Skip to main content

Weak Protection for Reflective Operating Systems

  • Conference paper
  • First Online:
Book cover Object-Oriented Technologys (ECOOP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1357))

Included in the following conference series:

  • 324 Accesses

Abstract

A customizable scheduler for real-time computing is a typical example of the advantage of extensible operating systems. We have applied the reflection technique to a traditional operating system and experimentally implemented a customizable scheduler for real-time computing. This paper reports this experience and discusses the limitation we encountered. Then this paper presents a new mechanism we call weak protection and mentions that it is useful to make a reflective operating system workable. We are currently developing this mechanism for our DECADE operating system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bershad, B. N. et al, “Extensibility, Safety and Performance in the SPIN Operating System,” in Proc. of ACM SOSP-15, pp. 267–284, December 1995.

    Google Scholar 

  2. Chiba, S., “A Metaobject Protocol for C++,” in Proc. of ACM OOPSLA’95, no. 10 in SIGPLAN Notices vol. 30, pp. 285–299, ACM, 1995.

    Google Scholar 

  3. Engler, D. R., M. F. Kaashoek, and J. O’Toole Jr., “Exokernel: An Operating System Architecture for Application-Level Resource Management,” in Proc. of ACM SOSP-15, pp. 251–266, December 1995.

    Google Scholar 

  4. Kiczales, G., J. des Rivières, and D. G. Bobrow, The Art of the Metaobject Protocol. The MIT Press, 1991.

    Google Scholar 

  5. Loepere, K., Mach 3 Server Writer’s Guide. Open Software Foundation and Carnegie Mellon University, 7 1992.

    Google Scholar 

  6. Yarvin, C., R. Bukowski, and T. Anderson, “Anonymous RPC: Low-Latency Protection in a 64-Bit Address Space,” in Proc. of the 1993 Summer USENIX Conference, pp. 175–186, June 1993.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chiba, S., Nishimura, T., Kourai, K., Ohnoki, A., Masuda, T. (1998). Weak Protection for Reflective Operating Systems. In: Bosch, J., Mitchell, S. (eds) Object-Oriented Technologys. ECOOP 1997. Lecture Notes in Computer Science, vol 1357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69687-3_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-69687-3_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64039-4

  • Online ISBN: 978-3-540-69687-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics