This is a DRAFT language change specification (LCS) proposing a revision of the VHDL-93 language reference manual (LRM) with respect to shared variables. Please send comments on this draft language change specification (LCS) to:
jwillis@acm.org [John Willis: Language Designer] stephen@srbailey.com [Steve Bailey: WG Chair] mench@mench.com [Paul Menchini: LRM Editor] rouillard@acm.org [Jacques Rouillard: Technical Committee] chuck_swart@analogy.com [Chuck Swart: Technical Committee] berman@cadence.com [Victor Berman: Technical Committee] vijay@webpage.com [Vijay Vaidyanathan: Technical Committee] dunlop@cadence.com [Doug Dunlop: Interested Party] newshutz@ftlsys.com [Rob Newshutz: Interested Party] Before this LCS revises the VHDL LRM, it will be: 1. Reviewed and potentially revised by SV Technical Committee 2. Reviewed and potentially revised by SV Working Group 3. Balloted by SV Working Group John Willis 9/12/96
Version 5.7 9/12/96 Number: LCS-1076A Title: Shared Variables Designers: John Willis with contributions from Steve Bailey & Chuck Swart Requirements-addressed-herein: VHDL 1076A Requirements Document Requirements-addressed-herein: VHDL 1076A Requirements Ballot Analysis Document Requirements-addressed-herein: VHDL92-DG-18 Requirements-addressed-herein: VHDL92-DG-28 History Log: (1) September 15, 1994 -- Initial Version (willis@vhdl.org) (2) September 19, 1994 -- Incorporated Paul Menchini's comments (3) November 7, 1994 -- Responded to Paul Menchini, Chuck Swart -- Peter Ashenden, Doug Dunlop, Jayaram Bhasker (4) November 9, 1994 -- Joseph Skudlarek found three errors in V 2.0 (5) November 9, 1994 -- Bill Paulsen found seven errors in V 2.0 (6) November 9, 1994 -- Added section numbering (7) April 2, 1995 -- Incorporated response to reviews of LCS Version 2.* from ISAC (8) June 2, 1995 -- Incorporated responses from review in San Diego (9) June 10, 1995 -- Incorporated Chuck Swart's comments and example (10) October 10, 1995 -- Incorporated Doug Dunlop and Paul Menchini's comments (11) November 2, 1995 -- Incorporated comments from review in Boston (12) February 18, 1996 -- Revised per Steve Bailey and Peter Ashenden's comments (13) May 31, 1996 -- Revised per Steve Bailey and Chuck Swart's comment (14) September 12, 1996 -- Revised to eliminate protected types with -- wait and composite types with subelements -- of protected type per Chuck Swart's -- extensive analysis of this LCS.
This LCS adds three different forms of non-normative annotation to the LCS normative text: notes, ramifications and rationale. Note annotations assist the reader to better understand the points made by normative text. Ramification annotations explain implications of the normative text which are not likely to be apparent to the casual reader. Rationale annotations explain the reasons behind a particular language design decision. In this LCS, rationale annotations distributed throughout the LCS replace an explicit rationale section typically found in an Ada or VHDL LCS. Although the LCS is generally structured along the lines of the VHDL LRM, integration and editing into the LRM will be completed after SVWG approval of the LCS. This LCS is formatted for a 38 page printout where the last page is so identified.
