The Long Road to 64 Bits

Total Page:16

File Type:pdf, Size:1020Kb

The Long Road to 64 Bits DOI:10.1145/1435417.1435431 Double, double toil and trouble —Shakespeare, Macbeth, Act 4, Scene 1 BY JOHN MASHEY The Long Road To 64 Bits SHAKESpeare’S WORDS OFTEN cover circumstances beyond his wildest dreams. Toil and trouble accompany major computing transitions, even when people plan ahead. Much of tomorrow’s software will still be driven by decades-old decisions. Past decisions have unanticipated side effects that last decades and can be difficult to undo. ranging from high-level strategies down For example, consider the overly to programming specifics. long, often awkward, and sometimes contentious process by which 32-bit Fundamental Problem (late 1980s) microprocessor systems evolved into Running out of address space is a long 64/32-bitters needed to address larger tradition in computing, and often quite storage and run mixtures of 32- and 64- predictable. Moore’s Law grew DRAM bit user programs. Most major general- approximately four times bigger every purpose CPUs now have such versions, three to four years, and by the mid- so bits have “doubled,” but “toil and 1990s, people were able to afford 2GB trouble” are not over, especially in soft- to 4GB of memory for midrange micro- ware. processor systems, at which point sim- This example illustrates the interac- ple 32-bit addressing (4GB) would get tions of hardware, languages (especial- awkward. Ideally, 64/32-bit CPUs would ly C), operating system, applications, have started shipping early enough standards, installed-base inertia, and (1992) to have made up the majority of industry politics. We can draw lessons the relevant installed base before they Chronology: Multiple E K Interlocking RANS IBM S/360 F EN 32-bit, with 24-bit B Threads addressing (16MB total) BY H P of real (core) memory HOTOGRA P 1964 1965 JANUary 2009 | VOL. 52 | NO. 1 | COMMUNICATIONS OF THE ACM 45 practice were actually needed. Then people mode operating systems, compilers, Problem: CPU Must Address could have switched to 64/32-bit oper- and libraries; and modify application Available Memory ating systems and stopped upgrading source code to work in both 32- and 64- Any CPU can efficiently address some 32-bit-only systems, allowing a smooth bit environments. Numerous details amount of virtual memory, done most transition. Vendors naturally varied had to be handled correctly to avoid conveniently by flat addressing, in in their timing, but shipments ranged redundant hardware efforts and main- which all or most of the bits in an in- from “just barely in time” to “rather tain software sanity. teger register form a virtual memory late.” This is somewhat odd, consider- Solutions. Although not without address that may be more or less than ing the long, well-known histories of in- subtle problems, the hardware was actual physical memory. Whenever af- sufficient address bits, combined with generally straightforward, and not fordable physical memory exceeds the the clear predictability of Moore’s Law. that expensive—the first commercial easily addressable, it stops being easy All too often, customers were unable to 64-bit micro’s 64-bit data path added to throw memory at performance prob- use memory they could easily afford. at most 5% to the chip area, and this lems, and programming complexity Some design decisions are easy to fraction dropped rapidly in later chips. rises quickly. Sometimes, segmented change, but others create long-term Most chips used the same general ap- memory schemes have been used with legacies. Among those illustrated here proach of widening 32-bit registers to varying degrees of success and pro- are: 64 bits. Software solutions were much gramming pain. History is filled with ˲ Some unfortunate decisions may more complex, involving arguments awkward extensions that added a few be driven by real constraints (1970: about 64/32-bit C, the nature of exist- bits to extend product life a few years, PDP-11 16-bit). ing software, competition/cooperation usually at the cost of hard work by oper- ˲ Reasonable-at-the-time decisions among vendors, official standards, and ating-system people. turn out in 20-year retrospect to have influential but totally unofficial ad hoc Moore’s Law has increased afford- been suboptimal (1976–1977: usage of groups. able memory for decades. Disks have C data types). Some better usage recom- Legacies. The IBM S/360 is 40 years grown even more rapidly, especially mendations could have saved a great old and still supports a 24-bit legacy ad- since 1990. Larger disk pointers are deal of toil and trouble later. dressing mode. The 64/32 solutions are more convenient than smaller ones, al- ˲ Some decisions yield short-term at most 15 years old, but will be with us, though less crucial than