1 Introduction
2 Ground Rules
Building a File System
3 File Systems
4 File Content Data Structure
5 Allocation Cluster Manager
6 Exceptions and Emancipation
7 Base Classes, Testing, and More
8 File Meta Data
9 Native File Class
10 Our File System
11 Allocation Table
12 File System Support Code
13 Initializing the File System
14 Contiguous Files
15 Rebuilding the File System
16 Native File System Support Methods
17 Lookups, Wildcards, and Unicode, Oh My
18 Finishing the File System Class
The Init Program
19 Hardware Abstraction and UOS Architecture
20 Init Command Mode
21 Using Our File System
22 Hardware and Device Lists
23 Fun with Stores: Partitions
24 Fun with Stores: RAID
25 Fun with Stores: RAM Disks
26 Init wrap-up
The Executive
27 Overview of The Executive
28 Starting the Kernel
29 The Kernel
30 Making a Store Bootable
31 The MMC
32 The HMC
33 Loading the components
34 Using the File Processor
35 Symbols and the SSC
36 The File Processor and Device Management
37 The File Processor and File System Management
38 Finishing Executive Startup
Users and Security
39 Introduction to Users and Security
40 More Fun With Stores: File Heaps
41 File Heaps, part 2
42 SysUAF
43 TUser
44 SysUAF API
Terminal I/O
45 Shells and UCL
46 UOS API, the Application Side
47 UOS API, the Executive Side
48 I/O Devices
49 Streams
50 Terminal Output Filters
51 The TTerminal Class
52 Handles
53 Putting it All Together
54 Getting Terminal Input
55 QIO
56 Cooking Terminal Input
57 Putting it all together, part 2
58 Quotas and I/O
UCL
59 UCL Basics
60 Symbol Substitution
61 Command execution
62 Command execution, part 2
63 Command Abbreviation
64 ASTs
65 Expressions, Part 1
66 Expressions, Part 2: Support code
67 Expressions, part 3: Parsing
68 SYS_GETJPIW and SYS_TRNLNM
69 Expressions, part 4: Evaluation
UCL Lexical Functions
70 PROCESS_SCAN
71 PROCESS_SCAN, Part 2
72 TProcess updates
73 Unicode revisted
74 Lexical functions: F$CONTEXT
75 Lexical functions: F$PID
76 Lexical Functions: F$CUNITS
77 Lexical Functions: F$CVSI and F$CVUI
78 UOS Date and Time Formatting
79 Lexical Functions: F$CVTIME
80 LIB_CVTIME
81 Date/Time Contexts
82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM
83 Lexical Functions: F$DELTA_TIME
84 Lexical functions: F$DEVICE
85 SYS_DEVICE_SCAN
86 Lexical functions: F$DIRECTORY
87 Lexical functions: F$EDIT and F$ELEMENT
88 Lexical functions: F$ENVIRONMENT
89 SYS_GETUAI
90 Lexical functions: F$EXTRACT and F$IDENTIFIER
91 LIB_FAO and LIB_FAOL
92 LIB_FAO and LIB_FAOL, part 2
93 Lexical functions: F$FAO
94 File Processing Structures
95 Lexical functions: F$FILE_ATTRIBUTES
96 SYS_DISPLAY
97 Lexical functions: F$GETDVI
98 Parse_GetDVI
99 GetDVI
100 GetDVI, part 2
101 GetDVI, part 3
102 Lexical functions: F$GETJPI
103 GETJPI
104 Lexical functions: F$GETSYI
105 GETSYI
106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD
107 Lexical function: F$PARSE
108 FILESCAN
109 SYS_PARSE
110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS
111 File Lookup Service
112 Lexical Functions: F$SEARCH
113 SYS_SEARCH
114 F$SETPRV and SYS_SETPRV
115 Lexical Functions: F$STRING, F$TIME, and F$TYPE
116 More on symbols
117 Lexical Functions: F$TRNLNM
118 SYS_TRNLNM, Part 2
119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY
120 Lexical functions: F$MESSAGE
121 TUOS_File_Wrapper
122 OPEN, CLOSE, and READ system services
UCL Commands
123 WRITE
124 Symbol assignment
125 The @ command
126 @ and EXIT
127 CRELNT system service
128 DELLNT system service
129 IF...THEN...ELSE
