Contents. Error Message Descriptions... 7

Size: px
Start display at page:

Download "Contents. Error Message Descriptions... 7"

Transcription

1

2 2

3 Contents Error Message Descriptions

4 4

5 About This Manual This Unify DataServer: Error Messages manual lists the errors that can be produced by the Unify DataServer RDBMS. It is intended to help you quickly resolve the cause of error messages you may receive during the design and use of a Unify DataServer database. The body of this manual is the Error Message Descriptions. This Error Message Descriptiond is made up of entries for each Unify DataServer error message. Each entry is introduced with a header that contains the error message number and text. This header has the format shown here: 1521 Cannot drop PUBLIC schema. The error message number is a number that represents the error message text in the Unify DataServer message file, unify.msg. This error message number appears in parentheses at the end of the error message text. The unify.msg file should reside in the directory named by the UNIFY configuration variable. The error message text is the actual text of the message. It describes the error condition. Items in the error message text that are italicized are substitution points. When the error message is displayed, Unify DataServer replaces the substitution points with actual string or numeric values that apply to your error condition. To use this manual, look up the error message number of your error message in the Error Message Descriptions. Error messages with positive error numbers are listed first, in ascending order. They are followed by error messages with 0 and negative numbers. The negative error codes are presented in ascending order of the numeric values. So for example, error message -2 is listed before -3, which again precedes 4, and so on. 5

6 Once you have found the entry for your error message in the Error Message Descriptions, refer to the and sections. The section provides a more complete description of the condition that caused the error message. The section describes how to resolve the error condition. Some error message entries also have an section that refers to other manuals. If you follow the instructions in the and sections and are still unable to resolve the error, please call Customer Support for assistance. Make sure that you have the error message number ready when you call. 6

7 +100 End of scan (or ordered access). The end of the select set of rows has been reached and there are no more rows to be retrieved. In RHLI, the scan can be restarted, or a new scan can be started. In embedded SQL/A, the cursor can be reused. 0 No error occurred. No error occurred during the operation. 1 Internal inconsistency fatal. An abnormal condition has been detected in shared memory. For instance, a numeric value that is always positive now has a negative value. Try shutting down the database and restarting, or running the irma utility. Also, you can check for database corruption by using the dbchk utility. Call Customer Support for assistance with the dbchk utility. This utility is not documented in the Unify DataServer manual set. 2 Not enough user memory space; try increasing SHMOFFSET. An attempt to allocate user memory failed because a related call to malloc, calloc, or realloc failed. The process may have reached a system-imposed limit. Try reducing the values of the configuration variables that control the size of process memory (INITMEM, SQLSMEM, SQLPMEM or TIMEM) or increasing the value of the configuration variable that controls the shared memory scanning offset, SHMOFFSET (remember that SHMOFFSET has no effect if SHMKIND is 1). Unify DataServer: Configuration Variable and Utility Reference Error Messages 7

8 3 Not enough shared memory; try increasing SHMMAX or decreasing SHMFULL. An attempt to allocate a structure in shared memory failed because the size of the shared memory segment was exceeded. Try to determine which partition is full by using the p option on the shmmap command. If the full partition is in the: Transaction manager Try these steps: Reduce the number of active transactions Lock manager File manager Reduce the number of locks Decrease the setting for the LMPROMO variable Commit transactions more frequently Synchronize the database more often by adjusting the FREQUENCY and FREQTYPE variables Reduce the number of pages modified between synchronizations If the error persists, try moving the overflowing segment into its own shared memory area or increasing the associated shared memory configuration variable (SHMMAX, TMSHMKEY, LMSHMKEY, FMSHMKEY, CMSHMKEY). Unify DataServer: Configuration Variable and Utility Reference 8 Error Messages

9 4 The database appears to be corrupted (is the root volume really a database?). A database file, such as a volume, physical log, B-tree index file, can be read but the file header does not indicate that the file is a Unify DataServer database file. Use file * in the database directory (DBPATH) to determine which file is corrupted. For this command to be effective, the magic file must be correctly installed in the /etc directory of your release. Unify DataServer: Configuration Variable and Utility Reference Your operating system documentation 5 This feature is not implemented yet. A feature is not yet supported or implemented. Check the availability of RHLI features in the RHLI documentation. Unify DataServer: RHLI Reference 6 The software version does not match the database version. The version number in the header of a database file does not match the version number expected by the database software. Convert the database to the new version. 7 An invalid memory address was supplied as a parameter to an RHLI function. An RHLI function was called with an invalid memory pointer. Verify the parameters passed to the RHLI function. Check the placement of pointer references. Unify DataServer: RHLI Reference Error Messages 9

10 8 Partial success; see the individual status list. One or more errors occurred on multi valued parameter; the actual errors are contained in the status list which was passed to the function. Examine the RHLI function s status list to determine the actual errors. Check for the correct number of parameters. Unify DataServer: RHLI Reference 9 Invalid argument/options. An RHLI function received an invalid argument or option. Verify the parameters passed to the RHLI function. Unify DataServer: RHLI Reference 10 Valid, but no work was done. A list element in an RHLI status list was valid but that no action was taken due to an error in another element of the list. This error is usually accompanied by another error in the status list. Check the status list errors. Find the RHLI function causing the error and correct the offending list element. Unify DataServer: RHLI Reference 11 An interrupt has occurred. This error is returned by most RHLI functions after an interrupt is set by the default Unify DataServer signal handler or by the function usetitr. Use the uclritr function to resume processing after the interrupt. Unify DataServer: RHLI Reference 10 Error Messages

11 12 Database file type mismatch possibly not a database file? A database file, such as a volume, physical log, or B-tree index file is not the type of file expected. For example, when attempting to open the log file, the file header indicates that the file is actually a database volume. Check the location of all files and verify file names and paths in related configuration parameters. Use the file * command to check for corrupt files. If the database files are Unix files, try using the fsck command to check the file system. You may need to recover your database from a backup version. Unify DataServer: Configuration Variable and Utility Reference Your operating system documentation 13 Database file ID mismatch possibly wrong database version? The database file opened does not have the expected file ID. For example, the file which should contain volume two of the database does not have an ID of two in the file header. Use the file * command to identify which file is incorrect. For this command to be effective, the magic file must be correctly installed in the /etc directory of your release. Unify DataServer Installation documentation. 14 The $UNIFY configuration variable is not defined. The UNIFY configuration variable must be defined so that the database system can locate the message files and the default configuration file. Set the UNIFY configuration variable to the path name of the lib directory in the installed Unify DataServer release. Unify DataServer: Configuration Variable and Utility Reference Error Messages 11

12 15 Invalid error code. An attempt has been made by the RHLI function ufchmsg to fetch an error message using an invalid error code. Verify the error code used with the ufchmsg function. The rhlierr.h file in the include directory of your release. 16 The $UNIFY directory does not exist or is not accessible. The database system is not able to access the directory indicated by the UNIFY configuration variable. Verify the value of the UNIFY variable. Make sure that read access is allowed on the $UNIFY directory. Unify DataServer: Configuration Variable and Utility Reference 17 The $UNIFY/unify.msg message file does not exist or is not accessible. The database system is unable to open the message file, unify.msg. Verify that the UNIFY variable is set to the lib directory of the release. Make sure that read access is allowed on the directory and the message file, $UNIFY/unify.msg. Unify DataServer Installation documentation. 18 Process terminated at user request (typically using shutdb utility). When two or more processes are accessing the database, one of them might be running a process which forces the database to shut down, while others are still trying to access the database. The latter processes will get this error. None. 12 Error Messages