memory point- benefits but incur long-term problems effectively, forever. In 5,000 years, will ers. These interact when mapped files (1964: S/360 24-bit addresses). some software maintainer still be mut- are used, rapidly consuming virtual ad- ˲ Predictable trends are ignored, tering, “Why were they so dumb?”4 dress space. or transition efforts underestimated We managed to survive the Y2K In the mid-1980s, some people start- (1990s: 32 -> 64/32). problem—with a lot of work. We’re still ed thinking about 64-bit micros—for ex- Constraints. Hardware people need- working through 64/32. Do we have any ample, the experimental systems built ed to build 64/32-bit CPUs at the right other problems like that? Are 64-bit by DEC (Digital Equipment Corpora- time—neither too early (extra cost, no CPUs enough to help the “Unix 2038” tion). MIPS Computer Systems decided market), nor too late (competition, an- problem, or do we need to be working by late 1988 that its next design must be gry customers). Existing 32-bit binaries harder on that? Will we run out of 64-bit a true 64-bit CPU, and announced the needed to run on upward-compatible systems, and what will we do then? Will R4000 in 1991. Many people thought 64/32-bit systems, and they could be ex- IPv6 be implemented widely enough MIPS was crazy or at least premature. I pected to coexist forever, because many soon enough? thought the system came just barely in would never need to be 64 bits. Hence, All of these are examples of long- time to develop software to match in- 32 bits could not be a temporary com- lived problems for which modest fore- creasing DRAM, and I wrote an article patibility feature to be quickly discard- sight may save later toil and trouble. to explain why.5 The issues have not ed in later chips. But software is like politics: Sometimes changed very much since then. Software designers needed to agree we wait until a problem is really painful N-bit CPU. By long custom, an N-bit on whole sets of standards; build dual- before we fix it. CPU implements an ISA (instruction DEC PDP-11/20 16-bit, 16-bit addressing (64KB total) IBM S/370 family virtual memory, 24-bit Algol 68 addresses, but multiple user includes long long address spaces allowed 1966 1967 1968 1969 1970 46 COMMUNICATIONS OF THE ACM | JANUary 2009 | VOL. 52 | NO. 1 practice set architecture) with N-bit integer reg- of virtual memory. For many programs Of course, increasing AM in a multi- isters and N (or nearly N) address bits, PM can differ greatly according to the tasking system is still useful in improv- ignoring sizes of buses or floating-point input, but of course PM ≤ VL. ing the number of memory-resident registers. Many 32-bit ISAs have 64- or The RL (real limit) is visible to the tasks or reducing paging overhead, 80-bit floating-point registers and im- operating system and is usually lim- even if each task is still limited by VL. plementations with 8-, 16-, 32-, 64-, or ited by the width of physical address Operating system code is always simpli- 128-bit buses. Sometimes marketers buses. Sometimes mapping hardware fied if it can directly and simply address have gotten this confused. I use the is used to extend RL beyond a too- all installed memory without having to term 64/32-bit here to differentiate the small “natural” limit (as happened in manage extra memory maps, bank reg- newer microprocessors from the older PDP-11s, described later). Installed AM isters, and so on. 64-bit word-oriented supercomputers, (actual memory) is less visible to user Running out of address bits has a as the software issues are somewhat programs and varies among machines long history. different. In the same sense, the Intel without needing different versions of 80386 might have been called a 32/16- the user program. Mainframes, Minicomputers, bit CPU, as it retained complete sup- Most commonly, VL ≥ RL ≥ AM. Some Microprocessors port for the earlier 16-bit model. programs burn virtual address space The oft-quoted George Santayana is apro- Why 2N-bits? People sometimes for convenience and actually perform pos here: “Those who do not remember want wider-word computers to improve acceptably when PM >> AM: I’ve seen the past are condemned to repeat it.” performance for parallel bit operations cases where 4:1 still worked, as a result Mainframes. IBM S/360 mainframes or data movement. If one needs a 2N- of good locality. File mapping can in- (circa 1964; see accompanying Chro- bit operation (add, multiply, and so on), crease that ratio further and still work. nology sidebar) had 32-bit registers, each can be done in one instruction On the other hand, some programs run of which only 24 bits were used in ad- on a 2N-bit CPU, but requires longer poorly whenever PM > AM, confirming dressing, for a limit of 16MB of core sequences on an N-bit CPU.
