GE 645

From Wikipedia, the free encyclopedia

The GE 645 mainframe computer was a development of the GE 635 for use in the Multics project. This was the first computer that implemented a configurable hardware protected memory system. The original CTSS was implemented on a modified IBM 7094 with two banks of memory and bank-switching between user and supervisor mode. The Multics operating system implemented multilevel security (MLS) on a GE 635 running a simulator of the 645 starting on October 18, 1965, in the MIT Tech Center.[1] This simulated environment was replaced by the first 645 hardware in 1967. The GECOS operating system was fully replaced by Multics in 1969 with the Multics supervisor (master mode now known as kernel mode)[2] separated by protection rings with "gates" allowing access from user mode.[3] A later generation in the form of the 645F (F for follow-on) wasn't completed by the time the division was sold to Honeywell, and became known as the Honeywell 6180. The original access control mechanism of the GE/Honeywell 645 were found inadequate for high speed trapping of access instructions and the re-implementation in the 6180 solved those problems.[4] The bulk of these computers running time-sharing on Multics were installed at the NSA and similar governmental sites. Their usage was limited by the extreme security measures and had limited impact on subsequent systems, other than the protection ring.[5]

The hardware protection introduced on this computer and modified on the 6180 was later implemented in the Intel 286 computer processor as a four-layer protection ring, but four rings was found to be too cumbersome to program and too slow to operate. Protection ring architecture is now used only to protect kernel mode from user mode code just as it was in the original use of the 645.[2]

References[]

  1. ^ "Project MAC 1966-67" (PDF).
  2. ^ a b E. L. Glaser and 2 others. "System Design of a Computer for Time Sharing Applications". 1965 Fall Joint Computer Conference.
  3. ^ "Project MAC 1966-68" (PDF).
  4. ^ Michael D. Schroeder and Jerome H. Saltzer. "A Hardware Architecture for Implementing Protection Rings". Retrieved 27 September 2012.
  5. ^ Donald A. MacKenzie. Mechanizing Proof: Computing, Risk and Trust. The MIT Press. ISBN 0-262-13393-8.

External links[]

Retrieved from ""