1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
Exceptions and Emancipation In this article, we will address three final issues that impact the implementation of our class.
Exceptions
UOS exceptions are handled as objects. A given exception consists of text, a severity code, a facility code, and an error code. They can also be nested, or chained together. Let's say that our class calls a method in the store, which gets an error. It passes this to our class as an exception object. We then create our own exception object that indicates where the failure happened in our class, and attach the exception returned from the store to our exception, so that now it is two levels. Our caller may then take our exception, create their own exception and attach ours to it and then pass that three-level exception up the call stack. This can go on for many levels. There are two reasons for doing this. First, the caller of a component doesn't know the implementation of the component, so simply returning an exception from some other code called by the component means nothing to the calling code other than the operation failed. It doesn't know how it failed, only that it did. But, if the exception returned is specific to the component, then the calling code can make intelligent decisions about how to react to it. Second, the user can derive as much information about the problem from the exception chain as they desire. Perhaps they don't want to know more than that the file expansion failed. But perhaps they want to know it failed because the disk drive was full. The text for the exceptions is probably sufficient in most cases, but a facility and error code help provide an unmistakably clear way of identifying what the error is, and where it occured. Here is the definition of the exception class:
So, we will add a local instance variable that is tUnified_Exception. And then a Get_Error method is added that will return the last exception that occurred. If no exception has happened, the result of this method will be nil (NULL in C++). We will set the instance variable to nil when we start an API operation, and only set it when something goes wrong. We will create a descendant of tUnified_Exception that will be used in our class. Here is the code:
The Create_Exception function will construct an instance of our exception class and return it to us. We pass an error code and the chained exception (or nil, if none). Note that we don't assign the text until asked for it, to save us from extra overhead if the caller doesn't need it. The text is obtained from the ERT function, which is defined as:
We add instance data to hold our current exception object:
We also add an internal method to set it, and a public method for the caller to obtain it.
Why would we need a routine to set the last error? Can't we just assign it directly. Yes, we can. But it turns out that there is a little bit more involved...
Emancipation
And the new instance data:
So, this is the reason we have a Set_Exception method - because we need to handle attaching and detaching from our exception object. The routine looks like this:
Note that we attach to the passed exception object before we detach from the current one. This is just an added measure of safety in case the same object is assigned to us twice. It shouldn't happen, but better safe than sorry. Obviously, we don't call either method for a nil instance. The passed instance will be nil if we are clearing the last exception, and the current exception (_Last_Error) will be nil if we have no current exception. What this code does is it makes sure that we register our reference to the instance, via Attach, and release our reference to the current instance. If some other code has a reference to the instance, our Detach will not cause the instance to go away and the other code can still use it. This simple approach removes all the possible confusion about whether or not the instance is needed. In fact, we will use this for most of our classes. The only thing we have to keep in mind is that if we request an emancipated object from somewhere, that we attach to it immediately. Likewise, when we are done with it, we need to be sure to detach from it. Our allocation cluster manager class now needs to handle creating the exception instance when something goes wrong - and you can be sure that Murphy is correct: whatever can go wrong, will go wrong. Here is an example of the updated Pull method:
The call to Buffer will try to allocate a buffer if it hasn't been allocated before. But this can fail if we run out of heap space, so we check to make sure that the Buffer method didn't create an exception. If it did, we exit immediately. As we are traversing the chain, if at any point we end up trying to read address 0 from the store, we know we have a problem. This indicates that we've run into the end of the allocation cluster chain before we reached the requested cluster index. This can have two possible causes: 1) a bug in the code, or 2) bad data on the store. Since we validated the data before calling Pull, this is almost certainly an issue of bad data on the store. Somehow the allocation chain for the file has been compromised. This is a definite case for stopping our processing of the file immediately rather than attempting to operate on bad data, which could cause further data corruption on the store. This exception is not chained, because there is no other exception instance associated with it. Of course, we must also check for the presence of an exception after each call to Pull. And whomever calls that routine needs to check for completion, and so on. This may seem like a lot of extra work, but it is the cost of writing reliable code. And for a class which is fundamental to the proper operation of UOS, it is doubly important for it to be rock-solid reliable.
Last Changes
Since we are told what the root and data size are, we can just set the values and clear the buffer cache. Of course, if the size we are given doesn't match the allocation clusters, all manner of possible problems could result - anywhere from corrupted data to abends. There is another performance improvement we can give our class. In the Set_Size method, we know that, for expansion, _Buffer will always contain the last allocation cluster, so we can set _Current_AC to the proper value. This has the potential of preventing the need to traverse the entire chain from the root on the next request. We can do the same thing on truncation - but only if the truncation didn't require us to deallocate other allocation clusters. Once we move from the last allocation cluster, _Buffer will no longer match any of our allocation clusters and so we have to set _Current_AC to -1. How do we know if we are still on the last valid allocation cluster? We can tell by looking at the first pointer. If the first pointer is 0, we are no longer in a valid allocation cluster. Otherwise we are and we can set _Current_AC appropriately. Worst case scenarios would save us no turns. Best case scenarios would save us a lot of turns. Reality will probably average out to be a slight overall performance improvement. Since it is a couple simple lines of code, it is worth it. Here is how our method looks now:
That finishes up our class (finally!). In the next article, we will discuss the framework under which this class, and all others in UOS, operate. |