1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
Starting the Kernel Before we can create the Kernel component, we need to set some things up. So we define a global function that is called when UOS is started. At the point that the Startup function is called, the only thing that the function can assume is that the HAL is loaded and ready to go. Nothing else is available - additional memory, processor interrupts, file systems, etc. So we must proceed carfully. We can't even create a new component or allocate a buffer since there is no memory or heap management at this point. This need is so fundamental that it is our first order of business. But now we face a catch-22; how do we get a heap manager if we have no heap to use to construct our heap manager in the first place? Fortunately, as part of our kernel code, we have a simple static heap manager object. Most of our class instances are constructed on the heap (hence our problem). But we get an already-constructed static heap class as part of the Kernel code being loaded. You don't need to know all the differences between Pascal dynamic and static objects - just know that there is some RAM allocated for data when the kernel is loaded, and this data area contains our heap object. Here's the Startup function:
An instance of a HAL is passed to the function, and this should never be null. If it is, however, we call the Get_HAL function to create one. The included function returns nil, but a custom Kernel component could be provided by someone that creates and returns a HAL. In other words, this is a "hook" for someone wanting to write a custom kernel. If the HAL is null even after this, we just end our execution. The next thing we do is initialize our static heap. Part of this process is providing our heap with a chunk (buffer) of memory, which is obtained from the HAL. But what size to make this buffer? We ask the HAL for the memory page size. If the size returned is less than 4096 (4K) bytes, we double whatever size is returned. The hope is that we will allocate enough RAM for the heap to support the initial setup of the kernel. We ask for the page size so that we don't waste memory on systems that manage RAM on page-size boundaries. We also don't ask for more than 4K because this heap is temporary and is expected to only be necessary until the kernel sets up memory management. The memory we set aside for the static heap is permanently reserved and we don't want to waste memory. 4K ought to be sufficient for our initial needs. Whatever value we determine, we ask the HAL to set aside that much RAM and point our Buffer pointer to that memory. Buffer and Buffer_Size are global variables that are used by our temporary heap. Then we set the memory management pointers to our new heap (SetMemoryManager). Finally, we construct an instance of the kernel and start it up.
So, let's consider the static heap manager implementation. There are any number of algorithms that have been used for heap managers. One of the simpler kinds is what we will use. Here's how it works: when an allocation request comes in, we locate unused memory that is at least as large as the requested plus enough for a single integer. We place this value at the start of the free memory and place the size of the allocated chunk, in bytes, at this location. We then use the memory location after this value as the actual pointer returned to the caller. In other words, a heap pointer points to data, but prior to that location in memory is a size value. Because we need an integer size in all cases, and a pointer to link each chunk into the free list, it means that the minimum amount of memory that can be allocated is the size of an integer (for the size) plus the size of a pointer (which will usually default to the size of an integer). Assuming a 32-bit environment, that means that the memory must be allocated in chunks of no less than 8 bytes, regardless of what the user requests. If we allocate less than this, then there isn't room to link the chunk into the free list. So, if the user requests 1 byte from the heap, 8 bytes are still allocated. But if 5 bytes are requested, more than 8 bytes are required. How many? 9? Unlike disks, RAM has a minimum allocation size of 1 byte, since it can be addressed at the byte resolution. The temptation may be to make the minimum allocation equal to the requested bytes, with a minimum of 8. However, most CPUs access RAM more efficiently if the address being accessed is some power of 2, greater than 1 (2, 4, 8, etc). Further, the smaller the size of each chunk, the more likely it is that they heap will be fragmented. This could result in having enough total free memory for a request, but not having any of it be in a large enough contiguous chunk. On the other hand, if we allocate too much, we risk running out of RAM because we wasted too much on each allocation. To illustrate the fragmentation concern, consider the following diagram: As can be seen from this sample layout of the heap, we have four chunks; 1 of size 128 that is used, 1 of 32 bytes that is free, 1 of 16 bytes that is used, and 1 of 64 bytes that is free. The free pointer points to the first free chunk, which points to the second free chunk, which points to nothing, because it is the end of the free list. Assuming that these chunks represent the entire heap (a very small heap), then there are 96 bytes of free space, but the maximum that could be allocated is 64 bytes. Even if the chunks were next to each other, we have provided no way to coalesce them into a single larger chunk in our very simple heap manager. It may be of no consequence to our temporary heap, but we will be doing a fair number of allocations and deallocations, so we will use a 8 byte resolution just to be safe. Here is the definition of our global variables and our temporary heap class:
As can be seen, there are three methods: one to allocate (Getmem), one to deallocate (Free), and one to reallocate (Realloc). These correspond to the Delphi memory management unit needs. Free_Start is the pointer to the first free chunk in the free list (or nil if there is nothing in the list). Here are the constructors and destructors:
The constructor calculates a pointer to the end of the heap, and then sets up the first free chunk. This chunk is the entire buffer, so we write the size of the buffer to the beginning of the buffer and 0 pointer after that. Thus, we have a free chunk of the size of the buffer that points to null, indicating that it is the last chunk in the list. Free_Start points to the start of the buffer. Thus, we have a single large free chunk in the list. The destructor does nothing for two reasons: 1) we never get rid of the object, and 2) even if we did destruct it, there isn't anything to do. Now for the Getmem method.
