GE 645
The GE 645 mainframe computer was a development of the GE 635 for use in the Multics project. This was the first computer that implemented a configurable hardware protected memory system. It was designed to satisfy the requirements of Project MAC to develop a platform that would host their proposed next generation time-sharing operating system and to meet the requirements of a theorized computer utility. The system was the first truly symmetric multiprocessing machine to use virtual memory, and it was also among the first machines to implement what is now known as a translation lookaside buffer, the foundational patent for which was granted to John Couleur and Edward Glaser.
General Electric initially publicly announced the GE 645 at the Fall Joint Computer Conference in November 1965. At a subsequent press conference in December of that year it was announced that they would be working towards "broad commercial availability" of the system. However they would subsequently withdraw it from active marketing at the end of 1966. In total at least 6 sites ran GE 645 systems in the period from 1967 to 1975.
System configuration
The basic system configuration consisted of a combination of 4 basic modules these were:- Processor
- System Controller
- Generalized I/O Controller
- Extended Memory Unit
- Core Memory - 1 microsecond memory in size capacities of 32K, 64K or 128K of 36-bit words.
- Centralized point for forwarding control signals from one active module to another
- System Clock and the ability to issue interrupts to the processors.
The Extended Memory Unit, though termed a drum, was in reality a large fixed-head hard disk with one head per track, this was a OEM product from Librascope. The EMU consisted of 4,096 tracks providing 4MW of storage. Each track had a dedicated read/write head, these were organised into groups of 16 "track sets" which are used to read/write a sector. A sector is the default unit of data allocation in the EMU and is made up of 80 words, of which 64 words are data and the remaining 16 were used as a guard band. The average transfer rate between the EMU and memory was 470,000 words per second, all transfers were 72-bits wide, with it taking 6.7μs to transfer 4 words. The unit had a rotational speed of 1,725 rpm, which ensured an average latency of 17.4 milliseconds.
| Component | Small | Typical | Large |
| System Configuration Console | 1 | 1 | 2 |
| Processor | 1 | 2 | 4 |
| GIOC | 1 | 2 | 3 |
| System Controllers Total Capacity | 2 128K | 4 256K | 8 1024K |
| Extended Memory Unit Total capacity | 1 4096K | 1 4096K | 1 4096K |
| Fixed disc | 33M | 67M | 134M |
| Magnetic Cards | -- | 113M | 226M |
| Magnetic tape handlers | 4 | 16 | 32 |
| Printers | 2 | 4 | 6 |
| Card Readers | 1 | 2 | 3 |
| Card Punches | 1 | 2 | 2 |
| Perforated Tape | -- | 1 | 2 |
| Channels for TTY's | 64 | 192 | 384 |
| Channels for voice-grade communication lines for remote terminals such as such as DATANET-760 / GE-115 | -- | 12 | 18 |
Architecture
Processor Modes
The GE-645 has two modes of Instruction Execution inherited from the GE-635, however it also adds another dimension by having two modes of memory addressing. When the process is executing in Absolute Mode addressing is limited to 218 words of memory and any instructions are executed in Master mode. In comparison Append Mode calculates the address using "Appending Words" with an address space of 224 words and with instruction execution occurring in either Master or Slave modes.Slave Mode
By default this is normal mode that the processor should be executing in at any point in time. Nearly all instructions will run in this mode aside from a small set of privileged instructions which cannot execute in this mode. Execution of such instructions will trigger an illegal procedure fault, also the ability to inhibit interrupts is forbidden. Format of instruction addresses is via the Appending Process.Master Mode
In this mode the processor can execute all instructions and is able to inhibit interrupts while doing so. Like in Slave mode the default form of address formation is via the Appending Process.Absolute Mode
All instructions can be executed in this mode and full access is given to any privileged features of the hardware. Interrupts can be inhibited and instruction fetching is limited to a 218 absolute address thus restricting the processor to only been able to access the lower 256 KW of physical core memory. The processor will switch to this mode in the event of a fault or interrupt and will remain in it until it executes transfer instruction whose operand address has been obtained via the appending process.Appending Mode
By default this is normal mode of Memory addressing, both Master and Slave modes normally operate in this mode. Indirect words and operands are accessed via Appending Mechanism via the process of placing a 1 in bit 29 of the executed instruction. Effective addresses are thus either added to a base address, or the offset is linked to the base address.Functional Units
The 645 processor was divided into four major functional units these were:Appending Unit:- * Controls data I/O from memory
- * Controls memory selection and interleave
- * Carries out Memory appending
- * Control fault recognition
- * Does power on/off sequencingAssociative Memory Unit:
- * Consists of Associative Memory made up of 16 x 60-bit Registers
- * Registers point to most recently used segment or most recently used Page
- * Performs the function of what would now be classed as a TLB.Control Unit:
- * Performs all control functions
- * Performs Address modification
- * Controls the processor mode
- * Interrupt recognition/handling
- * Opcode decodingOperations Unit:
- * Performs fractional and integer divisions and multiplications.
- * Performs automatic alignment of floating-point numbers for addition and subtraction.
- * Performs inverted divisions on floating-point numbers.
- * Performs automatic normalization of floating-point resultants.
- * Performs shifts.
- * Performs indicator register loading and storing.
- * Performs timer register loading and decrementing.