13 21 Not owner. You have attempted to access a file that you do not own. Check the errlog file to see if the file name is listed there. Correct the access permissions of the file. Also, check the error message documentation for error number 1 in your Unix system documentation. 22 No such file, directory, or program. This error occurs when a file name is specified and the file does not exist, or when one of the directories in a path name does not exist. Check the errlog file to determine which file could not be found. Also, check the error message documentation for error number 2 in your Unix system documentation. 23 There is no process with the specified process ID. A process has abnormally terminated. Check the errlog file for information. Search for any core files. 24 Interrupted system call. A system call was interrupted. This is an internal error and should not occur during normal operations. Call Customer Support if this error occurs. 25 I/O error. An I/O error has occurred. Since it is usually a hardware problem, user must resolve the situation independent of the database, usually. Error Messages 13

14 26 No such device or address. This is an internal error only and should not occur. If this error occurs, please call Customer Support. 27 The argument list is too long (Consult operating system manual for limit). This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 7 in your Unix system documentation. 28 Exec format error. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 8 in your Unix system documentation. 29 Bad file descriptor. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 9 in your Unix system documentation. 30 No children. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 10 in your Unix system documentation. 14 Error Messages

15 31 No more processes. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 11 in your Unix system documentation. 32 Not enough memory; try increasing SHMOFFSET. An attempt to allocate user memory failed because a related call to malloc, calloc, or realloc failed. Try reducing the values of the configuration parameters that control the size of process memory (INITMEM, SQLSMEM, SQLPMEM or TIMEM) or increasing the value of the configuration parameter that controls the shared memory scanning offset, SHMOFFSET (remember that SHMOFFSET has no effect if SHMKIND is 1). Unify DataServer: Configuration Variable and Utility Reference 33 Access permission denied on file. An attempt has been made to open a file or shared memory in a mode not allowed by the permissions on the file. Check the errlog file to determine which file could not be accessed. Also, check the error message documentation for error number 13 in your Unix system documentation. 34 Bad operating system call address. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 14 in your Unix system documentation. Error Messages 15

16 35 Block device required. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 15 in your Unix system documentation. 36 Object busy. Some internal resource is being used. Check the error message documentation for error number 16 in your Unix system documentation. 37 File already exists. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 17 in your Unix system documentation. 38 Cross-device link. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 18 in your Unix system documentation. 39 No such device. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 19 in your Unix system documentation. 16 Error Messages

17 40 Not a directory. A non-directory name was specified where a directory name was required, such as for the configuration variables DBPATH or UNIFY. Check the errlog file to determine which file caused the error. Also, check the error message documentation for error number 20 in your Unix system documentation. 41 Object is a directory. An attempt has been made to open a directory as a file. Check the errlog file to determine which file caused the error. Also, check the error message documentation for error number 21 in your Unix system documentation. 42 Invalid OS function argument. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 22 in your Unix system documentation. 43 File table overflow. The system file table is full, and temporarily no more files can be opened. Reconfigure the operating system to support more open files or reduce the number of open files. Also, check the error message documentation for error number 23 in your Unix system documentation. Error Messages 17

18 44 Too many file descriptors open (> operating system limit?) This sometimes indicates a problem attaching shared memory segments. An attempt has been made to open more files than are allowed by the operating system for each process. Reconfigure the operating system to support more open files per process or reduce the number of open files. Also, check the error message documentation for error number 24 in your Unix system documentation. 45 Not a typewriter. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 25 in your Unix system documentation. 46 Text file busy. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 26 in your Unix system documentation. 47 File too large. An attempt has been made to make a file larger than the system imposed maximum. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 27 in your Unix system documentation. 18 Error Messages

19 48 No space left on device. No free space remains on the device in which to write an ordinary file. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 28 in your Unix system documentation. 49 Illegal seek. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 29 in your Unix system documentation. 50 Read-only file system. An attempt has been made to modify a file or directory on a device mounted as read-only. Check the errlog file to determine which file caused the error. Also, check the error message documentation for error number 30 in your Unix system documentation. 51 Too many links. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 31 in your Unix system documentation. 52 Broken pipe. This is an internal error and should not occur in the normal execution of the database. Check the error message documentation for error number 32 in your Unix system documentation. Error Messages 19

20 53 Generic operating system error. An operating system error has occurred that cannot be mapped to a standard RHLI error. Try to determine the statement of statements causing the error. Examine the error that occurred just after this one, if any. 54 Not enough resources. Your application has run out of stream file descriptors. Try to reserve lower-numbered file descriptors for the functions that need them. If possible, set SCHEMA to FALSE to turn off schema merging. Unify DataServer: Configuration Variable and Utility Reference 55 End-of-file reached. An attempt has been made to read past the end of a database file. A file may have been truncated. By using the ls l command, check that the current size of the.db file is the expected size. Also, check for zero-length files. Your operating system documentation. 56 Partial read/write encountered. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 20 Error Messages

21 57 The software version does not match the shared memory partition version. The software version that created the shared memory was not the same version as the current software. Make sure you are using the correct release of database software. You can check the release of the current software with the version option of a database executable. This option should list out the partition numbers that the software expects. Use the shmmap utility to list the current partition version numbers. Unify DataServer: Configuration Variable and Utility Reference 58 The software version does not match the shared memory segment version. The software version that created the shared memory was not the same version as the current software or the shared memory segment is not a Unify DataServer shared memory segment. Make sure that the shared memory segment being used is a Unify DataServer shared memory segment. If not, you probably need to change the shared memory key, SHMKEY, to a value unique to this software. Unify DataServer: Configuration Variable and Utility Reference 59 Could not attach shared memory at required address. Shared memory could not be attached at the required address. The required attach address would probably overlap the data space of the process. This problem is usually caused by starting the database with a small program, such as shmmap, and later attempting to open the database with a much larger program, such as SQL or startdb. Shut down the database and either increase the value of the SHMOFFSET configuration parameter or restart the database using the larger program. Unify DataServer: Configuration Variable and Utility Reference Error Messages 21

22 60 The shared memory segment is already attached. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 61 Could not create shared memory incorrect SHMKEY value? This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 62 Could not create a shared memory segment >= SHMMIN and <= SHMMAX. The database system was unable to create a shared memory segment with a size greater than or equal to the SHMMIN configuration parameter setting due to some operating system limitation or because SHMMIN is greater than the SHMMAX configuration parameter. Try to make more shared memory available by reducing the size of SHMMIN, reconfiguring the operating system, or reducing shared memory usage by other databases. Unify DataServer: Configuration Variable and Utility Reference 63 File synchronization failed. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 22 Error Messages

23 64 A process has abnormally terminated while updating shared memory; database recovery using the irma utility is now necessary. This error occurs when a database program detects that another process has terminated while holding a shared memory critical section lock. Since the process terminated while updating shared memory, the database program assumes that shared memory is now corrupt. Recover the database by using the irma utility. Unify DataServer: Configuration Variable and Utility Reference 65 Cannot open or create the shared memory lock file ($SHMDIR/shmlk#####). The shared memory lock file, used to control access to shared memory, could not be created. Only versions of Unify DataServer that use disk-based locking create this file. Make sure the SHMDIR configuration variable is set correctly. Make sure the directory indicated by SHMDIR has appropriate permissions. Unify DataServer: Configuration Variable and Utility Reference 66 Specified processor ID does not exist. The processor specified in the PROCESSOR configuration variable does not exist. Set PROCESSOR to a valid processor ID. 67 Process is running on the wrong processor ID. A process called uopndb while running on the wrong processor. See information on migrate in Unify DataServer: Configuration Variable and Utility Reference. Error Messages 23