Recommended publications
  • Status and Projections of the NAS Program Frank R
    https://ntrs.nasa.gov/search.jsp?R=19870015491 2020-03-20T10:46:12+00:00Z View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NASA Technical Reports Server NASA Technical Memorandum 88339 . , Status and Projections of the NAS Program Frank R. Bailey EECGECTIOIS CP f Avail: NTlS P87-24924 CSCL 09B 63 Unclad 0080153 July 1986 National Aeronautics and Space Administration ~~ ~ NASA Technical Memorandum 88339 Status and Projections of the NAS Program Frank R. Bailey, Ames Research Center, Moffett Field, California July 1986 NASA National Aeronautics and Space Adminlstratlon Ames Research Center Moffett Field. California 94035 STATUS AND PROJECTIONS OF THE NAS PROGRAM by Dr. F. Ron Bailey to be presented at the SYMPOSIUM ON FUTURE DIRECTIONS OF COMPUTATIONAL MECHANICS ASME Winter Annual Meeting December 7-12, 1986 Anaheim, California ABSTRACT NASA's Numerical Aerodynamic Simulation (NASI Program has completed devel- opment of the initial operating configuration of the NAS Processing System Net- work (NPSN). This is the first milestone in the continuing and pathfinding effort to provide state-of-the-art supercomputing for aeronautics research and development. The NPSN, available to a nation-wide community of remote users, provides a uniform UNIX 1 environment over a network of host computers ranging from the new Cray-2 supercomputer to advanced scientific workstations. This system, coupled with a vendor-independent base of common user interface and network software, presents a new paradigm for supercomputing environments. Presented here is the background leading to the NAS Program, its programmatic goals and strategies, technical goals and objectives, and the development activ- ities leading to the current NPSN configuration.
    [Show full text]
  • Einführung in Z/OS Und OS/390
    Einführung in z/OS und OS/390 Dr. rer. nat. Paul Herrmannn Prof. Dr.-Ing. Wilhelm G. Spruth WS 2006/2007 Teil 3 z/OS Betriebssystem es 0101 ww6 wgs 09-99 System z und S/390 Betriebssysteme z/OS IBM große Installationen (OS/390, MVS) z/VSE IBM mittelgroße Installationen z/VM IBM Virtualisierung, Software Entwicklung TPF IBM spezialisierte Transaktionsverarbeitung UTS 4 Amdahl based on System V, Release 4 (SVR4) OSF/1 Hitachi Open System Foundation Unix z/Linux Public Domain Alle System z bzw. S/390 Betriebssysteme sind Server Betriebssysteme, optimiert für den Multi-User Betrieb es 0521z ww6 wgs 09-99 Transaction Processing Facility TPF 13. Oktober 2006. Die Firma Worldspan, ein weltweiter Anbieter von Reise-Reservierungs- systemen, hat sich für den Einsatz von sechs IBM System z9 Enterprise Class (EC) Mainframe-Servern entschieden. Worldspan will damit sein Angebot an elektronischen Datendiensten erweitern, um circa 700 Anbietern von Reiseangeboten und Millionen von Reisenden weltweit eine gemeinsame Plattform anbieten zu können. Worldspan setzt die neuen IBM System z9 EC Server ein, um sowohl Reisebüros als auch Anbietern von Online-basierten Reisediensten die Möglichkeit zur Nutzung des weltweiten Global Distribution System (GDS) zu geben, über das zum Beispiel die Bestellung und Buchung von Reiseprodukten von Flugzeugtickets, Hotels, Mietwagen und andere Reisedienstleistungen durchgeführt wird. Durch die Nutzung der Software „IBM Transaction Processing Facility“ (TPF) ist Worldspan in der Lage, 17.000 Kundenanfragen pro Sekunde auf
    [Show full text]
  • Joseph S. Mertz Jr. EDUCATION
    Jan 2020 Joseph S. Mertz Jr. H. John Heinz III College & Dietrich College of Humanities and Social Sciences Carnegie Mellon University Pittsburgh, PA 15213-3890 Phone: (412) 268-2540 Email: [email protected] EDUCATION: 1995 Carnegie Mellon University Ph.D. in Engineering and Public Policy 1983 University of Southern California M.S. in Computer Science 1982 Pennsylvania State University B.S. in Computer Science ACADEMIC APPOINTMENTS: Carnegie Mellon University 2018 – present: Director - Information Systems Program 2015 – present: Teaching Professor Joint 50/50 appointment: H. John Heinz III College Dietrich College of Humanities & Social Sciences Information Systems Program 2010 – 2015: Associate Teaching Professor Joint 50/50 appointment: H. John Heinz III College Dietrich College of Humanities & Social Sciences Information Systems Program 2005 – 2010: Associate Teaching Professor Joint 50/50 appointment: H. John Heinz III College School of Computer Science Spring 2009: Associate Teaching Professor Carnegie Mellon Qatar Computer Science Spring 2008: Associate Teaching Professor Carnegie Mellon Qatar Computer Science 2002 – 2005: Associate Teaching Professor Joint 50/50 appointment: Mertz-CV H. John Heinz III School of Public Policy & Management School of Computer Science 1996 – 2002: Co-Director Center for University Outreach 1994 – 1996: Post Doctoral Fellow Center for Innovation in Learning 1988 – 1995: Graduate Research Assistant Department of Engineering & Public Policy University of Puerto Rico 1986 – 1987: Visiting Professor Department of Electrical & Computer Engineering Illinois Benedictine College 1984: Adjunct Instructor Computer Science AWARDS: Mark Gelfand Service Award for Educational Outreach – 2012 Annual University honor for sustained, effective community service with academic coursework to enhance learning, and teach social responsibility. Nominated for the Martcia Wade Teaching Award – 2012 H.
