICAL l1ANUAL SECTION BC 1/12/73 PAGE 31 Access to user files is via a hierarchy of disk-resident Monitor files. Figure BC-3 shows the structure of system-managed files. The top file is an Account Directory, which contains a directory of all accounts that have public user disk files. There is one account directory for all public files in the system (the Public File Account Directory). Each account has its own file directory, which contains a directory of all files in the account. Each file has a File Information Table (FIT), which is part of the file directory for random files and part of the file itself for keyed and consecutive files, and contains all the information necessary to open a file, such as its organization, location, password, etc. To locate a public file, the public account directory is searched for the file account number. The account number entry contains the disk address of the account's file director1. The file directory is searched for the file name. The file name entry contains the disk address of the file's FIT. The FIT contains the disk address of the file. Private files are located via AVR and MOUNT logic. A keyed file consists of two parts: a Master Index and a set of data granules. The data granules contain the records in the file, which are packed in granule-size blocks. Data granules do not contain any system information. The Master Index is a collection of hierarchical levels of index blocks where the entries in a higher level point to index blocks at the next lower level, and the entries in the lowest level point to data records. A consecutive file consists of granules containing the data of the records preceded by four bytes of control information per record, generally. A random file is devoid of system information. Record management and format of the file is the user's responsibility. Besides the security checks required for access to a file, the only checks made by the system are to prevent the user from reading or writing past the limits of the file. Functionally and operationally, a random file is a collection of contiguous granules on the specified device type. However, if a random file is larger than a disk pack in size, the file will extend beyond volume boundaries (if private) or device boundaries (if public). 31 R~~1)OM (f"lXeb..o:= "D\e.e-~1 ) cn .... n '"t1 .... )"t'Ij (j) ,H -...10 t'ljr-vt-3 wZ t:d I i f ____ ?'!.. , •••, , _ - - - - - - ' Figure BC-3 - UTS/BTM/BPM File Structure () I UTS TECHNICAL MANUAL SECTION BC 1/12/73 PAGE 33 System PO Tape Contents The system tape, called a 'PO tape' for reasons lost in antiquity, contains all data needed to begin UTS operation. The tape contains ready-to-run load modules for the monitor, its overlays, and the processors of the operating system. It may contain any other files which the installation desires and includes when the tape is written (DEFed). The tape is structured into two parts. Prior to the first file mark are records absolutely required in getting the system into operation: the monitor, its overlays, EXEC DELTA, recovery, ALLOCAT, and the elements of the initialization program, GHOST1. Following the first file mark, the tape is in standard labeled tape format and contains load modules for all remaining parts of the system. The tape may contain any modules or files whatever. Only those preceding a null file named LASTLM are copied to the system device file structure during system initialization. The system tape may contain any necessary number of records prior to the formatted part and still be a valid standard format tape because of the label tape identification procedure (AVR sequence). In this sequence, the tape is rewound, forward spaced to the first file mark, backspaced two records, and read forward to find the tape label. Thus, the label is found independent of the number of records preceding the first file mark. Table BC-2 lists the records on a UTS PO tape. 33 UTS TECHNICAL MANUAL SECTION BC 1/12/73 PAGE 34 Table BC-2 - Contents of UTS PO Tape A. Unformatted Area Records Tape Boot Root in one-page records System information record containing version and creation date EXEC DELTA Head EXEC DELTA Data. ALLOCAT Head ALLOCAT Data. ALLOCAT Procedure GHOST 1 Head GHOST1 DCBs (load module protection type 2) GHOST1 Data. GHOST1 Procedure (load module protection type 1) Overlay Head Overlay Data. Recover Head Repeated for the nine overlays: MISOV,IODTYPR,OPEN,CLOSE,LBLT,KEYIN, Recover Data. DEBUG,DLNK,MUL ~Ioni tor B. Standard Labeled Tape Formatted Area :LBL :ACN First Physical End-of-File File records for all system load modules and other needed files (SYSTEl--t PROCs, Error Message Files, etc.) LASTLM File Other files as desired :EOT *Data is protection type 0 of the load module. 34 UTS TECHNICAL MANUAL SECTION RD 1/12/73 PAGE 35 MONITOR FUNCTIONAL STRUCTURE This section describes the UTS monitor's functional capabilities together with the broad strategy which is used to accomplish each. The outline of this section is echoed in the following section, BE, which reviews the system module by module giving details of the function provided by each, together with approximate physical size. The broad categories and services provided by each are as follows: 1. Basic I/O This section describes the operation of routines which centrally queue all requests for I/O, provide devLce-specific handling of each request, service I/O interrupts, and buffer and manage all terminal I/O requests. 2. System Management This section describes the operation of those portions of the monitor which are responsible for scheduling execution and swapping of user programs, managing core and swap RAD memory, and controlling the sequencing of jobs from step to step. 3. Symbionts and Cooperatives The routines described in this section provide for buffing of input and output between user programs and low-speed peripherals (card readers, card punches, line printers, and remote batch terminals). 4. System Services This section describes routines which relate to the system as a whole. Areas covered are: initialization, recovery, operator communications, accounting, performance monitoring, system debugging, and hardware error logging. 5. User Services The routines described in this section carry out services at the explicit request of user programs. Covered are file management, the load-and-link commands, and batch debugging commands. 35 UTS TECHNICAL MANUAL 1. SECTION BD 1/12/73 PAGE 36 Basic I/O System The code grouped in the 'basic control' category includes Ca) the routine which queues up requests for I/O activity and handles the I/O interrupt, (b) the basic device I/O handling routines, and (c) the UTS terminal I/O and buffering routines. The first two sets are nearly identical for the BP~I, BTM, and UTS systems. The I/O queue routines and handlers are also close cousins to those used in nCM and RBM. Data used by these routines are largely generated hy RYSGEN, including the Device Control Tahles (DCTs) and RAD Granule Maps (HGP) in the module IOTABLE, the Queue Tables (100) in M:CPU, and the terminal I/O tables in M:COC. a. . I/O Queueing and Device Handlers The Basic Input/Output System which is common code to RBM, BPM, and UTS provides a simple interface between all parts of the operating system and the external peripheral devices. It stacks or 'queues' the requests for service rather than waiting for each operation to complete before returning to the caller. When a request is completed, the caller is notified via certain parameters in the DCB, or the caller may specify the address of a subroutine to be executed at this time (called the 'end-action' routine). It is capable of receiving requests for input at any time or from any place in the system and dispatching them in a manner which is independent of other operations concurrently being executed by the system. Error recovery procedures are invoked when necessary and do not require any additional specifications from the caller. Requests are normally serviced in the order in which they are received. In a real-time system, requests are serviced by task priority. Precautions are taken to prevent any major service to lower priority requests when a higher priority task is active. Standard techniques within the handlers provide centralized recovery from errors and device malfunctions Operator intervention is enlisted when required, for example, to reinsert a card read with error or to take action on unrecoverable device failure. 36 UTS TECHNICAL MANUAL SECTION RD 1/12/73 PAGE 37 There are two basic entries to IOQ: a standard entry in which the I/O commands are prepared by IOO and the handlers, and an entry in which the entire I/O command list is supplied by the caller. Few restrictions are placed on buffer size or location. Facilities are included for gather-write/scatter-read operations (data chaining), and provision is made to allow construction of lOP command lists outside of the basic I/O. For standard tape, RAn, and Pack I/O, a monitor buffer is obtained in which data chained I/O command lists are built according to the actual physical core locations of the record requested. A maximum of 8K words is allowed for tape requests. UTS 'blocks' I/O requests if the calling process is mapped, i.e., a user service. Operation is discontinued for this user and the system turns to the next. The inherent differences between peripheral devices are accounted for by the insertion of device-oriented code (handler) for each type of device in the system. A well-defined handler interface allows addition of new handlers with a minimum of difficulty. Also, a number of subroutines are availahle which perform common hander functions. Handlers are added to the monitor root as a result of a SYSGEN PASS2 DEVICE command which names the device, its addresses, and its handler. This causes the handler to be added to the standard file of handlers which initially includes the handlers for the operator's console, the card reader, the line printer, the RAD, and nine-track tape. 37 UTS TECHNICAL MANUAL SF.CTION BD 1/12/73 PAGE b. 38 Logical I/O Channels A channel is a data path connecting one or more devices with the CPU, only one of which may be transmitting data (to or from memory) at any time. Thus, a magnetic tape controller connected to an MIOP is a channel. But one connected to an SlOP is not, for in this case, the SlOP itself fits the definition. Other examples of channels are a card reader on an MIOP, a keyboard/printer on an MIOP or a RAD controller on an MlOP. Input/Output requests made on the system are queued by channel. This method facilitates starting a new request on the channel when the previous one has completed. The exception to this rule is the 'off-line' type of operation such as rewinding of magnetic tape or arm movement of certain moving arm devices. If this type of operation is started, an attempt is always made to start a data transfer operation as well. Thus, the channel is always kept busy, if concurrent requests are available. By using logical channels to separate devices on a physical channel (MlOP), the IOO routine may be used to prevent data overruns when more devices are connected than can be handled by the MlOP simultaneously. In addition to assigning a logical channel(data path) to a group of devices, it is possible to define two logical channels for a group of devices where the hardware permits. Thus, requests to use any of the devices will be honored as soon as either channel (data path) is available for data .transmission. This facility is commonly referred to as 'device pooling'. Thus, for example, two controllers can simultaneously have any two of eight disk packs; whereas, without the feature, each controller would be able to serve anyone of four. Obviously, the former case is more efficient, in general. 38 UTS TECHNICAL ~~~UAL SECTION BD 1/12/73 PAGE 39 Since requests on a channel are normally "chained" by the I/O interrupt, there must be a means whereby any action on a request which is deferred by priority may be resumed at a later time. This provision is the 'Control Task', usually the lowest level external interrupt in the system. \"lhen action is deferred, the device code is entered into the Control Task stack and its interrupt-is triggered. When it becomes active it will call the scheduler for the device in question. In a system created with no Control Task, the console interrupt will be triggered instead. The console interrupt receiver is designed to perform Control Task functions when there is no external interrupt assigned for this purpose. There are two major parts involved in the processing of an I/O request: start (done -by STARTlO) and cleanup (done by CLEANUP). The start consists of building the lOP command list and executing the SIO instruction, while the cleanup consists of testing for errors and notifying the caller of the completion. For a given request, the tiMe at which a start of cleanup is done is determined by the I/O scheduler (called Service Device or SERDEV) • 39 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 40 System Flow The center of I/O activity is the scheduler, Service Device. This routine starts all operations and processes their interrupts (cleanup). Thus, Service Device Must he callen whenever certain key events occur or when other special conditions are present in the system. The figure below shows the downward flow of control from some of the most important areas of the I/O systeM. Request is made NEWO QUEUE1 1 Interrupt occurs IOINT J S E R V ICE Hon1tor wa1ts for completion IOSPIN J D E V ICE J j 1 In1 t1ate operation STARTIO Process interrupt CLEANUP , ,. H Hanc ler pre-processor Handler post-processor 40 Contra Task CTIOP UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 41 service Device is a highly independent routine in the sense that it can be called at any time from anywhere in the monitor. It is called whenever there is any chance that a start or cleanup can be done for a given device. Some examples of when Service Device is called are as follows: 1. When a request is queued (start may be performed for the next request in the queue). 2. After an I/O interrupt has occurred (cleanup be dohe). 3. After a cleanup has been done (a start may be performed for the next request in the queue). may Device-dependent routines are provided for building command lists and testing for errors. STARTIO calls the 'handler pre-processor' to do the former, while CLEANUP calls the 'handler post-processor' to do the latter. These two parts constitute the device handler for any given peripheral and are provided in separate assembly modules.:9 Information pertaining to requests, devices, and channels is maintained in a series of parallel tables produced at System Generation Time. The first entry (index = 0) in each table is reserved for special use by the system. Three groups of tables are used 1) to carry individual I/O requests, 2) to carry status and control information for each device, and 3) to group the requests for each logical channel. IOQ, Request Information These tables contain all information necessary to perform an input/output operation. When a request is made on the system, data is transferred from the controlling DCB and/or registers into one element in each of the parallel IOQ tables. This set of elements forms a 'queue entry'. The entry is then linked into the channel queue below other requests of higher or the same priority. 41 UTSTECHNICAL MANUAL SECTION BD 1/12/73 PAGE 42 OCT, Device Control The device control tables contain fixed information about each system device (unit level) and variable information about the operation currently being performed on the device. CIT, Channel Information These tables are used primarily to define the 'head' and 'tail' of those entries which represent the queue for a given channel at any time. A channel queue may have more than one entry active at any time (such as several tapes rewinding while another reads or writes). c. Terminal I/O (Cae) Terminal I/O cac routines are the read/write buffering and the external interrupt handling routines for I/O directed to user terminals. The read and write routines on the user-interface side translate characters to external form and buffer messages into linked, core-resident blocking buffers. Insertion of page headers, vertical format control (VFC), user headings, tab simulation, and other formatting tasks are performed. The interrupt routines demultiplex incoming characters by line, translate to internal EBCDIC form, check parity, block messages into buffers, echo characters to the terminal, and test for valid end-of-message characters. The routines support teletypes, ASCII-compatible CRrs, and 2741's for most common speeds, formats, and character encodings. Where full-duplex terminal are available, type-ahead is supported - the user may type input while output is ongoing or before a read request is received. Paper tape units are supported for both full- and half-duplex terminals. Translation of characters may be suppressed to provide arbitrary binary I/O. Recognition of special characters to allow simple character-delete and line-delete editing functions, mode settings to control echoplex _ operation, tab simulation, code set restriction, and other activities 'are inoluded. 42 SECTION BD UTS TECHNICAL MANUAL 1/12/73 PAGE 43 A routine entered periodically as a result of a clock interrupt scans all 7611 lines to detect data set hangup and data set answer to provide automatic logoff and logon, respectively. The cac routines carry out their functions using information carried in a series of line-associated tables, processing both characters deposited by the 7611 hardware in a 'ring-buffer' and messages to and from a pool of four-word blocking buffers. All these data are included in the module COCD and in M:COC, which is provided by SYSGEN as a result of processing the :COC control card. Initialization of 7611 lines is accomplished by the routine COCI, which is needed during system initialization, recovery, and power fail-safe restart. The COC routines are resident in the monitor root and consist of four main parts plus common subroutines, all assembled as a single unit: 1. Output interrupt handler. 2. Output interrupt handler. 3. Code to process a user's Write CALs directed to the terminal. 4. Code to process terminal. 43 Read CALs directed to the BD UTS TECHNICAL MANUAL PAGE 2. « System Manaqement Four groups of routines are associated with this activity: a) those that record the significant events which occur during operation and schedule user execution and swapping from them, b) those that centrally manage core and RAD or Pack memory, allocating and releasing pages of core and granules of secondary storage on demand, c) those that properly sequence the operation of a job between its individual steps, and d) those that associate and release monitor overlays in a job's virtual memory space. a. Scheduling and swapping The routines in this group control the overall operation of the system. Inputs to these routines, together with the current state of users as recorded by the scheduler, are used to change the position of each user in the scheduling state queues. It is from these queues that selections are made for both swapping and execution. Swaps are set up by the selection of a high-priority user to be brought into core and by pairing this user with one or more low-priority users to be transferred to swap storage. Similarly, the highest priority user in core is selected for execution. , Scheduler Inputs System activities are reported by direct entry to the scheduler, which makes changes to user state state queues through a logical event signaling table. The scheduler records inputs by changing the user the user state and other information associated with the user. In general, a table-driven technique is used. The received event is on one coordinate of the table and the current state of the user is on the other. The table entry thus defined names the resulting state or the routine to be executed in response to the given event-state combination. Since the number of events and states is large, the table technique aids in debugging by forcing complete specification to all the possibilities. Inputs to the Scheduler are listed in Table BD-1. UTS TECHNICAL M&~UAL SECTION BD 1/12/73 PAGE 45 The Scheduler also receives control at execution of each CAL issued by a user program that is requesting monitor service. All these entries (Table BD-2), the special entries from the executive language processors, and entries from internally reported events drive the scheduling of the system. Other entries to the Scheduler occur following each trap, each interrupt, and the end of each clock quanta. Scheduler Output The scheduling routine performs two major functions during the time it is in control of the computer. The first is to set up swaps between main core memory and swap storage in such a way that high-priority users are brought into core to replace low-priority users transferred to swap storage. The actual swap is controlled by the swapper according to specifications prepared by the Scheduler according to priority state queues described in the next section. Given a suitably large ratio of available core to average user size (greater than 4), the Scheduler can keep swaps and compute 100 percent overlapped. The second function is to select a user for execution according to the priority state queues and the rules for batch processing. The rule is simple: the highest priority user whose program and data are in core is selected. 