1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
Rebuilding the File System
We have previously discussed the need for a process to recover from a dirty shutdown of the file system. That is, the system is turned off or crashes before the on-store allocation table is updated from the in-memory copy. Attempting to use the file system in this state is almost guaranteed to corrupt files. Thus, if we want to safely use the file system, we need a way to rebuild the allocation table on the store. We were careful to do operations in an order that guaranteed that if something went wrong that the file structure wouldn't be corrupted, although some allocated space may not have be returned to the free space. The rebuild process will make sure that those unused, but allocated, areas are returned to the free space of the store. When finished, we will have a clean file system structure that can be used safely. Let's review this method:
First we see if the file system is already mounted. We can't repair the allocation table while the file system is in use. Rebuilding has to happen before the store is mounted.
The Valid_File_System methods checks that we have a valid file system structure on the store. If not, there is no way we can rebuild the allocation table and so we exit.
We can run the rebuild process even on a clean store, in which case we need to make sure the file system is marked as dirty in case the rebuild process is aborted (via a power failure, for instance). So we set the dirty flag regardless.
First we create a root directory file instance, and then deallocate all the storage on the store. This will clear the allocation table.
Now that the allocation table is clear, we mark the used areas via the Allocate_At method, for the header, the root cluster, and the root folder header.
Next we go through the allocation cluster for the root folder and allocate the clusters for it.
The workhouse of the method is the local Process procedure, which we will look at in a bit.
Finally, we clean up our work variables, flush the now-complete allocation table to the store, and mark the file system as clean.
Now let us examine the local Process procedure. It is called recursively, with the root folder file being passed in the initial call from the body of the method. As other folders are found in the root folder, the function recursively calls itself - passing each subfolder in turn. As each of those folders is processed, any subfolders are handled similarly.
As you (hopefully) recall, each folder is a file containing file headers. We iterate through each header in the folder until the Read method returns 0, indicating that we reached the end of the folder.
Some headers may be unused (either for a file that was deleted or one that was never used). If the Name is 0, it is unused and we will skip it. Otherwise, we create an instance of our file class.
We iterate through each possible stream in the file, since each one will have its own allocation cluster chain. We handle the special case of a contiguous file on the file data (stream 0). In that case, we simply allocate the entire data chunk in one call. In all other cases, we read through the allocation clusters until we get a cluster value of 0, which indicates the end of the allocation chain. For each cluster we then allocate it in the allocation table. We check for a failure to allocate a specific cluster and return True when we are done. We don't stop the rebuild process - just note the problem. The only way this should happen is if the some other file also pointed to the same cluster that this file points to. In theory, no file operations should be able to result in this kind of corruption of the file system structure. But we can't discount bugs. Further, a user with sufficient privileges could conceivably corrupt the structure. Or maybe someone used a stand-alone utility to modify the disk. Or maybe there is a bad spot on the disk where the data was corrupted. In any case, this should be an extremely unlikely event, but we need to check for it in any case. Being able to correct this kind of corruption is beyond the program's ability. It may even be beyond a human's ability to correct. But we'll hope for the best and the calling code can inform the user if the method returns True so they can run tools to recover the corrupted files. In fact, one of the UOS utilities that we will eventually write will help the user to do just this.
Once we have reallocated the clusters for this file - whether or not it is a folder - we see if it is a folder (directory). If so, we recursively call ourself passing this folder. When done with this file, we free the object instance and loop back to the next header in the current folder. When we write our disk defragmentation utility, we will be using a routine that is very close to this one. In fact, it will only differ by a handful of lines. But we will save that for later - there is a long road to travel before we get to that point. Next we will examine the Valid_File_System method:
This method checks the store header address in the root cluster. If it is an odd value or points to the first cluster, it is not a valid pointer and not a valid file system. Otherwise, we read the header that is pointed to. We then check the IDs and version in the header. If they are not valid it is not a valid file system. Otherwise we assume that everything is fine. However, it is possible that we could randomly find the values that indicate a valid file system even when there isn't one. Fortunately, the chances of random data matching our checks is very low - on the order of 1 in 248th. In the next article, we will address other support methods for our file system class. |