Copyright © 2017 by Alan Conroy. This article may be copied in whole or in part as long as this copyright is included.


1 Introduction
2 Ground Rules

Building a File System
3 File Systems
4 File Content Data Structure
5 Allocation Cluster Manager
6 Exceptions and Emancipation
7 Base Classes, Testing, and More
8 File Meta Data
9 Native File Class
10 Our File System
11 Allocation Table
12 File System Support Code
13 Initializing the File System
14 Contiguous Files
15 Rebuilding the File System
16 Native File System Support Methods
17 Lookups, Wildcards, and Unicode, Oh My
18 Finishing the File System Class

The Init Program
19 Hardware Abstraction and UOS Architecture
20 Init Command Mode
21 Using Our File System
22 Hardware and Device Lists
23 Fun with Stores: Partitions
24 Fun with Stores: RAID
25 Fun with Stores: RAM Disks
26 Init wrap-up

The Executive
27 Overview of The Executive
28 Starting the Kernel
29 The Kernel
30 Making a Store Bootable
31 The MMC
32 The HMC
33 Loading the components
34 Using the File Processor
35 Symbols and the SSC
36 The File Processor and Device Management
37 The File Processor and File System Management
38 Finishing Executive Startup

Users and Security
39 Introduction to Users and Security
40 More Fun With Stores: File Heaps
41 File Heaps, part 2
42 SysUAF
43 TUser
44 SysUAF API

Terminal I/O
45 Shells and UCL
46 UOS API, the Application Side
47 UOS API, the Executive Side
48 I/O Devices
49 Streams
50 Terminal Output Filters
51 The TTerminal Class
52 Handles
53 Putting it All Together
54 Getting Terminal Input
55 QIO
56 Cooking Terminal Input
57 Putting it all together, part 2
58 Quotas and I/O

UCL
59 UCL Basics
60 Symbol Substitution
61 Command execution
62 Command execution, part 2
63 Command Abbreviation
64 ASTs
65 Expressions, Part 1
66 Expressions, Part 2: Support code
67 Expressions, part 3: Parsing
68 SYS_GETJPIW and SYS_TRNLNM
69 Expressions, part 4: Evaluation

UCL Lexical Functions
70 PROCESS_SCAN
71 PROCESS_SCAN, Part 2
72 TProcess updates
73 Unicode revisted
74 Lexical functions: F$CONTEXT
75 Lexical functions: F$PID
76 Lexical Functions: F$CUNITS
77 Lexical Functions: F$CVSI and F$CVUI
78 UOS Date and Time Formatting
79 Lexical Functions: F$CVTIME
80 LIB_CVTIME
81 Date/Time Contexts
82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM
83 Lexical Functions: F$DELTA_TIME
84 Lexical functions: F$DEVICE
85 SYS_DEVICE_SCAN
86 Lexical functions: F$DIRECTORY
87 Lexical functions: F$EDIT and F$ELEMENT
88 Lexical functions: F$ENVIRONMENT
89 SYS_GETUAI
90 Lexical functions: F$EXTRACT and F$IDENTIFIER
91 LIB_FAO and LIB_FAOL
92 LIB_FAO and LIB_FAOL, part 2
93 Lexical functions: F$FAO
94 File Processing Structures
95 Lexical functions: F$FILE_ATTRIBUTES
96 SYS_DISPLAY
97 Lexical functions: F$GETDVI
98 Parse_GetDVI
99 GetDVI
100 GetDVI, part 2
101 GetDVI, part 3
102 Lexical functions: F$GETJPI
103 GETJPI
104 Lexical functions: F$GETSYI
105 GETSYI
106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD
107 Lexical function: F$PARSE
108 FILESCAN
109 SYS_PARSE
110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS
111 File Lookup Service
112 Lexical Functions: F$SEARCH
113 SYS_SEARCH
114 F$SETPRV and SYS_SETPRV
115 Lexical Functions: F$STRING, F$TIME, and F$TYPE
116 More on symbols
117 Lexical Functions: F$TRNLNM
118 SYS_TRNLNM, Part 2
119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY
120 Lexical functions: F$MESSAGE
121 TUOS_File_Wrapper
122 OPEN, CLOSE, and READ system services