45 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 46 Table BD-1 - Events Received by Scheduler EVENT E:ABRT E:AP E:ART E:CBA E:CBK E:CBL E:CEC E:CFB E:CIC E:CRD E:CUB E:DPA E:EI E:ERR E:IC E:IIP E:IP E:KI E:KO E:NC E:ND E:NOCR E:NRD E:NSYMD E:NSYMF E:OCR E:OFF E:QA E:QE E:QFAC E:QMF E:SL E:SYMD E:SYMF E:UQA E:UQFAC E:WU MEANING Operator-aborted user. Associate shared processor with user. Associate real-time job (not used). COC buffer available. Break signal received. Number of output characters system limit. TEL request: Y received. COC buffer available. Terminal input message complete. Read terminal command received. Number of output characters = system limit. Swap page available. External interrupt event (unused). Operator errored user. I/O complete. I/O started and now in progress. Request permission to start I/O. User back in core. User kicked out of core. Cannot get requested core pages. Cannot get requested swap page. Initiate user requesting open or close. Job exit until next external interrupt (unused No symbiont disc space. No symbiont file entry. User request to do open or close. User hung up or logged off. Q for access (e.g., for access to tape or disk pack). Quantum end. No file granules available for user. Master I/O function count exceeded. Sleep time for user. Symbiont disc granule is now available. Symbiont file table entry is now available. De-Q for access (e.g., for access to tape or disk pack) • ALLOCAT has filed granule stacks. Wake up time for user. UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 47 Table BD-2 - Service Request Input to Monitor SOURCE OF INPUTS SERVICE REQUEST ENTRIES User program (through monitor service calls) 1. Terminal input/output request. 2. Input/output service calls for RAD, disk pack, or magnetic tape. 3. l"1ait (sleep) request. 4. Program exit (complete). 5. Core request (for common, dynamic, or specific· pages). 6. Program overlay request. 7. Debug requests. 8. Requests for control of breaks, traps, timing, etc. 1. Name of system programs (shared or not) to be loaded and entered (implies deletion of any current program). 2. Continuation signal 3. LINK load-and-go exit. Executive Processor 47 SECTION BD UTS TECHNICAL MANUAL 1/12/73 PAGE 48 User State Queues State queues form a single priority structure from which selections for swapping and execution are made. The state queues form an ordered list with one and only one entry for each user. The position in queue is an implied bid for the services of the computer. As events are reported to the Scheduler, individual users move up and down in the priority structure. When they are at the low end, they are prime candidates for removal to secondary storage. This latter feature, that of having a definite priority for removal of users to swap storage, is an important and often overlooked aid to efficient swap management. It avoids extraneous swaps by making an intelligent choice about outgoing as well as incoming users. In addition to these primary queues have other functions: functions, user state 1. Synchronizing the presence in core of the user program and data with the ability of I/O devices. 2. Queueing user program pre-established time. 3. Queueing requests processors. 4. Managing core memory. 5. Queueing 6. Queueing requests services. for to be entry 'awakened' at a use off and requests for buffers in core or on RAD. for several non-reentrant A list of the state queues is given in Table BD-3. 48 UTS TECHNICAL MANUAL SECTION BO 1/12/73 PAGE 49 Table BO-3 - Scheduler State Queues STATE NAME AB BAT BK C COM CU CP OP EC ERR IOC lOW lOt-iF f i" IR ~ NRRT loeu I OFF ; ON , QA l QFAC SYf.1D • SYMF j TI TIO TOB TOBO TOC w NOTE: MEANING Users waiting for a COC buffer. Batch compute-bound users under segregated batch scheduling discipline. Users who have high BREAK. High-priority compute-queue (used for associating processors and some special cases of memory and I swap storage management). I Compute-bound users Current user of the CPU. Users waiting for a core page. Users waiting to be allocated a swapping page. : Users queued for entry to TEL (they have hit yC) • ~ User jobs errored by the operator. Users with I/O complete. Users with I/O in progress. Users queue because of excessive current I/O count. Users with complete terminal input messages. External interrupt received (not used). Users waiting to open or close a file while another open or close is in progress (nonreentrant portions only). Operator aborted user or user hung up. Users queued for the log-in process. Users queued for access to an I/O device. Users queued for ALLOCAT managed granules. Users queued for symbiont disc space. Users queued for symbiont file table entry. ' Users typing input and in core. i Users typing input and user not in core. Terminal output users - in core (more characters than the system limit are ready for typing). Same as TOB except user is not in core. Users ready to continue terminal output (the number of characters remaining to be typed is less than a system limit). Users waiting for a specified 'wake up' time. The actual names of the scheduler state queues are those given above prefixed with the letter'S'. f I 49 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 50 Scheduler Operation The scheduling categories: 1. queues be divided into four READY Queues (SB:EXU) Jobs in one of these execution if in core not. Through some present need for the 2. may state queues are ready for or ready to be swapped in if event, they have indicated a CPU. ACTIVE Queues Jobs, in one of the states CU or lOW, are currently running either using the CPU or one of the lOPs. 3. WAITING Queues (SB:SWP) These jobs have no present need for the and are not in core. 4. computer OUT-OF-IT Queues These jobs have no present need for the computer and are not in core. Table BD-4 shows the queue list used for selection of users to be brought in for execution and the queue list used for execution of users to be moved to the swap device. HIR (High-In-core-Ready-to-run) is a condition set when an in core user is in one of the READY Queue states (actually a count of such users). 50 SECTION BD 1/12/73 PAGE 51 UTS TECHNICAL MANUAL Table BD-4 Ready and Waiting Queue Lists WAITING QUEUES READY QUEUES : NRRT ON OFF ERR EC BK IR TOC C IOC COM BAT - High Priority SYMF SYMD W OEI OA DP TI TOB r j HIR OCU 1 I, Low Priority To select users for execution, the scheduler searches a list of the state queues, the READY list, in order to find the highest priority user in core memory. The highest priority user is served first. Thus, for example, interrupting users are served before those with an active input message (both of these take precedence over users with unblocked terminal output), then come' on-line compute-bound users and, finally, compute-bound batch jobs. Note that users in order states have no current requests for CPU resources. Note also that as each user is selected for execution, the state queue of the user is changed to CU. When the quantum is complete, the highest priority queue which the user can enter is the compute queue. Users that enter any of the high (above COM) priority states receive rapid response, but only for the first quantum of serivce. Thereafter, they share service with others in the compute queue. 51 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 52 A similar selection procedure is used to set up users for swapping. First, the highest priority in the READY list who is not in core is selected and his size requirement (including the requirement for shared processors not in core) is determined. Second, users are selected from the WAITING list until enough space is freed until enough space is freed by these users and their shared processors to provide for the user selected for swapping. If a single user can be found to swap out, then a single rather than mUltiple swap is chosen. No swaps occur until a user that is out of core enters a high-priority queue (READY Queue). No execution selection occurs prior to the end of the minimum compute quanta. No execution selection occurs prior to the end of the full compute quanta unless the HIR signal is set. Two lists resulting from this selection are presented to the swapper. One list contains the user (or users) to be swapped out and the other contains the user to be swapped in, the shared processors that must accompany the user, and the current free core-page list. Priority queues are arranged from high to low in order , of increasing expected time before the next activation. This ensures that the users that are least likely to be needed are .swapped out first, while the users most likely to require execution are retained in core. For example, the swap algorithm operates so that compute users remain in core and use all available compute time while the interactive users are swapped through the remaining core space whenever the following three conditions exist: 1. 2. 3. There is room in core for three user programs. Two users are comput~ng steadily. Other users are doing short interactive tasks. In order to prevent deadlocks and to provide for round robin scheduling of the compute-bound queue, the swap algorithm also provides for a search through the READY Queue list in inverse order up to the level of the inswap user for a set of outswap users. 52 UTS TECHNICAL ~mNUAL SECTION BO 1/12/73 PAGE 53 Thus, users whose programs have just issued a terminal input request will be swapped out before programs which have blocked on terminal output. Both of these will precede programs blocked by file I/O requests, and the final selection will be made in reverse order through the queue of compute-bound users. For file I/O, programs are blocked from the time the I/O command is issued until it is complete. Terminal input is similar. Output to the terminal is no wait until about four seconds of typing have been accumulated in system buffers. It is then blocked; unblocking occurs when one-half second remains. Since users' programs are of different sizes, it may be necessary to swap out more than one program to make room for the incoming program, although a detail of the selection algorithm causes it to preferentially select a single outswap program if one adequate size (including any associated shared processors) can be found on the WAITING Queue list. The layout of programs on the swap device is made by selecting four pages (always a 512-word granule) at a time from a common pool, but preferential allocation occurs for pages which will maintain nearly continuous sector-by-sector allocation. This technique keeps swap timeshort while preserving a general allocation scheme. Programs are allocated to storage with the pure procedure portions ordered last so that the procedure portions do not have to be transferred from core to swap storage when a copy already exists on the device. Note that the queues CU, IO~v, TOBO, and TID do not appear in either list. Thus, the users in these states are not selected either for execution or for swapping, nor is unnecessary overhead expended in their search. Two examples of typical interactive use are illustrative of the scheduling operation. The first example traces scheduling operations for a simple, short interactive user request. At the time the request is typed, the user is in the typing input (TI) queue. His program, which has probably been swapped, remains on swap storage until the cae routines receive an activation chracter. Receipt of this character is reported to the scheduler and causes a change in state of the user to input received eIR). 53 UTS TECHNICAL r.1ANUAL SECTION BD 1/12/73 PAGE 54 The scheduler finds a high-priority user not in core and initiates a swap removing a low-priority user (if necessary) and bringing in the one just activated. On completion of the swap, the scheduler is again called and now finds a high priority user ready to run. Given that the current user has completed his minimum quanta, the user's state is changed to cu, the program is entered, and the input command is examined by the reading program. The cycle in this example is completed by preparation of a response line and a request to the monitor for more input, which changes the user's state to TI again, making him a prime candidate for removal to swap storage. The second example illustrates an output-bound terminal program. This program moves through the state cycle TOB-Toe-cu as output is generated by the program. The cac routines signal when the output limit has been reached, thus causing the program to be delayed while output is transferred to the terminal. In a typical operation, four to six seconds of typing is readied in buffers each time the user program is brought into core and executed. During the typing time, the program is not required in core and the CPU resources can be given to other programs. I/O Scheduling I/O scheduling is designed to give job step I/O a very high priority to provide good terminal response. Other I/O is permitted to run as fast as possible 'until the user has accumulated a full maximum quantum of CPU time, at which point the user is placed at the bottom of the compute queue. The scheduling scheme is illustrated in Figu~e BD-1. . 54 UTS TECHNICAL r1ANUAL SECTION SD 1/12/73 PAGE 55 .~E:IOC J b Quantum end fo)" ,ob step users step • processing • 0 ~/ ~,' " ~ ./-' ,/' \ High-priority sel ection for execution i l --·0 ~/ I / '. CU \~ \ I ~ "', Low- pri ori ty selection for .~xecution Quantum end: ~.~ used comp-ute ti me . QMAX-QMIN .. i :~M ~ ------- QO I~ I S) .. // ~ An I/O-bound user cycles through the queues cu, row, IOC, and CU until he exhausts his tiMe quantum at which time he cycles through the compute (Cor·n queue s. Thi s ·ensures that a single I/O bound user does not dominate the system. I/O that occurs at job step time (that done by CCI, TEL, and the program fetch logic) proceeds through the higher priority C queue. If the number of concurrent I/O operations for a user exceeds a specified limit, the user is blocked in state laMP until some of them complete. Reentrancy The scheduler permits job-to-job switching only at certain carefully controlled points within the monitor. At these points control is explicitly given to the scheduler for job switching. The scheduler also receives control on asynchronous events from traps and interrupts (this code is completely stack-reentrant in the unmapped stack), but it enforces a logical disable of monitor operations by returning to the point of interrupt if the trap or interrupt occurred with the monitor in control. This scheduler-enforced logical disable allows critical monitor operations, such as a file index update to run to completion before permitting another user job to proceed and possibly interfere with the incomplete activity. 55 UTS TECHNICAL ~mNUAL SECTION BO 1/12/73 PAGE 56 Batch Jobs Two ways of scheduling batch jobs which result in quite different fractions of machine time devoted to batch processing are reasonable in this priority structure. Both are provided in UTS, and the mode of opration may be selected by the installation manager. The first scheduling technique keeps the batch job stream in a separate queue (BAT) that has a lower priority than the interactive compute queue indicated in Table BD-3. Thus, batch jobs get service only when no interactive user has a request. Estimates from current systems indicate that 10 to 20 percent of compute time is available to batch processing on a system supporting between 20 and 30 concurrent users in prime shift. During nonprime time, 80 percent or more of CPU time is available to batch jobs. The second method of scheduling cycles batch jobs through the interactive compute queue, where each job receives an equal fraction of the available time. It is usual in on-line systems for 5 to 20 percent of the on-line users to be computing at anyone time. Thus, as much as one-half of prime time, plus 80 percent of nonprime time, could be devoted to batch background operation. In this scheme, batch jobs can be biased to get a different quantum than on-line user, thus permitting the installation manager to control the actual percentage of computer time devoted to batch processing. b. Memory Management These routines control the allocation of physical core memory, maintain the map and access images for each user, service the get and free page CALs, and manage the swapping space. 56 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 57 Core management includes the parallel management of swap space. When a core page is requested, a swap page must also ~e acquired. Similarly, a release of core requires release of swap space. In order to provide for fast swaps, space acquired must be contiguous, or nearly so, to that already allocated. Further, the program pure procedure is always placed last on swap device so that it need not be written out if it is unchanged. These two requirements make necessary a shuffling of space on the swap device and corresponding adjustment of· memory maps and swap command list when a new data page is acquired. Frequently no new core pages are available when requested. In this event, memory management must allocate the swap space and not the core space by the 'get virtual, no physical' process and cause an entry to the swapper to provide the needed extra page(s) through its normal swap scheduling algorithms. Physical Core Allocation Allocation of core memory pages to a user at his request depends on the actual size of the machine as determined during initialization, the current size of the user including all needed shared processors and the management set limits on user size. Details of the calculations are given below. 57 SECTION BD 1/12/73 PAGE 58 UTS TECHNICAL MANUAL The following table describes how physical memory is reserved for system functions in UTS: AMOUNT (in pages) (JITLOC+511)/512 9 6 3 1 1 1 USED FOR HOW ESTABLISHED Resident Monitor XDELTA Longest Overlay (OPEN) KEYIN Procedure KEYIN JIT Monitor JIT Each Symbiont Device SYSGEN Answering "Y" to DELTA during initialization request. Initialization Initialization Initialization Initialization Initialization The above table shows that an SDK system with three symbiont devices and a 27K monitor will have q1.5K in which to run user programs if XDELTA is requested, and 46K if it is not. In addition, pages must be reserved for the context area and other things, as follows: PURPOSE HOW ACQUIRED 1 1 JIT AJIT n DCBs m IPOOL/FPOOL Buffers 2 CPOOL Buffers 8 TEL Logon Allocated when N pages are acquired and is never released once allocated. N is 32 for ~7 and 13 on ~9 greater than 128K. Job step time, from user program. Job step time. A minimum of two IPOOL and two IPOOL are required; i.e., three pages. Automatic for batch jobs, ·reserved if an on-line user has symbiont access in his account. Reserved if user is on-line. PAGES Note: n may be obtained from the program-dependent. 58 LOADER map and is never UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 59 m may be altered using !POOL card; otherwise, system defaults are assumed. these defaults are defined at SYSGEN time and may be altered using CONTROL. Therefore, the maximum user program size run on-line on the previously mentioned system, with two pages of DCBs and the ~n1mum allocation of file buffers (three pages) would be 33K with XDELTA and 37.SK without. The maximum size of the same program in batch would be 37K with XDELTA and 41.SK without. An increase in physical memory will increase the maximum size of a user program up to a point (less than 128K) where the limiting factor is the virtual memory layout. The first 32K of virtual memory is dedicated to the Monitor. The context area which includes monitor overlays, buffers, DCBs, JIT, and AJIT follows in the next 16K of virtual memory. The next 64K is set aside for user programs, and the last 16K of virtual memory is allocated to special shared processors and shared libraries. 64K is available for user program pure procedure and data, and 12K is available for user context (DCBs, buffers), not including JIT and AJIT maximum program size is 76K. On Sigma 6 and Sigma 9 configurations with 128K or less, an AJIT is required when the user size exceeds 32 pages. On Sigma 9 configuration over 128K, this threshold is 13 pages due to the larger memory map. c. Job Step Control The collection of monitor resident routines called STEP is entered between major segments of a job or an on-line user's session. Entries are made whenever ERROR, EXIT, or ABORT CALs are executed or when a new shared processor or new program must be fetched. When command processors (CCI, TEL, or LOGON/OFF) exit, they do so with coded information in registers which are used to associate a shared processor or fetch a prepared load module. (This exit is known as an interpretive exit.) Prior to either type of fetch, the user's core and swap RAD space are returned to the available pool to be reacquired during the fetch. Following the fetches, all DCB assignments associated with the user are merged into the DCBs acquired in the latest fetch. Required initialization of JIT is completed. 59 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 60 Following an exit by LINK from the load phase of processing a RUN command, step control sets up the loaded program, core image for execution, including the association of required shared debuggers and public libraries. Exit from CeI, TEL, and LOGON/OFF includes two other 'interpretive' exits. The first, to simply continue the current activity, and the second, to do the final cleanup after LOGOFF exits. The latter includes a test for completion of a batch job. If the job is completed, entry is made to the batch scheduler for selection of another batch job for processing. I/O, issued by STEP in order to fetch programs and processors at user request, is handled as a special high priority in order that good response time be achieved in these cases. 