1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
UOS API, The Executive side In the previous article, we looked at the application side of using the UOS API. Now let's look at the Executive's side. First, we must connect the Kernel to the ring calls. In the Kernel startup, we will tell the HAL to connect all four rings to the Kernel instance. As discussed in the previous articles, ring 0 is always reserved for the executive. The other rings are (or might) be used for other purposes, but the default handler is the Executive. So we will assign all the rings to the Kernel and then if something else is later to be linked to the other rings, those rings will be assigned at that time. Here's the addition to the Kernel Startup routine:
And here are the ring handler methods:
These functions simply call the Kernel CB_Ring method, passing the value of the ring that was called.
The Kernel ignores any ring calls other than 0. For ring 0, the Kernel's API method is called. The TKernel.API method simply redirects the ring 0 calls to the appropriate subsystem after some minimal validation.
In virtual memory systems, a given virtual address in the application is not the same physical address as the same virtual address in the executive. The application passes an address within its own virtual address space, so the Kernel needs to somehow gain access to the memory of the application. This is done by "mapping" some of the application's virtual memory into the kernel's virtual address space. Because the page size and page boundaries are the same for both virtual address spaces, the offset from the start of the page is the same in both cases. What differs is the base address of the page where the application memory has been mapped into the kernel's address space. A further complication is that in some cases some, or all, of the application's memory contents may have been moved out to disk and is no longer physically resident in memory. Therefore, we need to make sure that the application's data is in memory (and remains there until we are doine with it). This is done via the Lock_Pages method of the MMC. This is responsible for making sure the pages are resident (in memory) and locked in place so they are not removed. The PID of the process whose memory is to be read is passed, along with the address of the system request structure in that process' virtual address space, and the number of bytes from that address to lock. The function returns the offset of the address in the page. We check to make sure there wasn't an error. If there was, we set the last error and exit. Next we map the process page(s) that we locked into our address space with Map_Pages. We pass the process PID as the first parameter. The second parameter is 0 to indicate mapping the page(s) into the Kernel address space. The next parameters are the base virtual address and the size. The final parameter are flags. We pass 0 to indicate no flags. The result is the base address of the page that was mapped into the kernel address space. If multiple pages need to be mapped, the function will do so. However, if the operation cannot finish, the function returns 0. We know this is an error because nothing will ever be mapped to the first page of our address space. In this case, we set an error and exit.
Next we create a pointer to the request structure. If the subsystem is not the Kernel itself, we clear any pending exceptions. The reason we don't clear them in the case of the Kernel is something we will discuss in the future. Next we dispatch the request to the indicated subsystem, generating an exception if the subsystem is not valid (and setting the status code). Finally, we unmap the pages from the Kernel address space and then unlock the pages. Since the call is to the SSC component, we will now look at the SSC.API function.
The address of the calling user's request structure is passed along with a copy of the fixed portion of the request that was obtained by the kernel. First we get the current process ID. Then we base our operation on the request value (in this case, it is UOS_SSC_Get_Symbol). If it is not a recognized request, we generate an exception. We will discuss the code that handles the Get_Symbol request in a moment. But first, we'll look at the Generate_Exception method.
This method sets the exception for the current process. If the passed value is 0, we clear the exception. Otherwise, we generate an exception object and set the process exception via USC.Set_Process_Exception. Here is the code for USC.Set_Process_Exception:
This method gets the TProcess object for the passed PID, and sets the Last_Error to the passed exception. The TProcess class is used to keep track of information that is associated with a process. Here is the class definition:
In the future we will discuss other items stored in the TProcess class. Here are the method implementations:
These routines are typical for the Get_Last_Error and Set_Last_Error methods we have seen in other classes in the past. Now back to the handler for the UOS_SSC_Get_Symbol.
First we check to make sure that the passed length is at least as large as the TString2I1_Request structure, and generate an exception if not. Next we lock and map the page(s) for the request. You may be asking, "didn't we already lock the pages back in the Kernel.API method?" The answer is "maybe". In Kernel.API, we only locked and mapped enough memory for the fixed portion of a system request structure. If the fixed portion is entirely within one page, but the rest of the TString2I1_Request structure extends into the next page, then the part that is in the next page will not have been locked or mapped by the kernel. On the other hand, if the page(s) for the entire structure have already been locked and mapped by the kernel, locking and mapping them again here will not harm us. Each page lock increments the lock count for a page. When the page is unlocked, the lock count for that page is decremented. As long as the lock count is greater than zero, the page will stay locked. If the mapping operation failed, we set an exception and exit.
We set PS2I1 to the virtual address of the mapped structure. Then we obtain the string value via a call to Get_User_String. If that value is null, or we can't obtain the value (S = nil), we return an error.
Now we get the string value from the TUOS_String object, and detach from the obejct. Work now contains the name of the symbol. We use that to call Get_Symbol to get the symbol contents. We then extract the returned symbol contents from the TUOS_String, or set it to null if nil was returned. We reuse Work, so that now it contains the contents of the symbol (or null).
Now that we have the symbol value (or a null string), we check the length of String2 (the return string). If the length is 0, then the user is simply asking for the length of the symbol contents, rather than the actual contents. In that case, we simply set the String2.Length value to the length of Work. Otherwise, we set the result string via Set_User_String, and set the status (Set_User_String returns a status). Finally, we unmap and unlock the application memory. Here is the Set_User_String function.
This function writes the value of a string into the application virtual address space. The parameters are the process ID, the TSRB describing the string, and the string value to write. The function returns UE_Success unless there is a problem mapping the user's address space. The length specified in the TSRB structure is compared with the length of the passed string - the smaller of the two values is used. The string contents address from the TSRB structure is used to lock and map the page(s) containing the target buffer. If there is an error mapping the page, we set the process exception. The exception is the one set by the MMC or, if the MMC has no errors set, we generate a Memory Address Error exception. Assuming the pages are sucessfully mapped, the string contents are copied to the application buffer. Either way we then unmap and unlock the pages. Here is the Get_User_String method:
This function is, essentially, the Set_User_String method in reverse. If the TSRB structure length is 0, a null string is returned. Otherwise, we map the pages and copy the data into the local string. We set the result to UE_Success unless a problem happens, in which case UE_Error is returned. The pages are then unmapped and unlocked. In summary, the excecutive, in ring 0, can access the application memory, in ring 3. But not the other way around. The application passes its virtual address of the system request structure to the executive. This request indicates the application's virtual address for the name of the symbol. By use of the Lock_Pages and Map_Pages methods, part of the application's memory is mapped into the executive's memory space so that the executive can access the application's data. The application makes two calls: the first to get the length of the symbol contents, and the second to get the actual symbol contents. Now that we've worked out the details of how the executive and applications interact, we can look at future API calls at a higher level without all of this gory detail. In the next articles, we will discuss outputting the prompt to the user's I/O device. Copyright © 2018 by Alan Conroy. This article may be copied in whole or in part as long as this copyright is included. |