1.0 Brief Overview of the Problem 1.1 VHDL-93 SV Requirements 1.2 SV Working Group Requirements 2.0 Proposed Solution 2.1 General Monitor Approach 2.2 Overview of LCS's Monitor Design 2.3 Declaring Protected Types 2.3.1 Protected Type Specification: 2.3.1.1 Procedure Specifications 2.3.1.2 Function Specifications 2.3.1.3 Attribute Specifications 2.3.1.3 Attribute Declarations 2.3.2 Protected Type Body: 2.3.2.1 Subprogram Declarations 2.3.2.2 Subprogram Bodies 2.3.2.3 Type Declarations 2.3.2.4 Subtype Declarations 2.3.2.5 Constant Declarations 2.3.2.6 Variable Declarations 2.3.2.7 File Declarations 2.3.2.8 Alias Declarations 2.3.2.9 Use Clauses 2.3.2.10 Attribute Specifications 2.3.2.11 Attribute Declarations 2.3.2.12 Group Template Declarations 2.3.2.13 Group Declarations 2.4 Use of Protected Type Declarations: 2.4.1 Use within a Subtype Indication 2.4.1.1 New Subtypes of a Protected Type 2.4.1.2 Objects of Protected Type 2.4.2 Attributes Related to Protected Types 2.4.3 Use of (Protected) Type Marks 2.4.4 Semantically Prohibited Uses 2.5 Use of Protected Objects: 2.5.1 In Expressions 2.5.2 In Sequential Statements 2.5.3 In Concurrent Statements 2.6 Scope and Visibility Rules: 2.6.1 Declarative Regions 2.6.2 Scope of Declarations 2.6.3 Visibility 2.6.4 Use Clauses 2.7 Elaboration and Execution: 2.7.1 Elaboration of Protected Type Declarations 2.7.2 Elaboration of Protected Type Bodies 2.7.3 (Static) Elaboration of Protected Type Variables 2.7.4 (Dynamic) Elaboration of Protected Type Objects in a Subprogram 2.7.5 (Dynamic) Elaboration of Interface Objects of Protected Type in a Non-protected Type Subprogram 2.7.6 (Dynamic) Elaboration of Protected-Type Subprograms 2.7.7 Read and Write of Shared Variables 2.8 Lexical Elements: 2.8.1 Reserved Word(s) 3.0 Optional Extensions 3.1 Overloaded Assignment 3.2 Constructors 3.3 Destructors 3.4 Process ID 4.0 Examples 4.1 Atomic Counter 4.2 Complex Number 4.3 Variable Size Array 4.4 Mutual Exclusion Semaphore 5.0 Upward Compatibility 6.0 Other Alternatives Considered 6.1 Semaphores 6.2 Critical Regions 6.3 Monitors
This section enumerates some of the requirements for shared variables coming from both the VHDL 1076-93 language revision process and the subsequent Shared Variable Working Group (SVWG) requirements process. Both of these processes have distinct documentation. The interested reader should consult those documents for more detail. Requirements coming from the later (SVWG) process were more focused and had the benefit of being prioritized by a balloting process. Thus where the requirements are in conflict, this LCS responds to prioritization determined by the SVWG requirements process.
The original requirements included:
The shared variable working group (SVWG) developed and balloted a requirements document, resulting in a prioritized ranking of design objectives that should and should not be met. The following list summarizes the requirements that the implementation of shared variables should satisfy:
Since the working group voted on the priorities of requirements by specifying a value in the range of -3 to +3, it was possible for a requirement to be voted as being dangerous or undesired. The language design team was instructed to avoid satisfying requirements that received a consensus negative priority vote. The requirements in this category include:
The next section describes the proposed language design responding to these requirements.
This section first discusses the general approach using monitors and its overall benefits for meeting the requirements. Details of the proposed language design follow.
In general terms, a monitor is a computer language construct which denotes some form of mutual exclusion with respect to one or more mutable data objects, typically variables. In Hoare's words, "The basic insight is that all meaningful operations on data (including its initialization and also perhaps its finalization) should be collected together with the declaration of the structure and type of the data itself; and these operations should be invoked by procedure calls whenever required by the processes which share the data. The important characteristic of a monitor is that only one of the procedure bodies can be active at a time; even when two processes call a procedure simultaneously (either the same procedure or two different ones), one of the calls is delayed until the other is completed." (C.A.R. Hoare, Communicating Sequential Processes, published by Prentice-Hall in 1985). At about the same time, Per Brinch Hansen reached the same insight. Monitors were chosen as the basis for the implementation of shared variable mutual exclusion semantics based on the outcome of the VHDL-93 and SVWG requirements phase (see Section 1.0 above). Parenthetical references below refer to the Shared Variable Working Group Requirements Ballot Analysis Document:
In this LCS, monitors are added to VHDL via a new, protected type. To use monitors, a protected type must be defined, then instances of shared variables, non-shared variables and interface variable declarations are created using the protected type. Finally, the shared variable value may be accessed via protected calls to specific shared variable objects. Within a call prefixed by a variable of protected type, the privileged callee may then directly reference data elements belonging to the variable's implementation part (body). A process gains and releases exclusive access to one or more shared variables in a user-defined order (one per protected subprogram call), potentially blocking if exclusive access to the protected object is already held by another process. Acquiring and releasing exclusive access to a shared variable is a side effect of calls defined as part of the protected type interface, not an explicit lock and unlock operation. The protected types defined in this LCS resemble Ada 95's protected type constructs in many ways, however protected types in the two languages are not identical. The protected type construct defined here is substantially simpler than Ada's construct. Additional functionality, such as that provided by Ada, could be added at a later time. This section is structured so as to define protected types (see Section "Protected Type Definition" on page 8), the declaration of objects of protected type (see Section "Use of Protected Types" on page 17), the use of objects based on protected types (see Section "Using Protected Objects" on page 21), scope and visibility (see Section "Scope and Visibility Rules" on page 22), elaboration and execution (see Section "Elaboration and Execution" on page 24), and new lexical elements (see Section "Lexical Elements" on page 26).