60 UTS TECHNICAL MANUAL 3. SECTION BD 1/12/73 PAGE 61 Symbionts, Cooperatives, and Multibatch Scheduling (RBBAT) a. Symbionts/Cooperatives Records sent to and received from the low-speed peripherals (CR,CP,LP,PL,RBT) are buffered to RAD or pack through the symbiont-cooperative routines. Four stages are readily identifiable. First, input jobs from the CR or RBT are blocked by the input symbiont into disc unit records and written in the peripheral storage area (PER). This process is carried out asynchronously with respect to other tasks in the system and, once started, is interrupt-driven until completion. Initiation is accomplished by operator command for CR and is automatic for RBT. The input symbiont recognizes !JOB cards for CR and RAT and treats them as beginning-of-file and end of previous file (if any), recognizes !FIN cards for CR and RBT and treats them as end-of-stream, and recognizes !RB cards for RBT and treats them as beginning-of-file/end of previous file as with !JOB cards. At file end, the file starting disc address is passed to RBBAT, the symbiont file ghost job, for entry into the batch tables. Second, when a user issues a read directed to the card reader, the operation is intercepted by the input cooperative. This routine reads and deblocks the records for presentation to the reading program, which is not allowed to read past the end of the symbiont file containing his own job. Initially, the multibatch scheduler selects the job to be run by placing the job and resource information in the GET tables. The batch user is started and the !JOB card CCl read causes this information to be placed in the user's JIT. Thereafter, records of the file are passed to the user on subsequent reads. Third, the output cooperative, which is an intercept routine acting on ali output directed to symbiont devices, blocks records into buffers, and writes them to secondary storage. Separate symbiont files are built for each type of output (print and punch). Upon user signal ('superclose', usually at end of job), the file is cloosed by entering it into the RBBAT queue via the add output file communication. 61 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 62 Fourth is the interrupt-driven task (the output symbiont), which reads symbiont files and writes the symb10nt device. Output symbionts are started automatically when RBBAT senses that there is work to do, the device is idle and, otherwise, capable of processing the output. Symbionts use, for buffer memory, pages obtained from the general pool of physical memory. This restricts maximum user size in that a user must not be allowed to exceed the available physical memory ieft while symbionts are active. The cooperatives use similar buffer and control memory pages from the user's virtual space. The buffer management routines get memory and restrict size appropriate to the mapped/unmapped (cooperative/symbiont) condition on entry. Symbiont files are selected by the Multibatch Scheduler (MBS) portion, RBBAT, for input and output by resource, priority, system id, and control information maintained by RBBAT. Priority by symbiont files which originates from the job card (or on-line user default) may be changed by the operator, who may also delete files. Control information (e.g., remote batch hold) is specified by the user. Figure GA-1 shows the symbiont and cooperative big picture. b. Multibatch Scheduler Inputs o Job description (resource requirements) from JOB and LIMIT cards. This information is carried in input symbiont tables which reside in the RBBAT. o Partition definitions (permissible ranges of resource values) created by SYSGEN in resident tables and modifiable dynamically during system operation using CONTROL. o Maximums, also carried in resident tables and changeable via CONTROL, which limit the total use of each resource by all batch (or on-line) jobs taken together. 62 UTS TECHNICAL MANUAL SECTION BD. 1/12/73 PAGE 63 New Job selection initiated whenever: 1. 2. 3. 4. 5. 6. a job completes exeuction. a new job is entered. partition definitions are changed. operator command 15 is issued. Resources are released (by an on-line job or by a CAL which releases resources). Clock routine which checks a flag set by certain cases of resource releasing. Scheduling Algorithm 1. Identify all available partitions (not executing, not locked). 2. Find the highest priority job which fits the available partitions. 3. Verify that execution established maximums. 4. Failing 3, increment job priority and go to 2. 5. Verify that order and account parameters do not preclude running the job. 6. Run the job passed. 7. Go back to Step 1, unless: a. b. c. selected if would all tests one J not have of exceed Step been The job was 'F' priority and not selected. No partitions are available. All jobs in the input queue have been processed. 63 UTS TECHNICAL 4. ~mNUAL SECTION BD 1/12/73 PAGE 64 System Services a. System Initialization UTS initialization routines accomplish three major functions: booting from a system PO tape, booting from system resident secondary storage, and recovery-restart. The functions are accomplished by common routines which distinguish recovery from booting by zero contents of cell 2A which is always filled in during a device boot by the hardware. The initialization routines fall into three physical groups: first, the routine INITIAL which initializes trap and interrupt cells and loads locks and access images both for booting and recovery; second, the routine BOOTSUBR which provides for monitor patching and system storage initialization; and third, the initialization job, GHOST1, which copies the system tape to the system account, provides for GENMOD patches to processors, and completes system storage initialization. The last two processes which have similar functions are divided in order to remove as much code as possible from the monitor root to job status even though, in this case, it is a master mode job. BOOTSUBR completes just enough initializatio~ of the system to enable it to run its first job, GHOST1, which completes the initialization task. Figure BD-1 summarizes the initializarion process. SECTION BD UTS ""TECHNICAL MANUAL 1/12/73 PAGE 65 INITIAL This routine is entered immediately after a tape or disc boot has read in the monitor's root or after recovery has done the same thing. Its purpose is to preset the hardware for system operation. It accomplishes this in the following order: 1. the unmapped JIT is moved from assembled location to execution location; 2. external interrupt cells are preset to zero; 3. the trap and initialized; 4. the memory locks are set to 01 everywhere except the code portion of the monitor, which is set to 11 ; 5. the virtual memory map is preset in correspondence with physical memory; 6. access is preset to read-only for virtual page zero and to no-access for the rest; 7. I/O interrupts are enabled for tape boot; counter for disc boot; and 8. GETHGP is called to read initialization is from disc. interrupt cells 40 through SF are 65 in one-to-one CLOCK4 XDELTA if UTS TECHNICAL MANUAL -0 0 0 0 al c:Q CD -- Q.. 0 I- U CIt 0 ~ s- CD U CD 0:::: ~ II I 1 I I 1 1 I I FIGURE BD-1 - Initialization Overview > 0 1 I I INITIAL Move master JIT to Execution Location. Zero external interrupts Set up 40 through SF. Load Locks, Access. Enable I/O interrupts. Enable CLOCK4 counter interrupts. BOOTSUBR MONINIT Check and set assigns for C, LL, DC, COC. Print and type patch numbers. Type sense switch setting assignments. Set up location 2B with proper monitor type. Read in XDELTA. Read card reader via XDELTA, patch root. SWAPINIT Copy ALLOCAT, GHOST1, Monitor Overlays XDELTA, RECOVER to swapper. Set up monitor tables with disc addresses. WRTROOT i 1 Write monitor root to swapper. write bootstrap on swapper. 66 -oo CO 0 0 CO CD U ISS .- a. I- II) 0 ~ ,.. UTS TECHNICAL MANUAL .... ~ U SECTION BD 1/12/73 PAGE 67 CD 0=::: 1T I GETHGP (Get XDELTA) Set up memory size info. Turn off symbionts. Enable all interrupts. GHOST 1 1 T, .J. 1 J. I Ask about DELTA and keep or no; release core of INITIAL and BOOTSUBR. PASSO to read and patch (GEN1-10D) processors. RECOVER2 for shutdown of open files. SYSMAK: copy shared processors to swap RAD Request date and time from operator. Write start record in ERRLOG. Initialize COC. Turn on symbionts Log on Analyze to process crash dump Start scheduling batch jobs by start of RBBAT ghost job; interpretive exit to PILL. 67 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 68 BOOTSUBR Three subroutines of BOOTSUBR are then called if the initialization is from a PO tape: MONINIT, SWAPINIT, WRTROOT. MONINIT, the first subroutine of BOOTSUBR, carries on the initial dialogue with the operator: 1. it requests from the operator new device addresses for card reader, line printer, system resident swapper, and COC, providing dynamic reconfiguration for these devices; 2. it prints the patch segment numbers and sense swith setting both on line printer and on the operator's console; 3. it sets location 2B with monitor version and type; version comes from the monitor information record generated on the PO tape by DEF; 4. it reads in EXEC DELTA and monitor cells which locate it; 5. it then passes control to EXEC DELTA to read the card reader for monitor patches, interpret them, and place them. If the ** card is read, a flag is set to control the 'boot-under-the-file-structure' operation, in which the PO tape is not read. initializes the SWAPINIT, the second subroutine of BOOTSUBR, initializes the system portion of the swapping RAD. Enough monitor elements must be placed to be able to run the first job - the GHOST 1 initializer. During copying to the swapper of monitor overlays, ALLOCAT, the elements of GHOST1, ~IDELTA, and the RECOVER overlays, the card reader is read by DELTA for patches to them; monitor tables which record overlay swapper locations are set up. This setup defines the portion of system RAn which must be intact to accomplish recovery. Recovery uses the system swapper from this point on (that which will be occupied by the shared processors) to save the crash core dump. 68 SECTION BD 1/12/73 PAGE 69 UTS TECHNICAL MANUAL WRTROOT, the third subroutine of BOOTSUBR, writes the monitor root which is now fully initialized and patched to the system swapper. The routine also writes the disc bootstrap routine onto system swap storage. INITIAL's Entry to GHOST1 Final activity includes: carried out before entry to GHOST1 1. scanning memory for existing physical pages which are linked into an available memory page poolJ 2. enabling of all interrupts (COC lines' are not scanned by the clock interrupt routines until later when the input external interrupt locations are set up); 3. temporary disabling of the symbionts so that GHOST1 will use printer and card reader directly. INITIAL exits through the job calling for startup of GHOST1. initialization logic GHOST1, The System Initializing Program' This master mode job contains all initialization and recovery functions which can be run as a job (as distinct from those functions which must be imbedded in the monitor root). The program takes differential action on recovery (cell 2A = 0) and on disc and tape boots. Major elements included in GHOST1 are as follows: 1. RECOVER2, which is entered only in a recovery situation to replace dynamic system information like the date, to provide accounting summaries for all interrupted jobs, to copy files that were open in update mode and could not be closed normally, and to copy the core dump from the swapper to a permanent file, 2. PASSO, which copies PO tapes to files, the application of GENMOD patches, 3. SYSMAK, which reads the shared processors from files and prepares absolute copies on the swapper. 69 including UTS TECHNICAL MANUAL SECTION BO 1/12/73 PAGE 70- As shown in the schematic flowchart of Figure BD-2, GHOST 1 first asks if EXEC DELTA is required. If not, or if there is no answer within six seconds, the physical memory used by EXEC DELTA (from about 60-64K physical) is released to the physical page pool and the 'Lees-watering-hole' entry to EXEC DELTA at location 4E is disabled. A check of location 2A determines whether recovery (2A = 0) or boot is intended. RECOVER2, PASSO, and SYSMAK are entered, as shown. Following a date-time request, if booting, common logic is entered which: 1. writes a startup (or recovery) record into the hardware error file, 2. initializes terminal I/O by starting turning on all line receivers, 3. turns on the symbiont system, 4. logs on a ghost job for Analyze (if recovering) to process the crash dump, 5. enters the batch job scheduler still in the input symbiont recover, and, finally, 6. exits through the monitor's interpretive exit logic to activate FILL for possible reading of backup tapes. cac I/O and to start jobs queue after a The flowchart Figure BD-3 shows PASSO's main line. execution SYS~mK copies the shared processors listed in the monitor table P:NAME from files to locations on the swapper with addresses, sizes, and start addresses placed in the monitor shared processor tables. 70 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 71 entry _ _,--.....-.-.,<~..~--...J....---~ .. ,. . . . . ".~.,.,,,_.=,. _ Do you want Exec De Ita? .~~;--------- I~~ ~~I~~:~~re pages to physical pool, I reset XPSD in location 4E to an effective NOP. I l---.------r---~- .._. _~.". c •• _ ....".. '·· f~overy o~ Boo~? , t disc· "'" Do you want HGP reconstruct? ) .---~ ape f ). No r-· . · \ REi ON / \ RECOVER2 . PASSO\ BO-3. / . .,~I &...-_---._- I I ------- /---- 1Fi9 ,/ "- (tiGP .-------\ I SYSMAK / _ _ _ _--J SYSMAK Write start record to ERRLOG Initialize COC Turn on Symbionts Initiate Analyze, if recovery Schedul e batch iobs Exit to FILL 71 Figure 8D-2 Overview of GHOST1 SECTION BO 1/12/73 UTS TECHNICAL MANUAL PAGE 72 Figure BO-3 - PASSO Overview .-----_._.-_.._-/ \ PASSO \~----I---.! .____.._._ .. _. __ . ___ ._.... . . ..._.-.__L........ _ . _ __ Read Cards (GENMOO, GENDCB, etc) saving them in a core buffer '_ ... - ........... -.-. . . --····-·-·r--··-----·--···-····--····-·····--·· -- BITOTM .!L____._~ Boot under fj les? (was a ** card read?) :. ~. yes -"' - /1 " \ --.---- ' .. - ._.. . no _"'--_.- .- Read all fi Ies from PO tape and wri te them on fj Ie RAD using standard monitor CALs and continuing until the fj ~e LASTLM is encountered. --_._-_._, ! I PHASEC Open each file in the :SYS account and if GENMODs exist for that file read it in, patch it, and write it back on fj Ie. r-----· ~. eXit 72 UTS-TECHNICAL MANUAL SECTION BD 1/12/73 PAGE h. 73 Operator communications The machine operator communicates his instructions and requests to the system through key-ins at the operator's console. This 7012 console is a TTY-like EBCDIC transmitting device connected to an MIOP. It is usually designated TYA01. Since the device may be used in only one direction at a time, the operator must signal his desire to type by pressing the PCP interrupt button. He is prompted for input with a !, carriage return terminates the control message, and EOM deletes it for a retry. When the PCP interrupt button is pres~ed, IOQ recognizes the request and starts the console read . operation into a dedicated buffer. On completion of the message, the ghost job for KEYIN is initiated. The pre-established JIT for this job is read, and the initial environment is pulled and executed as is normal for job beginning. For the KEYIN job, the program is contained entirely in the registers. The two-instruction program calls for association and entry into the KEYIN overlay and for job deletion after return. The KEYIN overlay reads the input message from its fixed buffer, interprets it and acts on the commands. The overlay structure is used in order to provide convenient direct entry to monitor routines and to the monitor tables which KEYIN is directed to change or display. 73 UTS TECHNICAL MANUAL SECTION BO 1/12/73 PAGE c. 74 Accounting and Performance Monitoring CPU execution accounting is carried out by th~ incrementing of the CLOCK4 timer. This clock ticks each 2ms into a cell in the JIT. Addressing is subjective, that is, the JIT of the current user is selected by the setting of the memory map. When the map mode is not on, the time increments are accumulated into the monitor's JIT located at the same physical address that is occupied virtually by user JITs. Thus, when the CPU is executing for a given user, whether in his program or in the monitor -cting at his request, time ticks are directed to his JIT via the map. When the monitor is operating unmapped in servicing I/O or terminal character interrupts, processinq traps, providing symbiont I/O or scheduling jobs - all general services which are not simnlv allocatable to a single job the time ticks are accumulated to overhead cells in the master unmapped JIT. Two other breakdowns are performed on the CPU time accumulated for each user. The two breakdowns result in four separate CPU time accumulations. Time is separated at the CAL boundary accumulating time used by the user program and monitor time used to carry out his CAL requests. Honitor service and program time are carried separately also for UTS shared processor execution and other proqram execution. This is slightly different than BPM/BTM which counts processor execution for all programs coming from the :SYS account. COBOL is the important processor which is not shared and is therefore accounted for as a user program. Performance monitoring is carried out as an integral part of the UTS system. Subroutines and count-incrementing instructions are embedded in the monitor at appropriate places. The counts which they accumulate and the program to display these counts are described in detail in the UTS System l-1anagement Reference f.1anual. 74 UTS .'!-'ECHNICAL MANUAL SECTION BD 1/12/73 PAGE 75 Approximatelv one page of memory is devoted to accumulation of data on system operation. In order to keen the memory required small some reduction of the data is done at the time of gathering. Along with sums and counts for averaging, certain data is accounted for by adding into an appropriate cell of a distribution histogram. d. Automatic Recovery The system recovery function is provided to restore UTS to operational status very quickly following an unrecoverable failure, which may be either hardware or software caused. Some examples are memory parity error by the hardware or an illegal memory reference trap because of software error. Each reported error is checked to determine whether the entire system is in danger (unmapped mode errors) or iT only one user is affected (mapped mode errors). In the latter case, that user is logged off, or failing that, deleted, and system operation continues. In the former case, recovery is entered. Recovery consists of cleaning up all open-ended information (both user and system-oriented information) and restarting the system at initialization. If this occurs all terminal users must log on again and the current executing batch job(s) must be resubmitted. Any job partially read through the card reader must be reinserted. Jobs already submitted but not yet in execution are saved and need not be resubmitted. The recovery routine is entered whenever hardware and software errors are detected. Hanual entry is also provided for use by the operator when the system cannot automatically recover, such as if low core erased or the system loops. When the recovery routine is entered, none of the normal operating system is assumed to be operating. Most routines of the normal system required for recovery are duplicated in the recovery routine, but for automatic recovery a small resident recovery driver is required intact. This driver brings in the bulk of the recovery routine, overlaying the pure procedure portion of UTS. Certain monitor tables are also required intact. This is verified where possible. If the "recovery process cannot be completed, the operator is instructed to reload the system from the PO and file backup tapes. 75 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE The recovery routine per~orms 76 the following functions: 1. Displays cause of failure. 2. Takes a full core dump for later analysis. 3. Closes all open files using default o,tions. 4. Packages or releases all partial s"mbiont 5. Packages error log. 6. Informs users 7. Saves time, date, error log pointers, accounting information, s~biont file directory, and RAD granule stack contents. 8. Restarts o~ system files. interruption. and restores items saved above. lihen any functions cannot be performed, these are noted' on the operator's console. If the function is considered minor, recovery continues • . If it is connected with file operations, the file identification is noted and recovery proceeds. If recovery determines that the RAD allocation tables (HGP) or File Control Tables (CFU) have been destroyed, then a routin~ is called to rebuild the II P bv reading through the entire file hierarchy, recording RAD and pack addresses as it proceeds. While this technique cannot repair or replace file elements which have come unlinked during the failure, it does provide a much faster restart mechanism than reloading of files from tape (about 15 minutes, as opposed to one to five hours, dependinq on reload technique and file size). 76 UTS TECHNICAL 14ANUAL e. SECTION BD 1/12/73 PAGE 77 System Debugging Although much system debugging is carried out by other means and with other tools, UTS carries with it a master interactive debugger called EXECUTIVE DELTA. Language features of this debugger are virtually iqentical to those of user DELTA as described in the UTS Time-Sharing Reference Manual. EXECUTIVE DELTA carries with it an elided symbol table for the monitor and may be entered through location 4E. EXEC DELTA does not use (and therefore depend on) monitor I/O and thus, may be used to examine, change, set breakpoints and otherwise completely control the operation of the system whenever such steps are necessary for detailed debuggginn or development activities. (~or most crash analysis on running systems, the dumps taken by recovery and reported by ANALYZE are adequate for finding problems.) EXECUTIVE DELTA is loaded with the monitor's REF/DEF stack and placed on the system PO tape by SYSGEN. One of the first tasks of the boot routines is to bring in EXEC DELTA and place in physical memory at approximate location 60-64K. During the boot processes it may be used to make svrnbolic patches to the system either entered from the console or from the card reader. At the end of the boot process the onerator has the option of retaining DELTA for possible later use or releasing it and returning its physical soace to system use. Once released EXEC DELTA cannot be regained except through the recovery process. 