    [Show full text]
  • How Attackers Break Programs, and How to Write Programs More Securely
    How Attackers Break Programs, and How To Write Programs More Securely Matt Bishop Department of Computer Science University of California at Davis Davis, CA 95616-8562 United States of America email: [email protected] www: http://seclab.cs.ucdavis.edu/~bishop phone: +1 (530) 752-8060 © 2002 by Matt Bishop This page deliberately left blank. That is, this page would have been blank except that we had to put the notice "this page deliberately left blank" on it. Otherwise, you might have seen the blank page and worried that someone left a page out of your booklets. So, we put a note on the blank page to assure you that no-one forgot to put something on this page; indeed, we intended for it to be blank. But we could not live up to our intentions, for the reason stated above, so we couldn't put a blank page in here. We had to put a page with some writing on it. So we couldn't put the notice "this page deliberately left blank" because it's not true and, if we couldn't tell when a page is blank, you'd doubt the veracity of everything we did. So we wrote this paragraph to ... oh, heck, forget it. Table of Contents sections slides Overview..................................... 1— 13 Attacking Programs ........................... 14—123 Overview .......................14 — 20 Users and Privilege ...............21 — 29 Environment ....................30 — 48 Buffer Overflow ..................49 — 70 Numeric Overflow ................71 — 76 Validation and Verification .........77 — 92 Race Conditions..................93—112 Denial of Service ............... 113—121 Environment .................. 122—123 Writing Better Programs ......................124—379 Overview ....................
    [Show full text]
  • 17. Websphere Application Server
    17. WebSphere Application Server 17.1 z/OS as a Unix System 17.1.1 Unix Betriebssysteme Welche Server-Betriebssysteme findet man in der Praxis ? • Windows, verschiedene Varianten • Unix, verschiedene Varianten • i-Series, OS/400 • zSeries Betriebssysteme – z/OS, z/VM, z/VSE, TPF Welche wesentlichen Unix Varianten existieren ? • HP/UX • SunSolaris • IBM AIX • Siemens Sinix Unix Systeme sind weitestgehend, • MacOS (BSD) aber nicht 100 % kompatibel • Linux, einschließlich zLinux • z/OS Unix System Services Führende Unix Großrechner sind: • Integrity Superdome von HP mit Itanium Prozessoren und dem HP-UX Betriebssystem • M9000 bzw. SPARC M5-32 Server von Oracle mit Sparc Prozessoren und dem Solaris Betriebssystem. Ein verwandtes Produkt wird von der Firma Fujitsu unter dem Namen „SPARC Enterprise Server“ vertrieben. • System p von IBM mit PowerPC Prozessoren und dem AIX Betriebssystem Neben den proprietären Unix Dialekten ist auf diesen Rechnern auch Linux verfügbar. Performance Unix versus z/OS Die I/O Leistung eines Rechners wird gemessen in der Anzahl von I/O Operationen pro Sekunde unter realistischen Betriebsbedingungen. Konkrete Untersuchungen sind nie veröffentlicht worden, aber es wird allgemein angenommen, dass die z/OS I/O Leistung vielleicht um einen Faktor 3 - 10 höher als die I/O Leistung von großen Unix Rechnern wie Superdome und M9000 ist. 17-1 17.1.2 Was definiert ein Unix System ? Unix wurde ursprünglich von Ken Thompson und Dennis Ritchie an den Bell Telephone Laboratories für Rechner der Digital Equipment Corporation (DEC) entwickelt und 1971 erstmalig im praktischen Betrieb eingesetzt. Schon bald entstanden (fast) kompatible Implementierungen für andere Rechner. Aus Bemühungen um einen einheitlichen Unix Standard entstand die Portable Operating System Interface (POSIX).