24 70 Executable is not licensed. The executable has not been properly licensed. License the executable using the instlic utility. See the Unify/Net Installation instructions for details on licensing executables. 71 Executable license has expired. Your license for this executable has expired. Contact Customer Support to renew your license. 72 Unable to determine current time. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 73 Executable is not licensed for this machine. An attempt was made to run an executable on a machine for which it was not licensed. Check your command name and PATH configuration variable to make sure you are running the correct version of the software. Call Customer Support to resolve the problem. 74 File seek error. An attempt has been made to perform a file seek operation on a file that is not seekable or has an invalid specified seek address. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 24 Error Messages

25 75 Unable to install license. The license cannot be installed in the executable. Make sure that the license is being installed in the correct executable. 76 License installation error. The license has been incorrectly installed. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 77 Database Server unable to respond; too many users. The remote database cannot be opened because the Database Server is already servicing its licensed maximum number of users. Verify all existing users. If all users are valid, try to open the database later. Use the operating system utilities to remotely log into the server machine and perform the operation as a local user. Contact Customer Support to increase your license. 78 Invalid date. The input date value is invalid. Make sure that the specified value is in correct format and range. 81 No messages in specified range (user changed message file incorrectly?). This error occurs when a Unify DataServer utility attempts to retrieve a set of messages from the message file, unify.cmf, and the desired messages do not exist. Make sure that the UNIFY configuration variable is set to the lib directory of the release and that the file unify.cmf exists with the correct permissions in the $UNIFY directory. Error Messages 25

26 100 End of scan (or ordered access). UEEOSCN See error message Bad column count (exceeds maximum column limit). The specified number of columns in a column group must be greater than 0 and less than 9. Correct the number of component columns. 102 Invalid or conflicting options. The options specified for the RHLI function are invalid or contain conflicting values. Verify the options of the function. Unify DataServer: RHLI Reference 103 Invalid segment size specified. The specified table segment size is less than 1 byte or greater than the largest possible segment size for the host machine. The value in the SHMMIN configuration parameter may be too large. Choose a more reasonable segment size, or specify the value 0 to specify no segment size. When choosing a segment size, be sure to specify the size in bytes. 104 Invalid volume ID. The specified Volume ID does not exist in the database. Check the Volume ID using the volume statistics utility volstats. The root volume should have a Volume ID of 1. Unify DataServer: Configuration Variable and Utility Reference 26 Error Messages

27 105 File may not be block-special file. The specified file is a block-special device, which is invalid for the operation. Use a character-special device for files such as the physical log file and the transaction log file. 106 No direct table key column specified. No primary key column was specified for a table designated as being a direct table. Designate one of the columns in the table as the table s primary key column. The alternative is to make the table non-direct. 107 Invalid column type for direct table (must be type INTEGER [U_HINT]). An attempt has been made to define the primary key for a direct table using a column type other than U_HINT or INTEGER. A direct table requires that the primary key column be of type U_HINT. In SQL/A, use the SQL type INTEGER. In RHLI, use the type U_HINT. 108 Transaction-log is not a file (directory or pipe?). An attempt has been made to reference a database transaction log file (.lg suffix) that is not a Unix regular file, or a block-special or character-special device. Make sure the database transaction log file specified by the configuration parameter LOGFILE specifies either a Unix regular file or a block-special or character-special device. The transaction log cannot be a directory, named pipe, or non-seekable device, such as a magnetic tape device. Error Messages 27

28 109 Transaction-log size is too small (should be at least MAXSYSTX blocks). The size of the database transaction log file (.lg suffix), as specified by the LOGBLK configuration parameter, is smaller than the minimum required size. The database transaction log file size is specified in number of blocks. The transaction log must have at least as many blocks as the maximum concurrent transactions specified by the MAXSYSTX configuration parameter. 110 Too many primary key columns specified. An attempt has been made to specify more than one primary key column or column group for a table. A table may only have one primary key. The table s current primary key can be obtained from the operating system shell using the schlst utility, or from the RHLI using the uinftbl function. 111 Exceeded maximum B-tree key length. An attempt has been made to specify a B-tree index whose combined length exceeds the maximum allowable index size. The maximum B-tree index size differs for each type of hardware. Try to reduce the size of the B-tree index by reducing the number of component columns, or by decreasing the size of any character or U_STR columns. 112 No column group information specified. An attempt has been made to reference a column group explicitly. Use the column group s component columns instead. 28 Error Messages

29 113 Invalid database ID. An attempt has been made to reference a Database ID that does not correspond to an open database. Make sure the Database ID is the one returned from the RHLI uopndb function. Make sure the RHLI uopndb function has returned the USUCCESS status. 114 Invalid direction specification. An invalid direction parameter was specified. The valid direction parameters are: UFIRST, ULAST, UNEXT, and UPREV. These parameters are located in the RHLI header file rhli.h. Make sure you specified a valid direction parameter and that you have only specified a single direction parameter. 115 No database information specified. An attempt has been made to create a database without specifying any database information. The DBINFO structure passed to the RHLI uadddb function is a zero pointer. Make sure the DBINFO data structure is correctly initialized. 116 Invalid link ID. An attempt has been made to reference a non-existent Link ID. Make sure the Link ID was obtained using runtime name binding or retrieved using the uinflnk RHLI function. Error Messages 29

30 117 No volume preference found. An attempt has been made to drop a non-existent volume preference from a table. Make sure that the volume ID representing the volume preference does exist. You can use the uinfvol RHLI function to perform this validation. Unify DataServer: RHLI Reference 118 No user information specified. An attempt has been made to reference a zero-length list of users. Make sure the count of the number of user entries in the user information list accurately reflects the actual user count. 119 No volume information specified. An attempt has been made to reference zero-length volume information. Make sure the count of the number of volume entries in the volume information list accurately reflects the actual volume count. 120 Column cannot be combination to itself. An attempt has been made to define a column group with a component column member that is also a column group. Make sure the component members of a column group do not reference other column groups. 121 Schema has been modified cannot open database. One or more of the tables or columns referenced in uld were modified in some manner. Creating an access method does not count as a modification. This message only appears if the database is not using ID mapping. Either relink the executable with uld or use ID mapping on the database. 30 Error Messages

31 122 Beginning-of-set reached. An attempt has been made to reference a row before the first row in a selected set. The beginning of the selected set of rows has been reached there are no more rows to be retrieved. In RHLI, the scan can be restarted, or a new scan can be started. In embedded SQL/A, the cursor can be reused. 123 End-of-set reached. An attempt has been made to reference a row after the last row in a selected set. The end of the selected set of rows has been reached there are no more rows to be retrieved. In RHLI, the scan can be restarted, or a new scan can be started. In embedded SQL/A, the cursor can be reused. 124 Volume appears to be active or in use. An attempt has been made to add a volume whose physical device file is already in use on a database, not necessarily the database to which the volume is being added. The volume status can be examined using the Unix file utility, if the identification information has been installed. For more information on installing the file identification information, see the product installation instructions. Volumes residing on block-special or character-special devices cannot be reused unless they have been properly dropped and a subsequent file system synchronization has occurred. Until the synchronization occurs, a deleted volume is considered in use but not accessible. 125 Bad volume pre-allocate option (length). An attempt has been made to specify the preallocated option for a volume whose length is zero, or the forced option for a volume whose type is device. Correct the volume specifications. Error Messages 31