130 Comments, labels, and GOTO
131 GOSUB and RETURN
132 CALL, SUBROUTINE, and ENDSUBROUTINE
133 ON, SET {NO}ON, and error handling
134 INQUIRE
135 SYS_WRITE Service
136 OPEN
137 CLOSE
138 DELLNM system service
139 READ
140 Command Recall
141 RECALL
142 RUN
143 LIB_RUN
144 The Data Stream Interface
145 Preparing for execution
146 EOJ and LOGOUT
147 SYS_DELPROC and LIB_GET_FOREIGN
CUSPs and utilities
148 The I/O Queue
149 Timers
150 Logging in, part one
151 Logging in, part 2
152 System configuration
153 SET NODE utility
154 UUI
155 SETTERM utility
156 SETTERM utility, part 2
157 SETTERM utility, part 3
158 AUTHORIZE utility
159 AUTHORIZE utility, UI
160 AUTHORIZE utility, Access Restrictions
161 AUTHORIZE utility, Part 4
162 AUTHORIZE utility, Reporting
163 AUTHORIZE utility, Part 6
164 Authentication
165 Hashlib
166 Authenticate, Part 7
167 Logging in, part 3
168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN
169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME
170 LIB_SPAWN
171 CREPRC
172 CREPRC, Part 2
173 COPY
174 COPY, part 2
175 COPY, part 3
176 COPY, part 4
177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards
178 CREATESTREAM, STREAMNAME, and Set_Contiguous
179 Help Files
180 LBR Services
181 LBR Services, Part 2
182 LIBRARY utility
183 LIBRARY utility, Part 2
184 FS Services
185 FS Services, Part 2
186 Implementing Help
187 HELP
188 HELP, Part 2
189 DMG_Get_Key and LIB_Put_Formatted_Output
190 LIBRARY utility, Part 3
191 Shutting Down UOS
192 SHUTDOWN
193 WAIT
194 SETIMR
195 WAITFR and Scheduling
196 REPLY, OPCOM, and Mailboxes
197 REPLY utility
198 Mailboxes
199 BRKTHRU
200 OPCOM
201 Mailbox Services
202 Mailboxes, Part 2
203 DEFINE
204 CRELNM
205 DISABLE
206 STOP
207 OPCCRASH and SHUTDOWN
208 APPEND
Glossary/Index
Downloads
|
CRELNM
In this article, we look at the CRELNM system service. On VMS, CRELNM creates a logical,
while on UOS it creates a symbol. We've discussed symbol creation before, using the
Set_Symbol service, which isn't in VMS. To follow the VMS specification, we need
to define the CRELNM service, which will wrap the Set_Symbol service. However, there
are some additional features we will be adding to symbols, as described in the previous
article, to support all of the CRELNM options. First the documentation.
CRELNM
Create Symbol
Creates a symbol name and assigns its equivalence values.
Format
SYS$CRELNM attr table name acmode list
Parameters
attr
The address of a 64-bit value defining attributes for the symbol. The attribute
value is a combination of bits as defined in the following table. If the value is
0 or the address is 0, no attributes are set.
Attribute | Description |
LNM_M_CONFINE | If set, the symbol is not copied to spawned subprocesses.
This does not apply to symbols in system tables. |
LNM_M_NO_ALIAS | If set, the symbol cannot be duplicated in the table
at an outer access mode. If any symbol with an outer access mode is already defined,
it is deleted. |
table
The address of an SRB structure defining the name of the table to which the symbol
is to be added. Table names are not case-sensitive. If the table name is the name
of another symbol, that symbol is translated iteratively until/unless a table is found
or the maximum number of translation iterations have been reached.
name
The address of an SRB structure defining the name of the symbol to define. Symbol
names may contain only alphanumeric characters, dollar signs ($), hyphens (-), and underscores
(_) in order to make the symbol accessible to shells such as UCL.
