1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
LIB_RUN There are a series of steps associated with running a program, which we will cover in detail, but here is an overview of the steps involved:
The first two steps have to be done in tandem. We have to check the execution path, which may be multiple directories, to find an executable matching the specified program name. We will go with the first match we've found, whose protection allows the user to run it. Thus, we may execute the second or third (or...) one that we find if the first (or second...) is protected such that the user cannot run it. Of course, if a specific directory is specified, we only need to concern ourselves with that directory. Another consideration that makes this more complex is that if a file extension is not provided, we have to determine which file to execute if the same name exists with multiple extensions. Something like prog.txt is probably a text file and therefore not executable. But prog.exe, prog.bin, and prog.php might all be. Obviously, we will exclude any file whose protection prohibits access. But when there are multiple choices, which one do we choose? That comes down to the executable priority list, which we will discuss in a bit. It defines which executable extensions have what priority. Higher priority extensions are chosen before lower priority extensions. The policy is handled by the LIB routines and not by the executive. In fact, the executive must be given an explicit device, path, and filename, including extension - all else is disambiguated by Starlet. The situation is a bit complicated by the fact that, when searching a path, a higher priority extension in a later directory must take precedence over a lower priority extension in a directory earlier in the path. So we may need to make multiple passes through the path to find the best match taking both protections and extension priorities into consideration. One last consideration is that the user may specify a file extension that doesn't match any of the extensions in the priority list - like prog.txt. It is possible that such a file might still be an exectuable. Remember when we talked about data streams back in articles 8 and 9? The default data stream is what most people think of in terms of file data. But UOS allows additional (or ancillary) data streams to be read from and written to on file. It took 135 articles to get to the topic, but we now start to make use of ancillary data streams. We use a data stream with the name "$RUN" (All UOS-reserved data stream names start with "$") - in this case, we will refer to it as the $RUN attribute of the file. If that attribute exists on a file, it indicates the name of the program (the "run handler") that will execute that file. So, if said data stream exists, we read the data for that stream, which is the name of the program to run. We then go back to the beginning step and find that program, and we include the name of the file in question at the beginning of the parameters passed to the run handler. Note that this program, once found, could also have a $RUN attribute. Also note that even if the file extension is known, the $RUN attribute overrides the defined extension priorities. Briefly, what is the purpose of a run handler? UOS can only run certain types of executable files. UOS cannot directly run an executable created for Linux or Windows, for example. Nor can it run uncompiled source programs written for some interpreted languages such as BASIC or PHP. But we want to provide a way for users to seamlessly run these programs on UOS. This is where run handlers come in. They are programs that are directly executable by UOS, and take the given file and execute it on behalf of UOS. So, a Windows emulator can be associated with Windows executables to run Windows programs on UOS. Likewise, a BASIC interpreter can be associated with BASIC source files so that the interpreter can execute the BASIC program. These are just examples - there is no limit to the number of run handlers that UOS could run. In the future, we will address some run handlers that will be provided with UOS by default. In fact, we've already discussed one run handler at length: UCL. By default, files with the ".com" extension are executed by UCL. The name by which a run handler goes depends upon the way it operates. UCL is considered a shell (similar to bash on Linux). A run handler that executed Windows programs under UOS would be considered an emulator. On some operating systems, such as RSTS/E, such emulators are bundled together with shells and called "Run Time Systems". A run handler that executed source code, such as BASIC or PHP, would be considered an interpreter (sometimes also incorporating a shell). But, by whatever name or technology, anything that executes a non-UOS-binary on behalf of UOS is considered a run handler. LIB_RUN is the interface to executive service that runs programs. It performs the first of the three steps described above. This routine has no equivalent in the VMS Starlet (there is a LIB$RUNPROGRAM there, but it works differently and we'll cover it in the future). Here is the user documentation: LIB_RUN Executes a program in the context of the current process.
Format LIB_RUN programname, commandline, flags
Arguments programname
commandline
flags
Quotas: None for the call, any/all for the running program.Possible error codes SS_NORMAL = Success
<extension> = <handler> where extension is the file extension, including the dot (.) and handler is the fully-qualified filename of the program that is the handler for the specified extension. If no handler is specified (this should only be the case for UOS .exe files), the system executes the file directly, without using any handlers. If sys$extensions isn't defined, the default behavior will be as if it was defined with the following contents: .com=sys$system:ucl.exe;.exe=
.php=sys$system:php.php In this case, if the user tried to run a file with the .php extension, UOS will use the sys$system:php.php program. Unfortunately, since that is also the .php extension, the code would read through the extensions and try to use the sys$system:php.php program, which then causes us to loop back and try it all over again - a true infinite loop. Therefore, if we reach 16 levels of recursions, we'll assume that this is the case and exit with an error. But it could also simply indicate that there are a lot of run handlers and we hit 16 levels of run handling. Generally speaking, for performance sake, we'd limit this to 1 or 2 levels for any given extension. Anything beyond that is probably going to bog down due to overhead anyway. 16 levels ought to be more than sufficient. In the future, we'll discuss ways of changing these kinds of built-in limitations. Granted, we could check the simple case of recursion, but it is useful to simply limit the number of levels for the purpose of maintaining system performance. This code solves both issues.
_Program to indicate that the program
wasn't found (if it is, we'll set the variable appropriately).
There are two different paths through the code to find the file: 1) if
an extension is specified, and 2) if an extension is not specified. In this snippit of code we
are handling the first case. If a device or path is explicitly specified, we don't
use the search path and simply check to see if the file exists. Otherwise we clear the
However, if a device and path are not specified, we have to search for the program. So
we iterate through the path, seeing if the program exists in that directory. If found,
we construct
_Program is set, we found a match
and we exit the extension loop. Otherwise, we restore the search path, loop back
for the next extension and try again. Note that if a match is found, Handler
will be set to the run handler for this extension.
_Program
is null, the program wasn't found, so we exit with an error. Otherwise, we continue
on to the next stage of the process - checking for a run handler.
Handler will be the value of
the $RUN property for the file.
_Program to be the
run handler, and loop back to start the search process all over again. However, if
the RUN_DEBUG flag is set, we add "/DEBUG" after the program name so the
run handler knows to run the program in a debugger (assuming it has one).
RUN_DEBUG
flag. If set, we are going to treat the system debugger as if it were a run handler.
In that case, we preprend the command line with the program name, and set _Program
to the name of the system debugger program. Note that there is no attempt to check
for a run handler for debug.exe, or to follow pathing. If we get here, we will hard-code
the debugger and have the executive run that program.
In the next article, we will take a look at the data stream interface used by the above code. After that, we'll look at the run service.
Copyright © 2021 by Alan Conroy. This article may be copied in whole or in part as long as this copyright is included. |