1 Introduction
2 Ground Rules

Building a File System
3 File Systems
4 File Content Data Structure
5 Allocation Cluster Manager
6 Exceptions and Emancipation
7 Base Classes, Testing, and More
8 File Meta Data
9 Native File Class
10 Our File System
11 Allocation Table
12 File System Support Code
13 Initializing the File System
14 Contiguous Files
15 Rebuilding the File System
16 Native File System Support Methods
17 Lookups, Wildcards, and Unicode, Oh My
18 Finishing the File System Class

The Init Program
19 Hardware Abstraction and UOS Architecture
20 Init Command Mode
21 Using Our File System
22 Hardware and Device Lists
23 Fun with Stores: Partitions
24 Fun with Stores: RAID
25 Fun with Stores: RAM Disks
26 Init wrap-up

The Executive
27 Overview of The Executive
28 Starting the Kernel
29 The Kernel
30 Making a Store Bootable
31 The MMC
32 The HMC
33 Loading the components
34 Using the File Processor
35 Symbols and the SSC
36 The File Processor and Device Management
37 The File Processor and File System Management
38 Finishing Executive Startup

Users and Security
39 Introduction to Users and Security
40 More Fun With Stores: File Heaps
41 File Heaps, part 2
42 SysUAF
43 TUser
44 SysUAF API

Terminal I/O
45 Shells and UCL
46 UOS API, the Application Side
47 UOS API, the Executive Side
48 I/O Devices
49 Streams
50 Terminal Output Filters
51 The TTerminal Class
52 Handles
53 Putting it All Together
54 Getting Terminal Input
55 QIO
56 Cooking Terminal Input
57 Putting it all together, part 2
58 Quotas and I/O

UCL
59 UCL Basics
60 Symbol Substitution
61 Command execution
62 Command execution, part 2
63 Command Abbreviation
64 ASTs
65 Expressions, Part 1
66 Expressions, Part 2: Support code
67 Expressions, part 3: Parsing
68 SYS_GETJPIW and SYS_TRNLNM
69 Expressions, part 4: Evaluation

UCL Lexical Functions
70 PROCESS_SCAN
71 PROCESS_SCAN, Part 2
72 TProcess updates
73 Unicode revisted
74 Lexical functions: F$CONTEXT
75 Lexical functions: F$PID
76 Lexical Functions: F$CUNITS
77 Lexical Functions: F$CVSI and F$CVUI
78 UOS Date and Time Formatting
79 Lexical Functions: F$CVTIME
80 LIB_CVTIME
81 Date/Time Contexts
82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM
83 Lexical Functions: F$DELTA_TIME
84 Lexical functions: F$DEVICE
85 SYS_DEVICE_SCAN
86 Lexical functions: F$DIRECTORY
87 Lexical functions: F$EDIT and F$ELEMENT
88 Lexical functions: F$ENVIRONMENT
89 SYS_GETUAI
90 Lexical functions: F$EXTRACT and F$IDENTIFIER
91 LIB_FAO and LIB_FAOL
92 LIB_FAO and LIB_FAOL, part 2
93 Lexical functions: F$FAO
94 File Processing Structures
95 Lexical functions: F$FILE_ATTRIBUTES
96 SYS_DISPLAY
97 Lexical functions: F$GETDVI
98 Parse_GetDVI
99 GetDVI
100 GetDVI, part 2
101 GetDVI, part 3
102 Lexical functions: F$GETJPI
103 GETJPI
104 Lexical functions: F$GETSYI
105 GETSYI
106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD
107 Lexical function: F$PARSE
108 FILESCAN
109 SYS_PARSE
110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS
111 File Lookup Service
112 Lexical Functions: F$SEARCH
113 SYS_SEARCH
114 F$SETPRV and SYS_SETPRV
115 Lexical Functions: F$STRING, F$TIME, and F$TYPE
116 More on symbols
117 Lexical Functions: F$TRNLNM
118 SYS_TRNLNM, Part 2
119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY
120 Lexical functions: F$MESSAGE
121 TUOS_File_Wrapper
122 OPEN, CLOSE, and READ system services