32 126 Bad volume group ID. An attempt has been made to specify a negative value for a Unix group ID. For information on how to specify Unix group IDs, see your operating system manuals. 127 Bad volume length. An attempt has been made to specify one of the following: a volume length that is too short to fix database headers, a negative value for the volume length of a UNIX regular file, or zero for a block-special or character-special device. Correct the volume length specifications. The length of the volume must be greater than or equal to zero. Creating and Removing Database Objects in Unify DataServer: Writing Interactive SQL/A Queries. 128 Bad volume access mode (0777). An attempt has been made to specify a Unix file access mode that does not fit the bit pattern 0777 (octal). Correct the file mode. Your operating system documentation. 129 Bad volume offset. An attempt has been made to specify a volume offset when the volume is the root volume or the volume is a regular Unix file. Volume offsets can only be used volumes whose type is device. 32 Error Messages

33 130 Bad volume options. An attempt has been made to specify an invalid volume option. Verify the options on the volume creation statement or function. 131 Bad volume owner ID. An attempt has been made to specify a negative value for a Unix user ID. For further information on how to specify Unix user IDs, see your operating system manuals. 132 Bad volume page size. An attempt has been made to specify an invalid size for a volume file. Verify the size option you specified on the volume creation statement or function. 133 Bad volume device type. An attempt has been made to specify a volume file type that does not correspond to the actual file type. The volume file was specified as being a device when the volume file is actually a Unix regular file, or the file was specified as being a Unix regular file when the volume file is actually a device. Make sure that the file type specified for the volume and the file type for the actual file match. 134 There are orphan rows in the child table. An attempt has been made to add a link index. A link index cannot be added because there are rows in the child table that cannot reference a corresponding parent row. Identify the orphan rows in the child table and either delete them, change the referencing columns to the value of an existing parent, or insert a new parent with the orphan s values. Error Messages 33

34 135 Invalid buffer index (file too small). An attempt has been made to specify a text/binary buffer index that is invalid, according to other information in the text/binary descriptor structure. For instance, this error can occur if the input buffer is a file and the text/binary descriptor structure indicates that m bytes are to be read, starting at the nth byte in the file, when file size is smaller than n + m bytes. Check the indicated text/binary descriptor structure for accuracy. Specify a smaller index or fewer number of bytes. 136 An invalid expected number of rows was supplied. An attempt has been made to specify a negative value as the expected number of rows for a table. The expected number of rows for a table must be a positive number or 0 when the expected number of records is unknown. 137 The supplied index into a variable length data value is past the end of the actual value. An attempt has been made to specify an offset into a column s text or binary data buffer that exceeds the size of the data. Specify a smaller index to be retrieved or written. 138 Unknown TEXT/BINARY update mode. An attempt has been made to specify a text or binary operation mode that is invalid. Verify the operation. 34 Error Messages

35 139 Scan (or ordered access) ID is not found (Has the scan been closed?). An attempt has been made to reference a Scan ID that does not exist. Make sure the Scan ID was returned from a successful RHLI ubegscn function call. Also make sure this scan was not closed with the RHLI uendscn function call. 140 Column type mismatch. An attempt has been made to reference an index using columns that do not match the columns used to create the index. Make sure the Column IDs match the Column IDs used to create the index. Make sure the Column IDs do not reference a column group. 141 Unable to back out operation fatal. The database system detected an internal, non-recoverable error while trying to back out a failed operation. See the errlog file for an entry describing the cause of the error. Recover the database using the irma utility. 142 Fatal error in B-tree access; rebuild. An internal error was detected while scanning a B-tree index. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 143 Error opening B-tree. The system was unable to open a B-tree index file. Make sure the B-tree index file (.idx suffix) has not been removed. If the B-tree index file exists and you still receive this error, please call Customer Support. Error Messages 35

36 144 Combination group not allowed. An attempt has been made to reference a Column Group ID, instead of the component members Column IDs. In most RHLI functions, the Column Group ID may not be referenced. Use the Column IDs for the member columns in the column group. 145 Expected a column group, but columns are not members of any column group. An attempt has been made to reference a column group, but the specified Column IDs do not belong to any known column group. This error occurs when trying to retrieve rows based on an index key. Make sure the Column IDs are in the same sequence as those used to create the index. Make sure the number of columns specified matches the number specified when the index was created. 146 Invalid column length. An attempt has been made to specify an invalid column length or an invalid column display precision and scale. Make sure the internal column length corresponds to the limits of the data type. Verify the column s precision and scale. 147 Invalid column type. An attempt has been made to specify a data type that is invalid for a particular operation. Verify the data types available to you and the restrictions associated with each data type. 36 Error Messages

37 148 Data value conversion error. An attempt has been made to perform a an invalid data conversion. This error occurs when the data to be converted does not conform to the constraints for the column s data type. For instance, the date 88/88/88 would produce this error because the month 88 is invalid. Make sure the data to be converted conforms to the column s data type restrictions. 149 Database is closed; attempt to access database which is not open. An attempt has been made to access a database that has not yet been opened or that has since been closed. Perform the operation after the database has been opened and before the database has been closed. Make sure the open database operation succeeded before attempting other database activities. 150 The column data type internal length is larger than maximum length. An attempt has been made to specify an internal column data type length that is larger than the maximum allowable data length. Check the restrictions for the data types you are using. 151 Database already opened. An attempt has been made to open, or create with the overwrite option, a database that is already opened by the process. A database may only be opened once. The database must be closed before it may be reopened or recreated. A database can be reopened as many times as desired as long as the database is subsequently closed. Error Messages 37

38 152 Unknown column type. An attempt has been made to reference a column data type that is invalid. Verify the data types available to you. Working With the Data Types and Null Values in Unify DataServer: RHLI Reference 153 Invalid description length (too long). An attempt has been made to specify a description that is longer than the maximum size description. Shorten the description. Be sure to enclose the description in quotes. 154 Duplicate column in column group list. An attempt has been made to create a column group have component member columns with duplicate Column IDs. Make sure the number of component member column IDs is correct so that invalid memory is not inadvertently referenced. 155 Attempt to store duplicate value in unique column. An attempt has been made to insert or update a unique column with data that matches data in an existing unique column. If a column group generates this error, the error applies to all component member columns in the column group. This error can occur for both primary keys and non-primary keys, since primary keys require a uniqueness constraint. Insert or update unique data. An alternative would be to evaluate the uniqueness constraint placed on the columns to determine if the uniqueness constraint is accurate or necessary. Unify DataServer: RHLI Reference or Unify DataServer: Writing Interactive SQL/A Queries 38 Error Messages

39 156 Duplicate table ID. An attempt has been made to create a link between the same table. Links must exist between two different tables. Correct the link. 157 Invalid database name syntax. The database name string contains a format error. Verify that the correct separator characters are used and that all necessary separator characters are present. 158 Failed to create error log name. An attempt to create the errlog file failed. The database system requires the errlog file. Check that the directory specified by DBPATH has write permission. If this error occurs, please call Customer Support. 159 Failed to open error log file. An attempt to open the errlog file failed. The database system requires the errlog file. If this error occurs, please call Customer Support. 160 Denied access to file. An attempt has been made to access a database file for which the process does not have access permission. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. Error Messages 39

40 161 Failed to close a file. An attempt has been made to close a file that is already closed. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 162 File create error. An attempt has been made to create a volume file which already exists. If you still want to create a new volume file, remove or move the file that currently exists before creating the volume. 163 File read error. An attempt has been made to read a file that is not readable, or to read past the end of file. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 164 File seek error. An attempt has been made to perform a file seek operation on a file that is not seekable, or with an invalid specified seek address. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 165 File write error. An attempt has been made to write a file that is not writable, or to write when there is no more available disk space. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 40 Error Messages

