词条 | Singularity (operating system) |
释义 |
| name = Singularity Project | logo = | screenshot = Singularity v1.png | caption = Singularity after boot-up | developer = Microsoft Corporation | source model = Source-available (through Shared Source Initiative) | kernel type = Microkernel language-based | supported platforms = x86 | ui = Command line interface | family = Language-based systems | released = {{Start date and age|2007}} | discontinued = Yes | latest release version = 2.0 | latest release date = {{Start date and age|2008|11|14}} | programmed in = Assembly language, C, C++, C#, Sing# | language = English | working state = Discontinued | license = Microsoft Research License | website = {{URL|research.microsoft.com/en-us/projects/singularity}}}} Singularity is an experimental operating system (OS) which was built by Microsoft Research between 2003 and 2010.[1] It was designed as a high dependability OS in which the kernel, device drivers, and application software were all written in managed code. Internal security uses type safety instead of hardware memory protection. OperationThe lowest-level x86 interrupt dispatch code is written in assembly language and C. Once this code has done its job, it invokes the kernel, which runtime system and garbage collector are written in Sing# (an extended version of Spec#, itself an extension of C#) and runs in unprotected mode. The hardware abstraction layer is written in C++ and runs in protected mode. There is also some C code to handle debugging. The computer's basic input/output system (BIOS) is invoked during the 16-bit real mode bootstrap stage; once in 32-bit mode, Singularity never invokes the BIOS again, but invokes device drivers written in Sing#. During installation, Common Intermediate Language (CIL) opcodes are compiled into x86 opcodes using the Bartok compiler. Security designSingularity is a microkernel operating system. Unlike most historic microkernels, its components execute in the same address space (process), which contains software-isolated processes (SIPs). Each SIP has its own data and code layout, and is independent from other SIPs. These SIPs behave like normal processes, but avoid the cost of task-switches. Protection in this system is provided by a set of rules called invariants that are verified by static program analysis. For example, in the memory-invariant states there must be no cross-references (or memory pointers) between two SIPs; communication between SIPs occurs via higher-order communication channels managed by the operating system. Invariants are checked during installation of the application. (In Singularity, installation is managed by the operating system.) Most of the invariants rely on the use of safer memory-managed languages, such as Sing#, which have a garbage collector, allow no arbitrary pointers, and allow code to be verified to meet a given computer security policy. Project statusSingularity 1.0 was completed in 2007. A Singularity Research Development Kit (RDK) was released under a shared source license allowing academic non-commercial use, and is available from CodePlex.[2] Version 1.1 was released in March 2007 and version 2.0 was released on November 14, 2008. Similar projects
See also
References1. ^Source code history on CodePlex 2. ^{{Cite web|url=http://singularity.codeplex.com/|title=Singularity RDK - Home|last=|first=|date=|website=|publisher=|access-date=2016-06-08}} External links
5 : Microsoft operating systems|Microsoft Research|Microkernel-based operating systems|Microkernels|Operating system distributions bootable from read-only media |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。