UCL Commands
123 WRITE
124 Symbol assignment
125 The @ command
126 @ and EXIT
127 CRELNT system service
128 DELLNT system service
129 IF...THEN...ELSE
130 Comments, labels, and GOTO
131 GOSUB and RETURN
132 CALL, SUBROUTINE, and ENDSUBROUTINE
133 ON, SET {NO}ON, and error handling
134 INQUIRE
135 SYS_WRITE Service
136 OPEN
137 CLOSE
138 DELLNM system service
139 READ
140 Command Recall
141 RECALL
142 RUN
143 LIB_RUN
144 The Data Stream Interface
145 Preparing for execution
146 EOJ and LOGOUT
147 SYS_DELPROC and LIB_GET_FOREIGN

CUSPs and utilities
148 The I/O Queue
149 Timers
150 Logging in, part one
151 Logging in, part 2
152 System configuration
153 SET NODE utility
154 UUI
155 SETTERM utility
156 SETTERM utility, part 2
157 SETTERM utility, part 3
158 AUTHORIZE utility
159 AUTHORIZE utility, UI
160 AUTHORIZE utility, Access Restrictions
161 AUTHORIZE utility, Part 4
162 AUTHORIZE utility, Reporting
163 AUTHORIZE utility, Part 6
164 Authentication
165 Hashlib
166 Authenticate, Part 7
167 Logging in, part 3
168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN
169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME
170 LIB_SPAWN
171 CREPRC
172 CREPRC, Part 2
173 COPY
174 COPY, part 2
175 COPY, part 3
176 COPY, part 4
177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards
178 CREATESTREAM, STREAMNAME, and Set_Contiguous
179 Help Files
180 LBR Services
181 LBR Services, Part 2
182 LIBRARY utility
183 LIBRARY utility, Part 2
184 FS Services
185 FS Services, Part 2
186 Implementing Help
187 HELP
188 HELP, Part 2
189 DMG_Get_Key and LIB_Put_Formatted_Output
190 LIBRARY utility, Part 3
191 Shutting Down UOS
192 SHUTDOWN
193 WAIT
194 SETIMR
195 WAITFR and Scheduling
196 REPLY, OPCOM, and Mailboxes
197 REPLY utility
198 Mailboxes
199 BRKTHRU
200 OPCOM
201 Mailbox Services
202 Mailboxes, Part 2
203 DEFINE
204 CRELNM
205 DISABLE
206 STOP
207 OPCCRASH and SHUTDOWN
208 APPEND

Glossary/Index


Downloads

COPY, part 4

In this article we will we look at the support code referenced in the previous two articles.

function Invalid_Wildcard( const S : string ) : boolean ;

begin
    Result := False ;
    if( S = '*' ) then // Only a wildcard
    begin
        exit ;
    end ;
    if( pos( '*', S ) = 0 ) then // No wildcard embedded
    begin
        exit ;
    end ;
    Result := True ; // Must be a wildcard embedded with other characters
end ;
This function checks for invalid wildcard specifications as we discussed in the previous article. The only valid wildcard situation is a single "*" or no wildcards at all. You may note that there is no check for the "?" wildcard, but there is no need since we checked that earlier in the code (see previous articles).

