scispace - formally typeset
Proceedings ArticleDOI

Supporting ada memory management in the iAPX-432

TLDR
This paper describes how the memory management mechanisms of the Intel iAPX-432 are used to implement the visibility rules of Ada, and shows how Ada's view of sharing is the same as the 432, but differs totally from the sharing permitted by traditional systems.
Abstract
In this paper, we describe how the memory management mechanisms of the Intel iAPX-432 are used to implement the visibility rules of Ada. At any point in the execution of an Ada® program on the 432, the program has a protected address space that corresponds exactly to the program's accessibility at the corresponding point in the program's source. This close match of architecture and language did not occur because the 432 was designed to execute Ada—it was not. Rather, both Ada and the 432 are the result of very similar design goals.To illustrate this point, we compare, in their support for Ada, the memory management mechanisms of the 432 to those of traditional computers. The most notable differences occur in heap-space management and multitasking. With respect to the former, we describe a degree of hardware/software cooperation that is not typical of other systems. In the latter area, we show how Ada's view of sharing is the same as the 432, but differs totally from the sharing permitted by traditional systems. A description of these differences provide some insight into the problems of implementing an Ada compiler for a traditional architecture.

read more

Citations
More filters
Proceedings ArticleDOI

Minos: Control Data Attack Prevention Orthogonal to Memory Model

TL;DR: A microarchitectural implementation of Minos is presented that achieves negligible impact on cycle time with a small investment in die area, and minor changes to the Linux kernel to handle the tag bits and perform virtual memory swapping.
Journal ArticleDOI

The CHERI capability model: revisiting RISC in an age of risk

TL;DR: CHERI, a hybrid capability model that extends the 64-bit MIPS ISA with byte-granularity memory protection, is presented, demonstrating that it enables language memory model enforcement and fault isolation in hardware rather than software, and that the CHERI mechanisms are easily adopted by existing programs for efficient in-program memory safety.
Journal ArticleDOI

Algorithms for on-the-fly garbage collection

TL;DR: Un nouvel algorithme utilise seulement deux couleurs et a une simple preuve de justesse pour la collecte d'informations parasites.
Proceedings ArticleDOI

Hardware/software tradeoffs for increased performance

TL;DR: It is argued that the most effective design methodology must make simultaneous tradeoffs across all three areas: hardware, software support, and systems support.

A Bibliography of Books and Other Publications about the Ada Programming Language and Its History

TL;DR: This document catalogs the major players in the music industry, as well as some minor players, which were introduced in the second half of the 1990s and are still in use today.
References
More filters
Book

Reference Manual for the ADA Programming Language

Henry Ledgard
TL;DR: This grammar of the Ada follows the Ada 95 Reference Manual, consisting of the international standard (ISO/IEC 8652:2012): Information Technology -Programming Languages -Ada.
Journal ArticleDOI

Abstraction mechanisms in CLU

TL;DR: This paper provides an introduction to the abstraction mechanisms in CLU by means of programming examples, and it is shown how CLU programs may be written to use and implement abstractions.
Journal ArticleDOI

On-the-fly garbage collection: an exercise in cooperation

TL;DR: As an example of cooperation between sequential processes with very little mutual interference despite frequent manipulations of a large shared data space, a technique is developed which allows nearly all of the activity needed for garbage detection and collection to be performed by an additional processor operating concurrently with the processor devoted to the computation proper.
Journal ArticleDOI

Abstraction mechanisms in CLU

TL;DR: This paper provides an introduction to the abstraction mechanisms in CLU and illustrates the utility of the three kinds of abstractions in program construction and shows how CLU programs may be written to use and implement abstractions.

On-the-fly garbage collection: an exercise in cooperation

TL;DR: In this paper, a technique is developed which allows nearly all of the activity needed for garbage detection and collection to be performed by an additional processor operating concurrently with the processor devoted to the computation proper.