Filters








12 Hits in 5.9 sec

Experiences with the Amoeba distributed operating system

Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren, Gregory J. Sharp, Sape J. Mullender
1990 Communications of the ACM  
Among the things done right were basing the system on objects, using a single uniform mechanism (capabilities) for naming and protecting them in a location independent way, and designing a completely new  ...  One comparison with Mach is instructive on this point. Mach uses a clever optimization to pass messages between processes running on the same machine.  ...  Two user processes running on Sun OS 4.0.3 but using the Amoeba primitives. 3. Two user processes running on Sun OS 4.0.3 and using Sun RPC. The latter two were for comparison purposes only.  ... 
doi:10.1145/96267.96281 fatcat:yw7zxl4z5zbebnmrtedyr6m3kq

Experiences with the Amoeba Distributed Operating System [chapter]

Andrew S. Tanenbaum, Robbert Van Renesse, Hans Van Staveren, Gregory J. Sharp, Sape J. Mullender, Jack Jansen, Guido Van Rossum
2001 Classic Operating Systems  
Among the things done right were basing the system on objects, using a single uniform mechanism (capabilities) for naming and protecting them in a location independent way, and designing a completely new  ...  One comparison with Mach is instructive on this point. Mach uses a clever optimization to pass messages between processes running on the same machine.  ...  Two user processes running on Sun OS 4.0.3 but using the Amoeba primitives. 3. Two user processes running on Sun OS 4.0.3 and using Sun RPC. The latter two were for comparison purposes only.  ... 
doi:10.1007/978-1-4757-3510-9_25 fatcat:wr5ig5ncn5bnxnmys4sp7eng7q

Cooperation and security isolation of library OSes for multi-process applications

Chia-Che Tsai, Donald E. Porter, Kumar Saurabh Arora, Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira
2014 Proceedings of the Ninth European Conference on Computer Systems - EuroSys '14  
Previous library OS (libOS) research has focused on single-process applications, yet many Unix applications, such as network servers and shell scripts, span multiple processes.  ...  When compared to running a single application on an OS kernel in a VM, recent library OSes reduce the memory footprint by an order-of-magnitude.  ...  Acknowledgements We thank the anonymous reviewers, Vyas Sekar, and our shepherd, Bryan Ford, for insightful comments on ear-lier drafts of this paper.  ... 
doi:10.1145/2592798.2592812 dblp:conf/eurosys/TsaiABJJJKKOP14 fatcat:ssqeqhdko5aublwadjch4em2om

A Lock-Free Multiprocessor OS Kernel

Henry Massalin, Calton Pu
1992 ACM SIGOPS Operating Systems Review  
We h a v e implemented a complete multiprocessor OS kernel including threads, virtual memory, and I O including a window system and a le system using only lock-free synchronization methods based on Compare-and-Swap  ...  Typical shared-memory multiprocessor OS kernels use interlocking, implemented as spinlocks or waiting semaphores.  ...  For example, Mach uses a single lock for the global run-queue.  ... 
doi:10.1145/142111.993246 fatcat:bgw3bmlfgna77jizdemn2rrgre

A Lock-Free Multiprocessor OS Kernel

Henry Massalin, Calton Pu
1992 ACM SIGOPS Operating Systems Review  
We h a v e implemented a complete multiprocessor OS kernel including threads, virtual memory, and I O including a window system and a le system using only lock-free synchronization methods based on Compare-and-Swap  ...  Typical shared-memory multiprocessor OS kernels use interlocking, implemented as spinlocks or waiting semaphores.  ...  For example, Mach uses a single lock for the global run-queue.  ... 
doi:10.1145/142111.964561 fatcat:mh72dc5ehjdhfnh3ldeuumh5iq

Optimized Memory-Based Messaging: Leveraging the Memory System for High-Performance Communication