If, for some reason, we cannot allocate the requested amount of memory, we return nil. So we default the result to that. Next, we add the length of an integer to the requested size (to make room for the size prefix). Then we round up to the size of two integers. On a 32-bit system, this would round up to a multiple of 8 bytes.
We start with the beginning of the free list, keeping track of the previous item that we visited on the list (when we start, we have no previous item since we're on the first one). We then loop through each chunk in the list. For each chunk, we get the size from the chunk (Available), and the pointer to the next chunk (Next) in the list. If the chunk is the exact size requested, we are done and we can return the chunk to the user. This is the ideal situation as it means there is no memory fragmentation. The first thing to do is remove the chunk from the free list - if this is the first chunk, we set Free_Start to the next chunk, otherwise we set the previous chunk to point to the next chunk. If the chunk is smaller than requested, we skip to the next chunk in the list. If the chunk is larger than the requested size, we will divide it into two smaller pieces, one to return to the user and a smaller one for the free list. However, we don't want to leave a free chunk that is smaller than the minimum 8 bytes or we can't link it into the free list. If the leftover is less than 8 bytes, we will just assign the whole chunk for the user. Note that we could search through the list twice looking for a perfect fit the first time and a closest fit the second (if we didn't find the perfect fit). That would reduce memory fragmentation, but the tradeoff is that heap operations would be slower. For this, we will risk fragmentation. When dividing the chunk, we allocate at the end of the chunk so that we don't have to go back and change the previous pointer. All we need to do is change the size of the free chunk. The Free method is very simple.
First we check to see if the passed pointer is within our heap buffer. If not, we do nothing and exit. Otherwise, since the chunk being deallocated already has a size prefix, all we need to do is set the pointer after the size to the first item in the free list, and then point the free list to this chunk - essentially linking the chunk into free list, at the beginning. Reallocation is simply a matter of allocating a new chunk of the requested size, copying the data from the old location to the newly allocated location, then deallocating the old chunk. In a more fancy implementation, we'd try to extend the existing chunk (reallocate in place). Here is the implementation for Realloc:
The first thing we do is see if the user is trying to reallocate a null pointer. If so, we treat it the same as a simple allocation and pass the request to GetMem. Otherwise, if we are resizing the chunk to size 0, that is the same as deallocating it completely, and we pass the request on to the Free method. Then we have a sanity check to make sure that the passed pointer is within our heap. Thus, if a request comes in to reallocate memory that was allocated by someone else we will halt because this should never happen and if it did, there is no way for us to handle the request. The reason this cannot happen is because up to the point of starting the Kernel, there is no memory management. Such a pointer is probably an errant pointer indicating a rather serious bug in the Kernel. Assuming all is right with our memory world, we get the size of the chunk being passed to us and we calculate the actual new size (rounding up as we do for new allocations). If the old and new size are the same, we just pass back the existing pointer and we are done. Otherwise we allocate the new buffer via Getmem, copy the data from the old chunk to the new chunk, and then free the old chunk. We then return the pointer to the new chunk. Under what circumstances would the old and new size be the same? One reason could simply be that the user wants to resize something (like a buffer), but it turns out that the new size is the same as the previous size. The user need not keep track of the size for the purposes of allocations/deallocations/reallocations since the heap keeps track of this itself. Another reason could be that the difference in size fits within the resolution of 8 bytes. For instance, if the user requested 10 bytes, we would round up to 16 bytes. If he then resized that same chunk to 12 bytes, we would still round up to 16 bytes, and the actual allocation would be the same. Here's the code that links the Delphi heap requests with our temporary heap object - the SetMemoryManager call in the Startup function is what makes the connection.
In the next article, we will look at the Kernel class instantiated and invoked by our startup code. The Kernel never returns control to this routine - it takes control until the system is shut down or powered off. |