acmode
The address of an 8-bit value indicating the access mode of the symbol. If this
value is more privileged than the access mode of the calling process, and the process
does not have the SYSNAM privilege, the process access mode is used instead. If the
value is 0 or the address is 0, the process access mode is used. Also, if access
mode is more privileged than the access mode of the table in which the symbol
is being created, the table's access mode is used instead.
list
The address of an array of descriptors which define the equivalence names for the
symbol. The array ends with a descriptor consisting entirely of zeros (0). If an
address of 0 is passed, or there are no non-zero descriptors in the list, no equivalence
is assigned to the symbol. Each descriptor has the format:
Byte offset | Byte length | Description |
0 | 2 | Must be -1. |
2 | 2 | Item code. Contains a value that indicates what the descriptor defines. |
4 | 4 | Must be -1. |
8 | 8 | Length of buffer. Indicates how large a buffer
is for receiving or specifying data. If the buffer is too small for returned data,
the returned data is truncated. |
16 | 8 | Address of buffer. For items that specify or return
data, this indicates the source or destination of the data. |
24 | 8 | Address where to write result length. For items that
return data, the actual length of the returned data is written to this location, which
must be a 64-bit integer. Otherwise, this is ignored. |
The valid item codes are as follows:
Item code | Description |
LNM_ATTRIBUTES | Specifies attributes for all equivalence strings
specified in the array of descriptors after this point (or until another LNM_ATTRIBUTES
item is encountered). Thus, attributes for an equivalence value must precede that
equivalence value in the array. The Buffer address must point to a 64-bit integer
which contains zero or more of a set of bits as defined here:
Attribute | Description |
LNM_M_CONCEALED | If set, the equivalence names are treated as concealed. |
LNM_M_TERMINAL | If set, the equivalence name prevents further iterative
translation when the symbol value is used as a logical. |
|
LNM_CHAIN | Ignored. Included for compatibility with VMS. |
LNM_STRING | Indicates a(nother) equivalence value for the symbol.
Each descriptor of this type adds a new equivalence value to those already specified.
The Buffer address must point to memory containing the value, and the Length of buffer
must indicate the size of that value, in bytes. |
LNM_TABLE | Indicates that the service should write the name of the
table, into which the symbol is created, to the specified buffer address. If the
returned data is larger than the return buffer length value, it is truncated to
the specified size and the SS_BUFFEROVF status is returned. This item can appear
anywhere in the descriptor array. |
LNM_TABLELENGTH | Indicates that the service should write the length
of the name of the table into which the symbol is created, to the specified buffer address. The address
should be the address of a 64-bit integer. If the returned data is larger than
the return buffer length value, it is truncated to
the specified size and the SS_BUFFEROVF status is returned. This item can appear
anywhere in the descriptor array. |
Description
The Create Symbol service creates a symbol of a specified name in the specified symbol
table, and optionally assigns one or more equivalence values to that symbol. Symbol
names are case-sensitive, but table names are not.
Required Privileges
BYPASS is required if writing to a table whose protection code does not otherwise
allow the process to write to it.
SYSNAM is required if creating a symbol with a higher privilege level than the process.
SYSNAM or SYSPRV is required to write to a system table from a process not logged
into a system account.
GRPNAM or GRPPRV is required to write to a table from a process not logged into an
account that belongs to the group associated with the table.
Required Quotas
The quota for the specified table must be sufficient for the creation of the symbol.
Condition Codes
SS$_NORMAL The symbol was successfully created.
SS$_ACCVIO Could not read the one or more values specified in the parameters or descriptors.
SS$_BADPARAM One or more arguments have an invalid value or else the table or symbol
name are null.
SS$_BUFFEROVF The symbol was successfully created, but the returned data was too large to fit into the receiving buffer and was truncated to fit.
SS$_DUPLNAM A symbol with the same name already exists in the table with a higher
privilege and with the LNM_M_NO_ALIAS attribute.
SS$_EXLNMQUOTA Creating the symbol would exceed the quota of the table.
SS$_INSFMEM Dynamic memory is insufficient for creating a message describing the creation of a clusterwide symbol.