Protected type specification and bodies may only appear as part of a type declaration:
type identifier is type_definition;
VHDL's type_definition is expanded to include both
protected type specifications and bodies:
type_definition::= scalar_type_definition | composite_type_definition | access_type_definition | file_type_definition | protected_type_specification
LRM Change:
Protected type definitions must be added to the grammatical production
and text in Section 4.1 of IEEE Std. 1076-93.
In turn, protected type definitions include both specifications
and bodies:
protected_type_specification ::= protected_type_declaration | protected_type_definition
LRM Change:
Section 3.5 must be added to Section 3 of IEEE Std. 1076-93. It is
suggested that an introductory section describing protected types be followed
by sub-sections 3.5.1 and 3.5.2 describing protected type declarations
and protected type definitions (respectively).
Protected type declarations may occur anywhere a subprogram
declaration may occur, including:
LRM Change:
Sections 1.1.2 (entity declarative part), 1.2.1 (architecture declarative
part), 2.2 (subprogram bodies), 2.5 (package declarations), 2.6 (package
bodies), 9.1 (block statements), 9.2 (process statements) and 9.7 (generate
statements) of IEEE Std. 1076-93 will need additional grammar productions
for protected type declarations.
Protected type definitions may occur anywhere a subprogram
body may occur, including:
Rationale:
Since protected types generally include subprogram bodies, it seems
appropriate to restrict protected type definitions to places where a subprogram
body may otherwise appear.
Rationale:
Protected type specifications are included in "non-concurrent"
regions, such as process statements and subprogram bodies so that non-shared
variables may be declared locally using a protected type (consistency at
little or no cost).
LRM Change:
Sections 1.2.2 (entity declarative parts), 1.2.1 (architecture declarative
part), 2.2 (subprogram bodies), 2.6 (package bodies), 9.1 (block statements),
9.2 (process statements) and 9.7 (generate statements) of IEEE Std. 1076-93
will need additional grammar productions for protected type specifications.
Note:
Protected type declarations and protected type definitions are respectively
analogous to package declarations and package bodies in that both a protected
type declaration and a package declaration defines an abstract interface
while protected type definitions and package bodies define an implementation
part.
Note:
Protected type declarations and protected type definitions respectively
differ from package declarations and package bodies in that elaboration
may result in multiple instances of a protected type (if the protected
type is declared in an entity, architecture or for-generate block) and
multiple objects of a given protected type (one per object declaration).
Elaboration of a package results in only a single instance. As primary
and secondary units within a library, packages have a wider visibility
than protected types. Protected types must be declared within an existing
primary or secondary unit.
Each protected type declaration must be associated
with exactly one protected type definition before objects can be created
using the protected type. The declaration must precede the definition within
the same declarative region. It shall be an error if, during elaboration
of a variable declaration using a protected type, no protected type definition
is found. It shall be an error if a protected type definition is already
associated with a protected type declaration and another protected type
definition is encountered for the same declaration. Note that a protected
type declaration appearing in an entity declaration may have more than
one protected type definition, each declared in a distinct architecture.
The entity/architecture binding encountered during elaboration determines
the declarative region formed and thus association used between protected
type declaration and definition.
LRM Change:
The intent of the above paragraph should be included in Section 3.5
of IEEE Std. 1076-93. It is an error if a wait
statement appears within a function or procedure which has as its (dynamic)
parent a subprogram appearing within a monitor interface.