David R. Cheriton, Robert A. Kutter
1996 Computing Systems  
The optimizations include address-valued signals, message-oriented memory consistency and automatic signaling on write.  ...  Mach uses the copy model of IPC and optimizes it using memory mapping techniques, whereas the memory-based messaging approach takes the memory mapping model and extends it for efficient communication.  ...  We note that all device intemrpts in our system are handled as address-valued signals, unifying and simplifying the hardware and OS software Address-valued signals can easily subsume Unix signals by designating  ... 
dblp:journals/csys/CheritonK96 fatcat:wxums3ryobfhbmmhdkfsss3x4i

The Flux OS Toolkit: reusable components for OS implementation

B. Ford, K. Van Maren, J. Lepreau, S. Clawson, B. Robinson, J. Turner
Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)  
These components can be used as basic building blocks both for operating systems and for booting language run-time systems directly on the hardware.  ...  The OS toolkit is already heavily used in several different OS and programming language projects, and has already catalyzed research and development that would otherwise never have been attempted.  ...  Acknowledgements We thank Shantanu Goel for his important work, both at Columbia and at Utah, on the Linux device driver framework in Mach.  ... 
doi:10.1109/hotos.1997.595175 dblp:conf/hotos/FordMLCRT97 fatcat:46gqusqvwfbgnlxdtkmkqw4g4e

The Fox project : advanced development of systems software

Eric Charles. Cooper, Robert Harper, Lee
2018
We will base our work on Standard ML, a modern functional programming language that provides polymorphism, first-class functions, exception handling, garbage collection, a parameterized module system,  ...  For example, Mach uses RPC for all of its operating system services, and Camelot and Avalon use RPC in transaction-based reliable distributed systems.  ...  the object, it must invoke the server.  ... 
doi:10.1184/r1/6610583 fatcat:egwupum7qbgqdej526tiau2hkq

Security for a High Performance Commodity Storage Subsystem (CMU-CS-99-160)

Howard Gobioff
2018
Next, I explore how a variety of different mechanisms for describing a set of NASD objects can be used to improve the basic capability system.  ...  As storage devices move from behind the protection of a server and become first-class network entities in their own right, they must become actively involved in protecting themselves from network attacks  ...  Some distributed systems such as Mach used capabilities to share resources and the capabilities were managed by mutually trusted operating system kernels [Sansom96].  ... 
doi:10.1184/r1/6619781.v1 fatcat:7rm72qdqjfbutiqaivqm43uwie

Execution Environments for Running Legacy Applications in Multi-Party Trust Settings [article]

Stephen Mark Herwig
2021
The result of this broken assumption is that applications either must be re-written to accommodate each new security posture, or used as-is, accepting that one party exposes private data to another.  ...  I support this thesis through the design, implementation, and evaluation of two distinct application-level virtualization layers that handle trust concerns on behalf of the application: conclaves and SecureMigration  ...  Our design is effectively that of a multi-server microkernel system, similar to GNU Hurd [69] or Mach-US [70] , in which shared resource abstractions are implemented as a set of enclaved daemons shared  ... 
doi:10.13016/ygsx-zja9 fatcat:sf6siqghsfhi3mmcnzkskvwzri

HARDWARE-ASSISTED VIRTUALIZATION AND ITS APPLICATIONS TO SYSTEMS SECURITY [article]

ARISTIDE FATTORI
2014
Despite the fact that Mach uses a microkernel architecture, XNU is a macrokernel and it is possible to extend its original functionalities by dynamically loading new components into the kernel.  ...  Logs are saved locally and processed out of band before being sent to the server, when network connectivity is available. Users can turn data collection on and off, based on their needs.  ... 
doi:10.13130/fattori-aristide_phd2014-03-18 fatcat:lbu7jtf4vnezjkdarsujjefzae

Modeling and Managing Program References in a Memory Hierarchy

Vidyadhar Phalke
1995
We discover the predictable nature of missed cache lines under a variety of workloads, and propose a hardware scheme for prefetching based on the history of misses.  ...  Object: In a CAD / database environment. The object could be a database record, a relation or a file depending on the granularity.  ...  page reference trace EQN10, one object trace OO1, and one disk trace RBER1 are used for validating our algorithm.  ... 
doi:10.7282/t3v40zs4 fatcat:d6e3ijcfv5blpbxqthg7qeegd4