41 166 Tried to free a nil UNIPCOLL structure pointer. An attempt has been made to free a nil pointer to a UNIPCOLL structure. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 167 Operation not allowed on tables with data. An attempt has been made to perform an operation that cannot be performed on a table that has data in it. Remove the data before performing the operation. 168 Bad hash table options (only unique hash tables supported currently). An attempt has been made to specify hash table creation options that are not valid or that conflict with other options. Currently, only unique hash tables are supported. Specify the hash table as being UNIQUE, or use a duplicates B-tree index instead. Validate that none of the hash table creation options conflict with one another. 169 Illegal argument. An attempt has been made to specify an option that is invalid or conflicts with another specified option. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 170 Invalid menu-line position (must be >= 1). An attempt has been made to specify a menu line item whose menu line position is less than 1. All menu line items must be positioned starting at line 1. Error Messages 41

42 171 Link already exists on child column. An attempt has been made to add a link to a child column that already has a link. A column may only be the child column of one link. Remove the existing link before attempting to add the new link. 172 Invalid list size specified; verify the count parameter. An attempt has been made to call an RHLI function with a list size that is less than or equal to zero. All RHLI functions that accept lists need at least one item in the list. Make sure the parameters to the RHLI function are correct. On some machines, an invalid parameter can be masked as another error due to the method in which parameters are passed to functions. 173 Menu-lines already exist. An attempt has been made to delete a menu which still has menu line items attached to it; all line items must be dropped before the menu may be deleted. Drop the menu line items before attempting the menu delete operation. 174 An attempt has been made to create a btree index with too many component columns. An attempt has been made to specify a B-tree index column list that exceeded the maximum number of columns for a B-tree key. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 42 Error Messages

43 175 Too many scans (and/or ordered accesses) active at once. An attempt has been made to start a scan which would exceeds the maximum number of simultaneous scans permitted per process. Make sure scans are properly closed using the RHLI uendscn function. Unify DataServer: RHLI Reference 176 Database Object Name is required. An attempt has been made to add or modify an object which requires a name, and the specified name was either a nil pointer or pointed to an empty string. Make sure the data structure for the operation was properly initialized. All object names require non-null strings. 177 The not null column attribute is required for unique columns. An attempt has been made to specify a column as being UNIQUE without also specifying that the column is NOT NULL. This error also applies to the creation of a unique column group, when one or more of the component member columns does not have NOT NULL specified. Before attempting to add the uniqueness constraint, make sure all columns having the uniqueness constraint applied to them also have the NOT NULL attribute. 178 Invalid B-tree ID. An attempt has been made to reference a B-tree index ID that does not exist. This B-tree index may have been deleted just before being referenced. Make sure the B-tree ID was obtained using the correct name binding interfaces, such as the RHLI name binding function ubndbt, through the RHLI functions such as uinftbl or uinfbt, or through the ucc compiler. Error Messages 43

44 179 This program only operates on remote databases. A program that has been linked to access remote databases only is being used to open a local database. Check the setting of the DBHOST configuration variable or make sure that the host machine portion of the qualified database name is given. 180 This program only operates on local databases. A program that has been linked to access only local databases is being used to open a remote database. Check the setting of the DBHOST configuration variable or make sure that the host machine portion of the qualified database name is. (local access). 181 Invalid column ID/not part of common table. An attempt has been made to reference a column ID that does not exist. This column may have been deleted just before being referenced. Make sure the Column ID was obtained using the correct name binding functions such as the RHLI name binding function ubndcol, through the RHLI functions such as uinftbl or uinfcol, or through the ucc compiler. 182 Invalid number of columns specified. An attempt has been made to perform an operation requiring one or more columns, but the number of specified columns was less than one. Make sure the data structures have been properly initialized. 44 Error Messages

45 183 Not a column group. An attempt has been made to reference a column group, but the specified Column IDs do not belong to any known column group. This error occurs when trying to retrieve rows based on an index key. Make sure the Column IDs are in the same sequence as those used to create the index. Make sure the specified number of columns matches the number specified when the index was created. 184 No row current. An attempt has been made to access a row, but no row is current. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. 185 The row was NOT deleted. An attempt has been made to insert a row into a direct table, where the specified primary value was mapped to a row that already exists. You can only insert rows into a direct table at locations occupied by deleted or non-existent rows. This error only occurs when the primary key value is specified in the UNIPCOLL data structure. Use an update operation to update a direct table row. 186 File does not exist. An attempt has been made to open a file that does not exist. This is an internal error and should not occur in the normal execution of the database. If this error occurs, please call Customer Support. Error Messages 45

Error num: 1 Meaning: Not owner Error num: 2 Meaning: No such file or directory Error num: 3 Meaning: No such process Error num: 4 Meaning:

Error num: 1 Meaning: Not owner Error num: 2 Meaning: No such file or directory Error num: 3 Meaning: No such process Error num: 4 Meaning: Error num: 1 Meaning: Not owner Error num: 2 Meaning: No such file or directory Error num: 3 Meaning: No such process Error num: 4 Meaning: Interrupted system call Error num: 5 Meaning: I/O error Error

More information

Memory may be insufficient. Memory may be insufficient.

Memory may be insufficient. Memory may be insufficient. Error code Less than 200 Error code Error type Description of the circumstances under which the problem occurred Linux system call error. Explanation of possible causes Countermeasures 1001 CM_NO_MEMORY

More information

Chapter 7: File-System

Chapter 7: File-System Chapter 7: File-System Interface and Implementation Chapter 7: File-System Interface and Implementation File Concept File-System Structure Access Methods File-System Implementation Directory Structure

More information

Chapter 11: File System Implementation. Objectives

Chapter 11: File System Implementation. Objectives Chapter 11: File System Implementation Objectives To describe the details of implementing local file systems and directory structures To describe the implementation of remote file systems To discuss block

More information

Ricardo Rocha. Department of Computer Science Faculty of Sciences University of Porto

Ricardo Rocha. Department of Computer Science Faculty of Sciences University of Porto Ricardo Rocha Department of Computer Science Faculty of Sciences University of Porto Slides based on the book Operating System Concepts, 9th Edition, Abraham Silberschatz, Peter B. Galvin and Greg Gagne,

More information

CS720 - Operating Systems

CS720 - Operating Systems CS720 - Operating Systems File Systems File Concept Access Methods Directory Structure File System Mounting File Sharing - Protection 1 File Concept Contiguous logical address space Types: Data numeric

More information

TPS / 3270 TCP /IP. TPS /TN3270 Client Troubleshooting Quickstart Guide. Application Level. Protocol Level. Device Driver Level

TPS / 3270 TCP /IP. TPS /TN3270 Client Troubleshooting Quickstart Guide. Application Level. Protocol Level. Device Driver Level TPS /TN3270 Client Troubleshooting Quickstart Guide About this Guide Thank you for your interest in TPS /TN3270 Client. To help you configure and/or troubleshoot any problems you might encounter, we have

More information

File System Interface: Overview. Objective. File Concept UNIT-IV FILE SYSTEMS

File System Interface: Overview. Objective. File Concept UNIT-IV FILE SYSTEMS UNIT-IV FILE SYSTEMS File System Interface: File Concept Access Methods Directory Structure File System Mounting Protection Overview For most users, the file system is the most visible aspect of an operating

More information

Chapter 11: Implementing File-Systems

Chapter 11: Implementing File-Systems Chapter 11: Implementing File-Systems Chapter 11 File-System Implementation 11.1 File-System Structure 11.2 File-System Implementation 11.3 Directory Implementation 11.4 Allocation Methods 11.5 Free-Space

More information

File Management. Chapter 12

File Management. Chapter 12 File Management Chapter 12 Files Used for: input to a program Program output saved for long-term storage Terms Used with Files Field basic element of data contains a single value characterized by its length

More information

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1 Introduction to OS File Management MOS Ch. 4 Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Introduction to OS 1 File Management Objectives Provide I/O support for a variety of storage device