SS$_IVLOGTAB The table argument doesn't specify a symbol table.
SS$_NOLOGTAB The specified table does not exist, or not found within 10 translation
iterations.
SS$_NOPRIV The process lacks the necessary privilege to perform this operation.
SS$_SUPERSEDE The symbol was successfully created, but another symbol of the same name was overwritten in the process.
function CRELNM( Attr : int64 ; Tabnam, Lognam : string ;
ACMode, itmlst : int64 ) : int64 ;
var LogNam_SRB, TabNam_SRB : TSRB ;
begin
Set_String( Tabnam, TabNam_SRB ) ;
Set_String( Lognam, LogNam_SRB ) ;
Result := SYS_CRELNM( int64( @Attr ), int64( @Tabnam_SRB ),
int64( @Lognam_SRB ), int64( @AcMode ), Itmlst ) ;
end ;
This is the pascal wrapper for the service, in PasStarlet.
function SYS_CRELNM( Attr, Tabnam, Lognam, ACMode, itmlst : int64 ) : int64 ;
var Status : int64 ;
SysRequest : TS2I3_Request ;
LogNam_SRB, TabNam_SRB : PSRB ;
begin
LogNam_SRB := PSRB( pointer( Lognam ) ) ;
Tabnam_SRB := PSRB( pointer( Tabnam ) ) ;
SysRequest.Request.Subsystem := UOS_Subsystem_SSC ;
SysRequest.Request.Request := UOS_SSC_CRELNM ;
SysRequest.Request.Length := sizeof( SysRequest ) - sizeof( Sysrequest.Request ) ;
SysRequest.Request.Status := int64( @Status ) ;
SysRequest.SRB1.Buffer := LogNam_SRB.Buffer ;
SysRequest.SRB2.Buffer := Tabnam_SRB.Buffer ;
SysRequest.SRB1.Length := LogNam_SRB.Length ;
SysRequest.SRB2.Length := Tabnam_SRB.Length ;
SysRequest.Integer1 := Attr ;
SysRequest.Integer2 := Itmlst ;
SysRequest.Integer3 := AcMode ;
Call_To_Ring0( integer( @SysRequest ) ) ;
Result := Status ;
end ;
And this is the general system service wrapper in the SYS unit.
UOS_SSC_CRELNM:
begin
UE := Enter_System_Call( Request, SReq, PID, MMC,
sizeof( TS3I5_Request ) - sizeof( TSystem_Request ), Base ) ;
if( UE <> nil ) then
begin
Set_Last_Error( UE ) ;
exit ;
end ;
try
PS3I5 := PS3I5_Request( Base ) ;
PS3I5.Request.Status := CRELNM( Kernel, PID, PS3I5.SRB1,
PS3I5.SRB2, PS3I5.Integer2, PS3I5.Integer1,
PS3I5.Integer3 ) ;
finally
Exit_System_Call( Base, PID, MMC, sizeof( TS3I5_Request ) ) ;
end ;
end ;
This code is added to the SSC component's API method. It resembles previous code
for this method so we won't belabor it here.
function TUOS_SSC.CRELNM( Kernel : TUOS_Kernel ; PID : TPID ; LogNam, TabNam : TSRB ;
Attr, Itemlst, AcMode : int64 ) : int64 ;
var Table_Name, Logical_Name : string ;
Status : integer ;
SRB : TSRB ;
US : TUOS_String ;
begin
// Get and validate parameters...