UCL Commands
123 WRITE
124 Symbol assignment
125 The @ command
126 @ and EXIT
127 CRELNT system service
128 DELLNT system service
129 IF...THEN...ELSE
130 Comments, labels, and GOTO
131 GOSUB and RETURN
132 CALL, SUBROUTINE, and ENDSUBROUTINE
133 ON, SET {NO}ON, and error handling
134 INQUIRE
135 SYS_WRITE Service
136 OPEN
137 CLOSE
138 DELLNM system service
139 READ
140 Command Recall
141 RECALL
142 RUN
143 LIB_RUN
144 The Data Stream Interface
145 Preparing for execution
146 EOJ and LOGOUT
147 SYS_DELPROC and LIB_GET_FOREIGN

CUSPs and utilities
148 The I/O Queue
149 Timers
150 Logging in, part one
151 Logging in, part 2
152 System configuration
153 SET NODE utility
154 UUI
155 SETTERM utility
156 SETTERM utility, part 2
157 SETTERM utility, part 3
158 AUTHORIZE utility
159 AUTHORIZE utility, UI
160 AUTHORIZE utility, Access Restrictions
161 AUTHORIZE utility, Part 4
162 AUTHORIZE utility, Reporting
163 AUTHORIZE utility, Part 6
164 Authentication
165 Hashlib
166 Authenticate, Part 7
167 Logging in, part 3
168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN
169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME
170 LIB_SPAWN
171 CREPRC
172 CREPRC, Part 2
173 COPY
174 COPY, part 2
175 COPY, part 3
176 COPY, part 4
177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards
178 CREATESTREAM, STREAMNAME, and Set_Contiguous
179 Help Files
180 LBR Services
181 LBR Services, Part 2
182 LIBRARY utility
183 LIBRARY utility, Part 2
184 FS Services
185 FS Services, Part 2
186 Implementing Help
187 HELP
188 HELP, Part 2
189 DMG_Get_Key and LIB_Put_Formatted_Output
190 LIBRARY utility, Part 3
191 Shutting Down UOS
192 SHUTDOWN
193 WAIT
194 SETIMR
195 WAITFR and Scheduling
196 REPLY, OPCOM, and Mailboxes
197 REPLY utility
198 Mailboxes
199 BRKTHRU
200 OPCOM
201 Mailbox Services
202 Mailboxes, Part 2
203 DEFINE
204 CRELNM
205 DISABLE
206 STOP
207 OPCCRASH and SHUTDOWN
208 APPEND

Glossary/Index


Downloads

Loading the components

Loading the components
We now return to the Kernel startup routine. When we last looked at it, we had just loaded the HMC. After that we set the memory manager so that all further heap activity for the Kernel will use the HMC:

    HMC.Kernel := self ;
    __HMC := HMC ;
    _MMC.Set_Aside( Buffer, Buffer_Size ) ; // Set aside the temp heap
    _MMC.Kernel := self ;
    HMC.End_Startup ;

{$WARNINGS OFF}
    SetMemoryManager( HMC_MM ) ;
{$WARNINGS ON}
    // Set FS memory to HMC...
    FS.Heap := THeap64_Wrapper.Create( HMC ) ;

We call the Set_Aside method to reserve the temporary heap buffer. Since it may still contain allocated data, we want to make sure that it isn't reused for something else later. Note, the previous articles showed a local variable named Buffer that was used for File System operations. This made the temporary heap buffer out of scope, so I renamed the local variable to Buff. Then we set the MMC's kernel to ourself. Next, we can call the End_Startup method of the HMC so that it is no longer in startup mode. And finally we set the memory manager for the kernel so that the HMC is used. At this point, we can breathe easier because the most complicated part of the kernel startup is complete. From this point on, we need not concern ourselves with having no, or little, heap - which means we can create objects on the heap, use strings, etc. as we would in any normal programming environment. We already have a file system object, so we need to set its heap to the HMC so that it can use the heap as well. We've been careful not to use any file system methods that would need to allocate data on the heap thus far.