More information

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23 FILE SYSTEMS CS124 Operating Systems Winter 2015-2016, Lecture 23 2 Persistent Storage All programs require some form of persistent storage that lasts beyond the lifetime of an individual process Most

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 11: File System Implementation Prof. Alan Mislove (amislove@ccs.neu.edu) File-System Structure File structure Logical storage unit Collection

More information

Arcserve Backup for Windows

Arcserve Backup for Windows Arcserve Backup for Windows Agent for Sybase Guide r17.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

File Management By : Kaushik Vaghani

File Management By : Kaushik Vaghani File Management By : Kaushik Vaghani File Concept Access Methods File Types File Operations Directory Structure File-System Structure File Management Directory Implementation (Linear List, Hash Table)

More information

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File

More information

DATA STRUCTURES USING C

DATA STRUCTURES USING C DATA STRUCTURES USING C File Management Chapter 9 2 File Concept Contiguous logical address space Types: Data numeric character binary Program 3 File Attributes Name the only information kept in human-readable

More information

Table 12.2 Information Elements of a File Directory

Table 12.2 Information Elements of a File Directory Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For

More information

CSC209: Software tools. Unix files and directories permissions utilities/commands Shell programming quoting wild cards files

CSC209: Software tools. Unix files and directories permissions utilities/commands Shell programming quoting wild cards files CSC209 Review CSC209: Software tools Unix files and directories permissions utilities/commands Shell programming quoting wild cards files ... and systems programming C basic syntax functions arrays structs

More information

CSC209: Software tools. Unix files and directories permissions utilities/commands Shell programming quoting wild cards files. Compiler vs.

CSC209: Software tools. Unix files and directories permissions utilities/commands Shell programming quoting wild cards files. Compiler vs. CSC209 Review CSC209: Software tools Unix files and directories permissions utilities/commands Shell programming quoting wild cards files... and systems programming C basic syntax functions arrays structs

More information

Error code. Description of the circumstances under which the problem occurred. Less than 200. Linux system call error.

Error code. Description of the circumstances under which the problem occurred. Less than 200. Linux system call error. Error code Less than 200 Error code Error type Description of the circumstances under which the problem occurred Linux system call error. Explanation of possible causes Countermeasures 1001 CM_NO_MEMORY

More information

File Organization Sheet

File Organization Sheet File Organization Sheet 1. What is a File? A collection of data is placed under permanent or non-volatile storage Examples: anything that you can store in a disk, hard drive, tape, optical media, and any

More information

B. V. Patel Institute of Business Management, Computer &Information Technology, UTU

B. V. Patel Institute of Business Management, Computer &Information Technology, UTU BCA-3 rd Semester 030010304-Fundamentals Of Operating Systems Unit: 1 Introduction Short Answer Questions : 1. State two ways of process communication. 2. State any two uses of operating system according

More information

File System Definition: file. File management: File attributes: Name: Type: Location: Size: Protection: Time, date and user identification:

File System Definition: file. File management: File attributes: Name: Type: Location: Size: Protection: Time, date and user identification: File System Definition: Computer can store the information on different storage media such as magnetic disk, tapes, etc. and for convenience to use the operating system provides the uniform logical view

More information

OPERATING SYSTEM. Chapter 12: File System Implementation

OPERATING SYSTEM. Chapter 12: File System Implementation OPERATING SYSTEM Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management

More information

CS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University

CS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University CS 370: SYSTEM ARCHITECTURE & SOFTWARE [MASS STORAGE] Frequently asked questions from the previous class survey Shrideep Pallickara Computer Science Colorado State University L29.1 L29.2 Topics covered

More information

File Systems. CS170 Fall 2018

File Systems. CS170 Fall 2018 File Systems CS170 Fall 2018 Table of Content File interface review File-System Structure File-System Implementation Directory Implementation Allocation Methods of Disk Space Free-Space Management Contiguous

More information

ICS Principles of Operating Systems

ICS Principles of Operating Systems ICS 143 - Principles of Operating Systems Lectures 17-20 - FileSystem Interface and Implementation Prof. Ardalan Amiri Sani Prof. Nalini Venkatasubramanian ardalan@ics.uci.edu nalini@ics.uci.edu Outline

More information

Da-Wei Chang CSIE.NCKU. Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University

Da-Wei Chang CSIE.NCKU. Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University Chapter 11 Implementing File System Da-Wei Chang CSIE.NCKU Source: Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University Outline File-System Structure

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems Operating System Concepts 99h Edition DM510-14 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation

More information

Outlook. File-System Interface Allocation-Methods Free Space Management

Outlook. File-System Interface Allocation-Methods Free Space Management File System Outlook File-System Interface Allocation-Methods Free Space Management 2 File System Interface File Concept File system is the most visible part of an OS Files storing related data Directory

More information

File Systems: Interface and Implementation

File Systems: Interface and Implementation File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science File System Topics File Concept Access Methods Directory Structure File System Mounting File

More information

File Systems: Interface and Implementation

File Systems: Interface and Implementation File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science Notice: The slides for this lecture have been largely based on those from an earlier edition

More information

BEA Tuxedo. System Messages CMDFML Catalog

BEA Tuxedo. System Messages CMDFML Catalog BEA Tuxedo System Messages CMDFML Catalog BEA Tuxedo Release 7.1 Document Edition 7.1 May 2000 Copyright Copyright 2000 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and

More information

Chapters 9 & 10: Memory Management and Virtual Memory

Chapters 9 & 10: Memory Management and Virtual Memory Chapters 9 & 10: Memory Management and Virtual Memory Important concepts (for final, projects, papers) addressing: physical/absolute, logical/relative/virtual overlays swapping and paging memory protection

More information

Motivation. Operating Systems. File Systems. Outline. Files: The User s Point of View. File System Concepts. Solution? Files!

Motivation. Operating Systems. File Systems. Outline. Files: The User s Point of View. File System Concepts. Solution? Files! Motivation Operating Systems Process store, retrieve information Process capacity restricted to vmem size When process terminates, memory lost Multiple processes share information Systems (Ch 0.-0.4, Ch.-.5)

More information

CA Harvest Software Change Manager

CA Harvest Software Change Manager CA Harvest Software Change Manager Messages Guide Release 12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Chapter 12 File-System Implementation

Chapter 12 File-System Implementation Chapter 12 File-System Implementation 1 Outline File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery Log-Structured

More information

File Structures and Indexing

File Structures and Indexing File Structures and Indexing CPS352: Database Systems Simon Miner Gordon College Last Revised: 10/11/12 Agenda Check-in Database File Structures Indexing Database Design Tips Check-in Database File Structures

More information

Chapter 10: File-System Interface

Chapter 10: File-System Interface Chapter 10: File-System Interface Objectives: To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file

More information

CSC209 Review. Yeah! We made it!