LRM Change:
The intent of the above paragraph should be included in the introductory
part of Section 3.5 of IEEE Std. 1076-93. Since VHDL does not make the
stack explicit, other words are probably needed for "dynamic"
above.
Rationale:
If waits were allowed within a monitor there are numerous undesirable
"corner cases". These corner cases must either be addressed by
a variety of special case rules or waits must be forbidden. This LCS takes
the latter, more conservative approach, leading the future option for flexibility.
No predefined operators or assignment is defined for
protected types.
LRM Change:
The intent of the above paragraph should be included somewhere in Section
7 and Section 8.5 of IEEE Std. 1076-93
Declaration of a protected type requires a protected type declaration having the syntactic form:
protected_type_declaration ::= protected protected_type_declarative_part end protected [protected_type_simple_name]
The protected type declaration may only contain subprogram specifications defining abstract operations on objects of the protected type, use clauses or attribute specifications:
protected_type_declarative_part ::= { protected_type_declarative_item } protected_type_declarative_item ::= subprogram_specification | use_clause | attribute_specification
LRM Change:
The above grammar productions, syntactic and semantic restrictions
should be included in the Section 3.5.1 and may need to be incorporated
in Section 8.1 of IEEE Std. 1076-93.
Each procedure specified within a protected type
declaration defines an abstract operation which operates atomically on
a single object of the associated protected type. In
addition to the (implied) object of protected type being operated on, additional
parameters may be specified by the procedure specification interface declarations,
as with any other procedure specification. These interface declarations
may have any type which is not of and does not contain access or file type(s).
Procedures declared in the protected type specification may not have
formals of or including access or file type.
LRM Change:
The above syntactic and semantic restrictions should be included in
the Section 3.5.1 (Protected Type Specifications) and may need to be incorporated
in Section 2.1 (Subprogram declarations) of IEEE Std. 1076-93.
Rationale:
If the interface objects were to have one or more parameters containing
an access value, the same dynamically allocated object might become accessible
from two or more processes via distinct mutual exclusion mechanisms, thus
subverting the implied atomicity of a protected type (monitor).
The interface declarations of a protected type declaration
subprogram may include interface declarations of protected type. Although
exclusive access is not obtained for interface declarations of protected
type directly, the ability to pass objects of protected type, by reference,
is essential to implement generalized n-ary (n > 1) operations. VHDL
calling semantics allow passing actuals of composite type by either copy
or reference (scalars must be passed by value); actuals of protected
type must be passed by reference.
LRM Change:
The above semantic restrictions should be included in the Section 2.1.1.1
(Constant and Variable Parameters) of IEEE Std. 1076-93.
Each function specified within a protected type
declaration defines an abstract operation which operates atomically on
a single object of the associated protected type and returns a value.
NOTE:
Since values cannot be created of protected type (only objects) a function
cannot return a protected type.
In addition to the object of protected type to which
protected type subprograms have direct visibility (prefix of selection),
additional parameters may be specified by the function specification interface
declarations, as with any other function specification. These interface
declarations may have any type which is not of and does not contain access
or file type(s). Functions declared in the protected type interface
may not have formals of access or file type.
LRM Change:
The above syntactic and semantic restrictions should be included in
the Section 3.5.1 (Protected Type Specifications) and may need to be incorporated
in Section 2.1 (Subprogram declarations) of IEEE Std. 1076-93.
Rationale:
If the interface declarations were to have one or more parameters containing
an access value, the same dynamically allocated object might become accessible
from two or more processes via distinct mutual exclusion mechanisms, thus
subverting the implied atomicity of a protected type.
The interface declarations of a protected type specification
subprogram may include interface declarations of protected type. Although
exclusive access is not obtained for interface declarations of protected
type directly, the ability to pass objects of protected type, by reference,
is essential to implement generalized n-ary (n > 1) operations. VHDL
calling semantics allow passing actuals of composite type by either copy
or reference (scalars must be passed by value); actuals of protected
type must be passed by reference.
LRM Change:
The above semantic restrictions should be included in the Section 2.1.1.1
(Constant and Variable Parameters) of IEEE Std. 1076-93.
No copy (assignment) operation is predefined at all
for protected types.