US := Get_User_String( Kernel, PID, TabNam, Status ) ;
if( Status = UE_Error ) then
begin
Result := Status ;
exit ;
end ;
Table_Name := trim( US.Contents ) ;
if( Table_Name = '' ) then
begin
Result := SS_BADPARAM ;
exit ;
end ;
US := Get_User_String( Kernel, PID, LogNam, Status ) ;
if( Status = UE_Error ) then
begin
Result := Status ;
exit ;
end ;
Logical_Name := trim( US.Contents ) ;
if( Logical_Name = '' ) then
begin
Result := SS_BADPARAM ;
exit ;
end ;
if( Attr <> 0 ) then
begin
Attr := Get_User_Integer( Kernel, PID, Attr, Status ) ;
if( Status = UE_Error ) then // Error reading user value
begin
Result := Status ;
exit ;
end ;
end ;
if( AcMode = 0 ) then
begin
AcMode := USC.Access_Mode( PID ) ;
end else
begin
AcMode := Get_User_Integer( Kernel, PID, AcMode, Status ) ;
if( Status = UE_Error ) then // Error reading user value
begin
Result := Status ;
exit ;
end ;
end ;
if( AcMode < USC.Access_Mode( PID ) ) then // More privileged than process
begin
if( ( USC.Get_Process_Info( PID, JPI_CURPRIV ) and SYSNAM ) <> 0 ) then
begin
AcMode := USC.Access_Mode( PID ) ;
end ;
end ;
if( AcMode > PSL_C_USER ) then
begin
Result := SS_BADPARAM ;
exit ;
end ;
Result := Create_Symbol( Kernel, PID, PChar( Logical_Name ),
PChar( Table_Name ), Attr, Itemlst, AcMode ) ;
end ; // TUOS_SSC.CRELNM
This new method in the SSC component is simply a wrapper for the Create_Symbol
method. It obtains and validates parameters, then calls the routine to do the actual
work.
function TUOS_SSC.Create_Symbol( Kernel : TUOS_Kernel ; PID : TPID ;
LogNam, TabNam : PChar ; Attr, Itemlst, AcMode : int64 ) : int64 ;
var Buff : PAnsiChar ;
Change : int64 ;
Current_Attributes : integer ;
Descriptor : TSYS_Descriptor ;
I, Index : integer ;
I64 : int64 ;
Offset : integer ;
Logical_Name, Table_Name : string ;
S : string ;
SRB : TSRB ;
Status : integer ;
Symbol : TUOS_Symbol ;
Table : TSymbol_Table ;
US : TUOS_String ;
Value : string ;
Values : TStringList ;
begin
Result := 0 ; // Assume success
Logical_Name := string( LogNam ) ;
Table_Name := string( TabNam ) ;
if( Validate_String( Logical_Name,
'0123456789_$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ' ) = -1 ) then
begin
Result := SS_BADPARAM ;
exit ;
end ;
if( ( AcMode > 3 ) or ( AcMode < 0 ) ) then
begin
Result := SS_BADPARAM ;
exit ;
end ;
if( AcMode < USC.Access_Mode( PID ) ) then
begin
AcMode := USC.Access_Mode( PID ) ;
end ;
if( ( PID <> 0 ) and ( AcMode < PSL_C_SUPER ) ) then
begin
if( ( USC.Get_Process_Info( PID, JPI_CURPRIV ) and SYSNAM ) = 0 ) then
begin
Result := SS_NOPRIV ; // User must have SYSNAM to use KERNEL or EXECUTIVE access mode
exit ;
end ;
end ;
Value := '' ;
This SSC method has been used in past code, but I waited until now to cover it. We
start with initializing the local variables and validating parameters.
// Find table...
Table_Name := Translate_Table_Name( Table_Name ) ;
_Kernel.Lock( Spinlock_Symbol_Tables ) ;
for I := 0 to Symbol_Tables.Count - 1 do
begin
Table := TSymbol_Table( Symbol_Tables[ I ] ) ;
if( lowercase( Table.Name ) = lowercase( Table_Name ) ) then
begin
break ;
end ;
Table := TSymbol_Table( Table.Get_Table( PChar( Table_Name ) ) ) ;
if( Table <> nil ) then
begin
break ;
end ;
end ;
if( Table = nil ) then // Table not found
begin
Result := SS_NOLOGTAB ;
_Kernel.Unlock( Spinlock_Symbol_Tables ) ;
exit ;
end ;
Table.Attach ;
_Kernel.Unlock( Spinlock_Symbol_Tables ) ;
while( not Enter_Unshared_Section( int64( @Table.Locked ) ) ) do
begin
Kernel.Yield ; // Wait a bit
end ;
if( ( PID <> 0 )
and
not USC.Validate_Protection( PID, FAB_V_UPD, Table.Owner, Table.Protection, 0 )
) then
begin
Result := SS_NOPRIV ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
Next we find the table that was specified. The Translate_Table_Name
function (covered below) resolves table name. Then we obtain the table, exiting
on error if not found. We use a spinlock to prevent anything else from messing
with the tables while we obtain a pointer to the table of interest. This is so
that we don't have a pointer to a table that is deleted before we finish. When
we successfully find the table, we lock the specific table and release the
system symbol tables spinlock. Because that spinlock prevents anyone from doing
anything with tables, we want to hold the spinlock for the least amount of time
possible, but we also want to make sure the table is locked before we release
the spinlock.