The instruction format with bit 29 set to 1 is:
B is the base register fieldY is the address field, addressing 32KWOP is the opcode, the additional bit 27 is the opcode extension bit.I is the interrupt inhibit bit.Tag indicates the type of address modification to be performed; some additional tags are supported by the GE 645.
1 1 2 2 2 2 3 3
0 2 3 7 8 6 7 8 9 0 5
+---+---------------+---------+-+-+-+------+
|BR | Y | OP |0|I|1| Tag |
+---+---------------+---------+-+-+-+------+
Address base registers
The GE 645 had 8 Address Base Registers, these could operate in either "paired" or "unpaired" modes. The later Honeywell 6180 changed these to 8 pointer registers. Each abr was 24-bits wide consisting of 18 bits for an address and 6 bits for control functions.One bit of the control functions field indicates where an abr is "internal" or "external". If an abr is internal, another 3-bit subfield of the control functions field specifies another abr with which this abr is paired; that other abr is external, with the external abr containing a segment number in the address field and the internal abr containing an offset within the segment specified by the external abr. If an instruction or an indirect word refers to an external abr, the address field in the instruction or indirect word is used as an offset in the segment specified by the external abr. If it refers to an internal abr, the address field in the instruction or indirect word is added to the offset in the abr, and the resulting value is used as an offset in the segment specified by the external abr with which the internal abr is paired.
The registers have the following formats depending on how bit 21 is set.
Format as an "external" base, with bit 21 set:
1 1 2 2 22
0 7 8 0 1 23
+------------------+---+-+--+
| PDW |\\\|1|\\|
+------------------+---+-+--+
Format as a component to the effective "internal" address with a pointer to an "external" base, with bit 21 clear:
PDW is the Pointer to a descriptor word PY is the component P of the effective internal address 'Y'PB is pointer to another base register whose bit 21 = 1
1 1 2 2 22
0 7 8 0 1 23
+------------------+---+-+--+
| PY |PB |0|\\|
+------------------+---+-+--+
In Multics, an even-numbered abr and the following odd-numbered abr were paired. When writing in Assembly the standard Multics practice was to label these registers as follows:ap for abr 0ab for abr 1bp for abr 2bb for abr 3lp for abr 4lb for abr 5sp for abr 6sb for abr 7
The naming scheme is based around the following:a for argument-list pointerb for general basel for linkage-segment pointers for stack-segment pointer
The 8 pointer registers in the Honeywell 6180 and its successors served the same purpose as the 4 paired base registers in the GE-645, referring to an offset within a segment.
History
CTSS had originated in the MIT Computation Center using a IBM 709 and was first demonstrated in November 1961, it was subsequently upgraded to a 7090 in 1962, and finally to a 7094 in 1963. This required modification to these standard systems via the addition of a number of RPQ's which among others added two banks of memory and bank-switching between user and supervisor mode, i.e. programs running in the A-core memory bank had access to instructions that programs running in the B-core bank did not.Project MAC formally began with signing of contract with ARPA on the 1st of July 1963. By October 1963 they had received a dedicated 7094 to run CTSS under, this was termed the "Red Machine" due to it having red side panels. This would provide a time-sharing environment for Project MAC, and would subsequently be heavily used for the development of Multics. During this period exploratory work was carried out into what a replacement for CTSS would look like and what type of hardware it would require to run on. A committee was formed consisting of Fernando J. Corbató, Ted Glaser, Jack Dennis and Robert Graham with responsibility to visit computer manufacturers to gauge level of interest in the industry to tender for the hardware platform. It was made clear that Project MAC was looking for a development partner given the considerable hardware modifications that would be required to meet their requirements, which were specified as:
- User Programs having read/write protection.
- That privileged instructions would not be accessible to end user programs
- At least the ability to address 256KW of memory directly.
- Native multiprocessing capability with all processors been of equivalent functional level
- Effective support for telecommunications which could handle both conventional telephone lines as well as high speed data links that could run graphic display terminals such as the MIT-developed Kludge graphical terminal.
- Mass storage units, including a fast drum that could be used as a paging device.
- Hardware support for both segmentation and paging with support for a content addressable memory so as to reduce virtual memory overhead.
While the GE 645 hardware was being designed and debugged in Phoenix, a system was put in place where a GE 635 could be used to run a simulator known as the 6.36, so that development and checkout of Multics could occur in parallel. This process involved creating a tape on the CTSS system which would be inputted to GECOS on the 635 system in MIT so that it would run under the 6.36 simulator; the resulting output would be carried back via tape to CTSS for debugging/analysis. This simulated environment was replaced by the first 645 hardware in 1967. The GECOS operating system was fully replaced by Multics in 1969 with the Multics supervisor separated by protection rings with "gates" allowing access from user mode.
A later generation in the form of the 645F wasn't completed by the time the division was sold to Honeywell, and became known as the Honeywell 6180. The original access control mechanism of the GE/Honeywell 645 were found inadequate for high speed trapping of access instructions and the re-implementation in the 6180 solved those problems. The bulk of these computers running time-sharing on Multics were installed at the NSA and similar governmental sites. Their usage was limited by the extreme security measures and had limited impact on subsequent systems, other than the protection ring.
The hardware protection introduced on this computer and modified on the 6180 was later implemented in the Intel 286 computer processor as a four-layer protection ring, but four rings was found to be too cumbersome to program and too slow to operate. Protection ring architecture is now used only to protect kernel mode from user mode code just as it was in the original use of the 645.