77 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE f. 78 Error Logging, Diagnostic Device Access Recording of hardware errors for analysis by customer engineers is carried out by a special procedure designed to minimize the possibility of losing the record of the errors. Each device error, watchdog timer trap, memory parity error, device timeout, etc., together with system startup and recovery records and software-detected inconsistencies which might have been caused by hardware errors are recorded by the resident error logging routine into a pair of 64-word core buffers which are then transferred to RAD in a simple linked chain. A special CAL may be used to read this file and a routine, ERR:FIL, is provided with the system read this special file and, using standard file management operations, transfer it to a standard managed file, ERRFILE. ERR:FIL is called as a ghost program each time five error records are accumulated. In file form, the records are accessible to customer engineers and to two standard system programs, ERR:LIST and ERR:SUM, for listing and summarizing the error file contents. Descriptions of these programs and of ERRFILE record formats are given in the UTS System Management Guide. Also provided for customer engineers is a privileged method for opening I/O directly to a device, bypassing the symbiont operation. Thus, diagnostics may be run on-line during system operation to diagnose, test, or PM the peripherals. In this special mode, the AIO, TDV, and TIO status information from the device are returned directly to the program via the DCB. Error and failure records are still recorded in the error log '-and privilege-controlled CALs allow direct reading and writing of the special error file. Alternately, the diagnostic program may cause. ERR:FIL to transfer records to the. standard file, ERRFILE, by issuing a ghost job initiation CAL, and read the records from that file. 78 UTS 5. TECHNICAL MANUAL SECTION BD 1/12/73 PAGE 79 User Service This category encompasses most of the monitor routines which are called at the explicit request of user programs, both batch and on-line, through CAL instructions. The major categories are: a) file management service for reading and writing of files on tape, RAD, and disk pack; b) load-and-link services; and c) batch debugging services. Also in this category but not explicitly described in this overview, are routines for the UTS-specific CALs, trap control and timer CALs, the user program overlay segment loading CAL, error log read and writing CALs, and the job entry CAL. a. File Management This category includes routines which manage the contents of and access to physical files of information. Included are the functions of indexing, blocking and deblocking, management of the pools of granules on RADs and disk packs, labeling, label checking and positioning for mag tape, formatting for printer and card equipment, and controlling access to and simultaneous use of a hierarchy of files. Four subgroups are identifiable: 1. Basic routines for reading and writing files and physical devices. 2. Routines for opening and closing files. 3. Routines to changes in WEOF, PEOF) device DCBs 4. Routines to service labeled tape. service the CALs requesting position files or on tape (PFIL, PRECORD, REW, and those requesting DCB changes for (all the M:DEVICE CALs). The primary storage areas used by file management are the DCBs and buffer areas in user virtual memory, and the CFUs in resident core which control simultaneous file usage. Also in resident memory are 'monitor buffers' from MPOOL, which are used primarily for preparing operator console I/O. Occasional use of nCT and IOQ tables occurs. 79 UTS TECHNICAL r·1ANUAL SECTION BD 1/12/73 PAGE 80 All physical I/O is accomplished via the basic I/O routine, IOQ. Entries to the file management routines are via the CAL receivers, CALPROC and ALTCP. b. Load-and-Link Command This set of monitor routines is contained in the overlay, LDLNK, and processes the M:LINK and M:LDTRC CALs. They allow processors to pass control back and forth from one to another in either a subroutine or transfer-of-control fashion. COBOL object programs and the MANAGE processor use SORT as a subroutine via M:LINK; PASS3 of SYSGEN uses the Loader in a similar way. Communication between caller and callee is via information stored in COMMON memory and in registers. When an t1:LINK is issued, the entire program and context, including open DCBs but not the COMMON memory area, is saved in the star file idN where N is a binary number incremented for each l-1:LINK. All memory except COMMON is released and control passes to a point in STEP to associate the indicated shared processor or fetch the named program. The parameter N is passed to the called program to identify the saved program for possible return. Two possible actions are available for M:LDTRC. The first is like M:LINK except that the current program is not saved. The second occurs when the request names a program file, idN, preserved by a previous M:LINK. Current memory pages are released and the file idN is read in. The file idN is released and the program entered at its return point just following the M:LINK. Cleanup is necessary for the saved program images after program exit or abort and processing of any PMOs. This need is indicated by a nonzero value of the link counter, N, in the rightmost byte of the JIT cell, J:RNST. Each idN file is read and all DeBs therein are closed, the file is released, and finally, N is zeroed. 80 UTS TECHNICAL MANUAL SECTION BD 1/12/73 PAGE c. 81 Batch Debugging Batch debugging services include program MODIFY commands, execution output and test via SNAP, IF, AND, COUNT,-etc., CALs and control cards, and postmortem dumps through PMD commands. These commands are read, processed, and'executed by the coordinated action of the processors CCI and RUNNER, the root element STEP, and the monitor overlay DEBUG. The processors read and prepare tabular forms of the commands while the monitor elements carry out the indicated actions. The process begins when eCI reads the MODIFY, SNAP, PDM, etc., cards which follow the RUN command in the JCL stream. A RUN table is built from the information on the RUN card and left in high virtual memory for use by RUNNER and STEP. For each card read after the RUN card, a record is written into the star file, idD. A flag is left in JIT to indicate the presence of PMDs and a count of the number of other debug cards is left in the run table and CCI exits indicating the required load module fetch to STEP. The fetch portion of STEP calls the special shared processor, RUNNER, as an aside in order to process the idD file. RUNNER reads the file and creates two tables in core, the first of which contains location and contents values corresponding to MODIFYs and SNAPs. The second table contains FPTs for the debug CALs. PMD and PMDI records are left in the idD file. The head and tree of the load module requested (as recorded in the RUN table) by the original fetch are read by RUNNER, the size of the pure procedure area is determined, the two tables are moved into position just above it, and the head and tree records are updated to reflect the additional pages (if any) and the LM start address. The page containing the Run table is released. STEP interprets the final exit from RUNNER and, after completing the load module, fetch places the MODIFYs and SNAPs in the appropriate locations in the user program as indicated in the Rm~ER prepared tables. The user's program is then placed in execution. 81 SECTION BD UTS .TECHNICAL MANUAL 1/12/73 PAGE 82 When SNAPs, IFs, COUNTs, etc., are executed, the CAL receiver associates the DEBUG overlay which provides the dumps and other required operations. On final exit from the user's program, if either the flag indicating idD presence is set, or if the program exits with an error or abort indication, then STEP associates the DEBUG overlay. The TELUSER portion of this overlay processes error and abort codes into messages and appropriate dumps, while the PMD portion processes PMOs from the idD file, provides the indicated dumps, and releases the idD file. Return to STEP is made for the step shutdown procedure. 82 remainder of the job UTS TECHNICAL MANUAL SECTION BE 1/12/73 PAGE 83 MONITOR PHYSICAL STRUCTURE This section summarizes the UTS monitor by listing and functionally noti~g each of the system modules. The modules are summarized in S1X functional categories, then each category is detailed, module by -module, as to function and size. Finally, the utility processors (as distinct from language processors, which are delivered with the system) are listed by function and size. Sizes and exact module content are approximate only; they are accurate for a particular version of UTS. The gross size of the system can also be estimated from the size of the compressed source files (280 files totaling 2400 granules) and from the size of a typical :SYS account (175 files totaling 3100 granules), although this later value is highly dependent on individual installation desires. Modules are grouped by place of residence in four categories: 1. MONITOR ROOT - These routines are loaded together, enter the machine at system boot time, and are never replaced except during recovery. 2. VIRTUAL OVERLAY - These groups of routines are required to perform specific user serivces. They are loaded with the REF/DEF stack of the monitor root and communicate directly with it. They run in master mode but are mapped. They act as map reentrant shared processors only one copy is required for all users. More than one overlay may be physically resident in the CPU if appropriate in light of cumulative user size and processor association. 3. PHYSICAL OVERLAY Three kinds are used: a) monitor initialization code booted with the root but where space is reclaimed after startup; b) space is physically reserved permanently for execution of DELTA if that debugger is selected at boot time; and c) the recovery routines are loaded over code of the root monitor. 4. PROCESSOR - The utility routines of UTS are mostly user-style programs running in slave mode and mapped. Some of the programs are shared processors and others are ordinary unshared ones. Two exceptions are the initialization program, GHOST1, which runs in master mode in order to patch the monitor and to establish shared processors on the swapper with direct execution of I/O commands, and the granule allocation program, ALLOCAT. 83 UTS TECHNICAL MANUAL SECTION BE 1/12/73 PAGE 84 Root size is summarized in Table BE-1. Table sizes are detailed in Table BE-2. Typical size of modules in loading order is given in Table BE-3. Differences between a large and a minimum Table BE-4. monitor are given in The major SYSGEN parameters which control root size are given in Table BE-S. 84 UTS TECHNICAL MANUAL SECTION BE 1/12/73 PAGE 85 Table BE-1 - UTS Root Size Code BASICS 6900 System Management 6100 Symbionts and COOP 1700 System Services User Services 400 5300 20,400 Tables Fixed Size 1400 Variable Size 8000 TOTAL Large 128 user systeM (small system = 2800) in variable tables1 a difference of 5200) 29,800 85 UTS TECHNICAL MANUAL SECTION BE 1/12/73 PAGE 86 Table BE-2 - UTS-C01 Resident Tables INITIAL DEF NAME DECIMAL SIZE SYSGEN COMMAND DESCRIPTION Fixed Size Tables and Assembly Parameterized Tables SSDAT PPP PMDAT HGPSTK CFUD 598 PPP PMDAT BUFSPD CFUD 4 218 424 6 M:OLIMIT SL:OTIME 14 :OLIMIT M:ELIMIT SL:ETlME 14 :ELIMIT M:BLIMIT SL:BTIME 14 :BLIMIT COMBAT 74 GI:SDA Ghost job tables, swapper skeleton command list and disc address, swapper page pools, swap scheduler tables Physical page, pool data Performance monitor counters and distribution Granule allocation stacks, pointers, comm. buffers, etc.e Parameters definitions for Packs and RADs (sectors/track, etc.) Default limits (print, punch, time, core, etc.) for on-line Limits (print, punch, time, core, etc.) for exit control Default limits (print, punch, time, core, etc.)' for batch Contains GETI tables and RBBAT symbiont and MBS communication buffers. SYSGEN-Generated Variable Size Tables M:COC M:SPROCS M:IMC M:CPU IOTABLE COD:LPC P:NAME S:CUAIS MPOOL IOTABLE M: SDEV SSTAT PL:LK M:PART 1100 550 650 4370 1150 34 - 138 8 000 :COC Terminal I/O control tables and buffers :SPROCS Shared processor control tables : IMC System control parameters, user tables for scheduling, etc, :UTM MPOOL, CPOOL, IOQ Tables, CFUs, PPUT, Sigma 9 PSDs :CHAN,:DEV DCT, CIT, OPLABEL, TPMEN, AVR Tables, Remote Batch Control Tables, Swapper configuration definitions, HGP skeletons, private HGPs :SDEV Symbiont control tables : PART Multibatch partition control tables UTS TECHNICAL MANUAL Table BE-3 Name Decimal Size Begin SSDAT PPP PHDAT 100 598 4 218 SLI~1S 0 COCD COCI Tables M:COC H:SPROCS r1: IHC H:OLIMIT H:BLIHIT r·1:ELIHIT REQDC CFUD RECORD CHK l~:CPU I'1:BIG9 IOTABLE 11: SDEV COHBAT H:PART HGPSTK lNlTRCUR GPHGP CLOCK4 ACCT Handlers 48 76 623 1100 550 650 14 14 14 64 6 2 28 4370 0 1150 34 78 138 424 100 18 155 52 419 Name - \J Cl) E "- Cl) a... Cl) 0i: ~ ~ Q) ...a c t- c: '0 ~ 0 U en Q) :::> \J 0 ~ Q) -g u --e SECTION BE 1/12/73 PAGE 87 TlEical Contents of UTS-DOO In Loading Order Decimal Size CRDOUT 90 PLOT 14 SKD 728 7TAP 102 DPACK 140 COC 1982 TSIO 432 ANSTP 256 S9TRAP 170 2741 Tables 384 ERHNDLR 394 FBCD 21 SSS 2388 STEP 1906 1111 1018 CALPROC 203 ALTCP 542 P14 264 T:OV 214 1346 lOO ENTRY 202 BUFF 58 GRAN 260 GRANSUB 263 ADD 86 SUB 19 AVR 160 COOP 312 SUPCLS 296 SACT 163 \J Cl) u Cl) --- 0.. I Cl) "- ~ 87 Name OUTSYl·1 INSY~'1 SUSPTERM SYr.1SUBR IORT RDF NRTF WRTD PFSR INITIAL JIT BOOTSUBR Decimal Size 361 212 24 50 757 2345 1158 622 73 246 512 964 >-. c - 0 c Cl) \J °Vi Q) a::::: >-. c: 0 c oz0 0 N 0 00- c UTS TECHNICAL MANUAL SECTION BE 1/12/73 PAGE 88 Table BE-4 - Differences Between a Large and Minimum Resident Monitor Large Resident ~1inimum 29,800 Words Resident 23,500 6,300 cac Without 2741, etc.* 800 Handlers: DISK, ANSTP 400 COC Tables & Buffers 128 Lines 1,100 Symbiont Tables, CFUs Monitor Buffers, Patch 4,000 6,300 *SYSGEN options will remove 384 words of 2741 translation tables from the monitor load. To recover code for 2741 handling, the cac module must be reassembled. A total of 760 locations may be saved in COC by eliminating 2741 code, page heading, logic, buffer checking, and performance monitor entries. 88 SECTION BE 1/12/73 PAGE 89 UTS- TECHNICAL MANUAL Table BE-5 - UTS-DOO Monitor Size Increases due to SYSGEN Par"amete"rs MODULE FACTOR SYSGEN KEY~RD ~1:COC 4 words per buffer 5-3/4 words per line BUFFERS LINES M:SPROCs 9-1/2 words per shared processor entry. 10 if Disc Swapping or BIG9 10-1/2 if Disc Swapping and BIG9. :SPROCs entries r4: IMC 7 words per user 2-1/4 words per ghost job ~fAXG+MAXB+MAXOL 34 words per MPOOL 8 words per IOQ 19 words per CFU 6-1/4 words per tape if ANS system 1 word per input symbiont file 1 word per output symbiont file 1-1/4* «AVGSER*16)+3+17 words 1/4 word per physical page (1/2 word if BIG9) 18 words for Sigma 9 PSDs Patch Space 2-1/4 words per RBT device MPOOL QUEUE CFU 13-3/4 words per OCT 2 words per CIT 3-1/2 words per tape and private pack (AVR) 8 words per public HGP 20 words per private pack HGP 1 word per DCT+AVR IOCTQ 6-74-word CLIST per device One per :DEVICE One per : CF..AN One per PRIV + tape r·1:CPU IOTABLE 2-1/2 words per RBT device 89 MAXG :DEVICE INFILE OUTFILE AVGSER CORE, (BIG9) SIG9,BIG9 MPATCH :DEVICE One per pack or RAn One per PRIV One per device: Punch - 74 SKD - 74 DP - 12 Other - 6-8 :DEVICE UTS TECHNICAL MANUAL M:SDEV SECTION BE 1/12/73 PAGE 90 6-3/4 words per symbiont device :SDEVICE names M:PART 7-3/4 words per partition Maximum n in PART,n S9TRAPS 169 words for Sigma 9 traps SIG9,BIG9 90 SECTION BE UTS TECHNICAL MANUAL 1/12/73 PAGE Basics Control & I/O Device Handlers Terminal I/O & Buffering Root '!100 Virtual Monitor Overlay Physical Monitor Overlay 91 Ghost Job or Processor 1100 2500 6900 System Mana2ement Scheduling & Swapping 2388 Memory Management 1589 (Core & Files) Job Step Control 1906 f.1oni to rOve r 1 ay control + CHK 242 Multibatch Scheduling Symb. File Handling and Remote Batch 1700 680 3800 1rn25 System Services Initialization Operator Communications Accounting & Performance Monitoring Recovery System Debugging 113 1200 10700 1800 300 7000 4400 400 User Services 5300 File Management Load & Link commands Batch Debugging commands Other User Services ~ Tables TOTALS l.finimum Size 11900 800 1700 3600 1900 9400 29800 24,600 19800 91 12600 17100 000 Size No. Lines ALTCP 542 886 CAL P ROC 203 358 CLOCK4 155 323 TABLES 623 671 1346 202 2028 258 73 121 lOa ENTRY PFSR S9TRAPS "-0 ~ (I/O Device Handlers 170 1100 PTAP (143) 172 PLOT 7 TAP MTAP MAGTAP CRDOUT DPAK FBCD ( 14) (41 ) (71 ) ( 162) 90 140 44 128 296 54 TSIO DPSIO 432 (688 ) .683 Descri rap nterrupt an erS1 I/O Queueinn: Secondary C , Processor 1 trap processing CAL receiver and distributor (direct for CAL1,1 CAL1,2) Clock 3 handler (time of day, timed-events) Constants, dates, error log routine & buffer, WD trap memory parity interrupt, file account directory index Central I/O queueing and dispatching Central XPSD receivers1 routines for traps and interrupts Power fail-safe recovery Trap & interrupt handlers for the Sigma 9 Device-specific'I/O start & recovery routines' , pr n er, car rea er, tape, operator console Paper tape handler (not teletype terminal top) Plotter handler Seven-tracK tape handler Nine-track tape handler Common mag tape routines Card punch handler Disk pack (7242) handler Hollerith to EBCDIC (026 to 029)H conversion Swapper I/O routines Swapper I/O routines for disk pack swapping '"tJ '" >'m Q-n m~;:! '10 W z ~ o:J m -' (function) LM Name ('l'erIriinai flo Handler) ROM Compressed COC (1364) COCI COCD DOO Size No. Lines 2500 2791 1982 2378 76 143 48 622 384 (System Management) BUF 5950 7'945 1018 1899 58 146 260 GRAN SUB SSS 253 2388 454 328 3602 STEP 1906 2482 T:OV CHK 214 28 248 GRAN (Symbionts & Cooperatives) 430 1675 COOP 86 161 312 554 INSYM OUTSYM 212 361 400 64 142 SACT 163 488 SUSPTERM SUPCLS 24 296 437 50 109 ADD REQDC SYMSUBR 571 35 Description Teletype terminal (7611) handler and buffering routines including 2741 code Initialization for 7611 Data areas for terminal I/O, not generated by SYSGEN 2741 Translation tables Scheduling, swapping, memory management step control Memory management - core & swap RAD pages Core buffer management File & symbiont granule management Granule management subroutines Scheduler for swap & execution 7 swapping Job step control - exits, program fetch, assign merge Monitor overlay association System consistency checking RAD buffered and queued I/O for printers and card e~uipment Move Input informat10n to JIT. Input cooperative & common routines for cooperatives Input symbiont for card reader Output symbiont for punch & printer, deletes symbiont files Disc and core allocation for symbionts and cooperatives Start & restart requests for buffers or I/O Type suspended & terminated messages Close output coop files1 output coop routines Miscellaneous symbiont routines (function) LM Name ROM Compress'ed (Initialization) DOO Size 1325 No. Lines' BOOTSUBR 964 956 INITIAL INITRCVR GPHGP 246 100 285 18 57 KEYIN (operator communications) 121 1850 DELPRI DISPLAY IOREC KEYN KEYSUB (Other System Services) 52 110 507 30 1190 465 86 1716 68 139 300 ACCT PM RECORD RECOVER CYCUSR RCVCTL SYMFILS TSTHGP 52 88 264 2 568 7050 2560 2750 660 1071 187 1324 590 523 980 Boot from tape or RADi space reclaimed from root after root Initlalizer & patch monitor portion of swap RAD - all space reclaimed Turns on system & initiates GHOST1 Initialization or recovery entry Read XDELTA Operator Command Processor, virtual overlay Delete symbiont files & change priorities Display key-ins Device I/O recovery key-ins All ather key-ins Symbiont command analyzer System instrumentation, Root resident' CPU accounting Performance monitoring System event trace recorder & buffer 1 Recover from crashes, physical monitor , overlay UTS-specific - process users Recovery control Symbiont file recovery File system recovery Executive (monitor) debugger dedicated physical, if used. XDELTA DELSYMS SYMTAB XDLT XDELTA 730 357 3661 4808 Symbol table for Exec DELTA Debugger (function) LM Name Fl. e Management ROM ressed DOO Size CFUD IORT . 