    [Show full text]
  • Les Routeurs Multicast
    Raccorder son réseau d’entreprise à l’Internet Alexandre Fenyö, Frédéric Le Guern, Samuel Tardieu To cite this version: Alexandre Fenyö, Frédéric Le Guern, Samuel Tardieu. Raccorder son réseau d’entreprise à l’Internet. Editions Eyrolles, 1997, 9782212089516. hal-01649131 HAL Id: hal-01649131 https://hal.archives-ouvertes.fr/hal-01649131 Submitted on 3 Jul 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - ShareAlike| 4.0 International License Remerciements Nous tenons tout particulierement` a` remercier Philippe DAX, Nadine RICHARD et Ahmed SERHROUCHNI pour les precieux´ conseils qu’ils nous ont prodigues´ durant la redaction´ de cet ouvrage ainsi que pour leur patience lors des multiples relectures. Les noms d’utilisateurs fictifs presents´ dans les exemples de ce livre nous ont et´ e´ gracieu- sement pretˆ es´ par Luc BEURTON et Stoned ELIPOT, qui nous ont egalement´ aides´ par leurs pertinentes contributions. Le chapitre sur le travail cooperatif´ a ben´ efici´ e´ de l’aide de Yan PUJANTE, auteur d’un me-´ moire de recherche sur le sujet. Nous tenons egalement´ a` remercier Bruno BEAUGRAND, Raphael¨ LUTA et Philippe MEU- NIER qui ont eu la gentillesse de nous procurer les documentations techniques dont nous avions besoin.
    [Show full text]
  • Validated Products List: Programming Languages, Database Language
    NISTIR 469 (Supersedes NISTIR 4623) VALIDATED PRODUCTS LIST 1991 No. 4 Programming Languages Database Language SQL Graphics ®OSIP Judy B. Kailey POSIX Editor U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1991 (Supersedes July 1991 issue) U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director — QC 100 .U56 NIST //4690 1991 V C.2 NISTIR 4690 (Supersedes NISTIR 4623) - ' J JF VALIDATED PRODUCTS LIST 1991 No. 4 Programming Languages Database Langucige SQL Graphics GOSIP Judy B. Kailey POSIX Editor U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1991 (Supersedes July 1991 issue) U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director FOREWORD The Validated Products List (formerly called the Validated Processor List) is a collection of registers describing implementations of Federal Information Processing Standards (FIPS) that have been tested for conformance to FIPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The Validated Products List is updated quarterly. TABLE OF CONTENTS 1. INTRODUCTION 1-1 1.1 Purpose 1-1 1.2 Document Organization 1-1 1.2.1 Programming Languages 1-1 1.2.2 Database Language SQL 1-2 1.2.3 Graphics 1-2 1.2.4 GOSIP 1-2 1.2.5 POSIX 1-2 1.2.6 FIPS Conformance Testing Products 1-2 2.
