IBM 3350-A2 Reference Manual page 27

Direct access storage 3350 series
Table of Contents

Advertisement

Recovery Action Table (continued)
Action
Explanation
7
a.
Construct seek argument (see Note# below).
b.
Construct restart CCW 1.
c.
Continue user's chain by executing the following chain:
Seek
(argument from step a)
Set File Mask
(same as original)
Set Sector
(argument
0)
Search ID Equal
(record 1)
TIC*-8
Restart CCW
1
TIC (CSW)
(channel status word)
8
a.
Increment the cylinder address of the user's seek argument by one. Set the head address to zero.
b.
Continue the operation by executing the following:
Seek
(argument from step a)
Set File Mask
(same as original)
Set Sector
(argument
0)
Read Home Addr
(skip bit on)
TIC (CSW-8)
(channel status word -8)
Note: If the modified seek argument
is not within the user's extent, /OS must supply the correct seek argument
before issuing the Seek. If that is impossible, /OS must do action 2.
9
a.
Increment the cylinder address of the user's seek argument by one. Reset the head address.
b.
Construct restart CCW
1.
c.
Complete the interrupted operation and continue the user's chain
(if
appropriate) by executing the
following:
Seek
(argument from step a)
Set File Mask
(same as original)
Set Sector
(argument O)
Search ID Equal
(record 1)
TIC*-8
Restart CCW
1
TIC (CSW)
(channel status word)
Note: If the modified seek argument is not within the user's extent, /OS must supply the correct seek argument
before issuing the Seek. If that is impossible, IOS must do action 2.
Note#: Get the cylinder bytes and high-order head byte from the user, not from the sense bytes. Get the low-order head
byte from sense byte 6, bits 3-7.
Figure I 0. Recovery Action Table (Part 3 of 4)
Error Recovery
23

Advertisement

Table of Contents
loading

This manual is also suitable for:

3350-a2f3350-b2f3350-c23350-c2f3350-b2

Table of Contents