350 3430 NRTD 622 919 WRTF 1158 1592 4775 LTAPE ARDL 250 359 LBLT 1289 1669 243 430 RDL OPEN Labeled tape operations: virtual overlay Read labeled tape reverse Write labeled tape & general purpose labeled tape out routines Read labeled tape records All open operations: virtual overlay Open subroutines: scan FPT, check na~es, file security checks Open labeled tape - output Open files & device DCBs except tape Open labeled tape - input Open free form mag tape 3000 OBSE 291 490 OPLO OPN 213 1610 363 2074 1201 OPNL OPNTP CLOSE LDLNK 1175 256 2345 ANSTP RDF Descri tion Fl. e & tape rout1nes, root reS1 ent 304 53 AVR MUL No. Lines 887 12 56 2860 CLS DLT 1998 2721 867 1160 MUL nUL OBSE 1330 LNKTRC 1046 1389 291 490 850 1103 ~ Monitor overlay for all close °ferations C ose DCBs Delete records and files Honitor overlay which creates treed indices Create treed 1n 1ces .or Security checks, etc. Load-and-link, load-and-transfer; virtual overla (function) LM Name DEBUG ROM Compressed DEBUGTV PMD TELLUSR SNAP DUMP IODTYPR TYPR 100 MISOV 000 Size 1700 11 No. Lines 28 370 500 250 590 990 622 122'5 808 1043 320 508 664 430 Description Batch debug commands; virtual overlay Entry vector for debug overlay Postmortem dumper Batch error message generator Execution time routines for debug CALs Core dump routine for SNAP, etc. Tape mount and dismount, messages M:DEVICE & M:SETDCB CALs 2360 UCAL 600 1000 TRAPC 150 RDERLOC T:DSMNT T:JOBENT TFILE 280 190 200 350 100 280 TIM POS 120 400 200 580 SEGLD 320 470 (Data Tables) 140 580 145 UTS CALs Trap control CALs Read and write special error log file Print tape dismount messages at logoff Symbiont file insertion CAL Record temporary file name for release at end of job Time CALs Positioning operations Load overlay for user program 9400 SSDAT 600 411 PPP PMDAT* 4 218 HGPSTK 424 145 218 51 6 53 CFUD H:OLIMIT* 14 M:ELIMIT 14 M:BLIMIT* 14 COMBAT M:COC* 74 1100 * * * ** GJOB tables, swapper she!! command lists, miscellaneous tables Physical page pool data Performance monitoring buffers Granule allocation stack, points, communication buffers, etc. -0 Vl »""-m G')-n m~;:j ......0 W Default limits (print, punch, time, ~ etc.) to on-line Limits (print, punch, time, etc.) for exit control Default limits (print, punch, time, etc.) for batch Contains communication buffers for RBBAT Terminal I/O command tables from :COC SYSGEN command z 0' m (function) LM Name ROM co;ressed M: PROCS' M:IMC* 000 Size 550 M:CPU* 4370 IOTABLE* 1150 M:SDEV* M:PART* 650 34 138 *Data and Tables generated by SYSGEN. No compressed or source corresponds . to the ROMs. ~*Size depends on SYSGEN parameters this example is a 45-user system for the Xerox Data Center which is approximately typical. No. Lines ••** * * * Description (function) LM Name ROM Compressed GHOST 1 BITOTM No. Lines 10675 220 178 DOO ceIO CLS1 GHOST1D MODIFY PHASE A PHASE B 1180 273 465 523 362 496 1414 PHASE C 328 990 PODCBS RECOVER 2 SYSMAK 296 1360 860 84 1331 1033 ACCTSUM 1760 1850 MAILBOX HGPRECON RCVRIO 180 3180 166 3090 510 413 ALYHD M:HGP* ALLYTL GRANSUB ALLYCAT RBBATM MBS RBBATR 8 66 253 352 9 328 460 Description System initialization - tape boot or recovery. A master mode user. Move modules from boot tape to file RAD Reads PASSO control cards Character scan routines Ghost 1 driver Subroutines for GENMODs Process GENCHN, GENOP, GENDCB Process GENMODs, GENDICTs builds tables Executes changes as dictated by PHASE B DeBs for GHOST1 Restore systems data saved by RECOVER Initialize swap RAD with shared processors Produce accounting for jobs shut down during recovery Recovery messages to users Rebuild HGP tables for recovery I/O routines for Rrecovery Ghost jobs which allocate RAD and . pack space Granule counters, master account directory pointer The HGP maps for granule allocation List of AD granules & first name in each Granule allocation routines Control module - comm. buffers, stack-adjusting, counting 3810 3085 370 350 *Data and Tables generated by SYSGEN. No compressed or source corresponds Id:nthe ROMs_ 403 228 748 482 770 680 AL~OCAT RBtiAT Size 2955 481 394 symbIont file control Multi-batch scheduling Symbiont file recovery UTS TECHNICAL MANUAL SECTION BE 1/12/73 PAGE 99 UTS UTILITY PROCESSORS PROCESSOR LMN APPROX. TOTAL SIZE ANALZ BATCH CCI CONTROL 4254 869 7177 3546 DEF DEFCOl-1 DELTA DRSP EASY EDCON EDIT ERR:FIL 3961 200 3810 3700 E~:LIST 2642 4288 1817 3451 1331 230 3496 3207 ERR: SUM ERRMWR FILL FPURGE LABEL LINK LOAD LOCCT LOGON MEDDUMP 3798 8138 809 2570 12700 PASS2 PASS3 PCL PFIL RATES REW RUNNER SUPER SUMMARY 11647 2468 3121 1800 516 1800 1900 2350 21800 SYl-iCON TEL UTSPM ttffiOF 1144 3767 9600 1800 DESCRIPTION Crash Dump Analyzer Terminal Batch Job Entry Batch Control Command Interpreter Installation Management Displays and Controls System Tapewriter for SYSGEN Extracts REF/DEFs from LM User Debugging Language Dynamic Replacer of Shared Processors GE Mark II Command Processor Compressed Deck to Edit File Editor for Symbolic Files Hardware Error Logging Hardware Error Log List Hardware Error Summaries Centralized Error Message Filewriter File Save, Restore, and Auto PURGE File Save/Restore Program Pre labels ANS tapes On-line/On-pass Loader Overlay Program Loader (Link-Editor) Loader Command Tablewriter Job/User Logon/Logoff Control Pack and RAD Surface (Cylinder-by~Cylinder Dump) SYSGEN Monitor Table Compiler SYSGEN Loader Runner File & Device Copying Utility Position File Control Command Charge Rate Table Creator Rewind Control Command Debug Command Preprocessor User Authorization File Maintenance Performance Monitor History File Processor LM REF/DEF Stack Manipulator Terminal Executive Language Performance Monitor Write-End-of-File Control Command 99 SECTION BE 1/12/73 PAGE 100 UTS TECHNICAL MANUAL BPM MODULES UTS LDPRGM EXIT PRGMLDR STEP } MEMALOC EQUIVALENT DESCRIPTION Load and Execute Programs MXXX, M:ERR, M:EXIT Load Programs MM Core & Swap RAD LNKRT LNKLDTRC LNKIO l LNKTRC Load & Link CALs CHKPT CHPTDCBM } None (TELSAVE/GET Checkpoint REC REC REC REC } RECOVER CNTC COOP FILE BTM MONSEGLD T:OV COOPRES COPNRES SYMCR SYMPPRTY SYMC OM COOP SUPCLS. INSYM OUTSYM KEYSUB Management . System Recovery· Monitor Overlay Control } 100 Symbionts & Cooperatives UTS TECHNICAL MANUAL SECTION BF 1/12/73 PAGE 101 UTS PROCESSORS The UTS Operating System consists of a monitor and a number of associated processors (Figure BF-1). The monitor provides overall supervision of program processing and the associated processors provide spe·cific functions, such as compilation, execution, and debugging. Processors operate in slave mode and thus request all I/O and other master mode services through monitor CALs like an ordinary program. CeI, TEL, and LOGON have store access to JIT in order that they may update accounting and other information stored there. These programs (command processors) also have a special interpretation applied to their EXIT CALs to provide the mechanism for calling other programs or processors into service. Special EXIT interpretation also applies to LINK to provide the load-and-go facility of the. RUN command. All processors are independent loads except those that use JIT which are loaded with the JIT definitions. Many shared processors are single assemblies. Exceptions are CCI, PCL, and the Public Libraries which consist of many assemblies. Further, processors may be shared - that is, a single copy is established at system boot time in absolute form on the swapping RAD and then shared by all concurrent users. An ordinary shared processor may have a single level overlay structure; that overlay is also shared amonq all concurrent users. Processors may be special - that is, they reside in the highest 16K of virtual memory. This is because the user's program already occupies or may soon occupy the remainder of virtual memory. debugging language Public Libraries, DELTA (the on-line batch interpreter), LINK (the on-line Loader), RUNNER (the debugging language preparation program), and TEL (the on-line executive language interpreter) reside in the special shared processor area. Processors may require that the user have a certain privilege level in order to run. Examples are CONTROL, DRSP, ERR:SUM, ERR:LIST, RATES, and SUPER. 101 - UTS TECHNICAL MANUAL SECTION BF 1/12/73 PAGE Five kinds of shared processors may be associated with a given user at one time: 1) an ordinary shared processor, 2) the ordinary processor's overlay, 3) a monitor overlay, 4) a public library, and 5) a debugger (DELTA is the only current possibility). TEL may be associated and used without forgetting the other processor associations. DELTA and Public Libraries may be used by the same program but breakpoints may not be set in the library nor can DELTA make use of the library subroutines. Processors Processors are illustrated in Figure BF-1 at two levels. The upper level contains executive language and related processors, and the lower level, all other processors. These processors are defined in the following paragraphs. Executive Language Processors The three processors in this group are: LOGON, TEL, and CCI. The first two of these processors are available to on-line users only and the last to batch users only. It is also possible to implement other command processors, such as UTS-EASY. LOGON LOGON admits on-line users to the system and connects the user's terminal either to TEL or to an alternative processor, such as BASIC that has been selected by the user. User authorization is established by reading the file USERS for a record keyed by the concatenation of the LOGON account and name. LOGON also disconnects a user from the system and does the final cleanup and accounting (reference: Section PC). 102 102 UTS TECHNICAL MANUAL SECTION BF 1/12/73 PAGE 103 Terminal Executive Language The Terminal Executive Language (TEL) is the principal terminal language for UTS. Most activities associated with FORTRAN and assembly language programming can be carried out directly in TEL. These include such major operations as composing proqrams and other bodies of text, compiling and assembling programs, linking object programs, initiating execution, and debugging proqrams. They also include such minor operations as checkpointing on-line sessions, determining current user charge status, and setting simulated tab stops (reference: Sigma 7 UTS/TS Reference Manual, Publication No. 90 09 07). Control Card Interpreter The Control Card Interpreter is the batch counterpart of TEL. It provides the batch user with control over the processing of batch programs just as TEL provides on-line users with control over the processing of on-line programs. Authorization for batch jobs is obtained by reading the USERS file and final job exit is through LOGOFF (LOGON). 103 UTS TECHNICAL MANUAL Figure BF-l - UTS Logical Structure SECTION BF 1/12/73 PAGE 104 Monitor Basic Control Scheduling & Swapping Memory Management File Management Job Step Control Terminal I/O Symbionts & Coop. Sys. Integrity (Recovery) LOGON/LOGOFF System Management Processors SUPER CONTROL RATES FPURGE FILL ERR:LIST ERR:SUM MEDDUMP VOLIN IT UTSPM SUMMARY DRSP Terminal Exec. Language (TEL) User Command Processor e.g., EASY Language Processors FORT. IV Metasymb. BASIC ANS-COBOL MANAGE FLAG Initialization & Startup Operator Communication Batch Debuggging System Debugging Load-and-Link Real-Time Serve (Proposed) Remote Batch Serve Exec. Control Processors Link Load DELTA FDP Libraries (FORTRAN) 104 Utility Processors Edit PCL SYSGEN DEFCOM SYMCON ANALZ BATCH Control Connnand Interpreter (CCI) Application Processors SORT/MERGE 1401 SIM DMS GPDS SL-1 CIRC UTS TECHNICAL MANUAL SECTION BF 1/12/73 PAGE 105 System Management Processors System management. processors furnish the manager of a ~s installation with on-line control of the system. Eight system management processors are supplied: SUPER, CONTROL, RATES, DRSP, FPURGE, FILL, ERR:LIST, and ERR:SUM. SUPER SUPER gives the ins~allation manager control over the entry of users and the privileges extended to users. Through the user of SUPER commands, the installation manager may add and delete users, specify how many central site magnetic tape units a user will have. lie may also grant certain users, such as system programmers, special privileges, e.g., examining, accessing, and changing the monitor. All commands result in creation or modification of the file USERS in account :SYS. CONTROL The CONTROL processor provides control over system performance. UTS has a number of performance measurements built directly into the system. Commands of the CONTROL processor enable the installation manager to display these measurements and to "tune" the system as needed by setting new values for the parameters that control system performance. RATES The RATES processor allows the installation manager to set relative charge weights on the utilization of system services. Specific items to which charge weights may be assigned include the following: 1. 2. 3. 4. 5. 6. 7. 8. CPU time CPU time multiplied by core size Terminal interactions I/O CALs Console minutes Tapes and packs mounted Page-date storage Peripheral I/O cards plus pages 105 t1I'S TECHNICAL MANUAL SECTION BF 1/12/73 PAGE FPURGE 106 The FPURGE processor allows the installation manager, through the computer operator, to purge unwanted files from the system. Specifically, FPURGE provides for: 1. Purging 2. Loading (restoring) RAD storage with files that were created and saved under the Batch Time-Sharing Monitor (BTM) , or under UTS. 3. Printing (on the line printer) the names of all files on storage by account number. (Reference: (releasing all unwanted user files from RAD storage. RAD Sigma 7 UTS/OPS Reference Manual, Publication No. 90 16 75) FILL The FILL program executes as a ghost program to provide for the safety of file information. This program writes backup copies of files on a system-owned magnetic tape. In addition, a facility is provided for the automatic deletion of expired files and a semi-automatic (operator-initiated) purge of inactive files in the event of a critical shortage of available file storage. The FILL ghost is scheduled by a file called BACK:SCHED in account :SYS. This file may be created or modified during system operation to suit the requirements of individual installations. If the schedule is not frequent enough for some users, the user may employ terminal command !BACKUP to request that a specific file be added to the current backup tape. 106 UTS TECHNICAL MANUAL SECTION BF 1/12/73 107 PAGE The backup schedule specifies the frequency of three types of backup which are necessary to keep the physical amount of tape at a minimum to speed recovery while holding loss of filed data to a minimum. The three types of backup in ascending frequency of operation as follows: 1. are SAVEALL - Saves all files currently known to the system. This provides a starting point for recovery (FILL) and allows the release of all previous backup tapes. 2. INCREMENTAL Saves all files that have been created or modified since the last INCREMENTAL (or SAVEALL, whichever is later). During a recovery or initial load, these -tapes are processed by FILL after the SAVEALL tape has been processed. 3. SQUIRREL - Saves all files that have been created or modified since the last backup of any tape. These tapes provide for a minimal loss of data but occupy a large volume of tape1 they are therefore replaced periodically by the INCREMENTAL tapes. In case of a catastrophic failure during which the information on the RAD is lost, recovery routines instruct the operator to request execution of FILL. The FILL program reads the various sets of backup tapes in sequence by date/time and thereby restores the backed-up files to the latest version available. ERR:LIST and ERR:SUM All hardware malfunctions occurring during UTS operation, whether recovered or not, are recorded in a special RAD storage file which is periodically copied into two standard UTS files (ERRFILE and SUMFILE) by a ghost program (ERR:FIL) that is initiated automatically for that purpose. The resulting files may be listed and summarized by the two programs, ERR:LIST and ERR:SUM. These files are also available for on-line preventive maintenance of the system and for diagnosis and prediction of hardware malfunctions. 107 UTS TECHNICAL MANUAL SECTION BF 1/12/73 PAGE 108 The ERR;LIST program examines the error file (ERRFILE) for malfunct10n records that were written during the specified time period and produces a formatted listing of these records with (optionally) a summary of the records for that period. The formatted listing is complete with headings and formatting necessary for easy reading and use by field personnel. ERR:SUM produces a complete one-page summary of errors accumulated in the error file. Language Processors Language processors translate high-level source code into machine object code. Five processors are of special importance (XDS Extended FORTRAN IV, Meta-Symbol, MANAGE, ANS COBOL, and BASIC) and can be used in both on-line and batch mode. Execution Control Processors Processors in this group control the execution of object p·rograms. Two of the processors (LINK and nELTA) can be used in on-line mode only. Load can be used in batch mode only. The FORTRAN.Debuqging Package (FOP) can be used in either batch or on-line mode. LINK LINK is a one-pass Linking Loader that constructs a single entity called a load module which is an executable program formed from relocatable object modules (ROMs). LINK is designed to make full use of mapping hardware. It is not an Overlay Loader. If the need for an Overlay Loader exists, the Overlay Loader (LOAD) must be called by entering the job in the batch stream (reference: UTS/BP Reference Manual, Publication No. 90 17 64). LOAD LOAD is a two-pass Overlay Loader. The first pass processes: 1• all relocatable object modules 2. the protection types sections of the ROMs. 3. defining expressions for definition and references secondary, and forward references). and (RO~1s). sizes 108 for the control and dummy (primary, SECTION BF UTS TECHNICAL MANUAL 1/12/73 PAGE 4. 109 loads from libraries as requested. The second pass forms the actual core image and its relocation dictionary, and produces the executable program in Load Module (LM) form. DELTA DELTA is designed to aid in the debugging of programs of the assembly language or machine language levels. It operates on object programs and tables of internal and global symbols used by the programs but does not require that the tables be at hand. With or without the symbol tables, DELTA recognizes computer instruction mnemonic codes and can assemble machine lanquage programs on an instruction-by-instruction basis. The main purpose of DELTA, however, is to facilitate the activities of debugging by: 1 examining, inserting, and modifying such program elements as instructions, numeric values, and coded information (i.e., data in all its representations and formats). 2. controlling execution, including the insertion of breakpoints into a program and requests for breaks on changes in elements of data. 3. tracing execution by points in a program. displaying 4. searching programs subelements. and data information for specific at designated elements and Although DELTA is specifically tailored to machine language programs, it may be used to debug FORTRAN, COBOL, or any other program. DELTA is designed and interfaced to UTS in such a way that it may be called in to aid debugging at any time, even after a program has been loaded and execution has begun (reference: UTS/TS Reference Manual, Publication No. 90 09 07). 109 UTS TECHNICAL MANUAL SECTION BF 1/12/73 PAGE 110 FORTRAN Debug Package The FORTRAN Debug Package (FDP) is made up of special library routines that are called by XDS Extended FORTRAN IV object programs compiled in the debug mode. These routines interact with the program to detect, diagnose, and in many cases, repair program errors. The debugger can be used in batch and on-line modes. An extensive set of debugging commands are available in both cases. In batch operation, the debugging commands are included in the source input and are used by the debugger during execution of the program. In on-line operations, the debugging commands are entered through the terminal keyboard when requested by the debugger. Such requests are made when execution starts, stops, or restarts. The debugger normally has control of such stops. In addition to the debugging commands, the debugger has a few automatic debugging features. One of these features is the automatic comparison of standard calling and rece1v1ng sequence arguments for type compatitility. When applicable, the number of arguments in the standard calling sequence is checked for equality with the receiving sequence. These calling and receiving arguments are also tested for protection conflicts. Another automatic feature is the testing of subprogram dummy storage instructions to determine if they violate the protection of the calling argument (reference: Sigma 7 FORTRAN Debugger Reference Manual, Publication No. 90 16 77). Utility Processors The processors in this group perform such functions as editing, sorting, and transferring data between RAD storage and central site peripheral devices. One of the processors (EDIT) can be used in the on-line mode only. Three processors (peL, SYMCON, and ANALYZ) can be used in both batGh and on-line mode. The remaining processors can be used in batch mode only. EDIT The EDIT processor is a context editor designed for on-line creation, modification, and handling of programs and other bodies of information. All EDIT data is stored on RAD storage in a keyed file structure of sequence number variable length records. This structure permits EDIT to dirctly access each line or record of data. 110 UTS TECHNICAL l-mNUAL SECTION BF 1/12/73 PAGE 111 EDIT functions are controlled through single line commands supplied by the user. The command langugage provides for insertion, deletion, reordering, and replacement of lines or groups of lines of text. It also provides for selective printing, renumbering records, and context editing operations of matching, moving, and substituting line-by-line within a specified range of text lines. File maintenance commands are also provided to allow the user to build, copy, merge, and delete whole files (reference: UTS/TS Reference Manual, Publication No. 90 09 07). Peripheral Conversion Language The Peripheral Conversion Language (PCL) is a utility subsystem designed for operation in a batch or on-line environment under UTS. It provides for information movement among card and paper tape devices, line printers, Teletyp"e terminals, magnetic tape devices, disk pack, and RAD storage. peL is controlled by single-line commands supplied through on-line terminal input or through command card input in the job stream. The command language provides for single or multiple file transfers with options for selecting, sequencing, formatting, and converting data records. Additional file maintenance and utility commands are provided (reference: UTS/TS Reference Manual, Publication No. 90 09 07). SORT/MERGE The XDS SORT/MERGE processor provides the user with a fast, highly efficient method of sequencing a nonordered file. SORT may be called as a subroutine from within a user's program or as a batch processing job by control cards. It is designed to operate efficiently in a mini~um hardware environment. Sorting can take place on from one to sixteen keys1 each individual key field may be sorted in ascending or descending sequence. The sorting technique used is that of replacement selection tournament and offers the user the flexibility of changing the blocking and logical record lengths in explicitly structured files to different values in the output file. 111 UTS TECHNICAL MANUAL SECTION BF 1/12/73 PAGE 112 The principal highlights of SORT are as follows: 1. Sorting both. capability allows either 2. Linkages allow execution of the user's own code. 3. Sorting on from one to sixteen key fields in ascending or descending sequence is allowed. Keys may be alphanumeric, binary, packed decimal, or zoned decimal data. 4. Records may be fixed or variable length. 