Note:
Addition of the ability to overload assignment (beyond the scope of this
PAR) would provide for user-defined deep copy (See LCS Section 3.1) semantics.
Rather than provide an irregular form of predefined shallow copy, no copy
(assignment) operation is predefined at all for protected types.
LRM Change:
The above semantic restrictions should be included as a note in Section
3.5 (Protected Types) of IEEE Std. 1076-93.
Attribute specifications may appear in the protected type declarations. For further information on attribute specifications, see IEEE Std. 1076-93 Section 5.1.
Use clauses may appear in protected type declarations in order to make declarations directly visible which would otherwise be visible only by selection. For further information on use clauses, see IEEE Std. 1076-93 Section 10.4, which need not change.
Exactly one protected type definition must be associated with each protected type declaration in order to define how the protected type is to be implemented. Protected type definitions have the syntactic form:
protected_type_definition ::= protected body protected_type_definition_declarative_part end protected body[protected_type_simple_name]
LRM Change:
The above syntactic and semantic restrictions should be included in
the Section 3.5.2 (Protected Type Body).
The protected type definition may contain declarative
items in any order provided that declaration precedes use (as elsewhere
in VHDL, consistent with existing visibility rules):
protected_type_definition_declarative_part ::= { protected_type_body_declarative_item } protected_type_definition_declarative_item ::= subprogram_declaration | subprogram_body | type_declaration | subtype_declaration | constant_declaration | variable_declaration | file_declaration | alias_declaration | use_clause | attribute_declaration | attribute_specification | group_template_declaration | group_declaration
The declarations which can appear in a protected type definition are identical to those which can appear in a subprogram body. The following subsections discuss each of the protected body declaration items in more detail.
Each subprogram specification which appeared in
the protected type specification shall have a corresponding subprogram
body in the protected type body. This body defines the subprogram's implementation.
It is an error if a subprogram specification declared in the protected
type declaration does not have a conforming subprogram body by the end
of the protected type definition's declarative region.
Subprogram specifications first appearing in the protected
body are only visible to other (subsequent) subprogram bodies appearing
in the same protected type. The parameters and, for functions, return type,
of subprograms first specified in the protected type body may involve parameters
of or containing access types (unlike subprograms specified in the protected
type specification).
LRM Change:
The above syntactic and semantic restrictions should be included in
the Section 3.5.2 (Protected Type Body) or Section 2.1 (Subprograms).
Note:
Subprograms first declared in the protected type body may facilitate implementation
of the protected type. For example, such a "private" function
might provide for locating the last dynamically allocated record within
a list of dynamically allocated records maintained within a variable of
the protected type.
Side-effects from within pure functions, impure
functions and procedures remain consistent with VHDL-93. Specifically,
pure functions defined in the protected type body may not reference variable
declarations that belong to the protected type object to which the function
is applied. Impure functions and procedures defined in the protected type
body may both read and update variable declarations that belong to the
protected-type object to which such subprograms are applied, while exclusive
access is granted.
LRM Change:
The above should be summarized in a note associated with the explanation
of pure and impure functions in Section 2.1 of IEEE Std 1076-93.
The rules for wait statements contained in subprograms
are consistent with VHDL-93, although slightly more restrictive. From the
VHDL-93 LRM, Section 8.1: It is an error if a wait statement appears
in a function subprogram or in a procedure that has a parent that is a
function subprogram. Furthermore, it is an error if a wait statement appears
in an explicit process statement that includes a sensitivity list or in
a procedure that has a parent that is such a process statement. Further
more, a wait statement may not occur within or be reachable from any subprogram
declared in a protected type.
LRM Change:
The above semantic restriction (on wait statements) should be added
to Section 8.1 of IEEE Std. 1076-93.
Rationale:
If wait statements were to appear in any subprogram bodies appearing
within the protected type body then any call of a protected subprogram
which blocks may not resume until some subsequent simulation cycle (if
at all). Thus one wait statement, even if not directly called from a
given process, may suspend execution of other processes referencing the
same shared variable.
Type declarations may be declared (and used) within the protected type definition. Such declarations are described in IEEE Std. 1076-93 Section 4.1 and need not be changed.
Subtype declarations may be declared (and used)
within the protected type definition. Such declarations are described in
IEEE Std. 1076-93 Section 4.2 and need not be changed.
