1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
Contiguous Files
Okay, after a break for the holidays, I'm ready to jump back into the development of UOS. However, before we continue with the file system, we need to change our UOS Native File class. Picking the right goals is a matter of understanding the problem domain and the requirements placed on you by others and/or the situation. We stated the goals of UOS early on. Picking the right approach is largely a matter of experience. It may require trial and error to gain that experience. But if you choose the wrong approach, you will not meet your goals. Even experienced engineers may sometimes choose the wrong approach, especially if they are doing something new and different. Fortunately, we have not only my experience in operating systems, but we are standing on the shoulders of the operating system designers of the past who have already worked out many of the sticky problems that present themselves in this domain. We have talked a bit about our approach to UOS before, but in order to keep these articles from bogging down, I've revealed it in bits and pieces as we go along. Mainly we've been discussing the implementation aspect of UOS.
One general approach of all software design is the concept of "layering". That is, we have one layer of software that does one thing, and then a layer above that which adds additional features. And one above that, etc. The idea is that each layer does a few things very well instead of a bunch of things inefficiently. So far, we've talked about 5 layers to our file system: the store which is concerned solely with the storage and access of data; the managed store, which adds allocation management to the store; the Allocation Cluster Manager, which manages variable-length buffers (files) through a chain of pointers on a managed store; the UOS Native File class, which abstracts the data access from the cluster-oriented data access of the ACM and adds the concept of multiple stores; and the file system, which supports multiple files on the store and manages their relationship to each other. Each layer from the store up to the file system does one or two things which are easy to implement, test, and maintain. This is part of our general approach/design. Another aspect of our design is to push the features up to the highest level that makes sense. We don't implement multiple streams inside the ACM class, because it would make the ACM overly complicated and more prone to failures. It is easier to manage two classes, one of which simply uses multiple instances of the other to accomplish its goals.
Here is a diagram of our current layering (or code "stack"). But sometimes it is difficult to know exactly where to place a given feature. And sometimes mistakes can be made. The general rule of thumb here is to place features where they most easily fit. Remember, we want to keep things conceptually simple or we will get lost inside the code as it grows in size. In general, the best place to implement a feature is where it will require the least and simplest (most straight-forward) code to implement. I bring this up because I had originally planned to implement the contiguous file feature in the file system class. However, as I started to contemplate the actual code for this feature, it became obvious that the best place for it was in the UOS Native File class. So, we will go back to visit that class just long enough to implement the contiguous file feature, which requires only a few additions to the existing methods, as it turns out. It doesn't go in the ACM because we cache the first few clusters of data in the file header (which the ACM knows nothing about), and we want to push the feature to as high a level as possible without making the code more complicated than necessary.
Here is the design we will use for contiguous files:
We add _Contiguous as instance data, and define a public getter and setter. We also add a new method, which we will discuss in a bit.
First we update Offset_To_Pointer:
If contiguous, we calculate a given file cluster based on the first cluster, plus the offset. If not set, we use the existing code.
Next we add code to the Set_Size method to handle resizing a contiguous file:
If the file has no data, we simply allocate the requested size. If we are setting the size to 0, then we simply deallocate what we have. Otherwise, however, we need to see if we can resize the allocated data. When a store reallocates data, it allocates the new area, copies the data, and deallocates the old. It then returns the new location, which we update our header with. Note: some stores may opt to attempt to resize the allocated data in place, which saves on the work of copying the data, so we may get the same store address back that we already had. But to our code, it doesn't matter. Finally, we make sure that our EOF offset isn't past the new size. We also make a slight change to Get_Allocation_Cluster:
Set_Allocation_Cluster allows us to set individual cluster values in the allocation cluster chain, which we will need in the Set_Contiguous method:
Once you get past the error checking and such, this simply calls the corresponding method in the allocation cluster manager. Finally, the implementation of the getter and setter:
The getter is simple. The real work comes where we need to convert between contiguous and non-contiguous. The operation is quite different depending on which direction we are going:
To convert to contiguous, we allocate a contiguous area on the store that is large enough to hold the file data. Then we copy the data from the old clusters to the new, contiguous, cluster. We clear all the existing header clusters and use Set_Size to clear the ACM, if any. We also set the first header cluster to the new starting cluster.
To convert to non-contiguous, we could go through the process of allocating each cluster in a chain and copying the data. But, we can do a shortcut instead. Since a contiguous file's data is really nothing more than a series of clusters, one after another, in order, we can leave the data clusters where they are, and simply create the entries for an allocation cluster chain to point to the various clusters in the contiguous area. In fact, the file data is still contiguous on the disk, although it is accessed via the allocation chain. So, it is physically contiguous, but logically non-contiguous. It is also possible that files will end up being physically contiguous just based on where free space exists on the store when the file is being written to, even though they are logically non-contiguous. Now the user has the option to define which files are accessed as contiguous and which ones are not, with all the advantages and disadvantages we discussed way back in Article 3.
We did add one method to the Allocation Cluster Manager class as well, to support setting individual cluster values in the chain:
There was no need to set individual cluster offsets from outside the class until the changes in TUOS_Native_File to handle contiguous files. Fortunately, it is a simple change, and doesn't require the class to know anything about how it is actually used. Thus, it remains a "black box" class. As a side note, while testing the contiguous file changes, I ran into a problem due to the store I was using. I was using a THeap64 class, which is just a wrapper around the Delphi heap manager. Since I hadn't replaced the standard heap manager with our own heap manager, the code was subject to implementation issues of the standard heap manager. In the case of the standard Delphi Heap manager, everything worked fine when we were allocating and deallocating clusters. But when we converted from contiguous to non-contiguous, and simply pointed to the individual clusters within the contiguously-allocated area, it corrupted the heap. Why? Because the standard heap allocates more than you ask for and stores the size of the allocated area just prior to the address that it returns. This is to make deallocations easier, since the program doesn't have to know how much memory is allocated when it frees a buffer or object. After our conversion, the "pointers" we used didn't have this extra size information prior to the data and when we deleted the file or resized it smaller, the heap assumed that before the pointer address was size information. But there wasn't. So I fixed this by using a RAM disk store which just allocates a large buffer and uses an allocation table to allocate data in that buffer. The use of the standard heap originally was just for speed of implementation of the test. The current test environment is closer to the actual situation that UOS will have. In the next articles, we will write the methods that will allow us to navigate and modify our file system. |