5. Fixed length records may be blocked or unblocked. 6. RADs may be used as file input intermediate storage devices. 7. SORT employs the read backward capability of the tape device to eliminate rewind time. 8. User-specified character collation sequence may be used. 9. Buffered input/output is used. or magnetic tapes, RADs, or output devices, or as (Reference: Sigma 6/7 'SORT/MERGE Reference Manual, Publication No. 90 11 99.) 1400 Series Simulator The 1400 Series Simulator provides an economical and effective solution to the program conversion problem that arose because of a change in hardware. This interpretive program is designed to execute 1400 series object programs automatically as if they run on a 1401, 1460, or 1440. Thus, an existing level of computing capability can be maintained while new processing methods that take advantage of the new, more powerful Sigma equipment are designed and implemented. 112 UTS TECHNICAL MANUAL SECTION BF 1/12/73 PAGE 113 The 1400 Series Simulator simulates object code produced by SPS, FORTRAN, Auto-coder, RPG, and utility routines. Almost all 1400 operations may be simulated except for I/O operations in which hardware differences make total simulation impossible. Full 1400 operator capabilities are provided (reference: Sigma 5/7 1400 Series Simulator Reference Manual, Publication No. 90 15 01). SYSGEN SYSGEN is made up of several processors that are used to generate a variety of UTS systems tailored to the specific requirements of an installation. The SYSGEN processors are: PASS2, LOCCT, PASS3, and DEF. PASS2 compiles the required dynamic tables for the resident monitor. generation. PASS2 compiles the required dynamic tables for the resident monitor. LOCCT and PASS3 respectively file away and execute load cards to produce load modules for the monitor and its processors. DEF writes a monitor system tape that may be booted and used (reference: Xerox Universal Time-Sharing System (UTS)/SM Reference Manual, Publication No. 90 16 74). DEFCOM DEFCOM makes the DEFs and their associated values in one load module available to another load module by using a load module as input and by producing another load module that contains only the DEFs and DEF values from the input modules. The resultant load modules of DEFs can be combined with other load modulas. DEFCOM is used extensively in constructing the UTS monitor and the shared run-time libraries (reference: UTS/BP Reference r.1anual, Publication No. 90 17 64). SYMCON The Symbol Control Processor (SYf-1CON) provides a means of controlling external symbols in a load module. Its primary function is to give the programmer a means of preventing double definitions of external symbols, but it may also be used to reduce the number of external symbols. For example, if certain load modules cannot be combined because their control tables are too large, the size of the tables may be reduced by deleting all but essential external symbols (reference: UTS/BP Reference Manual, Publication No. 90 17 64). 113 UTS TECHNICAL SECTION BF 1/12/73 pl\r;E 114 ~~NUAL ANALZ ANALZ provides the system programmer with a means of examining and analyzing the contents of dumps taken prior to system recovery. It is called automatically by the system initializer following a recovery and is executed as a ghost job. It may also he called by the operator to analyze tape dumps when recovery is not possible, or by an on-line user to examine dumps or the currently running monitor. ANALZ performs three Major functions: 1. It runs a series of monitor integrity checks on the contents of a core dump to determine what caused the crash. 2. It provides formatted dumps of the monitor's time of recovery. 3. It permits, via commands, the examination of dumps and the examination and change of the monitor. tables at the BATCH The Terminal Batch Job Entry (BATCH) processor inserts the contents of a RAD file into the symbiont input job queue. After insertion, the user is notified of job ID and queue position relative to the currently executing job. BATCH functions are controlled by a TEL or CCI command line in which the user has specified the FID{s} to be inserted. The status of a previously inserted job may be checked via the JOB command in TEL. Batch is an ordinary shared processor consisting of a single assembly. 114 UTS TECHNICAL MANUAL SECTION BF 1/12/7~ PAGE 115 LABEL LABEL processor tapes with ANS header sentinels and readies them in a protected shop 50 they may be AVRed. DRSP DRSP controls the addition, deletion, or replacement of shared processors, shared libraries, and monitor overlays during normal system operation. Current users of a replaced processor, library, or overlay continue to use the old copy while additional users are associated with the new version (reference: UTS/SM Reference Manual, Publication No. 90 16 74). 115 INDEX TO UTS TECHNICAL MANUALS SECTION BF 1/12/73 PAGE 116 The following pages contain two indexes to the complete set of UTS technical manuals. The first is an index by item and the second is an index by module. The two indexes are preceded by a key that indicates the volume numbers in which the various section numbers are located. KEY TO INDEXES I Sections Included in Volume Tit Ie Volume Number - B, BA, BB, BC, BD, BE, BF 90 19 84 Overview and Index C, CA, CB, CC, CD D, DA, DB, DC 90 19 85 Basic Control and Basic I/O E, EA, EB, EC, ED, EE F, FA, FB, 90 19 86 System and Memory Management G, GA, GB, GC, GD 90 19 87 Symbiont and Job Management H, HA I, IA, IB, IC, ID 90 19 88 Operator Connnunication and Monitor Services J, JA, JB, JC, JD, JE, JF, JG, JH, JI, JJ, JK, JL, JM, IN, JO 90 19 89 File Management K, KC, KD, KE, KF L, LA, LB, LD, LE, LF, LH W, WA, WB 90 19 90 Reliability and Maintainability M 90 19 91 Interrupt Driven Tasks N, NA, NB, NC, ND, NE, NG 0, OA, DB, OC, OD, OE, OF OG, OR 90 19 92 Initialization and Recovery P, PA, PB, PC 90 19 93 Connnand Processors 90 19 94 System Processors 90 19 95 Data Bases I II I I I r Q, R, S, U, QB, QC, QD, QE RA SC, SD, SE UB, UC, UD, UE, UF V, VA, VC, VD, VE, VF, VG, VH, VI, VK, VL , VM , VN, VO ! 116 JUL 19,' 7'3 INr,f-X 8,'1' !T~M UTS TEr~NTC~L MA.NUAL 117 .................................................................. ....................................... , • • • • • • • • • • • • • • • • • II . . . . . . . . . . . . " F ~ R I Tr: ~,~ I \1 ~~ e r, "I L ~ ................................................................, ceMM ~ NT S E r;- S E r:" I e~! ~ :8ACKUP ~A..CV'~)!=) KA.("1 : LeG Ace,.. <; II M Pr • 0 t :USERS :US~R!=; I",PUr rTLE rl!l~ SACKtJ O r~c:-A""F'r, ~V TEL Ace e u ~ T r NC3 V\l.~1 L~G!=t~' DATA BASE #. ;;;F S\A}A~ :USERS SUP~~ QC .SWAF$DrV sss sss E:r: .01 ' e:,.,.O? PASS~ 9r 18 17 #Sw.~.D~v ABC A6E~RETUR ABN~~T Jlr ABe T~L JTT .I'ef'FI PASS1RQ'1 ABRX/2 AHRXI1 ASS ASS A~SeUT ,SSO ACCN ACeNT SuM VA 9~ 18 77 PASe1R~M SvSrr~ 9~ 9~ 1~ 1~ VA. ACCeU~'T!f\Jr; 8') P~. rj 1 K~.01 e~ 8~ T~ .CCT ACCr • CCTS Uj+1 Ace T SUM Pr AOOr F, ADDF ADJusr.ncs ~~~ tA AJIT ~~ ALL .A, NA L l L~ • 01 ALLJIT ~7 is- 71 PC.01 eVEt"'!VT~lJ l~VEDV T~,/ 17 9r 18 17 18 77 9~ 9~ V'J.01 ACCBU,.,JT~ A~B~T P~~CFSS IN JIT AND A~~~OMAL ce~~ E~~A~ C DEvrCE ~~ A.R~e~MAL ~VF~~I~E .nn~ f~H'EN A8'-J"R"1AL ~N BI/~I ACC'U~IT 'DIQEC ftVEh:VT~i",j ACCeU~T SUMRV ACCTS!JM ACCeU\JT TsrB qETURNS ~~"UESTS ~~r:-Rt' Sv-1AP ~r~LJ~STS ~~F'~Rr Tsre ~ETURNS VA g, 18 7' A9S JIT ~BQ SUP~R ABl\jB~MAL R~'T" 'QN RE.,.,TNr: TF.'~MI ~AL PAS~'1A~ AAS A9S te .A{JTHBRY,crO usr:~S P~.03 ACCi~' 1M REC~v~~~ :USC"R~ ,CC~TSU~ IJ '}F L ~ G OAT" ~ A~ r. I:"t~t. GA =~8CES~ A8~Q~~'L eN Dt'vrC'.r er ~6PV TR F RY/rt DEVICF PR~CESS AB~AQMAL READ 9~ ~Rec~SS~s Ape (8PM 4~LV) PASSe !NITIALTZE ANn . 81/£1 C~NT~~L GENEQAT~ ~:.Q~ LBAD ~enULr ~~~C~St; "JEXT r::»,~~ENTIoolc:"TTCAl RAUTINE ~!E:L"" S~E JA~C~ L~GBrF" ACC~lJ"" I NG L~ 1 ~UBF(AU" I ~It ACC~~~TTNG ~q~ USER~ OU~IN3 rRA~~ A.reeLI"',. FIF'L~ I~ USC"~S ~rL~ C~AI'.' ~~ ACC--lJNTS A...,~ rtLF' D!~F'C:TeRIr;S "N .. l..INE USE~ ~U~MARv TY"'1E A~ln Rt~--lJRC:EO 1'~Er; ~ r LE M~, NA GfM~~T ~Ss~r.! AT T8" .. USF'~/F I LES ~~~!T~~ TI~~ .CceUNTTN~ R~UTr~!~ UP D• TEA CCRII ",. Le C3 JI RELEA. ~ r. T e: ""1 p • F I Lf! S AD' F'IL~S T~ ~prN_P~T~E: A~DJTrA~AL qYMFIL~ ~~~GE JTT TR D~~ TA8L~~ eAqAM~TEo~ ~ALD LAR~r CL S U~1 M A J:( ! 7 E ~ U"1 P 8 R R I J t\J N TN G ~~ ~ ~, r T Iq R A~AlZ L~.Q1 p~IN' uSER~ A~eCCT JIr VA 9ITS AL Tep AL T("'P cr D[C"~E 15.31 JTT,AJtT, ANO AQ~ CAL~ e~~T~xT AR~A ADDR ~~ LeA~ C~NTReL ~.5'~" q A~'D T~AJ!'S eM ••••••• , •••• 4 00 ........., .......................r......................................................................... 118 ..JUL 1 Q ,'71 r: tl R 1T E~! I~.J I. , "t ,), ,L F SF. r' C; E T I fl' , C~ M Me::' N" • • • • • , • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • 4 ALTMB~~ ALT""'; AL TMe ~ I ANALZ ANALZ !'t \I F LV ASS r; ~ "'1BP\JITQR ~;:(F''-4 ~9qTF'Il.~ ~ R9 M A.. ~! L r:" ALA. ..... ~ N~ 1)( t:; V~ T r ~ r. t:( AC ~ A~~ ALVC; T~ r' ~ ~~H1 ~ AM r, ~L TE'Rl'!ATt" ~ ~ f\j ! ,. :\ ~ L e ,. BVECVTt"',i er.- ~vt:'VTr:"" ~VE~VT~~ 8r' A",t~LvSTS ~, C::)(A~1 eF' 0tCAVr~v r"IU'A~S A..NALVSI~ ~ ~YAM BF ~~cnVr~v 'U~~S AI='PE',!D r""~i'T'Qql. Cf'MMA\'D TA 'L. RC~T' .' A~! A'. Z ANLZ ANLZ APNDSt:.:G L~ArJ \jC!" Rr:" L~ Tt" PAS~~3pqM eel A~JALVS!S ~ r:-'tA'1 6F' et"cqv~~V ~uvPS B~ ~~ A. 18 77 PA ASS! G~'J TE: L ASSIGN.MERGE UCAL !~ Ass~crATtr')r.L Alo.lALl Le-.01 VA P t~ • C' '3 ATITLE JTT AUTe-CALL AVR :uS~:~~ v".a1 ~C8 oAQ.METE~ TA~Lt" 4.~S~""J ~TE ')e'Lr A ~F~ J:TTTL~ AUT~~A'T'TC p~r\rESSR~ A!;~~rY~T!~"': AVR ~~ TAPE '1'1U\JT PJ~ AVRID S~DAT V~.03 U~~R A Vq TeL T J. B I F' ~ TABlr~ V I'j • c ~ 'i 'Ai vfl.C3 TA~I ;':.'~ V~.fi~ i( f, • AVRTB1..3IZ "VRT8LS1.Zr" 8 ACI( : 'S C~~ r r.~ B ACKU~ BACKUP R'AS! C I IF! RAT Cj..j 8ATC~ alAe ~3A C~ . l:1 C ~L~~IL r, i I~ T ~ ;; I ~ ~" ~TZF Aj? AVQT~L ~T7E 19r: AV~T~t. B A. CK L' P S CH~ ~ If l E. • ~ I I ~ ACvl .'!:) K A • 01 Br' ~~ T ~ ~ M T\.j A L J 11 ~ ~VE~VTt"J ~UrU~ I I~ I 8r 8r, P~QC~~'T'A3E RATC~CAL KAT~~ M~NrIX ~~ L~.n1.~1 ~LAG R~~T -:; TT .• T ~ BIT S A \l A, 7 T~ L 8I..A'\JK~L;F PAS~1~q'l AL.. 0 Cb ReeTA Q.~ B6BTF'ILE peL.. ~ AS c: 1::( ~,~ MqN~'IY f\ I") L~ p ~ • 01 9') tA 77 i ~ 3 n21 9'") 1 ~ 17 Lr;.01,'1 l' AP ~ ~ = r U r L or V ~, AN .A ~ t: R C~ p I ~ S 'J S e: ~ ,~ F" r L.. E~ ,. ~ 8 A r It'''. I eTA PE SAVE r:- TL.E~ fjVE"':VTr:" 8 I T9 TM A I T PUT tH~~~n) # ~~ AI) ~,J T J:" r) aVE::;; v Tc',! ·"lVEi.."V T t:"'; ~ A, T''r4 ~!') ,VR ~V • BATCH SrHe::-rJUL 8F C~,AR c: ":' '" ASS I C; 'I ~ A~'r'I p ~"r: C!" t: S q P A ~ e. I ,.. '.J 1M E ~ :; r: T A ~~ Lt [V ~ ~JT ~ UI ATAR r"1r;:THFlD~ ~I!"~\j A~ r Ce: C' r T~'T~~~lJPTe, r t: 5 ~ ~ P. TER~ ~'1. r' l\,t T RV 0 ~ R C~MPUT~R TJ~~ r~Q BATC~ -:tF" A~~Er.TINr, eATC~ Sr::~C""'UL.INr; SV~HlqNT ~LRCK AN~ !~~U£ ~!Jee FILE PlJTLT HV ~~N~yx ~~~ ALTMe N r: ~ p v T A I=' E T q r"'! 5 C J:) UTe 8 ....1 \I E R't e" ~ H V T E T" ~ l JT PUT S ! J~ F' ER ~ r: 5 E T ~ TLF t::" TEN S 9L/l~lk AUT q'.,~r:~~ r "",1 8 TT S g U I L ~ ~ ~ p E"1 !:t LIS T A,,! r, 4 0 E' NC; DC" p ~"I Cc:- SS .·8 \! ~ ~ MAL n u ~ TN ~ YL F' ~ ~A 0 F R~ M ReqT F'!I..f. ;\I.ITI T HV "1~NrI)( ~R~ ALTMe N r: J UL 1 96 , ,~ ! N~ t )( 0 y r" r M UT S Te: r t..I N T r. AI. ~ A to.II 'A L.. 119 • • • • • • • • • • • • I • • • • 4 • • • • • • • • • • I • • I • • • I • • I • • • • • • • • I • • • • • • • I • • • • • • • • I • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • t • • • • • • • F'''R I 'T'r: ~ •• I •••••• , I \J ··~~ItLF" S[~ t:;~~T C~MMF-"'N'T' I p"1 • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • I I • • • • • • • • • • 1'1 • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • t • • • • • • • • • • • • • • AeeTSUBP o~e.,. su~o B~8TSUBR M~~,1 BVE~VT~W ~PM U~ 8~ SYSTrM T~ITrALIZATI~~ M~DUL~ T~ A~StM~Lf ~~~ITeR ~E~VrC~ P~ACEDUR~S BPMBT ~~Mp'T' 9'" 1$\ 77 W~!TF. 8TM SyS~~~ STE~ HUF~QA~ 9~ 1B 17 E~ FA.o~.r2 PQPcrss~S PT~ (APM A~LV' CI-!AI~,IS LRF.P~~ATIVE A\lD r'TLr;.: ~U~r:ERS SV~T~M ~UF~~Q.~RANU, ~ ~~.~.n~ME~T RUFBUi A"IAL"- Lr:" BUILDC~i SDEvrr~ 9~ BP~ eUF'C~AI'" BU~GRAN I T~" 8~'1 r P~~/P.'T'M ~UBReU,. TNrs N" ~.SE q~T UP MAST~Q c:PRe~RrQ ~MDAT CAL VJ R,) CALPRRC ~vE~VTr:1.) CA~rR~r CP ryEC"E CAL5 1,? CASSIGN JIT VA SF"E J:r.A.SSTt.J C~I~~ SVMr~~ SVSOF~ S~ 9~ DEFpA~ q~ JYT DEF~RM eeI cet cCIR eel eel ~CITA~LS eelO CCLrLAGS CCL6AD CCLTFLGS CCL..O COP~ CEXT CHA'1NFL ~vEPVT~W eel CClo JtT P" TAPE: ~U~~~R USE~ tR ~7 1R 7' 1~ 77 N~ ~F ~~RC~S~~R T'~~S RE~Ut.e:T r:-~r( WAS~'T PRRr'ss~~ M~~!TTA~ IN ce~~ QE~U!~ED sr;pv!cr r~TEpPQ~T (XP~~ ~TArK ~~~T~AL QVTES ~V~GEN ~~NT~~L CRMMA~O srA~ PL!STS SA~E.S cc~ RfT 8 ~~T ~AV~ C~T~. CMn. WRIT~ ~UT PA TAPE CR~TQ~L CAo~ T~TERP~~TrR cA~T~eL CAQ~ T~TERPo~TrR reI, EXrCUTTV~ R~UTT~E DATA T6~~E ~qnULE PA~S~ C~NT~~I CARD PQ~rESSTN~ JrT VA 90 1S 77 V4 SSs E~.01 USCHA"J VA VA 9i'",. 1 ~ 77 ~YT~ 0-14 A~~ CURRENT ~rRU~ oA~rs ~UT CU~RE'IT EXErt 'T I eN T, ME ;FT UP C~A~T~L FNTRy F~~ :CHAN CBMMANO AA ~ALI~NT PAS~~rrT JrT JYT CHA~ACTERTSTC aVEPVT~~ e~ARN)( CHARR~UT V~ 9~ p~ B~ p~ p~ # ~F TIMES A PLIST VJ cC PLISTS CCA CCBEF CCE 'T'~ !.·IR I T~ p!JFr:~~ qUTPUT 18 77 PMDAT C:~'PQBr ~VSTF.:to.1 SVMCfP 1 eel SE FA qeUTIN~ ~CAN Ta q~nER C~ A~Tt.~ C~ARAr.TERISTTC~ ~~.c ~~ I~PUT r~MMANOS SYNTAX A~ALV~T5 SUH~~u~r~Fq UTS I 120 'IT:;; iErlooINTCAL ~A,NIJAl.. •••••••••••• •••••••• ••••••••••••••••••••••••• •••••*••••••• ••••••••••••••••••••••••••••••••••••••• ••••••••4 F''' R I 'T E' ~ I \l ,..< A") I ! LF. SEe" t; F' r T I A"" CBM'-1 r ~j T • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • 4 CH"RSCA~I CHECK C~ECKPt1 SVSGE'j CI-IK I ~I" CHEK"-iAME UCAL ApS 91 1~ K'" IA g~ ~~ 1 A 77 C~K If,.. CHKD~ STEP ~~, j;)'-.03 9"1 t~ CHKDCR~ Tr:.L PASC~':1~~~l CHSTSCA~I ~rAR~~ ~J~E~ cHK CHI(\lAM 77 ~~~ C~\'S L'~~ VALI":'ATr: Vr:.O? eITl IGTA~31 r.' vr;.r;~ CIT~ I~TA:~LC' I ~T ~ Hl t: vr:.Q? It:'TA~L~ vr;.o~ ~A~D, TABI..~~ ;:(CV ('1"1. V~.Ij~ rU~R;.'\jT rIT4 CJ8~ eKRAD cl... CLEANUP CLB8B~~ cLeeK j cLeCK~ TPL piT or~ ~~ 1"\ ~ US~~ A[)~~ JIT D A. 01 t'F'C:'F~~I\,' ~~~T. T\JTER~t '~T P~FO\~~~S' "'3 C~ .. 'T II I \' C\ LOr. s: VAL Ut: F' q Q nr q I ! G~ f" t ,:, ( 0(' ~ I ~~ T e:"' Q Q f .n:' T ~ ~ ~ Ceo ~ ~ ~ Q CLAC~ 1 INT~~QUPT ~~~C~~~p~ CLt'r-jI(· I", L:'.01 C~~ C"" Ce~MA~D i(Q'I}~,"7 r:L':'C;C" r:"TL.E'c; C~ARACT~~ CU~R~~T eNST r:NVDEr- JIT V,J.,. F':(G: q''', 1 ~ 77 CNV'Jr:X F~G:' q~ CqC Dr C~C V ~. ,]5 C~C ~r.,:"\1.c4 Cc;C'" r'!~ C~C 1.8 77 Cf.lCIo.!C tqC C'r.-J1 ,-''+ i),....il.1"\4 CtiCI cqCr i')r".J1.i4 Cqc r.:-·"')1.r"'4 C~ '.1 Vr Q T F R C~\V~~T SrA~ ~UM~~Q r ~ Tr.: EPC~ BF ~,~C ~~AN~FL PRI., f1 tTY I~Q RljNr. q~.~ CL f1r I<.4 c~r~< T~T~ At-It) ~WAPP[~ ~J~ CHCICP FAP ~1UTIN~ VALI~rTY TST~Jf;r. Cf}CGF'To '.IAME Kn.~~.C"2 CLS., C9CCRLF ~AUTy~lE' ASSqr.~A~TBN f".01 CLSFIL~ cec, ~~~CE~~AR sss CLSt C~C C~ C=5F-' ~ArYLYTV ",rj q", JIT vr-..r'J"? CIooII!"r:1( r~ECKPATNT JE:T r:: ~M T',JE p~~c:; I BLE r;r;:"LF T p~'" ~r ~ I LE '-:ir;r r.'E ~T S'T'~ T ~ TT 5 ~ - 1 5 Ao~' CAR D T" t P 1.' T C~ Ur. t T C" ~ gYTE, ~UEU[ r~~T~ H~AD evrE", ~llfUr "ul\ IN TAT l. qYTE,gYT C C;r:'T' IMPLTr'S C:~~A"f\:C"L ~USy SYSf.~~~! r.IT3 U~~~ vALI~ etC 1~ ~~LIMITE~ ST~NCV r~FC~ PR~C~~qq~ NAMr ~Y~Tt"'M C~NST~"E~CV rt~E:r.K C~EC~S 77 77 I A~n~ESSF~ LIS'T' R~UTT~E~ ~F F~~ ~~QA'T'r.~ °A~~O T~pr~ T'" H c:' ~ A'" r: r P' AL T'" ~EXA~~C T"'-1AL 'T~ ~F')(ADFr I CA ~ ~J A -" r) L E. ~ p, VT E ~ ') r) ~ n c:- ,I r:: ){ T I \1 ~ U'T' r 1-1 .\ ~ ~ V LN Ii P'jT rA.C:~IAtif;' Q.t:"Tur~N AN'" LT':r ~~F'D I" ~ T~:~LC"s ~~R "'(\r H.A~DI rQ S~T T/A J F T r f'T ~U~~~Q A~ D F~AM '? ~ t'> ~ ~ T r~ITT!ALTl~TTA\! "-1AT~ITA'" VAI.!t~ ~F ~~ ~ t. ~~~ QUF~t:"~ "G .. UP" ~,J '"' 7~11 C~"Q!E~ D~RL ~ r A L • UP PA~T"TfjN yN!,,)EX ~v JUL 19,'7] ,,.rM uTS TEr~NTr:~L ~At\JlJA.L 121 • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • • • • • t • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • • • • • • • • • • • • • • • ~eR I Tr~ I \l ~B""ILr Se:r SF.:L"r I 9~-) CBI'1""~N" • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • • • • • • • • • • • • • • • • • • • t • • • • • • • • • • • ceCINIT CeCINP CeCIl' C~CMI NT' cSCMU C~C Dr:.01.~4 I N I i I A ,- ';A Dr.()1.,2 c~c c~c or.01.r'U. C~C c~c or.ot.1)1 ceceoe: c~c A~AL] c:~c V".05 L;-:.01 CBC~P Cae D~.01.~3 ceC~BUF cec~c CeCeFF' cecpcrB ceCJ'UT8L CBC~D cec~IC ceCRrc:Xu c8 CSCYB c~c DC.01.rl4 r ~i I T YA L TZE r. q r: ~ PE:0r:c+~t.A r: ~tSPLAV DC.01.04+ D~.01.r.4 c: eTA F~ LEI ".1 TTl A LIZ A T I q ~,f F" Q A ,,-1 ~ eec: T""PUT c~ ~ R h CTrt:? PQ,AC:ESS I ~IG I~ITTALIZE LT~E MRD~ CANTRAL BYTES MaVE t\l~UT MrC;~AGe: r:Q~~1 c~r. T~ USER ~u q ~ f!) R~ T t:' AN' 'T'. I ~-l D- ~ I t I=' F' ~ ~ E: V~ "" T "I ~F" ~UT 9\1Tc:"~ LEr:"T ~v LTNt" II c TAdLES c~c ! NIT TAL TZ E L T 1\1 E F" R L A~ G T. . .1r; ur.01.Q4 Dr.01.el DC.01.~4 ~F'PB~T C~C DC.01.')4 RE:CBQD rNP'JT r"MPLETCO ~ T ~ q r t" PUT r" I-! A C< ACT ~ ~ cec Dr.01.~4 F' ~ r.Ae: C9C C"C CqC A PF'RF'PRM coe qUTPUT T\jT~pqUPT P~~CESS!N ~UT AUTPUT r.~A~ACTE~ !'" PUF'F'ER PUT !/A tiU~F'r~ IN F~~E r.~c QUF'C"r;.:R CIooIAI I N TT , A T I:' P ~ ~ r C" r; ~ I "J ti ~ r: TE" ~ ~~ yt-.! ~ L RE • D R ~VE~JT T~ SCHI:''''IULE~ T~ I P' 'T 8 UF' F" F. ~ T t\! cBCse CQC D"-.01.r4 c.;TART CAe '':l[IT'PUT C6CTe:RM CBCWR C~C CAC v~.o~ ~~.O1.01 C"Cr:-- V~.I'); ~VTE,TC::R"!P'JAt TYPE ~v LI"'J~ 11 !NIT!AT~ P~ql"'coSSI~·1(1 ~~ T~p'VI~'Al B VT E , c:; r: E C~ ~ q 1\1 ~ UTE A M r:: ~ "I ~ ceDe: -c6MeINE CeMLlST peL . 8ASWA"'J~L. A.~ALZ Lr.~1 9~ C6M~ETA F~G~ 1 ~ 17 9~' 1~ CeNTReL C6NTR"L CBNv C"'NT~~I" QA 77 ~VE~VTr:\!f er L~CrT~A~ PAS~~OA"" 9"'" 1R 17 9:"1 t~ 17 c-er' ceel=' F'A ~I3TAT'" Y"'ST/ILLATT~"l CR~VFRT "1 A r-..JAGEr; TQ~L ER~A~/.BN~R~4L CqDF E~o~c/A8N~~~4L c~nr C~~V~~T I t\jPI,.IT/AUTP)T ~LJc:'Ft'"~~ r:\ foJVE~VT ~I" R~ C"ePERATIVE'S SVMt;ICA~ ~A US::~ ceepF'tLs 5VM~T,-c: 1(~.O4.~5 CL~S~ ~ VALJ~ "N. L r "l£' PE ~r:~Q"'l A~'CE '-vALL ~PR9C~S~ JyT JYT I~Q F'~R ~~~p!Nr, •• cc~~s DATe: neT10 C~~~.. ,:" NT • • • • • • • • • • • • • • • • • • peL. W~~D, I LAST USF.:~ ~TATUS ~~ D~vrr~ ! ~l U,S V~.01 RYTE, I ,T ABI t" IeTABC~ V~.01 v~.o1. I'TJ.BL~ vr;'01 W~RDI ~~VIC~ M~EMeNTr =v DCT r~DEX HW, ~~T~V ANr" CRNTlt\I!JE ~UNCTr~" ceDE BVTE, TTME9UT INCREM~NTS ~~~ O~Tl1 v~.Ot t/6 ST~~ ceU~T gVTE, crT !~~FX BV BV Dr.T RY OCT IND I·BTASl.t" IeTA~L~ t • t • • • • • • • • • • • ~eT r~OEX rN~~X • • • • • • • • • • • • • • t • • • • UT ~ T Er Ht-.I ! JUL 19"7~ r. AL ~ ANI '" L 123 . t • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • FeR ITF'~ I'~ ~'ft')IILC" ~t"c: ~~r:'Tlr::P.' ••••••••••••••••••••• ' •••••••••••••••••••• '" •••••.••••••••••••••••••••••••••••••••••••••••••• t ••••••••••••• I OCT3 OCT.. I~TARLc:" vr;.~t ~VTE, LFC,jAL I'TACjLc:- vr;.01 RVTE, DCT~ oCT~ I~TA4Lc:" I~TA~Lc:" v~.n1 V~.c' eyrE, TyPM'Jr' ~YTE, SwITC~~~ RY 'uEU~ ~~A~ r~~~x OCT1. I~TA~Lc:- V"i."1 ~WAR!"'I, ~CT~ DC; T CJ I~TA3t~ V~.01 I ~ T A ~ l c:" DEB UG TAB LF" RUN Q e ~ V~ • ~ 1 LP • 0 t W~~D, \.OJ A ~ D, A~~RATr~~,IS T"!DEX A~DRr'<:~ ~F AnDREq~ A D~ ~ C~".I T A I ~ A~ S DE8l~ST" L:1 TQ/l"Jt:;F'r:Q DEca I N TEL p~.,.,3 OEceNV OECSCAN A~S 9~ 1~ SYSG~~ SvS~~~ 9~ 9~ s~ 1R 17 OEF DEFceM DE F' Ce ~ o E r: QDec !:)Ea:"X DEFC9 M eVE t: V T ~ :.; D~ F 0 5 ~1 S!)EVT~c:" 1~ 77 B~ 9~ tB , 7 9·"" t8 77 C,~V~RT ~ECT"-1A~ r p' DELoRT OELTA ~VERVTc:"'·f SF' "SSE~BLY DELTA M~NrTX L".C1.02 DtLTA ~1AV DELTA A"JAL 7. LA LE. 01 L~. 01 DELTA INTE~rArE DIAGNeSTIC ep CLS DIAGN~STIe ~p Cq6p DIAGNeSTIC SF' leQ Kn ,PEN SYMBIANT (~ K~ RPEN DIAGNeSTIC ep 6pN 1(""' IMTF~FC DEL T AGET DEL TAPUT DEVTRAN DISASSDEL DlSCle D I SPLAY A~IAl.Z peL 1~30t.t1 A~ALZ BAS~At...J"'L DA .03 L~.01 Dr SPL_ v j-l4 T~DEx FNTRv TA p~eCESS~R ~~UTTNES ~FV ~TAC~ ~XTRArTI~~ p ~ Ep ~ R ~ L I 8 ~ A Q I ES • 1:'1=" 1'1 ~ Vr- L A, ~ E F' RB M L M ~ ~ A C;. s s ~ E)(" r: '" "-J TRH, CA ~ ~ C;F'T l.'F' nEF' J3L TST r:~~ MA~Tr:'v p~IITINF. DEL.,.. DELTA SIZ~ ~E~T~AL ~TRING WO!T~S TA~~S L~AD M~nULE ~~F/DEF DELPRJ ~A ~CT TAqL~ ~~~ (~~A~,~~~) ce~V~RT DELTA LA =y CA"-1MI\'I!") L r~T ~v DCT VErT~~ F!"~ ~E'PIJr, Ee~r f T6 ~,~IA ~v GET !~'DE'{ T· J:' t< ~,. ~ c; ~ T ~. ! r: ~ t\.! T Rv r q EAT E r" Dr p. ur,I=" P T ~ eel 77 ""c:r ~~ PR~~Q~C~qST~G I ~ V~ M~~IT~~ AN~ QATCH O~9U~~I~G C~~~A~D ~VEeVTc:"~ BV QV ""(T !t'-I~F.:V Dr~ ,~~~~ p..l ~ ~ B~ ~~ DEBUGGING DEBUGR DEBUGTV 1 C~rv'v~N'" DELET~ ~YLE~ r~RM Sv~F'!Lr A~D ~TSC C~~IVE'R~ATI!ttNe: PRRGRA~ "t'BUGr,YNr; PR~C. L~·Nr:;UA3E Dr:"~U~Gr."~ ~e:" [lSED TA n~~UG WYT~ ~ ~V~ATFIL~ ~~A~~~SAR~ GE:T ~UPR8UT t \,~ FeR r"~L" A PUT ~U~~tjUT J "f!" F'BR ~t"'L TA c~e:CI(S r:-~Q CAD~ D!AA~ASTICS ~A~ Dr~O~~~TIC9 r~~ ~TA~N·~TICS VAl ID OEVTCr Tro, D~VIC~ OEVIC~ DEVtC~ FqR ~~EN SYMBI~~T SVMBt~~T 'PE'J SV~1BI~NT DEVICr; ~o~ ~TAG~JqSTICS ~TSA~S~LIATE ~ELTA ~AD ! Iq ~A~I"'L~R "" YSPLAV SPe:~ Tr I ED M~'! I T~R t ~JI="A~MA T I 8~' UTS INDEX BY y"M 124 MANUAL TEr~NTCAL ••••••••••••••••••• I ••• I I •• I • I-I' • t ••••••• I •••••••••••••••••• I ••••••••••• • •••••••••• • t ••••••••••••• t ••• I . I • •• F'~ ITEM IN ~~n~LE • • • • • • • • • • • • • • • • • • SE~ S~~TIe~ • • • • • • • • • • • • • • • • • I DISPLAY ANALZ OISPLAV "-4511,,;'M 9~ TSI~ DISPLY O!ROC:K AC:CTSUM l~.01 18 17 pe'Oi ceMM~NT • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • t • • • • • • • • • • • • • • • • • • SUMMARIlE .N~ ~ISP~AV DISPLAY F!Lr:: NAMES D6WTtK SSS DewTe~ TSlp O~ O~ nPAK DPAK OA.03 IF SET w~T WPtT~ ~~TNG IS C~Fr~tNG 6~ N~NE DUM OSCTS ANALZ ~tSC PACK ~A~~~~R ~EMeTE 8ATC~ ~.NDLE~ L[.01 OUMP I")UMP OUMp L~.O!5 DUM~SI!ME Dve ~ A8RT E AP e: ~ ~ ~ A~T caA CSt< eel E CEC ~ CFB J:: ~ C~D ~ Cre ~ ~ cue OPA O~A E [t E E~ ~ALZ M~ sss IF: GA.01 EA PRINT ~ELETE EVENT iel ~VENT 585 E~ !V£NT 1Q, SsS 55S· SIS S9S E. 1A, e:VENT 11t' ~VENT ~.. ~ .. ~N TE:~MTN.L T~L ~EQUEST R~CT~V~~ e: VF.''1,. U"JAL ~Cl(e:" A"J TE: R~ 1~! A L ~UTPUT SSS E. M~ GA.Ot EA 'IS ~A [A [A EA EA EVE~T EVENT 4.. ~~pe~T~~ qy ~V!NT ~, O!