The order of operations here is important. First we spinlock the system symbol
table lists (Spinlock_Symbol_Tables ) to prevent the deletion of the
table before we can lock it. Next we find the table in question. If not found,
we release the spinlock and exit. Otherwise, the next thing we do is attach to
the table. This increments the table reference count. The table will not be
deleted until its reference count goes to 0, indicating that no one else is
using it. This essentially "locks" it, in terms of it being deleted. Once we've
attached to it, we can release the spinlock which allows other processes to modify
the system symbol tables list.
Next we loop until we succeed in locking the table via Enter_Unshared_Section .
Unlike attaching, which is not exclusive to us, this lock is exclusive - which
prevents other users from deleting any symbols in this table. If the table is
already locked, we wait until we can obtain the exclusive table lock. On each failed
attempt, we reschedule ourself. We do this because we cannot do anything until
the table is unlocked, so constantly trying to lock the table until we lose our
quantum is inefficient. By allowing other processes to get their quantum, the CPU
can get more work done and perhaps when we are scheduled to run again, the table
lock will be free. Eventually, the lock will be released and we can continue.
I should also mention that setting a system spinlock will prevent the process from
being unscheduled until the spinlock is released. Otherwise, we run into the same
problem with a spinlock being held for a long time. If this process is low priority
and loses its quantum, the spinlock remains active until the process runs again.
So, there are three types of locks involved here: the system spinlock, the table
reference count, and the table lock. The first prevents anyone from deleting
tables. The second prevents the specific table from being deleted. The third
prevents other processes from deleting any symbols from the table.
The first is necessary to prevent us from getting a valid pointer to a table,
then having it deleted by another process, and then trying to use the pointer
which is no longer valid. The third is necessary to prevent us from getting a
pointer to a symbol in the table and then having that symbol deleted, leaving us
unknowingly using an invalid pointer.
// Make sure there are no more-privileged symbols with LNM_M_NO_ALIAS...
I := AcMode - 1 ;
while( I >= 0 ) do
begin
Symbol := Table.Get_Symbol( PChar( Logical_Name ), I, True ) ;
if( Symbol <> nil ) then
begin
if( ( Symbol.Flags and LNM_M_NO_ALIAS ) <> 0 ) then
begin
Result := SS_DUPLNAM ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
end ;
dec( I ) ;
end ;
The next step is to verify that there are no other alias symbols (symbols with the
same name but different access mode) that are more privileged (lower access mode
value) that have the LNM_M_NO_ALIAS flag. When a symbol has this flag,
an alias with a lower access mode is allowed to be created. If one is found, we
unlock the table and exit with an error.
// Process descriptor list...
Values := TStringList.Create ;
while( True ) do
begin
Offset := MMC.Lock_Pages( PID, Itemlst, sizeof( Descriptor ) ) ;
Buff := PAnsiChar( MMC.Map_Pages( PID, 0, ItemLst, sizeof( Descriptor ),
MAM_Read or MAM_Lock ) ) ;
if( Buff = nil ) then
begin
if( MMC.Last_Error = nil ) then
begin
Generate_Exception( UOSErr_Memory_Address_Error ) ;
end ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
move( Buff[ Offset ], Descriptor, sizeof( Descriptor ) ) ;
if(
( Descriptor.Buffer_Length = 0 )
or
( Descriptor.Buffer_Address = 0 )
) then // End of list
begin
break ;
end ;
Itemlst := Itemlst + sizeof( Descriptor ) ;
Now we process through the descriptor list. This code is nearly identical to all
other descriptor list processing code we've looked at in the past. This is the code
that obtains the descriptor and prepares to process it. If there are any errors,
we again unlock the table and exit.
