24.12.2013 Views

TOPS-10 Monitor Calls Manual Volume 2 AA-K039D ... - Trailing-Edge

TOPS-10 Monitor Calls Manual Volume 2 AA-K039D ... - Trailing-Edge

TOPS-10 Monitor Calls Manual Volume 2 AA-K039D ... - Trailing-Edge

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FILE DAEMON<br />

/PROG:file<br />

This switch allows the specified program to have<br />

the desired type of access to the file. This<br />

switch can appear only on the right side of the<br />

equal sign in the command line. For example:<br />

ONE. TST/READ= [<strong>10</strong>,<strong>10</strong>], [<strong>10</strong>,65] /WRITE, [1,2]­<br />

#/PROGRAM:SYS:BACKUP<br />

This command line specifies that [<strong>10</strong>,<strong>10</strong>] jobs<br />

can read ONE.TST, and [<strong>10</strong>,65] jobs can read and<br />

write ONE.TST, a job logged in under [1,2]<br />

running BACKUP can read the file. No one else<br />

can access ONE.TST.<br />

You may omit the device specification or you may<br />

specify DSK: or ALL: in the filespec argument<br />

to the /PROGRAM switch. However, this is not a<br />

recommended procedure because there may be<br />

potential security violations. The File Daemon<br />

has no knowledge of your search list; therefore,<br />

the File Daemon treats DSK: identically to<br />

ALL:. It is recommended that the device name be<br />

either a file structure name or an ersatz device<br />

name (LIB: is not allowed, however).<br />

/XONLY<br />

/ALL<br />

/RENAME<br />

/WRITE<br />

/UPDATE<br />

/APPEND<br />

/READ<br />

This switch, when it appears in conjunction with<br />

the PROGRAM switch, considers the specified<br />

program to match the program doing the<br />

accesslng, only if the accessing program is<br />

Execute-only.<br />

This switch specifies that ALL access to the<br />

file is allowed. Specified accessors of this<br />

file can change the protection code for the<br />

file, rename, write, execute, update, and append<br />

to the file. (This is equal to protection code<br />

O. )<br />

This switch specifies that rename access is<br />

allowed. Specified accessors of this file can<br />

rename, execute, write, read, update, or append<br />

to the file. (This is equal to protection code<br />

1. )<br />

This switch specifies that write access is<br />

allowed. Desired accessors of this file can<br />

write, read, execute, update, and append to the<br />

file. (This is the same as protection code 2.)<br />

This switch specifies that update access is<br />

allowed. Specified accessors of the file can<br />

update, append, read, and execute the file.<br />

(This is equal to protection code 3.)<br />

This switch specifies that append access is<br />

allowed. Specified accessors of this file can<br />

append, read, or execute the file. (This is the<br />

same as protection code 4.)<br />

This switch specifies that read access is<br />

allowed. Specified accessors of this file can<br />

read or execute the file. (This is the same as<br />

protection code 5.)<br />

B-6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!