// Compare filename F1 with wildcard specification F2
function Filename_Match( F1, F2 : string ) : boolean ;

var Node1, Access1, Node21, Device1, Path1, Name1, FType1, Version1 : string ;
    Node2, Access2, Node22, Device2, Path2, Name2, FType2, Version2 : string ;

begin
    Result := True ; // Assume match
    Parse_Filename( F1, Node1, Access1, Node21, Device1, Path1, Name1, FType1, Version1 ) ;
    Parse_Filename( F2, Node2, Access2, Node22, Device2, Path2, Name2, FType2, Version2 ) ;
    if( ( Node1 <> Node2 ) and ( not WC_Match( Node2, Node1 ) ) ) then
    begin
        Result := False ;
        exit ;
    end ;
    if( ( Access1 <> Access2 ) and ( not WC_Match( Access2, Access1 ) ) ) then
    begin
        Result := False ;
        exit ;
    end ;
    if( ( Node21 <> Node22 ) and ( not WC_Match( Node22, Node21 ) ) ) then
    begin
        Result := False ;
        exit ;
    end ;
    if( ( Device1 <> Device2 ) and ( not WC_Match( Device2, Device1 ) ) ) then
    begin
        Result := False ;
        exit ;
    end ;
    if( ( Path1 <> Path2 ) and ( not WC_Match( Path2, Path1 ) ) ) then
    begin
        Result := False ;
        exit ;
    end ;
    if( ( Name1 <> Name2 ) and ( not WC_Match( Name2, Name1 ) ) ) then
    begin
        Result := False ;
        exit ;
    end ;
    if( ( FType1 <> FType2 ) and ( not WC_Match( FType2, FType1 ) ) ) then
    begin
        Result := False ;
        exit ;
    end ;
    if( ( Version1 <> Version2 ) and ( not WC_Match( Version2, Version1 ) ) ) then
    begin
        Result := False ;
        exit ;
    end ;
end ;
This function compares a filename with a wildcard specification to see if they match. All we do is parse both strings into the component parts and then compare each one to see if they match literally or as wildcards.

function Open( Name : string ; Flags : integer ) : TCOM_UOS_File ;

var SRB : TSRB ;

begin
    Set_String( Name, SRB ) ;
    Result := Open_File( int64( @SRB ), int64( @Flags ) ) ;
end ;
This function is a wrapper to Starlet's Open_File routine.

    function Parse_Protection( S : string ) : int64 ;

    var P : integer ;
        I : integer ;
        T, Temp : string ;

    begin
        // Setup...
        Result := 0 ;
        S := trim( lowercase( S ) ) ;

        // Remove optional parentheses...
        if( copy( S, 1, 1 ) = '(' ) then
        begin
            S := copy( S, 2, length( S ) ) ;
            if( copy( S, length( S ), 1 ) = ')' ) then
            begin
                setlength( S, length( S ) - 1 ) ;
            end ;
            S := trim( S ) ;
        end ;
        if( S = '' ) then
        begin
            Result := -2 ;
            exit ;
        end ;

        // Parse each item...
        while( S <> '' ) do
        begin
            I := pos( ',', S + ',' ) ;
            Temp := trim( copy( S, 1, I - 1 ) ) ;
            S := trim( copy( S, I + 1, length( S ) ) ) ;
            T := copy( Temp, 3, length( Temp ) ) ;
            if( copy( T, 2, 1 ) <> ':' ) then
            begin
                Result := -2 ;
                exit ;
            end ;
            P := 0 ;
            for I := 1 to length( T ) do // For each type of protection
            begin
                case T[ I ] of
                    'r' : P := P or PROTECTION_OWNER_READ ;
                    'w' : P := P or PROTECTION_OWNER_WRITE ;
                    'e' : P := P or PROTECTION_OWNER_EXECUTE ;
                    'd' : P := P or PROTECTION_OWNER_DELETE ;
                    else
                        begin
                            Result := -1 ;
                            exit ;
                        end ;
                end ;
            end ; // for I := 1 to length( T ) )
            case T[ 1 ] of
                'o' : begin
                          Result := Result or P ;
                          Protection_Mask := Protection_Mask and ( not PROTECTION_OWNER_MASK ) ;
                      end ;
                'g' : begin
                          Result := Result or ( P shl 4 ) ;
                          Protection_Mask := Protection_Mask and ( not PROTECTION_GROUP_MASK ) ;
                      end ;
                's' : begin
                          Result := Result or ( P shl 8 ) ;
                          Protection_Mask := Protection_Mask and ( not PROTECTION_SYSTEM_MASK ) ;
                      end ;
                'w' : begin
                          Result := Result or ( P shl 12 ) ;
                          Protection_Mask := Protection_Mask and ( not PROTECTION_WORLD_MASK ) ;
                      end ;
                else
                    begin
                        Result := -3 ;
                        exit ;
                    end ;
            end ;
        end ; // while( S <> '' )
    end ; // Parse_Protection
This local function parses a file protection specification. It strips off any parentheses, then processes each comma-delimited field. It not only returns the appropriately-set bits of a protection mask, but also sets the Protection_Mask variable so that we can mask off the portion of the file protection that was specified so it can be combined with the existing protections for the portions not specified.