case Descriptor.Item_Code of
LNM_ATTRIBUTES : begin
if(
( Descriptor.Buffer_Length = 0 )
or
( Descriptor.Buffer_Address = 0 )
) then
begin
Result := SS_BADPARAM ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
Current_Attributes :=
Get_User_Integer( Kernel, PID, Current_Attributes, Status ) ;
if( Status = UE_Error ) then // Error reading user value
begin
Result := Status ;
exit ;
end ;
if( ( Current_Attributes < 0 ) or ( Current_Attributes > 3 ) ) then
begin
Result := SS_BADPARAM ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
end ;
LNM_STRING : begin
SRB.Buffer := Descriptor.Buffer_Address ;
SRB.Length := Descriptor.Buffer_Length ;
US := Get_User_String( Kernel, PID, SRB, Status ) ;
if( Status = UE_Error ) then
begin
Result := Status ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
Value := US.Contents ;
Values.AddObject( Value, pointer( Current_Attributes ) ) ;
end ;
LNM_TABLE : begin
if( Descriptor.Buffer_Address <> 0 ) then
begin
S := Table.Name ;
if( length( S ) > Descriptor.Buffer_Length ) then
begin
setlength( S, Descriptor.Buffer_Length ) ;
Result := SS_BUFFEROVF ;
end ;
Status := Write_User( Kernel, PID, Descriptor.Buffer_Address,
length( S ), PChar( S )[ 0 ] ) ;
if( Status = 0 ) then
begin
I64 := length( S ) ;
I := sizeof( I64 ) ;
Status := Write_User( Kernel, PID,
Descriptor.Return_Length_Address, I64, I ) ;
end ;
if( Status = UE_Error ) then // Error reading user value
begin
Result := Status ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
end ;
end ;
LNM_TABLELENGTH : begin
if( Descriptor.Buffer_Address <> 0 ) then
begin
I64 := length( Table.Name ) ;
I := sizeof( int64 ) ;
if( I > Descriptor.Buffer_Length ) then
begin
I := Descriptor.Buffer_Length ;
Result := SS_BUFFEROVF ;
end ;
Status := Write_User( Kernel, PID, Descriptor.Buffer_Address,
I, I64 ) ;
if( Status = UE_Error ) then // Error writing to user buffer
begin
Result := Status ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
end ;
end ;
LNM_CHAIN : ; // Ignore
else begin
Result := Generate_Exception( UOSErr_Bad_Parameter ) ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
end ; // case
end ; // while( true )
This case statement handles the various item codes, exiting with an error if the item
code is invalid or any other error occurs. We won't dwell on this code because it
resembles previous descriptor handling code we've looked at before. The only thing
of note is that we build a list of equivalence values from the descriptor list. This
is kept in a TStringList , where both a string value and attribute values
are associated.
// Ensure quota...
Change := 0 ;
I64 := 0 ;
if( Table.Quota > 0 ) then
begin
// Determine what the change in usage will be...
Symbol := Table.Get_Symbol( PChar( Logical_Name ), AcMode, True ) ;
if( Symbol <> nil ) then
begin
Change := Change - Symbol.Size ;
end ;
if( ( Attr and LNM_M_NO_ALIAS ) <> 0 ) then // No alias flag
begin
I := AcMode + 1 ;
while( I <= PSL_C_USER ) do
begin
Symbol := Table.Get_Symbol( PChar( Logical_Name ), I, True ) ;
Change := Change - Symbol.Size ;
inc( I ) ;
end ;
end ;
Change := Change + Values.Count * sizeof( pointer ) * 2 ;
for I := 0 to Values.Count - 1 do
begin
I64 := I64 + length( Values[ I ] ) ;
end ;
if( Table.Used + Change + I64 > Table.Quota ) then
begin
Result := Generate_Exception( SS_EXLNMQUOTA ) ;
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
exit ;
end ;
end ; // if( _Quota > 0 )
Next we determine the change in size of data in the table due to these changes. We
subtract out what is already in the symbol(s) that is being overwitten (if any) and
add in what is in the new equivalence list. If the difference would cause the table
data size to exceed its quota, we unlock the table and exit. Note: we only do this
check if the table has a quota. A quota of 0 indicates that there is no quota (limit)
for the table.