    [Show full text]
  • Amdahl 580 Series
    70C-Q.Ht.tM-'l" Computers Amdahl 580 Series MANAGEMENT SUMMARY Amdahl Corporation's 5890 Series is posi­ UPDATE: As a manufacturer of IBM plug-compatible tioned as a price/performance alternative to products, Amdahl has scaled profitable peaks andfallen into the IBM 3090 Series. The older Amdahl 580 some less than profitable valleys. At the moment, Amdahl is models are now in "limited new produc­ perched on another peak. The volume shipment ofAmdahl tion," according to Amdahl. 5890-300 mainframes, which compete against the IBM 3090, in addition to the sale ofdouble-capacity 6380E disks MODELS: 5840, 5850, 5860, 5867, 5868, made 1986 a financially satisfying year for Amdahl, to say 5870, 5880, and 5890-190E, -200E, the least. After coming off a very profitable 1986, Amdahl -300E, -400E, and -600E. responded to IBM's January 3090 liE" model announce­ CONFIGURATION: One, two, three, or four ments with the February introduction of a new three-way CPUs, up to 512MB of main memory, and up 5890-400E processor and the announcement ofperformance to 128 I/O channels. enhancements to existing 5890 models. Similar to IBM, COMPETITION: IBM 4381, IBM 308X, Amdahl also appended an liE" to the end ofeach ofits new IBM 3090, NAS AS/XL Series. and existing 5890 IBM-compatible machines. In January, PRICE: Prices range from $1,270,000 to Amdahl also announced a new 5890-190 uniprocessor $12,220,000. which has since been upgraded to a 5890.. ']90E. The new Amdahl 5890-190E, the first single-processor offering in the model line, establishes a new 5890 entry point for Amdahl CHARACTERISTICS 580 users contemplating a move to Amdahfs latest main­ frame generation.
    [Show full text]
  • Multithreading the Sunos Kernel
    BeyondMultiprocessing: Multithreadingthe SUnOSKernel t. 4. Fyt4olg S, R. Kleimaq S. Børton,R. Faulkner,A. Shivalingiah, M. Smith,D. Stein,J. Voll, M. Weeks,D. Williams- SunSoft,[nc. ABSTRACT Preparingthe SUnOSiSVR4kernel for today'schallenges: symmetric multiprocessing, multi-th¡eadedapplications, real-time, and multimedia,led to the incorporationof several innovativetechniques. In particular,the kernelwas re-structuredaround threads. Threads are usedfor most asynchronousprocessing, including interrupts. The resultingkernel is fully preemptibleand capableof real-timeresponse. The combinationprovides a robustbase for highly concurrent,responsive operation. Introduction having only a small data structure and a stack. Switchingbetween When we started to investigateenhancements kernelthreads does not requirea changeof virtual memory to the SunOSkernel to supportmultiprocessors, we addressspace information, so it is relatively realized that we wanted to go further than merely inexpensive.Kernel threadsare fully preemptible addinglocks to the kernel and keepingthe userpro- and may be scheduledby any of the scheduling cessmodel unchanged.It was importantfor the ker- classesin the system,including the real-time(fixed priority) nel to be capableof a high degreeof concurrencyon class. Sinceall other exe- cution entities tightly coupled symmetricmultiprocessors, but it are built using kernel th¡eads,they representa fully preemptible, was also a goal to supportmore thanone threadof real-time"nucleus" within the kernel. controlwithin a userprocess. These threads must be capableof executingsystem calls and handlingpage Kernel th¡eads use synchronizationprimitives faults independently. On multiprocessorsystems, that supportprotocols for preventingpriority inver- theseth¡eads of control must be capableof running sion, so a thread'spriority is determinedby which concurently on different processors.[Powell 1991] activitiesit is impedingby holdinglocks as well as describedthe user-visiblethread architecture.
    [Show full text]
  • Unix System Services
    Betriebssysteme it-Akademie Bayern z/OS und OS/390 Lehrgang 2009 Prof. Dr.-Ing. Wilhelm G. Spruth Teil 12 z/OS Unix System Services bs 1001 ww6 © copyright W. G. Spruth, 10-2000 wgs 03-95 Unix Welche Betriebssysteme findet man in der Praxis ? • Windows, verschiedene Varianten • Unix, verschiedene Varianten • i-Series OS/400 • zSeries Betriebssysteme – z/OS, zVM, zVSE, TPF Welche wesentlichen Unix Varianten existieren ? • HP/UX • SunSolaris • IBM AIX • Siemens Sinix • MacOS (BSD) • Linux, einschließlich zLinux • z/OS Unix System Services Literatur OS/390 Unix System Services. IBM Form No. SC28- 1891-8 Jürgen Gulbins: “Unix”. Springer Verlag , 3. Auflage, 1988. ISBN 3-540-19248-4 Gutes Handbuch, um mit den einzelnen Unix Shell befehlen zu arbeiten. History of Unix Operating Systems z/OS vs. Unix OS/390 mehrere 1000 E/A Operationen / s Unix mehrere 100 E/A Operationen / s Native Unix Betriebssysteme für S/390 Amdahl UTS (Universal Time Sharing System) Marktführer, < 300 Installationen Hitachi HI-OSF/1-M IBM AIX/ESA (nicht mehr verfügbar) z/OS Unix System Services früher als Open Edition MVS (OMVS) bezeichnet 1100 Unix API´s es 0519z ww6 wgs 09-99 The work on Portable Operating Systems Interface (Posix) started out as an effort to standardize UNIX and was performed by a work group under IEEE (Institute of Electrical and Electronic Engineers). What they defined was an application programming interface which could be applied not only to UNIX systems but to other operating systems, like OS/390. Posix is now a set of standards that define common interfaces across operating systems.
