Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Operating Systems Software

Adopt a Lost Technology Today For R.O.S. 56

submitted by Simon Strandgaard writes "When new operating systems gets designed today, great systems such as Amiga, Atari and VMS, seems to get overlooked in regard to their original features not found on other OSes. It might be time to collect and categorize those special unique features under the great/lost ideas wiki, so new OSes don't have to re-invent the wheel and re-innovate." This is all for R.O.S., a "ruby-centric operating system."
This discussion has been archived. No new comments can be posted.

Adopt a Lost Technology Today For R.O.S.

Comments Filter:
  • Plan9 (Score:2, Interesting)

    by spitzak ( 4019 ) on Monday January 12, 2004 @11:17PM (#7959239) Homepage
    Look at Plan9 for ideas!

    In theory it fixes all the problems with Unix, while still keeping to the original design philosophy.
  • Old/new idea (Score:3, Interesting)

    by be-fan ( 61476 ) on Monday January 12, 2004 @11:21PM (#7959286)
    I'd like to see the end of the kernel/userspace separation. Just put everything in one address space. With safe languages, there is no need for it. The safe language you can get fine-grained protection with close to zero performance overhead. This makes the VM a great deal less complex (read Charles Cranor's UVM paper to see the complexity cause by VM-enabled sharing) and faster/less memory-hungry.

    Performance should improve a lot too. A P4 pays a couple of hundred clock-cycles penalty for each system call. Context switches are close to 1000 clocks. With a single address-space OS, you can get all the advantages of a microkernel providing services via OS servers, without any performance hit.
  • FreeVMS (Score:3, Interesting)

    by JDWTopGuy ( 209256 ) on Monday January 12, 2004 @11:28PM (#7959348) Homepage Journal
    Since VMS was mentioned, I'd like to let people know about this project:
    FreeVMS [] (Mailing list archive) []

    It's based on Linux for the moment, but it'll split eventually. Despite the homepage being a bit out of date, the project is alive; in fact I'm working on cleaning up the code a bit.
  • by be-fan ( 61476 ) on Tuesday January 13, 2004 @02:45AM (#7960482)
    You mean like MS-Windows?
    Yeah, but with a safe language :)

    With safe languages, there is no need for it.
    The problem with "safe" languages is that the underlying system can be used for such odious purposes as D"R"M, and there is no way to get around it.
    Not at all. Systems-level safe languages (Lisp, for example) usually have a dialect used for kernel-level development. In this scheme, binaries would have to be signed, to ensure that the native code was compiled by the safe compiler. However, this signing only has to be strong enough to protect a traditional security model. Root users, of course, should be allowed to run unsafe, kernel-level code if they want.

    And you would have to have a "safe"-language-only policy on such a system, or you would have a security nightmare similar to that of MS-Windows.
    You could always run "unsafe" code in a virtual machine.

    (I certainly wouldn't want to use such a system; I like C, even though I usually use Python (a "safe" language).)
    C could be made safe, if you added runtime checks for array indexing, and disable pointer arithmatic except for arrays. Unless you're writing kernel-level code, you shouldn't use those features anyway. Or, you could just run it in a VM.

    Performance could be enhanced by doing more things in libraries (e.g., a ramdisk used exclusively by one application (or a limited set of mutually-trusted/ing applications) could be supported entirely in userspace, with no context-switching necessary).
    The MIT exokernel does this. They've shown some impressive performance gains in certain apps, but the design is, by necessity, highly unconventional (the kernel provides extremely primitive abstractions, namely memory pages and raw disk blocks). And it just moves the bottleneck around. Depending on what you're doing, an extremely low-level kernel API could very well cause a lot more system calls than a high-level kernel API.

    Or several mutually-trusting/ed intercommunicating apps could share the same address space, so no VM remapping would be necessary when switching from one to another, nor would a system call be necessary.
    You're essentially talking about threads. However, the problem is that you want sharing, but still want protection. Threads can corrupt each others memory, and that's unacceptable. Would you want your webbrowser to crash if your email client did as well? With a safe language, you get fine-grained control of who you trust. The only people you've got to trust are the ones you explicitly hand your object references to, and then only when dealing with that specific object.

    (This would be kind of like a lightweight thread mechanism, but different threads could be loaded from different binaries.)
    Linux can do this exact thing via the clone() system call, but its of limited usefulness, because most of the time, processes do *not* completely trust each other.

    I don't know if any of this would actually be feasible, though, since I haven't really worked on the guts of an OS for about 20 years.
    Its certainly doable (and indeed, has been done), but there are better ways now :)
  • by zangdesign ( 462534 ) on Tuesday January 13, 2004 @03:53AM (#7960771) Journal
    that those innovations on older systems would have to be pretty much reinvented anyway, since the older machines were developed with closed or copyrighted codebases. Not to mention which, most of those "innovative" features have been superseded by the better features available on more modern systems.

    Seriously, what features from the Atari systems are so great, yet have been overlooked in modern systems?
  • Re:Old/new idea (Score:3, Interesting)

    by be-fan ( 61476 ) on Tuesday January 13, 2004 @03:09PM (#7964828)
    Type tagging isn't a protection mechanism. Its an optimization for dynamic dispatch (virtual calls in C++/Java-speak). The protection in the Lisp Machine came from two conditions:

    1) You couldn't access the byte representation of pointers directly, nor do arithmatic on them. This meant that the only way to access an object was to be handed a pointer to it.

    2) Array bounds were checked.

    Since the Amiga used C/ASM (IIRC) neither of these conditions held true, which is the reason for the iffy stability.

    Note, that you can easily do the LispM-style machine without hardware type tagging. Gwydion's Dylan compiler*, for example, emits guaranteed-safe binaries on regular x86 machines.

    *> The CMU Common Lisp compiler ordinarily does the same thing, but unlike Dylan, Common Lisp has an "unsafe" mode that turns of certain checks.

Logic is a pretty flower that smells bad.