~r ~AG~ eUTPUT R~~. M~M~~V MANAG~~ENT ,~ .VATLA~L~ £vrNT 11, E)(T-=-qNAL T '.ITe-RRUPT RF' AL EV[NT 1~1 qp~~Are~ ~~RA~~~ USE~ EV!NT C, I/~ ~~MPLE"~O e:VENT ~, II" ~TARTE~ A·"O ,.." ~R~r,RE5S .,. 'SIS ••• EA ~VENT A, ~ Kr £A EV~NT 1~, F (8 ~ N~ SI. SIS ~A EVENT r:' Nt III [4 EVENT ~, GA.01 BL"'r\(ED D. CANT ~INO r~C BUF~ EVENT 2, TE~~T\JAL. It-.!C'UT "'~~SAr,F' Ce~F'LE EVENT 1, RrA~ ceMMA~~ ~~c~Tvro ~eR T~R Ie MM TRT~C3ER Rr:AL TTM! us~~ c~~ ijuFFE~ AVArLA~LE B~~ .4~ RECE T \lE~ EVENT 6. lIP I~ ~PF'RAT6R A~e~TF'O lJSE:~ A~~~CrA.TE ~~A~~n p~~e~sseR EA ~ ~ ~ Du~P EVENT SIS III ••• PA~E~ EA EA EA SIS SkAP J:'f'RMATT~O MEM~QV vP A~~ pp EA e:. ~E~F~~M~~ SP~CtFTFD LeCATTe~9 c:e~E ~UMP ~~lITI~E SSS sss TABLES SUB~~UTt~E F'~~ ACC'"'t''''TyNC; A~ID QANNER I' SET, R£A~ ~~ECKI~~ TS n~N~ O~ £~ oSCt! ~~~TTe~ ~VE~T PFRM!~~r-~ r:.,C( T~ ~TAOT I/q J~~~ RETU~~E~ T~ r~R~ U~~~ KICK~~ ~UT ~F C~~E Qr~e~T~n 8Y M~~e~v MANAGr~ENT 1', C"L\IT r.i~T R~rUe'C;Tr:1') r:~~~ PAG~S JUL 125 UTS TErHN!CAL MANUAL 1~~'1~ ..... , ..........•........ ..................................................•.....••...•.•••••••••••••••••. •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• " F'R I TF"" ~:ND £:ND r:~4RO F.le~~ I" ")I~,.,,'IL ~ MM SSS sss , Se:c:- SF.: CT I e~.J CeMt."1~NT EVENT ~~pePT~D BY EVENT 9, rANT ~ET G'.01 EA M~~eoV MA~AG~MENT R~OU~ST~~~!~t EVENT 1~' qt'ALTIME Je~ ~)(I" E:A PAGFS E:A EA EVE"'T ie, us~o HUNG UP e:VENT 1~' 0 110 r:eR 'Ie OL"'vrc~ AcCESS EVENT 7, QUA~TU~ EN~ ~V~"'T 1~' SLr:,:-P TY""'C' F'~~ LJC;~~ e::UQA ssS sss c;ss sss FDC6N sss F..:A ~A !VENT 10' EDC~N BvE~VT~W NqN~ BATC~ p~ec~s~~q B' ~:QA ~:QE F.':SL ~IWU ~DC~N ~OIT E' DI T ~ND ACTle~ ~ND ACTra~ ~NTRY sss EDIT 8 V E:;- VT~ i,.1 RDERLQ~ ~A ~l ~VEN.,. t4, N~N~ svMR/~~~ ~~ CA ~BCCSCA~" ~eCCSCA"J ~eCCSCA~ DEF~e1'-1 PAS~l~,q'~ ~ASS3QA~ E8MTTME CeCn v~.O'5 ~RLFLAGS JYT V4 ~Re FRR:fIL ERR:LIST 9~ iR 17 9'" 18 77 9~ 1B 17 K~.O~ rtJ~~E"JT r.e"lTR~L C"eM~AND SE:ARc:~ ~6~ r:~ID Br Cf'\"'T!(~L C6~MAt\,'D SE:ARrH ~~R ~M~ SF CA~Te~L C8~M.ND ~W, TIMF:: eJ:' ~'10 eF \A~S~AGF' ev LyNE , S~E J:CASSIN rILE Bv EQ V T ~ \~i 8 F' LIS T E ~ ~ ~ R LA r; F.:RRtsUM ERR:SUM ERR:su~ 1(F:.03 Br:" E~R"~ P.S~1QAM £RRL~LGS ~R~LeG JYT ~ILES F'f"" ::"Ir") 8F' F:: ~ R: LIS T ERRce~TL ~~~MAT Kt',05 VA E: R RDEL I M P ~ S~ 1. :;) ~ ~.I ~DYT a15·~1 ys ERq~R eVEPQrOE ADD~ ~R~GeA~ T8 ~~py ER~pqL~G T~ KEVED E~R~~ L~G F'~OMATTrNI'"4 ~ Lr~"I~IC; "RBGQAM Jlr E~R:~Ti ERR~LT~T eVE~Vy~w FeR UTILITV FaR E~TT u~r~s CA~TEXT EDYTAP CA ~J TEXT EDI 'T' ~ ~ WAQNrNG ~N u~~ 9F EN~ ACT!~~ END ACTT~N ~Q'VEN I/~ ~PUTrN~S ENr Rv AND r~TT ~e~ p~~c£s~t~G CA~S ~ATCW Br:" lA ENToV Uh.J " ~RR 'Ie D~VYC~ ACCESS WA~~ uP T'~E ~8R USE~ . 9~ q,., 1~ 77 t g 77 VA fA ERR l... eG R!)EoLqr= T ~ BLF" ~ Kf • 0 1 ERRMSG ERRMW~ u~ r:'RR~SGE T::L. po L"G SlJ~M~RV p~~c~ss~~ LIST EQReR LqG SPECr.L PAS~1 ER R6 R ~eUTrNr ~ I=' EerA L P A <; S 1. EP R" R ~" I) T r I'J ~EE J:CASSIN USER ~Qf.t(iRAM T\JTERFA~E r-~Q~Q 1£ ~ ~ ~ L ~ (; G! ~,~ R ~ UTI ~'E". ~Y~T~M ~RR~~ MESSAG~ r::PQ~~ .... ~ssAr;C" FILE ~I JB~~UT TN~ e r r" rTLF L.eG ••••• , •••••••• 4 UTS TFr~NTCAL 126 ~ANUAL • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • t • • • • • t • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • • • • • • • , • • • • • • • • • FeR I rEM IN t- 4 8t')1-IL ~ C6 MMr;NT SEE SECT' I e~! ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• t •••••••••••••••••••••• ERRMWR E~R~wQ up· ~RRNAME ~RReR peL. PASS1QA~ 9~ LeG ~RR"R BVEPV T~\,J 1R 17 7~~02' p.r, ~RR~R Re:P~RT M'JNF"YX Lr3.0t,f)4 ERR6UT e:RRS£Q PASS1 RFH1 ~ AS~ 9'" 18 " 9" 1$j 17 ~NALZ L~.01 P.S~1Rql\.1 SVMC~N 9~ FV£~TS ~xITCL r: x I TSVS\l.1 r:.:xNe:XT . t ~At-~ eVE\:(V y e:'~J ~XPAND TEL.. ~XPR SVMr.e~ FI3C~ FBC'" SDEVtr~ rXPRX r:op eVE~V ~ETtH F"ETCH3 F'IO F'IO FILe: DI~EC:TRV r:S.I.ENAMr:: T~I,.J E~~~~ ~~SSA~~ Fr~E r~NT~~L PRee[SseR SPECIAL PASS, ERR~R ~eUTI~~ ~£ce~DS q~ce~D ~~ce~o ERpq~ ~EVlr.r ~, ALI ceNOITt&~ FAtLU~~S ERR~R~ MAV ~rSPLAv ER~~Q M£SSAA~ Nfo'NE: SPe:CYAL PAS~~ ERReR ~eUTrN~ EVENTS ~ECE'V~D BV ~e~~DUL~~ rXECUTE Ne~~6l tXIT Te ~eNTTAq £)(IT SVSWRT ~r.T ~~GrSTE~ T' EXp~. ~TA~~ tT£~ ~)(PA~'O C~MJ)ArTe:D AIM TABL£ ~~IT~V STAC~ P~~Dur.~n BV ~~AD S~T UP rXP~ ~LIST FaQ ~e~"v R~UTINE F~RT~AN Be, r~NVE~ST~N SF' 'e~T~A~ e'j i8 17 s~ F'~.o~ sr 9~ 18 " OEBU~GER STEr E~ ASSeCIATE STE~ E~ CRNV~~JT~' Rr.pePTS A~.01 ~tLE UN~~AREO ~~ee~s~~Q ~~UTINE A8~~T ceo£ P=.03 B~[A~ C~~PL~~ ~ID BVE~v T~!"I A~ALZ 8e' CIoofAl~,~ eF" F'IL" LF".01 r:IL[NM PASS1QQM F"1L.£NT TE:L. 18 '7 PQ.03 FILL I'J A l ST~ f t\I(1 GET T~~ ~~T ~~!GINAL J~9 r~~~AND L~CCT TABl~ rQ~M STBRAG! - ..................... , .........................................................,.... , .................... UTS TErHN r CAL MAN')A'- FeR I TEM t.i~'""ilE IN ••••••••••••••••••••• , SEF' SECT I e~,J GET~ PASS1R~~~ ~~ALZ FA g~ Ie" GETKEV GET NA111 e: FRG~ p ~ S 1 r( A L~ 90 18 7' FqGr P.SS1RAM 9~ GETePLB GETPAGE GETPAGE s PAS~3~~M GETQ leG GETRITEMe~ D~FQe~ PASS\~A~ GETqITEM6N GETVAL LF 91 1 8 " D~.01 9~ 1~ 9' 1~ G~BST F~Gn ~VEPVT~w GHBST1 eVEPVTc:-\r1 SI"' G~eST1u G~eSTt~ I~!T!ATE UCAL GP~GP GpHGP GTMeNTRE' PASC:::1QR~ ~r GJSB 18 17 q, 19" 9~ 18 71 9~ B~ 7' 77 18 77 It. ~~ 9" 18 77 •••••••••••••••••••••••••••• , G~T FIL~ FQ~~ SVMFII~ ~ET ~1~XT F'!E:LLl ANO VALToATr C8~V~RT ~BcnTC TB ~~x G~T ~EYW~RD r; E T "I EXT N AM~ A ~J 0 V AL I '" A T F' q~ LABEL A~O LR~ATt~N VALU~ M~qF W~~~ A~EA PA~~S ~~Q ~AVE ~~T!~~ "BTAIN yNDE:)( ~F QUElI~ c.:~JT~V ""R~M ~FT ~ET ~£T B'~TA~LE ~~RTT~~ ~~ pA A~D F~TE~ NE~nE~ ~V~RLAV G£NEoATF 'BTAIN ceNVE~T T~ 8TNARV ~E~~~~~r~~ PSEUnq.~e~YTep ~UNCTIAN 9VST~M T~IT'ALIZATt.~' "-1~"ULt: Ja8 G~eST 1 DR!v~~ G~~ST Jq~ T~TTIATr"~1 ~rAD/WQTTE ~~~ TR S~AP RAD (AL~a "8TAI~ M:M~~Jt: TREE ~T~UCTLJ~~ H.NrL~gq eVE~V T~\-} Dh Q~QUrqE~ SA TVJ:) I r AL ~EAO DEFc~~ sn I-fEXBCO SyMrs\, 4EXBCD9 SVMC~~ TA9L~ PR~OUC~D BY L~AD C~~V~RT ~EXA~~C MAL. VALUr '" CHARACT~Q CA~vERSle~ TAALF ~E:)(A~£CTMAL "'lJMP PRp~£~S~~ ~E)(DUMP ~EXSCAN HEX~PRNT peL l-IGP svs~~~ ,8ATC~ ~r,PQ~rA\1 ~GP I~TABI ~ HGP~Ece~1 HGP:?~r.~~' ~ L.. e e p A ~I AL Z TMe S vS r; ~ ~, TNC~EMe:NTAL 9ACIG M eF A•.1l T SET BV SWAP I ~.! ~~E J:A~S!GN ~~XT AVAIL C~MM8N p~ BVTE AOOR[SS, ~~TT6M e~ C~MM~N PAGES BVTE TA. AloE F' .. ~ PHVq T~AL PA Gc::: NU~1BER INITYALrZrO ~v MEMM~V ~'."~IAr,t:MF:"J,.(JIT' p»~Y "G SET lJl:' w~EN C:\4IAPF'tNr; IN USER eVTE ADDR, rU~RENT I. TN~ C:"U~lT .. ~, TERMI BVTE TAB~E LT~~rNG ALL~CAT~D P4GES I N r T r AL r ZED ~ V ME Mp, ~ V ~ A~J Ar; ~ ME:" T ( J IT' USED T~ Lt~K T~~U PA~ T8 srT UP CL J rT VA eYTE A,.,,,~ I ·IJ ~F l. I Nr:~ PER PAGE ~N TERM J8mASft JIT J!T BVTE AODR£S!-;, MAXrMlI~ II ~r: RVTE NEXT AVATLABLE: ~ECTR~ JeIN.,,, MM JII'CC JIT VA VA GA VA J811.P" JSIMNPA 132 ceMM~NT 'JIVL.e!f" JIT TEr~N'CAL MANUA~ • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • GA ED.O~ JAJ MM VA VA V. V. VA VA uTS •••••• I •••••• • •• I • • , •••••••• I •••• • • • • •••• • • • • • ••••••• • •• • ••• • • ••• • PAC;~S AVAIL p~STTIeN INITYALtZED ~V MEMe~V twlAt\lAr,E'M~"'T(JIT) BVTE ADORESS, PAGE r~UMT ~~ CA~TEXT ......................................... , ................. , ... , ......... ,., ... ,......................... UTS FeR I 'T'E ~ IN MfH~lI-IL~ SEE" SE r.'T' I BN TEr~N!CAl MANUA~ 133 ' ceMM~NT .t ••••••••••••••••••••••••••••••••••••••••••••••••••••• t •••••••••• , •••••••••••••••••••••••••••••••••••••• ' JB:PCD J6:PCOD JrT JIT J6:~CF' M"1 JB:PCw J6P'PC JS F'PC JB PP~ JI3 PP~ Je PPT J6 PPr J~ PRYV JI:! PR'MPT J6·TDP JS:TOP JIT JYT J6:VL~ J8:VL~ Jti:VLT JS:VLT J68CF JBMNPA JSNAS~ J6PCC JBP~P ~JBPPC JBPPH JBPPr J6TDP Jaup ~J6VLH J~VLT JCCL JCL. JCLE . JeLL - Co\) Co\) MM JYT M~ JIT MM JIT JYT !'t1M JIT JtT MM JYT MM JrT JrT JrT JrT JYT JrT JrT JrT JrT JyT JYT JrT JYT Jlr JIT JYT '1"VA. GA VA VA G" VA GA VA,' GA, A:)D~ES~, PAGE C~UNT INrT!~LTZED 1:\ V ~VTE Br: nVN,Mrr. OAT' MEMfI!j:(v MAN. t'1F'HE~JT (J r T) 9VTE AD"'~, PLATEN wT"-'T~ e~ 'T'F.:RMINAL. ~VTE ADDQESS, "'I..fYSlr."L F'Ar.;~ ceUNT BVTE F'''GE USERS F'j.ofY pr; USERS ~VTE VA G4.01 BYTE VA (3" ratU'-JT Al.'D~ESSI P~YStr4L p.G~ ~e:AD USERS PIo4 Y pr, r~AIN IJ~A~ BYTE ADDRESS, IiIHYSlrAL PAG~ TAIL VA, VA. r~AIN BYTE . ~J~XT BVTE BVTE H~AD PHY pr; ~~AIN T4IL A",..,R ~F' ~RtVL.Er,~ LF'VF'L ~F' JeB ADDR, ~! I~RENT ~~eMPT C~AR A.VAIL "'''~, PG Tep B~ DV~!AMtC PAGES AI)[)RESC;, ADORESC;, VIRTUAL LINI( ~F.:." tLl~ VrqTI.'AL.. LrNj( CIJAJ~J A''''~ES~, VIRTUAL Ly~1( TAIL eF' VI~Tl1AL LIN\( C~AIN VA RVTE TAIL BVTE DIsP RF" Jt3SBCF' BVTE OlaFi' ~r: .. J~: MNP A evrE D!9 P ~r .jB:NASP qVTE O!Sp ar: j8:PCC 9VTF' DTSP Ar jB:PCP '3VTE DT~P ~~ .JI1 : PPC BYTE DySP Ar;:' ,.JB: pp~ BYTE OI~Fi' ~r: Jf3:PPT I3YTE O!RF' ~r: jt-3:TDP VA ~EE VA GA VA VA VA V" V" VA V4 VA VA VA v~ ~JH I VLH ,J~: C~~M 4~IO VL T DY~p ~YTE DI~P srZE VA \~AP.D VA ~EE VA J:F?u P J1V'T'E ~r or~P JICLE St.'E ~J: eLL ~~ ~r;:' ~r: LrST .HCL ( T'! W"~DS' ( J: C.L ) !N~)EX c,Y !'f'r:M LJTS Te:r~NTCAI. MANtIA!. 134.•............... ......•..... , .............................................••..•..•.•.••.••.••.•.•••.••••. FaR SEt: .•.•••...•............... , •......•.......•. , ..... , .........................•...••......•.•...•.•.••..•.••. JUL 19,' 73 ' ITr~ JCLP JCLPA I~ ~'~r")I~ILE' Jlr s~r.Tle~~ JCL.'S JYT VA. VA. VA, JCMAP JtT V~ JCPC JCUL JDA JDOL.L Jlr JyT JYT JrT JOLL. JDUL JEUP JHIOA JH:OA J~:PC J~DA JHS~PID JIT JIT JITF"PSIZ JITfPSIZ J I TLM~1 Jl"T'LMNP JITREE: .. JI T5 JITUSCDX JJAC JL.MAP JBB JetB STEP JeeR JePT J"PT JPLL JPPC JIT JIT JIT JrT JIT ceMM~NT SEE JICLPA qF.'E J:r.LS SE:~ JBrC""AF VA, W~r.(D VA VA VA VA VA SF:;: VA, VA J:LL~ ~~E Dr sF' ~~ J:cuL. W~RD D!Sp 9FE JI!')nL.L ,J~ I PCfJ qr JH:DA S£'E J:"LL. t;£E: C;F:E J:DUL. J:~UP ~ALFwe~D TA~L~ GA. INyTrALTZE' JIT JIT VA VA ~w AOO~, PA~F ~ALFwe~n 01S~ ~~ ,JIT ~A~FweQD DI~P JI T ' VA, VA. eVEQV Tc:'yl J~B JR~ JYT JIT B~ VA, VA. efTS 0.t5 BTTS 0-\5 JIT VA VA VA JIT JrT "~AL7. L~.01 JtT V,A JtT VA JIT B~ 'IVISI~~S JIT TEL VA VA TABL~ TAHI ~ T~E s'ZE AR~ A~' T~E JB:L~"P C;CHEDUL TNG Uf\' TT J~9 wT'~IN J~Q~ r~MMAND o~eCESS~~ 'PTIA~ 8ITS TN ~C9 ASSTGNM,MT USE BITS ,SEe: J P'LL. W~RO DtS~ ~F ~~ ~L~C~TNG BUF 9'1£ ~~ rNOE~ BUFF~~ 'IF'E JZ\o.'AC PA JIT J~tnA SWA= to " J:LMP ADOR ~F TR[~ TAa~E PRINT ~PEC!~T~O JfT 9F"E J:U~CDX eel MA~A~rM£~T(JIT) T£=MINAL SF'e: 6vEC?V Tc:-',..j JrT * F~R SE:E J:L"'1 N SF"E PR VA. MEM~~v !N~~RMATT~~ !~~~~MAT'~~ V4 B8 evE PV Tr: \./ ~v D,~C AnD~rss~s SF MM JH:PPC 13S • • • • • • • • • • • • • , • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • I • , • reR I"~~ IN ~AF'r)I'IL~ Se:F" S~c:"!B~J C~M~~N" •••••••••••••• ' •• , ••••••••••••••••••••••••••••••••••••••• " ••••••••••• , •••• " JPPI..f JTT V~ JF'PT JPUL JRESeQT JRNST Jfo(ST J5TART JTT JYT JYT VA. JSTOfH'r JTC9 JTELF'LCiS JTELFLG~ JUL r A. \.J .JUL. r A\! JU~AMF: JVL.CS JVL.4 JVLr Jr T . JYT Jyr JIT JYT JIT T;:L JULTA'.J VA V4. Wt'RD DY~~ q~ ,J"3:PP .... WR~D DT~P 9~ J~:PPT fjE"E J:PUI.. T~MP C~LI.. U~~D A~~ J~~IST J:~TART V4 8TTS 0., V~ ~EE VI. sr:r VA V~ R'TA'~ STA~D4RD Te QU~ STATU~ U4 1(~.01 JIT JrT JrT JTT DATE Vb.. VA FeR ~A'LB~X W~RD DI~PLAr~MENT e~ JtU~A~E S~E JIVLCS I<~Tte 8AS~A""'L DA.Q~ i(DSUT CA.C" vr;.O!5 T~AN~LATleN TA~LE F~~ eVE~V T~\'" S'"' V ft., VA GHeST/~vERLAV KEYN KE Y~I j..I~ KE:Vr.;un ANALZ HA e"N VE\!T~'! A\I", 1 AO.01 QA.UT I "f!'~ R~CBVERV.CREAT~D NAMI~G reNV~~T!~NS L~.01 V~.05 USER # RY LT~~. LABEL'TAP~ L~Be:LS LASTC~ASH L6:UN LDL.NK cac6 L.NKTRr. LDT~C l.~K'T'Rr. LEXIT I..NKTRr -=tVEClV T~~J LIBRA~lES :US~R~ LIMITS LIMITS,De:F'ALT BA.TCH LIMR eeI L~.01 ~UTpUT JIT e V ERe e~r~AT~R C~M~UNrCATN F6R TA.BLF.~ VC;.03 KO r~ ~o BVTES, ~~VTN MES~iG~ BUF'FFR 'F'FRATqq ce~J~~L.E 'C"MM"~lD "~"c~~seR KEYIN8UF" KEVSU8 "PT REC~Vt"o? we~D DySP ~r J~:VLH wa~D ny~p ~~ J~:VLT TY~E~'~ 1. TER ~A~IDLER KEVIN TN JtT A. W"~D wH I CH C:'~T AI ~It; ,.~~ ~T A~J~A RD A.Dr,)R ~~ TC~, C~NvF~qTR~ I(~V I~.I qrAD ~PEN M~ST Rr:" RC ~~UTtN~ RRUT!~E T6 Ta R~ ~~UTr~E T~ Q~~~NT TAP~ M6~~~p PQ~CESS P~~CESS - I ~,,~ ~ LINK C"~S I ~A~ ~ T~A~S ceNT I NKTRC CLEA~UP VN.01 OQ~CESS GE~E~AL ~ESC~TPTtaN ~PACr(RAO) LTMITS p" O~~AULT ~I~!T~ USED 9V ~.TC~ LfMIT,MESSAA"TITLE ee~MAN~ PR~eESS~ BP sr ••••••••• '" 6 PrI F'L~Gr. 1)~ED RV Ttl. ~LAG AITS r~Q CrRTAT~ LRGT~AL QTAT[S C~NV~Q'T' ~e~T~a~ DATA.T'~F T~ JULIAN VA p~ t • • • • • • • • • • • AND TD[NTIFrCATr~N II ••••••••••••••• TEr~NTCAL LJTS 136 MANUAL. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • , • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • II • • • I • • • • • • I • • • • • FeR I TEM I N "1~~I'ILE SE:f S~r.:T I 61\' ceMM~NT • t ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• LINEAGE LINK LINt( LINK LINKLIMS LIST LIST BVEklV Tr:t~ SA L..tNK RA eVERV TCo ~J BF" e,en FeRE~AT~ER5 ~~ UTS LeAD~R p~eG~ A~1 'N.LI~£ ~eADT~G 6F Vr';.05 HW, AD'R E::~ FA SUPE'~ QC C~MM~\J') De:F~e"'" P.SS1~AM P4S~~R~~ LMF~GD· F~G~ 9~ F~G!" 9,., 1R 71 1.6CCT1 LBCJIT LBCI.6C L6CTRAPS LBG'F"F" LBG6N LeGaN LeGR ~AM~ M~~S.G~ ~U~F~~ eel LlSTCC LISTCC LISTC"NT LISTCeN'T' LISTERR LISTYT LMA LNK LNI(CNTR LBAD LeAOR LBCCT L6CCT LBCCT FILI:.'S FyRST S~TS Ar.CES~ WYT~rN A r,TVr.~ RAN~r LTSTr~G AN? F~ReR M~~SAG~ UTILTTY STE~" LISTec LMINT B~ 9~ 18 71 90 1A 11 9~ 18 7' De:F~B~ P.S~3C?A~~ 9r 18 71 PAS~1~~~ 9~ P4S~f.H""! I~JI"'TAI~ L..yNv q1 lR 7' 1~ 9c 18 " NA 18 17 ~A JIT VA. l.eA~ R~.01 eel SVSr;~f\l M~NJ:"t)( SYSr.;~-f'..! I.~CCTPA'1 ·A~ALl At\1 ALl. A~IALZ "VEr:v Tr:'~J 7' FA 9j 18 77 Lf).01.01 9/j 18 " 9f"1 1 R 77 Lr Lr: Lr: ~TSPLAV ce~T~~L Ce~T~AL Dt~PLAV 4DD JNTFRr~ SAME A~ TA~LES ~I~K ,q ~:~R~~ L~AO M~O L~.D ~enu LY~K C'U~TER GE:T ~'E XT REr:qI;'O F'R~"1 L~CCT T4BL~ I NF'~R 8UtL~ "'ABL~ tJITPA~, ~FTU~~ STA~TT~G A~D ~N~T~G L6C.TleNS t1 UI Lr" T A ~ L£ ~ n t SPA '., n P SO" r; Tr:.:~M!f\JATE ,. "~~~/J~!l L~G6'" TI="RMT'JAL USE~. L~GAr:~ ALL Je~S ~e. FA 'JSt: R LF.~1 CLBS~ At\lALl ~ESSA~~ r"~M4 T, ~Nt. V L~AD A~D ~vr~l.Av ceM~A~D p~~rr~seR ~UIL.~S L~CCT FILES USEe' TA BUIL.~ ~e~TF'TL£ LRCC,.. T A~Lt./C" TI.~ ST~!JCTUF(F vr LP ev r: tt NT Rtt I e " M ~ • BtTS 24.31 ~F J:RNST, I NTEF=lN.AL SV~A~~L.. TA~Lr:" 9VE oV T1:'1-' St;OAT eel ~euT ceM~AN~ ~~£CIFt~D s C~~MANO F~~~ C~.RACT~R ~J D L~AD M~M~~V r'~TReL.. QErrS'T'r:'~~ ~LL~r,ATt. W~~~ ~REA ~qR M:F~G~ S~ j:'r' L~G~T ER~~Q L TSTe' J ~ RE ~J T L,.qG;!HJ Ar BV L* "rsPLAV c:e~JT~~L.. C"MMAN~ LtST ~ASSl ~q~TR6L rAMMA~D~ "'SPLAV ce~TQ~L ceMMAN~ ryTSPlAv t ••••••• • ••••••••••••••••••••• r~E:NTr~V ~ AF A"'MIT A lI~Er: L'GGEO ~N T~ U5F~S L~r;·er-.J AND TI4E: SVSTE~ ~~'CESS.Q ~~.~~~N M!Le T~ 'FVrr~ ~p 137 • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • .. • • • t • • • • • • • • • • • • • • • • • • , • • • • • • • . ..,....................................................................................................' c: F' " R I,. r; ~ MAL Deb M Broca M M Beoes eoce Mel DCB ~ C'!DC6 M O'DCB M rIDeB IN ~~ Et ') I-i L C' Se: C" c:; E: r T I ~ \j M : AL Dc: ~ v ~ , 04 M:BrDr~ V~.04 V~.04 v~. '=>4 v~. 04 M:BADCR M: C:jC~ M: C T!"H~~ Q C~ M ~ ~ NT • Ct':' l' 'J T r N G L ~ r, DeB 8I~A~V INPUT nC8 9r~APY ~UTPUT 9CB C~NT~eL C6"1M A ~JD I t\JPUT ~CB ceMPI::lE~~ED ! 'I~UT DeC!' C~MP~E~~EI) q"rPUT Dr"Q M: CPD~Q \/rJ. 04 !1:D~Dr:~ V~.1)4 "rA(i~!~C:jIC ~:ETDtR ~:Eencl!) VP.04 V~.04 E:LEMr~T EL.EM~"'T M:CPu V~ caUNT MM M"'1 Gh M:F'PP~ GA ~B'lI\TR~ MSFPPT ~:CPu VF" TAIL RF ~~rr: ~~GE PAqL H~A~ ~~~TT~Q FRE~ P_G~ P~~L MB~IT~~ FF~C" LTST!~G LeG MIEeOCa MIFPPC MIF'PPC ~IFPPT ~~ GA QllTPUT Dr-~ INPUT JCH ~UTI="JT DCs q~ M~~TT~~ ~R~r ~AGF' p~eL "1Br-.JIT~R F"R;:-F' pAGE p~qL C~lJ""T ~AGE PA~L '1tGeDrR "1:l..Y:)rQ E)(ECl'T!~N AU"'~!JT OCR Lr9RA~V INPIJT DCR M:l..LDr~ Vn..04 V",04 VQ.04 ~:Leoca P1IL"Dr~ V~.04 Lr~T!\JG ~UT~"T ~:eCOCB M:e~DrR M t P Q ~ I=' VP .C4 V" • 0 4 qP[RAT~~'S rq~q8LE ~ U~J CL1 ~ !J T P U'T' fj CA MM GAt01 ~T'!D~ V~.04 ~VST~M ~~L'RrE MIG'OCB MILIOCS MILLOCS e .., I P 0 CB . MlsGP r. MIStOCB M:SYDCQ V~.04 MISLOCB M:SL~r.Q ~: Sf< Dr.Q V".:)4 MIUC MIXX JIT JyT JIT M4I~Bex MAILB~X MAILB~x MAIL8~v BACvUO ~r;C~vC"~~ MAN 0 MA~ S\! AP K::>.O? L ~ • (j 2 TABL~~ V~.03 MAPM60E A~ALZ L~.ot L~AD MAS I( A '.! A L Z Lt"'. 11 M ~: S~DCB ~IUS V/~ VA VA ur Kfl ~,;JAt= ~rg r;QA." DeB ~~URrE T~FUT ~C9 LRn ~~9 P,,~, ~r~ qUTPI JT nr:B w~~D "D!)~ .J~R TITLE W~QD AD~R, TAyL "r: t7~C l"'~~DS) S~r: J:TITLE SYSTEM nCB lJ~r:D BV r')1:'LTA A\'D 'T~ER p~e DFLIvER~ Mr~~AGES T~ U~~R~ S~~!D 8~rl(u15 A~lJ FYLI Mr:'~~A";t:~"q USEJ:)S r:TL( r"'r.~NSTC::"Er-.JCV v~t;~AGF" T~ USER ~ q U T T\J ~ T p ~ q CF S ~ A ~L~ S~TS MAp A; I( e 8IT TN ~A~ ~A~ U~ I=" D I '" ",or. p~o AN~ ~~TU~~S ~~EC!FT~D ~ ~A. R CH USF~ T6 ~1 ~ .. ''', eN 00 INDEX RV I ••••• I I I I •••••••••••••••• " -Fe'f--fTE~ . . IN Mer)(,LE rT~M • • • • • • • • • • • • • • '" Se:~ se: CT r e~J 138 ••••••••••••••• '" CA.MM~ NT •••••••••• • " " • • • • • • • '" ••••••••••••••• I ., •• II I • • • • • • • • I ••• i ••••••••••••••••••••••••••••••••••••••• t • • • • • • • • • • • • • • • • • • • • • • • • • • • I • • • • • • • • • • • • • • • I ••• , MAlTER !NO£X eVE~VT~W K~Y IN~rX IN~~ FeR ~AC~ rTLE \~AX ~UMBER ~~ TASK JtTS r~ SVSTrM M.X'V~V MrSPR~~S v~ MA~IMUM !VERlA' PR~r's~~~ MM G.~ .01.08 SWAP ~AO TA~Lr·· ow ~TZ~ ~~ Be ve "'AxJ1TS-SsDAT MIlICW, '-'MTtClA MI--- ~M MI'GAM2 MBIGAM3 -~'MTa I'A"'. MM MM -. MM MIIIA"I MIt a.,.." MM MM -MI1 Ct'T------ GA.01.0! GA..Oi.0S G•• 01.08 MBIPPUT MM '--SSS MM MI''''UT HI' ----r--- u - - MJC'LG MM --MNSf--- L~.02 ~eUTrNE GA ...SIIW.,., MtauNT -Mope ---- -.-- --. SNAp J1T MEMeRV LAveUT eVE~VT~W ~FL EO.01 GA.01,·08 vr: MICPU MllfltPUT JIT --'SNAP JtT MM -'-JTT VA Be VA L.A.02 VA G. VA. Meo! C8CO MID' FRGQ VA,O! gn 18 " MeOtFv SYSGEN 9C 18 " 90 18 77 9n 18 " -M~ClrN- MID!'V M8Dr,v -M-eo-t'Y---'~'-- MIDIFY PLISTS M!DULrS MOOULIS . MIND"P MIN'IX --.vBarN -'TUP,~" --- SVSA~N eVERVT~W -~VE~Vt~W RECf'VF.D! M8Nr:tx MASK SWAP RAO TA~L~- GRA~UL, P~qL W.~DS/GRN SWAP RAO TARl~. SHI~T ~AAL T9 ~RAN p~s SWAP ~AD TAStr:- SHY,., TRAe\( Te GRA~! AD SWAP ~AO TABlr:- S~I~T ~F 04 TB TRACK SWAP ~.o TA9lr:- SECT~R A~nR~~S MASK SWAP RAD 'AelF- GRA~UL~S P~R T~ACK LINK T~ NEXT pHYSICAL ~AG' IN r~AIN PHV ~G e~ArN~ SET u~ IN 1T USAG! TABLE e~~TAtN~ SWAP PG C~AIN ~WAP RAO TA~L~. SHI'T r,~AN p~s ,6 SGPX G•• 01.0S GA'01108 GAI01,es GA.01.08 MM SGP QWAP ~AD T~Btr:- GRA~llJLIfr, ADORESq QC 90 18 " B~ BCI' I ASS 0 1~ 1~ ••••••••••••••••••••••••••••••••••••••••••••••••• I RAn PA~E~ BP. 9,., 9" ••• " 77 71 DA.01 9j 1R 11 ~eT s~.~rD DC:8~ A~~TGNS PA~S? C~~~AN'S p~eCtSSI=:S ~ECE TVE R[~',Jr~TS F"~ lIB APERAT eNS R£ADS AND Cor r GrT liE XT F I ~L" ANO r'I-fECK' F'~R STR! NG BA~E ~~ ACC6UNTT~r, RAT~ S'~UCTu~E V~". O~ OAT A ~ILE ~~ C~A~r,~ RATE~ C~AR~~ ~AT£ re~TReL ~~qc~qS~~ ~STA~Lr~H ~AT~ PReC~Ss :L~e~L ~~CeVE~v MAT~ CBNTR~l RATes RCL.SLE. 6VERV TC"IAf PASS1RA~ QP QI= Br: 91j 1B 11 ReVeTL ReVell KO.01 c~py DUMP T~ ~An RCVRAD cvcusp 1(~.O3.04 j("q • O~. QI+- MA ~~q C~~~ ~UMP RDE~~~G RDEcLFl~ lA, L~CATI9~ Ce~TAI~N~ ~£AD E~ReR L4G RorCLtsT 9~ ROINCF"CH UBC,""A~ P~SS2Cr-! CHANGE RELe~ATleN D,eTI~NA~V GET Fr~~T ~rFLD 5F r,NTReL C~MMANO S£T QEGySTE~ T~ REF/~Er STACK !TEM RDSRCH SVMr.:ft ll ! sVMcr:t\1 71 '7 RATt: F"ILF" ~ATE:S QCVDHP ~DNE)(T RATr:-S R~,Tr~ cvcu~~ 1~ 9:) 18 S~ IN L~CATE ~VM8AL RE'/Or~ P~~F~RM~ F"rL~ cepv MAKE ~EfNT~ A ~'~E s~ ~OW~T peL RElENT B.SI-IAl,l~L 7'3027 OA.02 READA~ eel P~.03 READer TEl. ~EAOCC Oe:Fp9M 90 1R 77 9n tR 77 9~ 18 77 9(") 18 11 9~ 18 77 9~ 18 READCC QEAOCC READCD REAOceNT READC~UNT PAS~~~,..! PASS3~A~-1 P.S51~~M DEF~FtM PAS~3~AM R~ceV~~v WEI~~TS Fe~ US~~S ceMMA~D ~T4CK TEST R~AD AIM TABL~ ~~TRV TRANSF"E~S t~PlJT DATA T~ PA " C~MM~ND C~NTR~L reMMAN~ Q~AD ~~AO ~E~T RFAD TEMpeRARY FII.E NEXT ~~AD NEXT C~~T~e~ C~MMANO PA~Sl CeNTq~L e~MMANO r F'~eCe:ss CB~T 1~JUAT ~~, C~MMA "" ~~~CFS~ Ce~T'NUATt6~ C~MM.N~ - - tINDEX JUL. 19,'73 ••••••••••••••• , F~R ITEM ~y 144 IT~M ••••••••••••••••••••••••••••• IN MPn~L~ , ••• , ••••••••••••••••••••••••••••••••••••••••••••••••••••••••• 1 S£~ S~CTIe~ CeMM'NT •••• t ••••••••• ••• ••••••• •••• ••••••• • •• • ••• ••• •• •• •••• • ••••••••••••••••••••••••••••••••••••••••••••••••••••• P.SS1~~M P'S~1~AM T~L REC~R~ REAOFtLE ~EAOX ~[erT REceRD REceVER RECeVERY RECeVERY REceVER2 gn 1a 71 g~ 18 11 P~.03 L' ENTE~ NAMe: TN STD TAel~ gA~E AS CepV~TM ~~5ET ~~Tt~N ~IT UP~N q£~E.SE ~V~NT Q[ceq~ ~~uTrN~ A~O eU'~E~ nCB I ~ I TRr.v~ BVERVY~~ ~UFF CVCus~ 8~ K8.0~ L" BEG I~) ~ r NGL~ l tSER .A~RT ,~ ~~C:"VERY ~EST~R! SYSTFM AFT!~ U~~£~~VRBL ~AILUR BU,FER ,eR qAvING SV~T~M P.RAM~TERS ~EC~V~~2 K~.01 SVMce~! ceNVrNT~! DUM~ s~ A~.Ot ~£ST~RE SVST~~ TAB~~~ STAC~ P~~Our.'n BY ~~AO ST~C~ ~ReDue~~ BY ~~AO SVM~~L ALIGN~~~T BY ~ET. LR.02 p~INTS REF/O~F REF/DEF R£r,N REGPRT REGS D[FC8M sn A~~ L~.OER ~So ~ ~EGS De:TEFMt'lE CAU~E: 6F rqAS~ RE~STARF RE~SVM ANALl ACCTSUM SVMrTLc LC'".01 Pc.Ot K~.04.02 A'JO OUMP ~Er;l SUBR~UTr~E T~ RtLEA~~ STAR FrL~S RELEASE FrL~q ~F ALL SVMFtLE ENTRIES REMeV!· SUP~~ QC ceMMAND REP~ACEM£~T ANALZ L~.O' REQceM IeQ DA.01 ALT£~ RU~NI~~ MeN!T~~ P~RF~RM FINAL CLEANlJr:t -F A ~~QUF"ST ~TSC AND c~~, ALL~CATr.N ~.R SVMa,ce~p D~TE~Mr~E ~~~~LUTr~N e~ ~~F/O£~ ITEM ~F~ETE ELE~r~T FILE~ REQDC REQ~C RESC8M 9VMr~N PASS3~A~ R6MOELET RB8M R68TCNT qeaTSvM RRSG, RRBI'i RSZ RTMAINCL RUNFLAG RUNNE~ SDEvI~~ SVMTA~ SVMTAR TSTIooJGP ·CeCa DEFQB~ JIT FA S~ 90 1A 77 9~ 18 " v~ VM K=. 02. ~3 V~.05 90 1R 77 VA C~EC~ ~eQ AV.yLABLE BITS 10.1_ RUNQ6~ L~.C1 SIAJP slAJP SSDAT VC SSS £~.02 T~~P US~D T~ SSDAT VC ~TST e~ PTR~ sss ~D.01 BfG ~~q stBeL FILE Aq~ RUN ~LAGS 8UIL~ ~~BUr, TA~LES eel stBel AQEA ~YTE, MAX ~~~~AGE S'ZE BV Lt~£ PR~C~SS AB~A~M~L REAO ~F TNCLU~~ RUNR PA We~K ~UM8~R ~F ~ W~~D ENT~t~s y~ Re~TSYM SVM~~L T9L,W1.XA400.w2 •• nD~,w31_.N.~E ':~[E A (1R A ~JUL.~ F8R AFt L, ~~ SYMB I ~NT ~U~ r~~M.~~ ~r r.~ P~~CESS~~ ~AVE AJTT pp ~URr~G SWAP T' CMN~ ~t~TI(SEE ~Blesu~ USE~ ~w.ppF.n ~UT 1 145 ..................................... ... ................. ................... ........... ..... .......... • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •• • • • • • • • • • • • • • • • • • FeR IT~M I~ ""6~1-'LF' s~~ se:~"!""'J CBMMC!pN" , , '. , , , LIST 'C- 8E:GTt..! 'JISC A'~DO. c«)F'F.: ~~leSUL) V': SSDAT SIBDA FIRST DtSC.A~~ ~F U~rR SWAPpro ~UT sss slBOA E~.01 ~UM~f~ ~~ J~~S TN 8ATC~ STq~.