CSC209 Review. Yeah! We made it! CSC209 Review Yeah! We made it! 1 CSC209: Software tools Unix files and directories permissions utilities/commands Shell programming quoting wild cards files 2 ... and C programming... C basic syntax functions

More information

File Systems: Interface and Implementation

File Systems: Interface and Implementation File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science Notice: The slides for this lecture have been largely based on those from an earlier edition

More information

Chapter 11: Implementing File

Chapter 11: Implementing File Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

Chapter 10: File-System Interface

Chapter 10: File-System Interface Chapter 10: File-System Interface Objectives: To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file

More information

Chapter 11: Implementing File Systems. Operating System Concepts 9 9h Edition

Chapter 11: Implementing File Systems. Operating System Concepts 9 9h Edition Chapter 11: Implementing File Systems Operating System Concepts 9 9h Edition Silberschatz, Galvin and Gagne 2013 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory

More information

Chapter 2. DB2 concepts

Chapter 2. DB2 concepts 4960ch02qxd 10/6/2000 7:20 AM Page 37 DB2 concepts Chapter 2 Structured query language 38 DB2 data structures 40 Enforcing business rules 49 DB2 system structures 52 Application processes and transactions

More information

Error Message Reference

Error Message Reference IBM Security Access Manager for Mobile Version 8.0.0.1 Error Message Reference GC27-6210-01 IBM Security Access Manager for Mobile Version 8.0.0.1 Error Message Reference GC27-6210-01 Note Before using

More information

File System: Interface and Implmentation

File System: Interface and Implmentation File System: Interface and Implmentation Two Parts Filesystem Interface Interface the user sees Organization of the files as seen by the user Operations defined on files Properties that can be read/modified

More information

Chapter 11: File-System Interface

Chapter 11: File-System Interface Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013 Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection

More information

Principles of Operating Systems

Principles of Operating Systems Principles of Operating Systems Lecture 24-26 - File-System Interface and Implementation Ardalan Amiri Sani (ardalan@uci.edu) [lecture slides contains some content adapted from previous slides by Prof.

More information

SMD149 - Operating Systems - File systems

SMD149 - Operating Systems - File systems SMD149 - Operating Systems - File systems Roland Parviainen November 21, 2005 1 / 59 Outline Overview Files, directories Data integrity Transaction based file systems 2 / 59 Files Overview Named collection

More information

CISQ Weakness Descriptions

CISQ Weakness Descriptions CISQ Weakness Descriptions This document presents descriptions of the 86 weaknesses contained in the 4 CISQ Quality Characteristic measures. These descriptions have been simplified from their description

More information

UIL Diagnostic Messages

UIL Diagnostic Messages UIL Diagnostic Messages This appendix lists the diagnostic messages produced by the UIL compiler. The severity, a description of the message, and a suggestion for correcting the problem are listed for

More information

Outline. V Computer Systems Organization II (Honors) (Introductory Operating Systems) Advantages of Multi-level Page Tables

Outline. V Computer Systems Organization II (Honors) (Introductory Operating Systems) Advantages of Multi-level Page Tables Outline V22.0202-001 Computer Systems Organization II (Honors) (Introductory Operating Systems) Lecture 15 Memory Management (cont d) Virtual Memory March 30, 2005 Announcements Lab 4 due next Monday (April

More information

Introduction. Secondary Storage. File concept. File attributes

Introduction. Secondary Storage. File concept. File attributes Introduction Secondary storage is the non-volatile repository for (both user and system) data and programs As (integral or separate) part of an operating system, the file system manages this information

More information

Chapter 9: File System Interface

Chapter 9: File System Interface Chapter 9: File System Interface File System Interface File Concept Computers store information on different [physical] media Flash Drives, Magnetic disk, Optical Disks, Magnetic Tapes OS provides a uniform

More information

NTFS Recoverability. CS 537 Lecture 17 NTFS internals. NTFS On-Disk Structure

NTFS Recoverability. CS 537 Lecture 17 NTFS internals. NTFS On-Disk Structure NTFS Recoverability CS 537 Lecture 17 NTFS internals Michael Swift PC disk I/O in the old days: Speed was most important NTFS changes this view Reliability counts most: I/O operations that alter NTFS structure

More information

Chapter 11: File System Implementation

Chapter 11: File System Implementation Chapter 11: File System Implementation Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

C13: Files and Directories: System s Perspective

C13: Files and Directories: System s Perspective CISC 7310X C13: Files and Directories: System s Perspective Hui Chen Department of Computer & Information Science CUNY Brooklyn College 4/19/2018 CUNY Brooklyn College 1 File Systems: Requirements Long

More information

CSC 553 Operating Systems

CSC 553 Operating Systems CSC 553 Operating Systems Lecture 12 - File Management Files Data collections created by users The File System is one of the most important parts of the OS to a user Desirable properties of files: Long-term

More information

Chapter 11: File System Implementation

Chapter 11: File System Implementation Chapter 11: File System Implementation Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

Ricardo Rocha. Department of Computer Science Faculty of Sciences University of Porto

Ricardo Rocha. Department of Computer Science Faculty of Sciences University of Porto Ricardo Rocha Department of Computer Science Faculty of Sciences University of Porto Slides based on the book Operating System Concepts, 9th Edition, Abraham Silberschatz, Peter B. Galvin and Greg Gagne,

More information

520 Cant empty Clipboard 521 Cant open Clipboard Expression not valid:.

520 Cant empty Clipboard 521 Cant open Clipboard Expression not valid:. The Following is a Programmers list of VB errors. Although this will not necessarily resolve your issues, it will give support an understanding as to where the potential problem is in the code. Use a Google

More information

Linux Filesystems Ext2, Ext3. Nafisa Kazi

Linux Filesystems Ext2, Ext3. Nafisa Kazi Linux Filesystems Ext2, Ext3 Nafisa Kazi 1 What is a Filesystem A filesystem: Stores files and data in the files Organizes data for easy access Stores the information about files such as size, file permissions,

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Chapter 11: Implementing File-Systems, Silberschatz, Galvin and Gagne 2009 Chapter 11: Implementing File Systems File-System Structure File-System Implementation ti Directory Implementation Allocation

More information

Virtual Memory cont d.; File System Interface. 03/30/2007 CSCI 315 Operating Systems Design 1

Virtual Memory cont d.; File System Interface. 03/30/2007 CSCI 315 Operating Systems Design 1 Virtual Memory cont d.; File System Interface 03/30/2007 CSCI 315 Operating Systems Design 1 1 Thrashing If a process does not have enough pages, the page-fault rate is very high. This leads to: Low CPU

More information

BEA Tuxedo. System Messages LIBWSC Catalog

BEA Tuxedo. System Messages LIBWSC Catalog BEA Tuxedo System Messages LIBWSC Catalog BEA Tuxedo Release 7.1 Document Edition 7.1 May 2000 Copyright Copyright 2000 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and

More information

Chapter 12: File System Implementation

Chapter 12: File System Implementation Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

The UNIX Time- Sharing System

The UNIX Time- Sharing System The UNIX Time- Sharing System Dennis M. Ritchie and Ken Thompson Bell Laboratories Communications of the ACM July 1974, Volume 17, Number 7 UNIX overview Unix is a general-purpose, multi-user, interactive

More information

Files. File Structure. File Systems. Structure Terms. File Management System. Chapter 12 File Management 12/6/2018

Files. File Structure. File Systems. Structure Terms. File Management System. Chapter 12 File Management 12/6/2018 Operating Systems: Internals and Design Principles Chapter 2 Management Ninth Edition By William Stallings s collections created by users The System is one of the most important parts of the OS to a user

More information

UNIX File System. UNIX File System. The UNIX file system has a hierarchical tree structure with the top in root.

UNIX File System. UNIX File System. The UNIX file system has a hierarchical tree structure with the top in root. UNIX File System UNIX File System The UNIX file system has a hierarchical tree structure with the top in root. Files are located with the aid of directories. Directories can contain both file and directory

More information

Appendix. Web Command Error Codes. Web Command Error Codes

Appendix. Web Command Error Codes. Web Command Error Codes Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting

More information

IBM Content Manager for iseries. Messages and Codes. Version 5.1 SC

IBM Content Manager for iseries. Messages and Codes. Version 5.1 SC IBM Content Manager for iseries Messages and Codes Version 5.1 SC27-1137-00 IBM Content Manager for iseries Messages and Codes Version 5.1 SC27-1137-00 Note Before using this information and the product

More information

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum)

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Stora Introduction Secondary storage is the non volatile repository for (both user and system) data and programs. As

More information

CSE506: Operating Systems CSE 506: Operating Systems

CSE506: Operating Systems CSE 506: Operating Systems CSE 506: Operating Systems File Systems Traditional File Systems FS, UFS/FFS, Ext2, Several simple on disk structures Superblock magic value to identify filesystem type Places to find metadata on disk

More information

Memory Management. To improve CPU utilization in a multiprogramming environment we need multiple programs in main memory at the same time.