    [Show full text]
  • AUUGN Volume 11, Number 3 June 1990
    AUUGN Volume 11, Number 3 June 1990 The Australian UNIX* systems User Group Newsletter Volume 11 Number 3 June 1990 CONTENTS AUUG General Information .......................... 3 Editorial ................................ 4 AUUG Institutional Members ........................ 6 Letters tothe Editor ................. ACSnet Survey .......................... 10 SESSPOOLE Information ...................... 13 Call For Papers: AFUU Convention UNIX ’91 .............. 14 AUUG Book Club - Reviews & Order Form ............... 17 Perth Summer’90 Technical Meeting Report ................ 23 Using UNIX as a Persistent Programming Environment (From Summer’90 Victoria) . 25 UNIX System V Release 4 and OSF/1 (From Summer’90 Sydney) ....... 30 Optimizing The B5FS File System .................... 38 Open Buzzwords And NPA’s .................. 46 Bulgeria In Turmoil ......................... 48 USENIX Association News For AUUG Members ............. 5O AUUGN Back Issues ........................ 54 WAUG Information ................. ¯ . 55 AUUG Membership Information .................. 56 AUUG Forms .......................... 57 AUUGN 1 Vol 11 No 3 Copyright © 1990 AUUG Incorporated. All rights reserved. AUUGN is the journal of the Australian UNIX1 systems User Group (AUUG Incorporated). Copying without fee is permitted provided that copies are made without modification, and are not made or distributed for commercial advantage. Credit to AUUGN and the author must be given. Abstracting with credit is permitted. No other reproduction is permitted without prior consent of AUUG Incorporated. 1 UNIX is a registered trademark of AT&T in the USA and other countries. Vol 11 No 3 2 AUUGN AUUG General Information Memberships and Subscriptions Membership, Change of Address, and Subscription forms can be found at the end of this issue. All correspondence concerning membership of the AUUG should be addressed to:- The AUUG Membership Secretary P.O. Box 366 Phone: (02) 361 5994 Kensington, N.S.W.
    [Show full text]
  • Kermit News March 1995 Brazil: Election Day 1994
    Number 6 Kermit News March 1995 Brazil: Election Day 1994 Brazil's October 1994 general election was almost certainly the world's largest and most complex ever. Kermit software played a crucial role. In Rio de Janeiro, ballots are transcribed to PCs for transmission to the tabulating center by MS-DOS Kermit. Article on page 19. Kermit News Number 6, March 1995 CONTENTS Editor's Notes . 1 New Releases MS-DOS Kermit 3.14 . 3 and BBSs . 4 and Business Communication . 5 C-Kermit 5A(190) . 6 for UNIX . 6 for VMS . 7 for OS/2 . 7 for Stratus VOS . 10 IBM Mainframe Kermit-370 4.3.1 . 11 Digital PDP-11 Kermit-11 3.62-8 . 11 Other New Kermit Releases . 11 New Features File Transfer Recovery . 12 Auto-Upload, Auto-Download, Auto-Anything . 12 Character Sets: Circumnavigating the Web with MS-DOS Kermit . 15 People and Places Cover Story: Kermit in the Brazilian Elections. 19 Kermit Helps Automate Mail Delivery . 23 Kermit and Market Research in the UK . 24 Computer Access for Persons with Print-Handicaps . 25 Down to Business Ordering Information . 28 Kermit Version List . 29 Order Form . 31 Kermit News (ISSN 0899-9309) is published periodically free of charge by Kermit Development and Distribution, Columbia University Academic Information Systems, 612 West 115th Street, New York, NY 10025, USA. Contributed articles are welcome. Editor: Christine M. Gianone E-Mail: cmg@ columbia.edu Copyright 1995, Trustees of Columbia University in the City of New York. Material in Kermit News may be quoted or reproduced in other publications without permis- sion, but with proper attribution.
    [Show full text]