The next step is to determine the path to UOS. As we discussed in previous articles, there can be multiple UOS installations. The \uos\installed.sys file links to the UOS installation that Init started, so we have to pull the path from it.

    // Determine path to UOS...
    Rebuild := False ;
    E := FS.Mount( '', '', FiP_Force or FiP_Flags ) ;
    if( E <> nil ) then
    begin
        if( E.Get_Error = UOS_File_System_Is_Dirty ) then
        begin
            if( H.Console <> nil ) then
            begin
                H.Console.Output( 'Rebuilding disk...' + CRLF, -1 ) ;
            end ;
            Rebuild := True ;
            FS.Rebuild ;
            E := FS.Mount( '', '', FiP_Force or FiP_Flags ) ;
        end ;
        if( E <> nil ) then
        begin
            Show_Error( E ) ;
            H.Halt ;
        end ;
    end ; // if( E <> nil )
    Info := FS.Get_File_Info( '\uos\installed.sys', 0 ) ;
    if( FS.Last_Error <> nil ) then
    begin
        Output( 'No installed operating system' ) ;
        H.Halt ;
    end ;
    Installation := Follow_Link( '\uos\installed.sys' ) + '\' ;

We clear the Rebuild flag and then try to mount the file system. If an error is returned, we check to see if it is a "dirty" indicator. If so, we set the rebuild flag, call the Rebuild method of the file system and then try to mount it again. If that fails, or if the error wasn't about the store being dirty, we show the error and exit. This is a fatal condition since it is rather important for the boot device to be accessible...
Once the file system is mounted, we make sure that the installed.sys file exists. If not, that means there is no installed UOS. This is an error and we let the user know, dismount the file system and halt. Otherwise, we follow the link in the file - setting the Installation variable to the path.

The next step is to load the remaining executive components.

    // Load File Processor, system services, and interrupt manager...
    _IMC := TUOS_Interrupt_Manager( Load_Component( FS, Installation + 'imc.sys', IMC_Index ) ) ;
    if( _IMC = nil ) then
    begin
        Output( 'Error loading the IMC' ) ;
        FS.Dismount ;
        H.Halt ;
    end ;
    _IMC.Kernel := self ;
    _FiP := TUOS_File_Processor( Load_Component( FS, Installation + 'fip.sys', FiP_Index ) ) ; // Get_FiP
    if( _FiP = nil ) then
    begin
        Output( 'Error loading the FiP' ) ;
        FS.Dismount ;
        H.Halt ;
    end ;
    _FiP.Kernel := self ;
    _SSC := TUOS_System_Services( Load_Component( FS, Installation + 'ssc.sys', SSC_Index ) ) ; // Get_SSC
    if( _SSC = nil ) then
    begin
        Output( 'Error loading the SSC' ) ;
        FS.Dismount ;
        H.Halt ;
    end ;
    _SSC.Kernel := self ;

We load the IMC, FIP, and SSC in the same way. We call Load_Component to load the component. If the result is nil, we report the load failure, dismount the file system, and halt. Otherwise, we set the component's kernel property.

Here is the local Follow_Link function:

    function Follow_Link( Path : string ) : string ;

    var Info : TUOS_File_Info ;
        UF : TUOS_File ;

    begin
        Info := FS.Get_File_Info( PChar( Path ), 0 ) ;
        UF := FS.Get_File( PChar( Path ) ) ;
        try
            setlength( Result, Info.EOF ) ;
            UF.Read( 0, 0, Info.EOF, PChar( Result )[ 0 ] ) ;
        finally
            UF.Detach ;
        end ;
    end ;

This function simply opens the passed filename, reads the path from the file, closes the file, and returns the path.