    function Read_File( Count : int64 ) : boolean ;

    var I : integer ;
        Res : int64 ;

    begin
        if( Count > sizeof( Buffer ) ) then
        begin
            Count := sizeof( Buffer ) ;
        end ;
        F.Blockread( Buffer, Count, Res ) ;
        if( Res < Count ) then
        begin
            Count := Res ;
        end ;
        Result := ( F.IO_Error = nil ) or ( F.IO_Error.Get_Error = 0 ) ;
    end ;
This local function reads data from the input file, up to the amount of bytes specified. It returns true if successful.

    function Write_File( Count : int64 ) : boolean ;

    var I : integer ;
        Res : int64 ;

    begin
        if( Count > sizeof( Buffer ) ) then
        begin
            Count := sizeof( Buffer ) ;
        end ;
        Outfile.Blockwrite( Buffer, Count, Res ) ;
        if( Res < Count ) then
        begin
            Count := Res ;
        end ;
        Result := ( F.IO_Error = nil ) or ( F.IO_Error.Get_Error = 0 ) ;
    end ;
This local function writes from the buffer to the output file. It returns true if successful.

    procedure Copy_Stream( In_Stream, Out_Stream : integer ) ;

    var Count, Size : int64 ;

    begin
        Size := F.Stream_Length( In_Stream ) ;
        while( Size > 0 ) do
        begin
            if( Size > sizeof( Buffer ) ) then
            begin
                Count := sizeof( Buffer ) ;
            end else
            begin
                Count := Size ;
            end ;
            Size := Size - Count ;
            F.Read_Stream( In_Stream, P, Count, int64( @Buffer ) ) ;
            OutFile.Write_Stream( Out_Stream, P, Count, int64( @Buffer ) )  ;
        end ;
    end ;
This function copies a stream from the input file to the output file.

    function Open_Output( O : string ) : boolean ;

    var A : int64 ;
        Buffer : array[ 0..1023 ] of byte ;
        D : TCOM_UOS_File ;
        DS : string ;
        Exists : boolean ; // True if file already exists
        FilePrivs : int64 ;
        Res : int64 ;
        This_Protection : int64 ;
        Node, Access, Secondary_Node, Device, Path, Name, Extension, Version : string ;
        UIC : int64 ;

