skip to main content
column

Implementing Safety-Critical Java Missions in Ada

Published:13 July 2016Publication History
Skip Abstract Section

Abstract

Critical systems written in Ada are still reluctant to use dynamic memory allocation. The Ravenscar profile, for example, prohibits the dynamic creation of tasks. This is in spite of the availability of storage pools and the strong compile-time checking of access types. The Java community has, by necessity, taken a slightly less conservative approach. Safety-Critical Java (SCJ) supports a constrained use of dynamic memory allocation. This paper takes the SCJ approach and tries to implement it using Ada's storage pools. We show that the approach is not directly transferable to Ada due to the difference in the way that SCJ and Ada handle region-based memory management. However, an equivalent approach can be developed.

References

  1. David F Bacon, Perry Cheng, and VT Rajan. A real-time garbage collector with low overhead and consistent utilization. In ACM SIGPLAN Notices, volume 38, pages 285--298. ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Borg, A. Wellings, C. Gill, and R.K. Cytron. Real-time memory management: life and times. In Real-Time Systems, 2006. 18th Euromicro Conference on, pages 11 pp.--250, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Miguel Masmano, Ismael Ripoll, Alfons Crespo, and Jorge Real. Tlsf: A new dynamic memory allocator for real-time systems. In Real-Time Systems, 2004. ECRTS 2004. Proceedings. 16th Euromicro Conference on, pages 79--88. IEEE, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Pizlo, J. M. Fox, D. Holmes, and J. Vitek. Real-time java scoped memory: Design patterns and semantics. 16th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2013), 0:101--110, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  5. Mads Tofte and Jean-Pierre Talpin. Region-based memory management. Information and Computation, 132(2):109--176, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Tian Zhao, Jason Baker, James Hunt, James Noble, and Jan Vitek. Implicit ownership types for memory management. Science of Computer Programming, 71(3):213--241, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

(auto-classified)
  1. Implementing Safety-Critical Java Missions in Ada

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGAda Ada Letters
      ACM SIGAda Ada Letters  Volume 36, Issue 1
      June 2016
      98 pages
      ISSN:1094-3641
      DOI:10.1145/2971571
      Issue’s Table of Contents

      Copyright © 2016 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 July 2016

      Check for updates

      Qualifiers

      • column

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!