Here is the code for the Load_Component function:

type TFGet_Component = function() : pointer ;

function TKernel.Load_Component( FS : TUOS_File_System ; Filename : string ;
    Index : char ) : pointer ;

var F : TUOS_File ;
    FGet_Component : TFGet_Component ;
    Module : TBTMemoryModule ;
    Info : TUOS_File_Info ;
    Res : int64 ;

begin
    Result := nil ; // Assume failure
    Info := FS.Get_File_Info( PChar( Filename ), 0 ) ;
    if( FS.Last_Error <> nil ) then
    begin
        Show_Error( FS.Last_Error ) ;
        exit ;
    end ;
    F := FS.Get_File( PChar( Filename ) ) ;
    if( F = nil ) then
    begin
        Show_Error( FS.Last_Error ) ;
        exit ;
    end ;

The first thing the function does is get information on the file, and then open the file. If there are any problems, we show the error and then exit with a return value of nil.

    try
        // Allocate memory for image...
        Result := pointer( MMC.Allocate( 0, Info.EOF, 'A', 0, 0 ) ) ;
        if( Result = nil ) then
        begin
            exit ;
        end ;

        F.Read( 0, 0, Info.EOF, Result^ ) ; // Read file into memory
        if( FS.Last_Error <> nil ) then
        begin
            Show_Error( FS.Last_Error ) ;
            exit ;
        end ;
    finally
        F.Detach ;
    end ;

Next we allocate memory for the file image. Since this is executable code, we don't allocate the memory on the heap. Instead, we allocate memory via the MMC. If that fails, we exit with nil. Otherwise, we read the file contents into the allocated memory. If that fails, we show the error and exit with nil. Now we're done with the file and so we close it.

    // Get function...
    Module := BTMemoryLoadLibary( MMC, Result, Info.EOF ) ;
    if( Module = nil ) then
    begin
        Result := nil ;
        exit ;
    end ;
    Result := BTMemoryGetProcAddress( Module, 'Get_Component' ) ;
    if( Result = nil ) then
    begin
        exit ;
    end ;
    Res := HAL.Execute( int64( Result ), byte( Index ) ) ;
    if( Res = 0 ) then // HAL didn't return a value
    begin
        FGet_Component := TFGet_Component( Result ) ;
        Result := FGet_Component() ;
    end else
    begin
        Result := pointer( Res ) ;
    end ;
end ; // TKernel.Load_Component

There is more to loading a component than simply copying an image into memory. Our components are executable files of the PE format. We won't discuss the format in these articles, but here is a link for those who are interested: Wikipedia. This format is probably the most commonly used executable file format in the world at present. The process of loading the component involves several steps, including relocating address references. We use the open-source BTMemoryModule component to load the PE file. The version used in the kernel is a modified and simplified version of the component, which we aren't going to cover in these articles. The File Processor uses a more complete version of the component and we'll cover it in a later article.
If BTMemoryLoadLibrary fails to load the component, it will return nil. In that case we immediately exit with a nil. Otherwise, we call BTMemoryGetProcAddress to get the address of the component's Get_Component method. If not found, we exit with a nil. Finally we make the call to the address to get an instance of the component. This is done by calling the HAL's Execute method. This is done indirectly so that the HAL can substitute its own version of the component in cases where UOS is running virtualized. If the HAL returns nil, it means that something went wrong, so we try making the call directly to our loaded component. If the HAL does virtualize the component, it means that we will have a copy of the loaded component sitting in memory but not used. This isn't as bad as it may seem, however, since the same amount of memory is used as on a non-virtualized system. If UOS is being virtualized, there is probably enough system memory that the small increase in memory footprint shouldn't matter.

In the next article, we will discuss the use of the File Processor component.