~ SSOAT vr. SIBFIS 9ATC~ USERS 41 LeWED ~N T~~ ~VSTrM M,IMC vr ·SI SUA IS' vr C~UNT "r: BATC'~ USER~ r 'I ~VC:;TE:M SSOAT glBUIS =~!NTE~ Te w~~D DE~T~~Yr~ TN U~ER'S r~ sss s:CL..P ED.'1 weRD DEsT~Av~n IN Cl BY TTC sss Er"'I.01 SICL..S SICUAIS SICUIS SICUM SIEAF SIECL MI I Me SSDAT ssDAT SSOAT SSO.T vr. vr: vr:. vr vr. CURR~NT ceuNT CUQRr~T LTST sss EN~ SIEOA SSD~T E"'.01 SIEVF SSOAT SSOAT SSS SSDAT v":, EVENT SIECL ~IFPPC SI~"PC ~:F"p~ SIr:PP~ SIFPPT SIFPPT slGJe6rBL SIHIR SIIDLE gllSUN sIISU~ glJCL slJeL SIJITER~ SIJSP SIJSP SII.UN Siess S.eUAIS -~ sss SSO.,T sss SSDAT SSD~T SSDAT SSDAT v"':. v~ E~·~1 Vr:'. En.o, vr USE~~ ~~ 'r -N T~F SYSTEM SV~T~M ~UMBER PTRg T~ END ~r C~N~ LI~T USEQ ~WA~p~n BUT LIST SF EN~T~G DISC AD~~ c~EE qe:esUL) ~F C~ FA~ ~AS ~crU~ED FI AG C~UNT ~~ N'. ~F F~E~ PAG~q TN ~:FPPT C~U~T ~~ SWA~PER'S ~~E~ p~v P.,\?r P~~L ~~AD ~~ 4~AD ~~ SWAP~rq FRE~ PAG~ P~~L SWA~P~q.S F~~E P~V PAG~ TAIL SWAPD~~ FRE~ PAGr P~~L SWAP~~q,S F~~E P~Y PAG~ ar TAIL ~~ ow I ~J" MF er: v~ r NSW~. ~ vr vr IN USF~ vr.. E:rj.01 ALL~W~~ US~Q~ C~UNT r~LE ~~ n~'ST J~9 ~v G~e9T ~!.eQIBRITV Jq~~ peeL peeL ,Jee ~FADY II T6 RUN FLAG sss e:n.o~ SSO,.T vr". lJ SEq ~" I AJ! 8 ER T~E t! -F' T4~ LJr;~R Til P"r.PA~E: F'~~ EXEC C~MM6Nr) LIST ~'H~ REA'I~'G JTT "'~ AutT s~s E~·O;t ~r".O~ q~UTT~~ Sss SSDAT sss SSOAT SSDAT MrIMC vr. e:"'.0" v,vr. vr- W~ERr (JIT SAvE~ LA~T ~UTI CL T Te SWAP ~A~~l~S S~r.TB~ Jr TS US~R JIT !~ ~WA~ AJIT ~ JIT ~Q~q~q ~RS • • ~~LAV)/~ r;~A \I pes 1 Sr SWAP Ir., ~J'JMRER ~UTSI-!A t' S Il~ qN.L!\J~ USER~ ALL~\l'r~ ~"! T~E S"STEM r'-. - L t STATF eVENT 'R~NSrT'~N TABr SWAP r~ PR'G~rSS F~AG RESET AT ENO 8F SWA~ !~, qWAP eeMPL[TE ceUNT 8~ us~~s Te 8~ SWAPP~D TN SWAP C~U~T!~ ,~~ SWA~ T~~NT!FleATle~ ~EAO eH~CK I~ FeR N~XT eUTSW4P USER EV!NT T~AN9. vEeTeR ,e~ ~V"NTS )-X'40' USER SYSTEM ,,., 5T'ATe: 1~, USFRS wA IT' Nt; ,,--'-'-". QUEUrO R£GI~TERS 'Y"'fLi 810AT SI' ,--Sl' ISDAT 1.~o·'i,.,L. SSDAT -- ~Eeev~~v & ANALZ IN ~GP "e~E FeR SVST~M ST~RAGE SAVE SVMFIL~ A~O SYM'SOA ceuNT ~F us~~s IN Q BV STATE • EVENT INDEX TNTe SI~'T LTST eF EXECUTABLE ~TAT£S ~rST ~~ PRee~sseR~ FRErO BV ~UTSWAP ~0M8ER e' ~~SgeR~ F~ErO ey ~UTSWAP ~~eST Je B ~LAGS ev ~~eST J~B M . Clt-4'eST Je B Ug,~ NUM8,~, Bv At-4eST Jete , Q ,F Q' S ~!ST e' ~IS~ ~RleRITV STATrS ~Rets T~MP P~VStCA~ PAO~ C~A1N ~EAO OSt" • tJF FY~~TUSER IN STATe: ~ NUMBrR 8' ~R~~ESS8R~ Te SWAP IN rNOICATr ~ew MANY P'8C,SS8RS T~ SWAPrN SAvt LeeCT ".ISIJt.M . SID.T SAVED FeR SAvE ('OA),(~~Mr), TIT~(J. , III eee BUFFER TVPE , JNITRevR s.·..." ,.."q SYMet~NT ANO eeep Rr.STA~T ~rMITEO ~N~r~~ CHEc~~erNT 8F AUT~MATIC 8AeKUP ANO (SM!) ·..r: .e........................srI:'........re'......................................., ................................ JUL. ., 147 19."~ R IT I 'J .. ,., L F" C NT ••••..••..•..•................................. .......................................•.•.......•.....••. ~~ ~~~ ~ ~ ~ 'r ~ M ~. C!' I ' s~ eSN sso. T vr:: sS es~ sss E~.'1 SSOA T vr "JU~~H~~ ~UMH~~ sss t:D.·,1 ~~. ~ 1 L T~T 9r ~U"G~ T'~G lJ~~~S U!it: R ~UM!jE:q~ q~' USE~s ,.~ S\;,'AP ~lJT Tr MP W~RI( T A ~LE I DE"T r rAL T~ SA! eSUL S8 PNL sss E~.J~ sa SET sss SSS ~A r~ SS TQ ssDAT vr SeA T sSINeUT 5S S E A C:f'N"'R~i' LJ4 S8 !SUL s8 SSUL s8 8.SULT SB PNL sa swp ~8K sBLANK sC SCAN sss S~O.T vr sss E~ QA SSS TEL £A CeN,.~" t'" PR.O~ __ F' ~F' ~U'T'~~'I ~G U~~QS T6 N ~~ p~~c£s~~~s Ta ~WA~ Lt~T e~ • ~~ p~ec~s~qR~ SCANNE~ A~ALZ L~.o, r~TE~PQrT SCHEOUL.ER eVERV T~I,I B0 ACT I ~t\J "ERF"~Q~~D SVMSU~~ V!.o~ vr.o~ sss F-4 sCREEC~ INIT~~vq L~ stu SSS E~ 90EC C~NT~~~ sDEvrCE SoEvteEo SVSGe~ SoEvt~~ sDEVO SOEVIr.~ gn 18 77 18 77 g~ 1R 17 9~ 1R 77 sss E~.o~ sss EA SDEVJ~~ SDEV8 sDLAV sDLAV SSDAT sDp gOaT SEARC~ 1A ceNTR~i A~ALZ g~ vr G4 L~.01 t~Er Se:N~) !,. 9'18 77 M:SnF.V IN TB SWAP IN S".T~ ~VENT TRA~SrTTqN ~? c~nE~ Lf~T ~~ SWA~AqL~ ~TA~r~ U~~~ • A~ 1~T USER ,~ ~TAT~ , STAT t' 9, BAT r ~ c 6 MP t E B9 U',! n U~ F' RS C~'JV~RT~ eI~AC)v T6 r:"~C"'TC: STAT~ 4, US~Q~ wH~ ~AV~ ~T" ~~~AK AF'F'E ~·'DC; A C;pr:c: I F' I ED ti ,,~ BL A~II(~ Te STATr 7, H! ~~IeRITv CAM~UT~ a PA~Sr ~A~~A~~ ~TNE SCAN ReUTYNES SVSG~\I sCJeBx SCNTXT SeeM LJ~EoS ~~A~ ~UT BUT sv~G~\J C~A~ArT;':R SCA"IN'~,!G q~UT'NES A~"LVZE C.~MA~~~ eN C;T A"r 'I'jUEUI="S ~v~BTeNT C~~TrXT BL~~K ADOR ~v SVMBr~N C; ,. A T ~ ~ I C~ MDt JT E B0 LJ '" D U5 F' ~ !; '3F.:G I ~I c; t ~GL~ USER A Q~~T ,,~ RECAVERV C;TAT~ A, CIJ~e)F'\JT US~Q e~~V~~T EeC~'~ T6 ~T~AQV ~ReC~ss~s 9n~vICE PRec£S~ NEXT P~RENT~~ltCAL PRec~sS ~EXT vYNDO ~rNE~AT~ M!~~~V LeA~ F"T~L" MA~UL~ ~ eF S~CTe~q ~ETWEEN JYT ~ RrST 6F PGS g~CT~R DELAV ~ETWEEN JfT ~ U~E~ GRAN INSE~T OECIMAL PBINT STATr D, Uqr~~ WAtTTNG r~~ SWA~ RAD pG S~ARC~ ~~~ ~orCtFrEn V~Lvr W!T~!N LIM! i ., '.' ......... UTS TErt-fN!CAL ~ANUAL. tNoEX BV tT£M '-lfEM ~ .148 ..... •.....•••.•.......... •...........•.•.. ....... ....................................•.....•.•...•..•. '1' '''''0 . >,;• . • '.;. . . '• • • • • • • • • • • • • • • • • • • •, • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , IN Meot1Lr -- SIC' i'M-·' I"~ .....i.AM C."'.8; ", 90 18 " .WTCt-f~·--,ue-------··'· 'IS SIRtI' SlRVDrV leQ .Ll_'~--·-------·'.11 ' - . " "',;1 ~:,~. _MAN: ----- CINTRei' "" -%n~~~~-...........IO'-. • .----- ..- - - - - - - - - ~~~:..LL--+-- ____ S~'''A 'ID" '1' _________ . SIO.T SSDAT a..' ••.. ' ...... SI' . . ...... ••• at'""tO ,.. .I"~ SZI,,, --.----, ----- "8- ew L " ........... ' . sss ,sss .... ,. _. . __ USOiJAN- al.I'1I MIIMe .M, fMC st.t:K -i1:leelt[-----~rrM~ sLlte sl.ltT -St'WfJlt..--_·-- MIJMC MIIM!: H ---- "'''IMe-- M,lMe tt.,,.MtIMC 81.1,_N [0.01 VC EO.O~ V'V, EO.01 rA 'EA --.. . T£L (CANTReL. E rrqRfH"~£O USfr~ "8U·T·jN! SETS ,~e:GS I~ TStS F'~~ N£WQ PReCrSS ALL. ~"T t eN ~N SEL~C:T IUPOATE ctt eurL.O ~GP BT' MAP9 r:eR At--10 PER "'A MAN I PULATE L~AO MeOIlLE O!'TERMt NES A~I 1NOEX VALU,- P"AR ~'AME SW4PPE ~RANUl' ALLerATT~N P~~L ·L.AST cISC, AO~ 6F US'R ~WAPPE:O ~uT OfSC AOOR£SS,S FeR ,-1tT ANO AJIT OYSC ADDRESS TABL.E ,eR SI JeL crsC ADDRESS ~F GH6~, J~B JYT ev G~e~T gE£K DISC AO'-'RESSES qE"~ BV SISC:lAREA USr:.:o O "'e~ 0 t sc .r,R F"R 91 sel f'URE P~"C:EDU~~S S~A~,O ev USERS ~ALF W!RD rn~ FeR RJ"'O Cf.f~C::l SVMTAR !=;VMSU9R SYMTA~ gYMTAA SYMX - 0'1 SVMr~'J M: Sr.-I~V RU~F~RS F~ I" 01 .n1 ~~.01 S~ BJ!" 1(~.04.04 SF' F'. LA. sr vc 9T SU~~qUTINE ~"Dl}L~ ~UTPl'T r."e~, TERMINAL t:VMBt~H"T r:ILE LRGR .. , C"NTR~L ~QeCE~C:;"~ A.UTH~R!lE uc:;r:~S FeR LJS~ er: SVSTf;.M TV~E SUss:aE~J~ A'JD TE~Mt~IATr MrS<';AGES SAvE LI~T ~~ DrVICES C:;AVE e~~ !T~M IN REr~V~RV ~UFFFR STAT~ E, usr~~ WArT'~G ~~R A TTME F'~~MAT A'Jl' PQT'Jj SWAC) TA8LfS ENTRv T~ SWAo IN PRqCESS~R ~ JTT LBG!C sss A~AlZ sss EA FLAG INTEPNAL S~RT SV~~~L A~.'D PR T"T r D~ Vr.:~! ~e'JT I NE:S TA~I ~s ~UTLT BV LeAD MBN I T~R DF."j:'S ~AM I ~JG C6NVF:"'TI eNS M~OULE ~vM8eL r~NT~~L p~e~~sseR SVMB~L ceNT~~L p~ec~ss SYMP'~~T TA~LE~ LeAD ~[~T SVMR~L F'R~M TNPUT C~MMAND ~tSC~LLANE~U~ SVMBI~~T sue~eUTTNES ~XECUTIVE D~LTA SYM~~L TA~L~ C~ARACT~~ TV~F TABL," SVMBre~IT Me~JTT'R TA~LE ~rC;M~~'T SCAN . I lJrs MANUAL. !N,,£X ITF.'M 152. .•...................•...................•.•.....•......•..•...•.......•...•••• , .......•..••....•..•.•.•...• TEr~NTeAL ~V ....................................... , ....................................................................FeR 1TEM IN "AEt~t ILE SE'~ SECT I e"J. SYNTAX SVSGFN 9~ SYNTAX SYStRR SYSGEN TE~ T~L P8.03 eVE~VT~W SVSG~N P~.03 8~ 9~ 1A SYSGEN LM'S SYSIO SySAFN 9~ JJT VA, sYS~IM CVCUSR K~.1n N~ B~ B~ B~ SYSGE~ SYSMAK sYSMAK SYSTEM tD SYSTf M MANAGE ~YSWRT SYSWRT2 T STAR F"ILF" TIAB6RT T:ABe~T~ TIAceT TIACCT[X TIACCT8V T: AOet3r-i A Sr TIAMRDWT T:A$P T:.sseCIAT~ TIBTsc~rD TICHS SVS~AK eVERVT~W eVE~VT~t~! eVE~VT~Y PAS~tRA~ PAS~1~AM ACC"C;LI~ STEP STEp ACCr ACCT ACCT 9n 71 CARD 11 ceMM.N~ ERR~~ HANO~'R SV~T~M ~R~6~ ~ANO~~q G~NE~AT~ A UTR SVST~~ SYSGEN eVERVT~W 18 11 lR 77 90 1B 7' pr.01 EB SCANNE~,AETS epTt~NS SVSG~N LeAn M~~ULE ~TRU~TU~~ 8e.e~'LTt\IE, R1.Gl-teST. B1b.~1 c;v~TEM 10 SAVE SY~TE~ LT~rTS INITYALylF qWAPPING qA~ (P~~CSIJITS) ~VSTFM JNITT.LtZATI~N Me~ULr E)(TE.~~,AL A'J" T"'TERNAL U~IT~UF' J--R IOE~T ~C~E~ULT~G, qWAPprN~. JeB MANA~~MENT p~eC~ss :SV~w~T ceMM.N~ ~BT.t~ ~ILr~ .~D oe ~V~WRT ~E:LEASE eF" "'~M~ FtL.,.~ E~ T~ Tr ENTRv P~INT F~Q .B"~T CAL INTEQNAL r~TQV ~eR A MANITA~ ~~~RT ~AIN TtME Arr~uNTt~A SUB~~UTY~~ ENTRy ~6~ ~x~rUTJ~N TIM~ ACC~U~TING t~ ~NTRv P~INT SSS EA ADD A ueAl IA Gl-fBST IIRER ~eUTrNE TA ~~.D/WRI,~ STED ER IA A~SeCIATE ~H.~EO PR~r.E~S~~ ~~u'rNE ,~sRctATE ~~~UESTED LI~~A~v/n£~uGGER ~A ~A SC~~OUL~ BATr~ C~A~G~ STAT~ fA ~~UTt~E T~ rWANGE c~r TRANSLAT£ TAS~£S n~8U~G~R ~XTT CeNTR~L L~GrC I NTE~NAL ~~'T"V -T6 D~LETe: • U~~~ OYSA~SACIAT' LIRRA~V/O~RU~~~~ UeAI. gSS TIC~T8L TID~L ·Sss ueAL STEP T: DELUS STEP F= TIEe sss r~ E~ ssS EA T:Drs.ssecYAT UCAL TIECB 1~ c:eMM,NT T:E~R~R STEP TIExrT STE~ E~ E~ ~Q Ge T~L !NTRV ~~INT P~INT T~ ~REA~ ~~TRv Ta TEL ~~~ eVEQ~~.O ACr~U~TING ,~R ~RQ ASST~N.M~RGE ERR~~ CAL EXIT CAL Rr C ................., ..................e'!............................................................., .......... ..........................................................................., ................................ JUL FeR I TF.~ TIFep T FP I I\J ~t'''''-'LF" FREE C~M~e" J:~EE J:~e:E Pr.i G•• 01 F'~rEVP MM G~.01 C; A, • () 1 GE:T GE:T UeAl IA M~ M~ T F'VP T FVPM T GAJP T GC:P T G~eST T GJ8BSTR'T' M""1 M'1 T GNVNP! T GNVPI T GP T GPP T GVGPI ,. GVP T GvpI T GVPM T T T T T T T T IACU INITJeB JeBENT NAMrCHt< eFr: 6V eVER eVE~LAY TleVE~LAV1 M~ ueAL MM MM GA.et G~T GA.01 Gr:T '1M (;.4.01 r;~T MM GA..Ot r;~T M~ GA.01 (3FT I"1M M"'1 G~.• ueAl T : J A3 r: t\1 ,. . TleV sss T:6v T:B" T:6v T:6" TsBv M'-'1 CI-oII( sss T:6v sss sss G~ r. 01 .01 rA £~ FA r:l F'r' E:C J:)(1 !I1ASTt!~ ~JIT PA~F' C"a~M~N p~ "I GF"T ~! !11~ ~M G~.01 PG !=)~V ~eUTT~E T6 ~~~Q ERR ~S~ r~ G~'~T q~UT!Nr TA ~~.~T UP G~~~T J~RS Ge,T C~~~~N LT~ITS (;A.01 TI~GC~t< rlPULLA rlPULI.E GA.~1. t't; J:"RE:E VTRTUAL "1"'1 TISV2 T:PAC TIPGC~K T:P~etC6V fA 153 ~ANUAL. Cft~MI="NT' SEF SECT I GA.1j1 G•• 01 GA.C1 C;A .01 MM T F'PP ,. GL TEr~NTCAL UTS 19~'73 ~~T V~ ABBRT A"H-' ~J"'" pp A\in oF"' "" PC; J'~v 'i' Vr:> PG G I \lC'~ PF' VrqTUAL or, I NT~~~I.L VP VP ~AS"C"Q !NTE~~~~ATE A~ r;~T R~UTTN~ e:~TE:~ T8 J~~ TN U~~~tq p~qCESS ! ~J ~ VMS ~~a~T re"T !MAGE STA~T CA~S ~T~F=',A M C~E"C" r:~Q VAl TD G~8~T ·,JAHr: F'A~C~ A USER ~F'F' .ss~~rATE ~A~TT~~ ~vC"~LAV " ~ 5 C' A. T B V~ Q L A. It( • '.1 A 0 ~ T lJ ~ 'J ASS6CIAT ~vrQL~V • ~~M~~~~~ P~TURN e r N.ME TN T:~V~~LAY WTT~ GA.01 o~~CC"~~~Q ArrC-SS C~":T~aL Krt:r"I.~1 '1 ~,,~ IT" ~ " ~ c; ~I A ~ PER ~ A G~ r ~ AT'" "" ..H: CK CV S V AL YD I TV q F' M'" N • ~ WA ~ ~. LJ ~ r Q ~ ~ c: HA N E'r .~sRLrATE ~A PULL A'I ENVrQA1\.J~ENT I:'ULL A~I ENVy ~~\Jf'-1FNT Er. E:~ E"A T : B v W! T ~ ',J U'A q E " SFJ J!" r. I Q~GTS,£qS r: Y~ ~ r S~AQED PR~~ ·vrQLAV T" ALT A~~~ UTS T!rJ..lNreAL MANUAL. lUI. 19,' 13 154 • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • , • • • • • • t • • • • • • • , • • • • • t • • • • • • • • • • • t.~ • • • • • • •• FeR 1TEM IN M8","'Il.E • • • • • • • • • • • • t • • , 'I RCE 'IRI tlRrceRO t I MG t ••• SE~ SeC." t e~1 Sss £A \R~~~~T £VE~T CUR~'NT USER EO.01C'RrATES SWAP OEBUG T~'~ E A R r. Ft" RT ~ VENT. ND Gtv, u~ CPU EC qF.'Ce~D C:UR~F.~IT SEG A/I~D R11 F~R RETURN ~tRVS~I T t ev STEp sss 9Tt'P' -_.' ---, MM MM ["eo, GA.01 GA.O! rl$AC MM GA. 01 'IRUE ;. RUNoeWN ~IRVPt rlSle r.SlVEGET MM UCAL fIst .. SSS rISEL'OESTRUC UCAL E~ ~~SET ~~peRT ~V£NT GA.O! !.' EA IA SSS EO rlSGA MM MM r1M MM GA.Ot GA.Ot.OS rISGA~IT r.SIR - r rlSGRNU rlSI! fsIe O~ GA .01 GA.Ot.OS TSI~ O~ flSMHe ,ISMP MM GA.01 MM rlSNAC MM GA.OI GA.ot ,18'- -,ISlE ,ISar M flSflJM"T ,'SXAC "SXMAP fISTS flsvs~aAC 1'_ITST!SZ SiSSSS SIS ~L-- MM MM --- - R~L~A UCAL ,_~~S ___ R[PfltFtT A EA rlSENIE ristXti F'VENT EA . ,sss ~IRSTLMS cee SIS' SSS '. REMEMBER ceMM,NT t • t • • • • • • • • • • • • • • • • • • • t • • • • • • • , • • • • • • , • • • • • • • • • • • • • • • • • • • • • • • • • • • • t • • • • • • • • • • • • • • • , • • • • AL~ t NTE~NAL ~rLEASE R~LEAS! JYT MEMeRV p~r~T~~~ SPErrFT~n U~ER USE~ SF.'T ACC,-SS S~ARCH AND nT~PLAV ~eUTrN~ Te P~~CESS ~.vrIG~T S~~EOUL~ FeR ~XFCUTT~N Te nr~ASSeCTATE CALtCMKP,) ~eUTrN! ~~N ~V!~~AV ~eUTrN£ RETl'~NS RAD ~EAD p~S!T,eN ~eUTrNr USe:O RETURN T~ ~.LLF.:~ SWAP GRAN ALLeCATre~ T" SWAP GRANUL~ ALLeeATTe~ WTT~~UT SWAP G~ANUL~ ~ELEASr WtT~~UT A USE~ PE~,e~M ~WAP TIB SWAP GRAN ~EL~~SE A US£R !NTRV Te TSt- Te S[T UP M~C 9~T ~EMeRY p~~T£CTt~~ SFT N A~CES~ seHEOULr SWAP EA SC~EOUL! SWA~ 9C~EOUL~ SWAP tA GA.01 8N ENT~V TI! R" TNT T I AL t l~ A vp INTERNAL vp SAvE pp EA £A eN ~eUTrNE r! ANO Ex,CUTteN AND EX,CUTr~~ ~~TA8L..tSI-l GA,01 fA EX!CUTr AC EXECUTE MAP ReUTtN£ re ~'vE %A £A qeUTfNE T! e~MPUTE 'TMF eAL.CULATE us,,,s SIZ, S~Av~ MAPPED E~T ,,"'eMF'T C:~'~ACTE~ USrR MAST~R ~eDE ..............................................................-............................................. JUL. 19~"~ !~""EX ~\' trr M UTS TF.r"'~NTCAl ~A~J"AL 155 FeR I I C;Er." I ••••••••••.•.•.........................•... , .... ..................................•......•••.••...•...•••.•.. SSS T~~ 'J ~~~"IILr: S[~ ~" C~MMt'NT ' TIUTS~TS TIWAIT T I W~K[UP T:' WTERLeG TfX~~C TIZPUP TABLe: TABLES TAPOMP UCAL UCAL ~, T~ANerf~ IA ~eUTr~r ~BlIT YN~ r~ RDE~L· ~ T~. ~M M~ P.SS1Q"~· T.BL~~ GA-01 GA.01 CVCIJ~~ STAr~ Te rNvtQ~N~rNT ~~qC~SS \.J AKE UP fSLErp) CAL ~!WATT T" f::LEr P r ~,Ir] l'Sr:'~S ~~UT Y~r: TB '-,~ T TF.: A ~t"CA~D T~ ~~~8R L~G EXECUTr MM~ 9" 1~ 77 \jA"'!F: K=.~~.~5 ~~ 7.r.~~ PU~E ~~~r.EDURE ACrE"C;!!; ~NTEQ ~IA'1f 1'" FILE A~ ~T' TA8LF" C8t\ ISTA ~ITS, ,., AT A CRPY ~t:C:~V~~v ')UM~ Tq TAPr: ~V~!TAX SCA"J "TILITV !!)t\\''T'P4~S TAP£C~ST TAF'e:F'CN TAP~C~eT T.Pc-F'~", pro, ~~""1M~ND TAP~P A~~LZ L~.j1 Q~AD E~r:C T ~ L SC• N PAS S 1 Q"~" 9~ ~ F' A~ C~ T A8 L r: ~ TCe.C~ JIT VA 1~ 77 FU\!CTT~N PRArE~C;AR 'r.LT~.CQEATE~ TAP~ (F" I LEI e T ~) ~DDR 8F' Teg TF."~M!NAL E)(~r'JTIVE F' -- R CLJ RRE NT F" TEL tjvERVT~\AI 13r::"' TEL Te:L PQ TELLTEL STEP EP ~XEC! 'T YVE LA "'GUAGF' ~qe"'~s~"'Q Ass~r.rATE"S T~t A"'O ~~PIqRT~ ~Q~"Q TELLU~Q L~.o~ ~~TNT TELLUSR TELSCAN TELSC!PE TEXTARG TEXT A~G TE:XTeUT TFILrLGS TIC TIM TI~TMP TL TMABNR TePRT TPEXT TPIeT 01 01 ER~~R ME~SAr,ES T~ CBOF BATC~ C ~~~U~E~T FIELD ~F BATr~ c~~MANn ~U~ITq~~,.N~ l~CCT TABL~ ~PTIMT'ER G~~E~AL ~E~eQT~TleN q~ UT~ ~TACKS "3~27 C~EC~S peL 1~30~7 ~ATrH sr VA J'~~C~S~~S i" o~ TY~E 8UT P UT TA BAT~~ eel TEMPST~CKS TExceM sr M~~ri~~ I bN~UAr,r SVMreN peL sr JIT SCAN ~A C~MPA~~ TEXT~ ~AMES AqGUM~~T LEN~"~ ~EF:L '!U~8E'~r.: TERM T "'AL SSS E~.01 ABBR~VIATle~ ~~R TRA~sr~~ TIM JtT r. DATE/TIME CAL C~CD VA VG.05 PAS~1~A~ Tep~T 9~ V~ J!T JJT' VA VA 1~ T~~PAQARY 77 TN C~AN I~CD PReCE~Se~ Tr~~ CELL TN JIT ~W, Lt~K T9 T~E AUF ,~~ TN~UT TAB SIMU P~BCESS A8~~PMAL REAn W~[N ~FN~~ATIN~ S~G NA~FS A~n ENTRV ~eTNT ~Y~PLACEMENT T~TAL TeTAl PR~C~~~~~ PR~Cr~~~~ EXErUTT~~ I~ rT~~ TN TIME TN JIr JTT JUL l ' I " ! INOEX ev tT~M UTS TE~~N!CAL MANUA~ 156 ., .•••......... , ••........... ...................•.....•.................•.•••......•..•••. , ............•... . FeR ·-ITt-~ IN·~-80iiLE-·· SEE 9£CTlel\J ceM~~NT .•.............•••...•.•.•.......................•.................•......... , ...........•......••.•.•..•... ~ r peVT J rT TRACE ANACl-··_·· TRAe luSrR~ TRANS,TRANSSl ANALl ~R~P TRAP TRAP. PRBC£SNG TRAPe TR[! TRE! TREER TRUNDLE Tsee JIT AI. T.CJ' TRAPC C N!NE so JrT O!F~eM SVMeeN eel TEL SSDAT SSllA T TSe! TSI! SSDAT TSTACK JrT TST~GP TSTUSR TTYIN TTveUT TUEXT TST~GP CV-CU9·~ c:eCn C!CD JrT u8.ev usapCT MIJ~C sss· MtJM~ M~ OUMP EV£NT ~pt~eRDER TrMPeRARY ~AO SPACE Lr~tT rNTe r~co!C LecATreN e' LAST TRAD ~XrCUT~D BtTS 20.23 A~F THE re AT T~AT T~AP !XECU TI eN TRAP PRec,~S T~IG ep~ CAL PRee~~S~R TABL! PR80Ur.rn BY L~AO TABLr PR~OUr~n BY L~AD T~.N~LAT! Br~ARY W~QD TREE A~O PT~'~ ceMMA~O PRaCESS~~ ceMPACT P.LyqT VC TEMP~R.RV SWAPPER C,LL 0 v e T F: MpeR ARV SW" FI' fi!' E: R C, L L 1 Vr- EO.O' VA U81ASP u81BL U8IJ!T PA P~.03 sss MIIMC M'IMC MIIMC M: I ~ c: MIIMC U81FL uSIJIT S~ C~ JIT JIT UB: os VA T9I~ 1UI!T tueVT uelAPR V~.01 L! VA TIe 1 . ~SIe v A T e T~ L p.~ e CE S~~ R eVE" "'4E A. D T t Me: TN J I T L! .01 K~.02.01 I(~. 03. 03 V(1.0~ va.os VA V~ VA VD VD V~ Vn V~ VD EO.O~ VO G4 T~MP~RARV SW.~PER C'LL 2 SWAPPER tIe ~~UTtNE ~~UTrNE us£n T~ P~R~~R~ SWAP tIe 9TACK PTR OW A~O STAeK FB~ TF-MP CNTXT VALIetTv c~,r.~ eF ~r,~ TA8Lrs V~R I f="V USE~ eeNTRel. TAeL~S TRA.NSLAT TBl "~R TTv I~'PUT ~v .SCI I TRANSLAT TBl FeR TTv eUTPUT PY ~BCDlc TeTAL USER F~~cuTteN TrM~ IN JYT TeTAL U~ER r~ TIME ,~ JtT TeTAL USER ~v~R~EAD TI~~ T~ JYT PReC£SS8~ • ~~ PR8C ~V'RLAV RY USER ~ PR~C ~ ~F SP,CIAL p~~c ~~ TrL • eel eACKwA~O LIN~ IN STATE OU~ 8Y USER * * ~ F' 0 r Q lJ C3 GERTF' A~I V Bvue; e: R '~~W.RD I.t~K T~ STAT~ nu~ ~v Uq~R • FI'·t,.fVStC.l PAG~ N~ eF JrT tr: I~,' ~RRE JIT'S p~y ,,~ 1J SET uP ev ~''''AP !~ ~ReC ~ SF Me~TTeR ~v~RlAV ~FQUT~EO tNtTtALTlE~ ~v MEMM~V MA~AG~M[~T(JyT' PRe C _ ................................................, .............................., ............................ ..........................................................................................., ................ JUL 157 19,t1~ F'~R ITE~~ ~,·pnl"",.~ I'J :1"1 U8:SWA.P1. Ut3:US M: I LJf3C~.~ SVSc~·"'J UCAL uCL6 UCAL ID U~: 10 UNAM£ U~M4F UPAGE:S LJ~DATE USER USER ~U~1B~~ IND~~ USE~ _ Vr') USER r~ # E:n,o~ FLAG~ G4..C1 ~A ~r ~~.O~ SSS JJT E:D.01 A\IALl ANAl Z ACC,..r:;, Le.:.01 Lr."'.01 JIT f'} vEr. VT~ \-' 8VE c V T,:'\;1 ~N l'SE:R • JrT N SWAP ,~qeR~ JtT ~WAP R~UT r N~ Te U~IL INK C, Ar'~~ se.Nt;:t: SF:e: JU"" A ~E ~I="SET F"LAG T" INDICATE MAPPt~IG VA !~ ev ~~T q~ ~~AG FA~ 1ST ~e"1E DA Fe~ ~lrT 1ST TI~t: F'i'.~t' PAS~t~A'1 UPDATE: USE ~y ~=IHC v~ sss UL..CLC ~~~c~ss~s C~A~,DEvtr'/~ToLq/A~·eLB ~~eC~SSrS MT~CEl~AN~~U~ UT~ CAL~ ~AD OQ I/VIr.: s~s U~:TS 9r 1,8 11 IA vr:: sss UH:JIT U5E Rt S ~WAP U~~R STATE j F.i'.f1~ MM U~:r:LG2 GA.01.0S Vi' TSIF\ :~: UH:r:LG C~~Mr;'NT CL6St A~D Q.r..A~£N MILe T~ OtVr~r uc OTSC ADD~ ,~ ADDITI~~AL JYT r~ ANY DA e~ AJIT ~~ 1ST T'~r ~r JTT U~ER FLAGS R,v USER j "URE J:t F'\..G ~'T RITS 1311_,1~ FeR N ~WAP ~~~~RS sss UH:F'LG 9~CTI~" L~.C1 A ", AL. Z M: I ~r. U~:AJrT U~:AJrT U~: ~'lC SEJ:." GrT USFRS ~rAnITAIL. 4ND C~'.I~'T T~ U~DATr: RAD ~PAr.E U~ED Pro:. 01. 9'" 1 R 17 V /" BR qr. Lrr.01 SU8~f.!UTTNE o~ec~ss ~4 ~F =UPnATE ceMMAND J:AAC, ~~Ar, ~~Q AIT T~~Mt~AL rNTE~NAL TA~~ BATC~ e~ G~~~T JeB U'IT"lJE NU~~cr~ F"~R rAC~ JeF usr~, PQTNT USEQ T'~L£S LJSE'~S Af\'AL 1 UTILITY UTMBPMBT PeL 7~302' SVS(jr'! UTMSPhIIBT UTMr:'lp~~~" 9n 18 77. 9' t ~ 77 lJTS UTS vALID vALU ur: WRIT~S ~~eTA~I,E PAR, PA/~~ TAPES WR!T~ UTS 8A~~ SVST~~ T~ ~A TA~r U~ED r:q~ ASSf:'~18LIN(i UT!; M~\'!"~~ SJEvTr-~ ~'" 1 ~ 9'1 1 ~ CH[C~ F"~G~: VJC~ RA voce v I ~TUAL MF"l"iRY ~VEPv T~;'J BATCH vLDC~Cj( IN ATe ~ (1 e GT T~1 ER T "BL~'q UT t L TTV AND r~NVE~S T'-N R~U"" r ~'E:e! 77 77 er ~BTA r~q AVATLABLE ~rvrrr~ TNT ~Tf.R'IA L. ce"JT~AL. TA ~L~ r\lTRY vA R~ LBGICAL S,. Cr'1 Df T E C"T ~EM~~V SEEN ~v USFQ Ace", U"" TAN 0 to l • Mrr r RQ ~ P S \-JATC~DItlr, T:>4~ PReCE~~T~'G 01 00 UTS JUL 19,'73 TEr.~NfCAl. 158. MANUAl. • • • t • , • • • • • • • • • • t • • • • • • • • • • • • • • • • • • • I • • • • • I • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • t • • • • • • • • • • • • • • • • • • • • FeR ITEt-" 1'1 Mr:l"'IL~ SEP SEC:TI~'" C"MM~NT' t , ••••• I II •••• • •••••••••••• I •••••••••••••• • •••••••••• • • • • • •••• I TABl~q TE~ P~.03 wRITE ASS 90 1.!! 17 \tJRI T~ ..." ASS L~AO M"~UL~ T~ wRITE PAS~1qAM 9n 18 77 'BTAIN wRITEr wRITELM WRIT£MSN wRITETM wRITLM wRITM wRITR'ST wRSU WRTBeeT wRTMSOEv wRT~eeT W~T~eeT xDELTA Xr TCTRL.. X~IMIT xMeNIT6R XSL z~FrL OA o~ oC oD oE SQEvJr~ SVSn~~ 8~MPT F~GD FRGn PASC;3~A~ PAS~3~A~ c~c PAS~t~A~ SOEvYr~ 8eeT!-i'.J~~ eVE~VT~\·1 C~ TRAP •••••••• • WOeGPGM wRITAM wATc~oeA T!~~~ WR!T~ 9~ 1~" 90 ta 77 9r 18" 9~ 18 7' 9n 1~ " 9~ 18" 9~ 18 11 OC.01.~~ 9~ lR 9~ 1~ NB " 11 A/~ TA~IE FILE~. P~RF~RM ~~An WR!T~S SVSG~~ ENT~V M: A~S LeAO LeAD W~ITr M:FRGn W~IT£ ~tFRGn WRITr • • •• • • FIl.,[ FReM ~T/EY. orvrcE M6DULE wRTT£ Mq~ULFS ~~~E~AT~ e~~TA~LE p~qTr~N ~F L'AD BDM/8TM 8 M~OULE PA~TS M~~UL~ Q"~T l.~AD MeDlf'-~ T~ ~~~T SA~E AS WRIT~ ~~T ~r~sT 8U'FER eF FIL.E ~UTPUT C~AtN G~NE~AT~ Be~TA6LE P~~TreN ~F p~ TAFE WRITE MtSO~v L6AO M~~UL~ T~ MtSOEV FrL WRIT~ Mf'NtT~~ QeeT Tilt SWAP RAO r~ITr'LIZATI~'" ~~~ULe: 9"" SVSTe:M t:P "'fANDLES EX I T LA ~eUTINr EXECUTIVE SVSGF~ SVS~FN 9~ 9~ JrT VA TSIe TSIR TSIR D~ D~LTA r"~JTRe, T~ D~L T" ~ReC£SSFS aLTMIT,B~'M!T,OL!~rT P~~Crss~s UTM.M~NrT~~ BITS 20.23 A~ JIRNST, ~x£eUTfe~ .SEVE~1 D~LETE ~ILE ~TRECTe~v rNTRV S~FTWA~~ CK • INceN~tSTANT ~~O'-R IN eL ~e~T~A~~ CK • Ne SENSE e~ 9EEK t N CL TSI~ o~ seF"T~IARFr TSI~ D~ seFTwA~~ q~'TWAQ~ XDELTA ·STEP TST~GP of TSIA 1-00 SIMULATR eVE~VT~~ 18 7' 1~ 17 K~.O~.C8 o~ D~ OR 8' S~'TWARF CK CK CK CK • ~AD ~~v PG , IN CL • CL oer:'~N'T F~O AS EXPEe1' • N8 C~ • BAD FrN PA~A~~T~P INTE~p~~Tlvr ~IMULATeR ,TAP 93 ~.SHA".I~L 0 •• O~ LeAD F"AU~ 8VTJ:'S F~e~ CA LL~'" S ~UFFER 7TAP DA.03 TSI~ DP D~ '.T~ACK TAF~ ~ANDLE~ ~eFTwAR' CK • N ERRARS ~ q5 TSIs O~ ~~'TWA~~ 4CHAR g_ TSI~ S6~TWAR~ N~ CL ~eUND CK • SAD e~~E~ ~N w~T ~K CK • ~ !RR~~S ~ BAO Tf~ AOR • • • • • " • • • •• • • • • • • • •••••••• • • ................. ........................................................., .................,.......,..... 159 - r SrF .•••••••.•................••......... , ................... " ....... .........•..... ........••.....•..•...... N MenUL~ ~~~ IT~~ ~~CTT"~ r~~ME~T ~ :USER~ Ace T tUsr~(S 'J~,~.~1 'L~ljq~1 Ar pc. a1 PC':· L ~ GA ~ r: • c r ~ ~J N'T' T~J G LeG Ace or r. ~ 'T S U"~ Ace T S U11 ACCTSUM ACCTSUM ADDF A~Dr AI.TM~ ALTt"'~\J ANALZ A VR At\JALZ AVR RACKU~ AAC~UP ALTC P A L T r" P SASIoofAt-luL (RDT'\! RAS~ A".J DLeI S( r ~ n: M~ '-1 I T~ q .AUT~~~TZED US~PS T T~~ E ACr ~ u ~.! T r N~ U~!)~T~ ftCr~UNT Lq(~, ~ r. s R~ UT T~,I ~ u 8 D A LJ" ! ~! eo REIt"Ae~ Tt"MP.rYLES FILt"S ~A A~D T~ ~Y~FILE TA~L~R r' e n : : c q n~ . C 4 L S 3 • ~ , 8 ,9 A, ! ~ T ~ Ape "i~ LqAI'" ~LTe::~~"I~TE ~q\JIT~R r:'R~~1 1=,t\A'T'r:TLE LE ·-.19
Source Exif Data:File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.13 Paper Capture Plug-in Modify Date : 2009:09:20 05:54:54-07:00 Create Date : 2009:09:20 05:54:54-07:00 Metadata Date : 2009:09:20 05:54:54-07:00 Format : application/pdf Document ID : uuid:70885324-c1d0-41bb-9524-4bea686ff761 Instance ID : uuid:ec9cead8-5b9e-4b31-ab6d-03b3b4df1775 Page Layout : SinglePage Page Mode : UseOutlines Page Count : 171EXIF Metadata provided by EXIF.tools