Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Supporting ada memory management in the iAPX-432

Published: 01 March 1982 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper, we describe how the memory management mechanisms of the Intel iAPX-432 are used to implement the visibility rules of Ada. At any point in the execution of an Ada® program on the 432, the program has a protected address space that corresponds exactly to the program's accessibility at the corresponding point in the program's source. This close match of architecture and language did not occur because the 432 was designed to execute Ada—it was not. Rather, both Ada and the 432 are the result of very similar design goals.
    To illustrate this point, we compare, in their support for Ada, the memory management mechanisms of the 432 to those of traditional computers. The most notable differences occur in heap-space management and multitasking. With respect to the former, we describe a degree of hardware/software cooperation that is not typical of other systems. In the latter area, we show how Ada's view of sharing is the same as the 432, but differs totally from the sharing permitted by traditional systems. A description of these differences provide some insight into the problems of implementing an Ada compiler for a traditional architecture.

    References

    [1]
    G. W. Cox, W. M. Corwin, K. Lai, and F. J. Pollack, "A Unified Model and Implementation for Interprocess Communication in a Multiprocessor Environment," Proceedings of the 8th Symposium on Operating System Principles, (December, 1981).
    [2]
    K. C. Kahn, W. M. Corwin, T. D. Dennis, H. D'Hooge, D. E. Hubka, L. A. Hutehins, J. T. Montague, F. J. Pollack, and M. R. Gifkins, "iMAX: A Multiprocessor Operating System for an Object-Based Computer," Proceedings of the 8th Symposium on Operating System Principles, ().
    [3]
    F. J. Pollack, K. C. Kahn, and R. M. Wilkinson, "The iMAX-432 Object Filing System," Proceedings of the 8th Symposium on Operating System Principles, (December, 1981).
    [4]
    S. Zeigler, N. Allegre, R. Johnson, J. Morris, and G. Burns, "Ada for the Intel 432 Microcomputer," Computer14(6) pp. 47-56 (June, 1981).
    [5]
    R. S. Fabry, "Capability Based Addressing," Communications ACM17(7) pp. 403-412 (July, 1974).
    [6]
    Reference Manual for the Ada Programming Language, U.S. Department of Defense Proposed Standard July, 1980.
    [7]
    D. Cook, "In Support of Domain Structure for Operating Systems," Proceedings of the 7th Symposium on Operating System Principles, pp. 128-130 (December, 1979).
    [8]
    P. J. Denning, "Fault-Tolerant Operating Systems," Computing Surveys8(4) pp. 359-389 (December, 1976).
    [9]
    T. A. Linden, "Operating System Structures to Support Security and Reliable Software," Computing Surveys8(4) pp. 409-445 (December, 1976).
    [10]
    K. Nygaard and O-J. Dahl, "The Development of the Simula Languages," ACM SIGPLAN History of Programming Languages, pp. 245-272 (June, 1978).
    [11]
    B. Liskov, A. Snyder, R. Atkinson, and C. Schaffert, "Abstraction Mechanisms in CLU," Communications of the ACM20(8) pp. 564-576 (August, 1977).
    [12]
    D. M. England, "Architectural Features of System 250," pp. 395-428 in Infotech State of the Art Report 14: Operating Systems, Infotech International Ltd., Maiden-head, Berkshire, England (1972).
    [13]
    B. Lampson and H. Sturgis, "Reflections on an Operating System Design," Communications of the ACM19(5) pp. 251-265 (May, 1976).
    [14]
    M. V. Wilkes and R. M. Needham, The Cambridge CAP Computer and its Operating System, Elsevier North Holland (1979).
    [15]
    W. Wulf, R. Levin, and S. Harbison, Hydra: C.mmp: An Experimental Computer System, McGraw-Hill Book Company (1981).
    [16]
    A. K. Jones, R. J. Chansler, I. D. Durham, K. Schwans, and S. R. Vegdahl, "StarOS, a Multiprocessor Operating System for the Support of Task Forces," Proceedings of the 7th Symposium on Operating System Principles, pp. 117-127 (December, 1979).
    [17]
    Intel 432 GDP Architecture Reference Manual, Intel Corporation 1981.
    [18]
    R. D. Arnold, Report of the Working Session on Ada Issues Nebula Review Committee Meeting. March 12, 1981.
    [19]
    E. W. Dijkstra, L. Lamport, A. J. Martin, C. S. Scholten, and E. M. F. Steffens, "On-the-Fly Garbage Collection: An Exercise in Cooperation," Communications ACM21(11) pp. 966-975 (November, 1978).

    Cited By

    View all
    • (2019)CHERI Concentrate: Practical Compressed CapabilitiesIEEE Transactions on Computers10.1109/TC.2019.291403768:10(1455-1469)Online publication date: 1-Oct-2019
    • (2014)The CHERI capability modelProceeding of the 41st annual international symposium on Computer architecuture10.5555/2665671.2665740(457-468)Online publication date: 14-Jun-2014
    • (2014)The CHERI capability modelACM SIGARCH Computer Architecture News10.1145/2678373.266574042:3(457-468)Online publication date: 14-Jun-2014
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGARCH Computer Architecture News
    ACM SIGARCH Computer Architecture News  Volume 10, Issue 2
    March 1982
    209 pages
    ISSN:0163-5964
    DOI:10.1145/964750
    Issue’s Table of Contents
    • cover image ACM Conferences
      ASPLOS I: Proceedings of the first international symposium on Architectural support for programming languages and operating systems
      March 1982
      209 pages
      ISBN:0897910664
      DOI:10.1145/800050
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 March 1982
    Published in SIGARCH Volume 10, Issue 2

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)90
    • Downloads (Last 6 weeks)13

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)CHERI Concentrate: Practical Compressed CapabilitiesIEEE Transactions on Computers10.1109/TC.2019.291403768:10(1455-1469)Online publication date: 1-Oct-2019
    • (2014)The CHERI capability modelProceeding of the 41st annual international symposium on Computer architecuture10.5555/2665671.2665740(457-468)Online publication date: 14-Jun-2014
    • (2014)The CHERI capability modelACM SIGARCH Computer Architecture News10.1145/2678373.266574042:3(457-468)Online publication date: 14-Jun-2014
    • (2014)The CHERI capability model: Revisiting RISC in an age of risk2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA)10.1109/ISCA.2014.6853201(457-468)Online publication date: Jun-2014
    • (1986)Supermicros—objectives and approachesMicroprocessing and Microprogramming10.1016/0165-6074(86)90136-517:1(1-17)Online publication date: 1-Jan-1986
    • (2017)Typed ArchitecturesACM SIGARCH Computer Architecture News10.1145/3093337.303772645:1(77-90)Online publication date: 4-Apr-2017
    • (2017)Typed ArchitecturesACM SIGPLAN Notices10.1145/3093336.303772652:4(77-90)Online publication date: 4-Apr-2017
    • (2017)Typed ArchitecturesACM SIGOPS Operating Systems Review10.1145/3093315.303772651:2(77-90)Online publication date: 4-Apr-2017
    • (2017)Typed ArchitecturesProceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3037697.3037726(77-90)Online publication date: 4-Apr-2017
    • (2006)New algorithms and applications of cyclic reference countingProceedings of the Third international conference on Graph Transformations10.1007/11841883_3(15-29)Online publication date: 17-Sep-2006
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media