    begin
        Result := True ;
        Exists := File_Exists( O ) ;
        This_Protection := Protection and ( not Protection_Mask ) ;
        UIC := 0 ;
        FilePrivs := 0 ;
        if( Exists ) then
        begin
            OutFile := Open( O, FAB_V_UFO ) ;
            FilePrivs := OutFile.Privileges ;
            if( ( Priv and SETPRV ) = 0 ) then // No SETPRV privelege
            begin
                FilePrivs := FilePrivs and Priv ; // Limit file privileges to user's current privileges
            end ;
            OutFile.Free ;
            if( ( Priv and ( BYPASS or SYSPRV ) ) <> 0 ) then
            begin
                OutFile := Open( O, FAB_V_UFO ) ;
                UIC := OutFile.Owner ;
                OutFile.Free ;
                Parse_Filename( O, Node, Access, Secondary_Node, Device, Path,
                    Name, Extension, Version ) ;
                if( Versions ) then
                begin
                    if( O_Version = '' ) then
                    begin
                        O := O + ';1' ;
                    end else
                    begin
                        repeat
                            O_Version := ';' + 
                                inttostr( strtoint( copy( O_Version, 2, length( O_Version ) ) ) + 1 ) ;
                        until not File_Exists( O ) ; // Find non-existent version
                        O := Node + Access + Device + Path + Name + Extension + O_Version ;
                    end ;
                end else
                begin
                    DS := Node + Access + Device + Path ;
                    D := Open( DS, 0 ) ;
                    UIC := D.Owner ;
                    D.Free ;
                end ;
            end ; // if( ( Priv and ( BYPASS or SYSPRV ) ) <> 0 )
        end ; // if( Exists )
This local function is used to open the output file. After some setup, we see if the file already exists. If so, we get the file's privileges and then limit them to the user's privileges, unless they have SETPRV. If the user has BYPASS or SYSPRV, we get the file's owner UIC (otherwise UIC remains 0 indicating the current user). If /VERSION was used, we increment the output file's version number from the existing file (no version means we use version 1). We keep incrementing in case there are existing files until we have a unique name. Otherwise, we open the parent directory and get its owner UIC. See the documentation in the previous articles for a description of this behavior.

        if( Overlay ) then
        begin
            OutFile := Open( O, FAB_V_CIF or FAB_V_UFO or OFlags ) ;
        end else
        begin
            OutFile := Open( O, FAB_V_CIF or FAB_V_SUP or FAB_V_UFO or OFlags ) ;
        end ;
        if( OutFile = nil ) then
        begin
            Result := False ;
            exit ;
        end ;
Next we open the output file, using the appropriate flags. If the open failures, we exit with a False result.

        OutFile.Owner := UIC ;
        if( Use_Protection ) then
        begin
            if( Exists ) then
            begin
                OutFile.Protection := This_Protection or ( Outfile.Protection and Protection_Mask ) ;
            end else
            begin
                OutFile.Protection := This_Protection or ( DefProt and Protection_Mask ) ;
            end ;
        end ;
Now we set the output file's owner to UIC. If a file protection was specified, we combine it with the existing file's protection or the user's default protection, and assign it to the file.

        if( ( Allocation_Size > 0 ) and ( Allocation_Size > OutFile.Get_Size ) ) then
        begin
            Outfile.Seek( OutFile.Get_Size ) ;
            A := Allocation_Size - OutFile.Get_Size ;
            fillchar( Buffer, sizeof( Buffer ), 0 ) ;
            while( A > 0 ) do
            begin
                if( A > sizeof( Buffer ) ) then
                begin
                    Outfile.Blockwrite( Buffer, sizeof( Buffer ), Res ) ;
                end else
                begin
                    Outfile.Blockwrite( Buffer, A, Res ) ;
                end ;
                A := A - sizeof( Buffer ) ;
            end ;
            Outfile.Seek( 0 ) ;
        end ;
        if( F.Symlink and Symlink and ( Operation = Op_Copy ) ) then
        begin
            Outfile.Symlink := True ;
        end ;
    end ; // Open_Output
If an allocation size was specified, we pre-extend the file as appropriate, and then reset the file pointer to the start of the file. Finally, if the input file is a symbolic link, /SYMLINK was specified, and we are doing a copy operation, we set the output file to be a symbolic link. We don't do this on concatenation since it doesn't make logical sense. Note that checking both Symlink and F.Symlink is redundant, since F.Symlink will only be set if /SYMLINK is specified. But we include it here as documentation.

In the next article, we will look at the new system services we've referenced in the last several articles.