Note that all these checks and processing of descriptors are done before we actually
update the symbol. This is because we want an all-or-nothing operation. We don't
want to delete the old symbol(s) and then fail due to quotas, for instance. So, if
we get past this code, we are ready to update the table.
// Delete existing symbol(s)...
if( Table.Delete( PChar( Logical_Name ), True, AcMode ) ) then
begin
Result := SS_SUPERSEDE ;
end ;
if( ( Attr and LNM_M_NO_ALIAS ) <> 0 ) then // No alias flag
begin
// Delete symbols with same name and less privileges...
I := AcMode + 1 ;
while( I <= PSL_C_USER ) do
begin
if( Table.Delete( PChar( Logical_Name ), False, I ) ) then
begin
Result := SS_SUPERSEDE ;
end ;
inc( I ) ;
end ;
end ;
Now we delete the existing symbol, if there is one. Then we delete any
lower-privilege symbols if the LNM_M_NO_ALIAS flag is specified. If
any symbol is deleted, the SS_SUPERSEDE result is returned.
// Define symbol...
Table.Set_Value( PChar( Logical_Name ), nil, 0, ACMode ) ; // Create symbol
Symbol := Table.Get_Symbol( PChar( Logical_Name ), AcMode, True ) ;
Symbol.Flags := Attr ;
Symbol.Values.Free ; // Delete initial value
Symbol.Values := Values ; // Assign equivalence values
if( Table.Quota > 0 ) then
begin
Table.Used := Table.Used + Change + I64 ;
end ; // if( _Quota > 0 )
Exit_Unshared_Section( int64( @Table.Locked ) ) ;
end ; // TUOS_SSC.Create_Symbol
Finally, we create the new symbol. By default, the symbol has an equivalence list,
so we free that and then assign the list that we created to the symbol. If the table
has a quota, we update the table's used count. Finally, we unlock the table.
function Enter_Unshared_Section( Addr : int64 ) : boolean ;
begin
Result := True ; // Assume success
if( PID <> 0 ) then
begin
Result := USC.Process_Lock( PID, Addr, False ) ;
end ;
end ;
procedure Exit_Unshared_Section( Addr : int64 ) ;
begin
if( PID <> 0 ) then
begin
USC.Process_Unlock( PID, Addr ) ;
end ;
Table.Detach ;
end ;
These local routines are used to lock and unlock the table. Unlock both unlocks
the table and detaches from it so that the reference count is decremented.
function Translate_Table_Name( Table_Name : string ) : string ;
var Count : integer ;
I : integer ;
U : TUOS_String ;
begin
// Setup...
Result := Table_Name ;
Count := 1 ;
while( Count <= 10 ) do // Up to ten translations
begin
// Look for name in symbol tables...
for I := 0 to Symbol_Tables.Count - 1 do
begin
Table := TSymbol_Table( Symbol_Tables[ I ] ) ;
if( lowercase( Table.Name ) = lowercase( Table_Name ) ) then
begin
Result := Table_Name ; // Found
exit ;
end ;
end ;
// Didn't find the table, try iterating...
U := Get_Symbol( nil, PID, PAnsiChar( Table_Name ),
False, True, AcMode ) ;
if( U = nil ) then
begin
exit ; // No more translations
end ;
Table_Name := U.Contents ;
U.Free ;
if( Table_Name = '' ) then
begin
exit ; // No more translations
end ;
inc( Count ) ;
end ;
end ;
This local routine is used to resolve the symbol table name. If the specified name
is not a table name, we assume it is a symbol and we get its value to use as the
table name. This process is repeated until we find a valid table name or exceed
10 translations.
In the next article, we will look at the DISABLE CUSP.
|