Memory Management. To improve CPU utilization in a multiprogramming environment we need multiple programs in main memory at the same time. Memory Management To improve CPU utilization in a multiprogramming environment we need multiple programs in main memory at the same time. Basic CPUs and Physical Memory CPU cache Physical memory

More information

(In columns, of course.)

(In columns, of course.) CPS 310 first midterm exam, 10/9/2013 Your name please: Part 1. Fun with forks (a) What is the output generated by this program? In fact the output is not uniquely defined, i.e., it is not always the same.

More information

Logical disks. Bach 2.2.1

Logical disks. Bach 2.2.1 Logical disks Bach 2.2.1 Physical disk is divided into partitions or logical disks Logical disk linear sequence of fixed size, randomly accessible, blocks disk device driver maps underlying physical storage

More information

Heckaton. SQL Server's Memory Optimized OLTP Engine

Heckaton. SQL Server's Memory Optimized OLTP Engine Heckaton SQL Server's Memory Optimized OLTP Engine Agenda Introduction to Hekaton Design Consideration High Level Architecture Storage and Indexing Query Processing Transaction Management Transaction Durability

More information

Examples of Code Roaches. First Draft List Cem Kaner September 11, 2005

Examples of Code Roaches. First Draft List Cem Kaner September 11, 2005 Examples of Code Roaches First Draft List Cem Kaner September 11, 2005 Why a Potential-Bug List? Given a potential error, you can develop a method to test for it Foundation for Code inspections Glass box

More information

Address spaces and memory management

Address spaces and memory management Address spaces and memory management Review of processes Process = one or more threads in an address space Thread = stream of executing instructions Address space = memory space used by threads Address

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

PAGE REPLACEMENT. Operating Systems 2015 Spring by Euiseong Seo

PAGE REPLACEMENT. Operating Systems 2015 Spring by Euiseong Seo PAGE REPLACEMENT Operating Systems 2015 Spring by Euiseong Seo Today s Topics What if the physical memory becomes full? Page replacement algorithms How to manage memory among competing processes? Advanced

More information

Fisher ROC Plus Serial Driver Help Kepware Technologies

Fisher ROC Plus Serial Driver Help Kepware Technologies Fisher ROC Plus Serial Driver Help 2014 Kepware Technologies 2 Table of Contents Table of Contents 2 5 Overview 5 Channel Setup 6 Device Setup 7 Tag Import Settings 7 Address Specification 8 Operator Identification

More information

Kea Messages Manual. Kea Messages Manual

Kea Messages Manual. Kea Messages Manual Kea Messages Manual i Kea Messages Manual Kea Messages Manual ii Copyright 2011-2015 Internet Systems Consortium, Inc. Kea Messages Manual iii Contents 1 Introduction 1 2 Kea Log Messages 2 2.1 ALLOC Module....................................................

More information

Glossary. abort. application schema

Glossary. abort. application schema Glossary abort An abnormal termination of a transaction. When a transaction aborts, its changes to the database are erased, and the database is effectively restored to its state as of the moment the transaction

More information

CPSC 341 OS & Networks. Processes. Dr. Yingwu Zhu

CPSC 341 OS & Networks. Processes. Dr. Yingwu Zhu CPSC 341 OS & Networks Processes Dr. Yingwu Zhu Process Concept Process a program in execution What is not a process? -- program on a disk A process is an active object, but a program is just a file It

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Silberschatz 1 Chapter 11: Implementing File Systems Thursday, November 08, 2007 9:55 PM File system = a system stores files on secondary storage. A disk may have more than one file system. Disk are divided

More information

Lecture 19: File System Implementation. Mythili Vutukuru IIT Bombay

Lecture 19: File System Implementation. Mythili Vutukuru IIT Bombay Lecture 19: File System Implementation Mythili Vutukuru IIT Bombay File System An organization of files and directories on disk OS has one or more file systems Two main aspects of file systems Data structures

More information

stack Two-dimensional logical addresses Fixed Allocation Binary Page Table

stack Two-dimensional logical addresses Fixed Allocation Binary Page Table Question # 1 of 10 ( Start time: 07:24:13 AM ) Total Marks: 1 LRU page replacement algorithm can be implemented by counter stack linked list all of the given options Question # 2 of 10 ( Start time: 07:25:28

More information

File System Implementation

File System Implementation File System Implementation Last modified: 16.05.2017 1 File-System Structure Virtual File System and FUSE Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance. Buffering

More information

File Organization Sheet

File Organization Sheet File Organization Sheet 1. What are File Structures? A File Structure is a combination of representations for data in files and of operations for accessing the data. A File Structure allows applications

More information

A. Run-Time Error Messages

A. Run-Time Error Messages Appendix A A. Table A-1 lists possible Fortran run-time I/O errors. Other errors given by the operating system may also occur (refer to the intro(2) and perror(3f) reference pages for details). Each error

More information

V. File System. SGG9: chapter 11. Files, directories, sharing FS layers, partitions, allocations, free space. TDIU11: Operating Systems

V. File System. SGG9: chapter 11. Files, directories, sharing FS layers, partitions, allocations, free space. TDIU11: Operating Systems V. File System SGG9: chapter 11 Files, directories, sharing FS layers, partitions, allocations, free space TDIU11: Operating Systems Ahmed Rezine, Linköping University Copyright Notice: The lecture notes

More information

17 CIF Converter Tools

17 CIF Converter Tools Chapter 17 CIF Converter Tools This chapter is a reference manual for the CIF2SDT and SDT2CIF converter tools. The CIF2SDT tool converts CIF (the Common Interchange Format as defined in the Z.106 recommendation)

More information

Chapter 8: Virtual Memory. Operating System Concepts

Chapter 8: Virtual Memory. Operating System Concepts Chapter 8: Virtual Memory Silberschatz, Galvin and Gagne 2009 Chapter 8: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating

More information

Chapter 10: File System Implementation

Chapter 10: File System Implementation Chapter 10: File System Implementation Chapter 10: File System Implementation File-System Structure" File-System Implementation " Directory Implementation" Allocation Methods" Free-Space Management " Efficiency

More information

This document is intended for users of UniBasic. Copyright 1998 Dynamic Concepts, Inc. (DCI). All rights reserved.

This document is intended for users of UniBasic. Copyright 1998 Dynamic Concepts, Inc. (DCI). All rights reserved. Dynamic Concepts Incorporated (DCI) has prepared this document for use by DCI personnel, licensees, and authorized representatives. The material contained herein shall not be reproduced in whole or in

More information

IBM Tivoli Storage Manager HSM for Windows Version 7.1. Messages

IBM Tivoli Storage Manager HSM for Windows Version 7.1. Messages IBM Tivoli Storage Manager HSM for Windows Version 7.1 Messages IBM Tivoli Storage Manager HSM for Windows Version 7.1 Messages Note: Before using this information and the product it supports, read the

More information

Chapter 10: File System. Operating System Concepts 9 th Edition

Chapter 10: File System. Operating System Concepts 9 th Edition Chapter 10: File System Silberschatz, Galvin and Gagne 2013 Chapter 10: File System File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection 10.2 Silberschatz,

More information