Note:
Since subtype declarations are only visible inside a protected type
body and signals cannot be declared inside a protected type body, specification
of a resolution function within a subtype indication has no significance
in the resulting model.
Constant declarations may be declared (and used)
within the protected type definition. Such declarations are described in
IEEE Std. 1076-93 Section 4.3.1.1 and need not change. The value of all
constant declarations must be given in the initial declaration; deferred
constant declarations may not appear in a protected type definition.
LRM Change:
The above semantic restrictions should be included in the Section 4.3.1.1
(Constant Declarations).
Variable declarations appearing in the protected type body define the encapsulated data representation of a protected type:
variable_declaration ::= identifier_list : subtype_indication [:= expression] ;
Subtype indications shall not denote the
protected type being defined but may denote other, previously defined protected
types.
LRM Change:
The above syntax and semantic restrictions should be included in the
Section 3.5.2 (Protected Type Body).
Ramification:
Within a protected type, the subtype_indications may denote previously
defined scalars, arrays, records, access types, files types and even other
protected types.
Each object (instance) of a protected type has distinct
storage associated with each variable declaration defined within the protected
type.
The variable declaration identifiers are only visible,
directly, within the protected type body (including any declarative regions
completely enclosed within the protected type body declarative region;
see "Scope
and Visibility Rules" on page 22).
LRM Change:
The above semantic restrictions should be included in the Section 3.5.2
(Protected Type Body).
Ramification:
Implementation of objects having a protected type may contain several
implicit variables denoting the process to which the object has granted
exclusive access (if any) and a queue denoting processes (if any) blocked
waiting for exclusive access to the object of protected type. Such implicit
queues are not to be defined within the normative text and are only used
in this LCS to facilitate understanding of possible implementation approaches.
File declarations may appear in protected type bodies. For further information on file declarations, see IEEE Std. 1076-93 Section 4.3.1.4 this section need not change.
Alias declarations, both object and non-object, may appear in protected type bodies. For further information on alias declarations, see IEEE Std. 1076-93 Section 4.3.3, which need not change.
Use clauses may appear in protected type bodies in order to make declarations directly visible which would otherwise be visible by selection. For further information on use clauses, see IEEE Std. 1076-93 Section 10.4, which need not change.
Attribute specifications may appear in the protected type body. For further information on attribute specifications, see IEEE Std. 1076-93 Section 5.1, which need not change.
Attribute declarations may appear in the protected type body. For further information on attribute declarations, see IEEE Std. 1076-93 Section 4.4, which need not change.
> Group template declarations may appear in protected type bodies. For further information on group template declarations, see IEEE Std. 1076-93 Section 4.6, which need not change.
Group declarations may appear in protected type bodies. For further information on group declarations, see IEEE Std. 1076-93 Section 4.7, which need not change.
A name denoting a protected type declaration may
appear in several contexts. Subtype indications based (directly or indirectly)
on a protected type may be used to derive new types, subtypes or objects.
Within an attribute specification, attribute values may be statically assigned
to a protected type. A protected type may appear as the prefix of a user-defined
attribute name. Use clauses may bring a protected type declaration into
direct visibility. This section considers the properties, ramifications
and limitations of each such use.
An incomplete type may be completed as a protected
type.
LRM Change:
The above semantic restrictions should be incorporated in Section 3.3.1
of IEEE Std. 1076-93.
Subtype indications generally permit association
of a resolution functions and/or subtype constraints with a type mark.
In general, subtype indications are derived directly from a protected type
without either a resolution function (meaningless) or a subtype constraint
(prohibited).
Association of resolution function with a protected
type is permitted but lacks utility. Since signals may not be declared
with a protected type, a resolution function has no meaning. In keeping
with VHDL's philosophy of permitting resolution functions even in situations
when the function is ignored (e.g. a variable), resolution functions may
be syntactically applied to a protected type but are ignored.
Constraints may not be applied directly to
a protected type, preserving the protected type's encapsulation. However
since an array may consist of elements having protected type, constraints
may be applied to type_marks indirectly containing a protected type.
LRM Change:
The above semantic restrictions should be incorporated in Section 4.2
of IEEE Std. 1076-93.
The resulting subtype indication may be used to declare
a new subtype or an object. This subsection will consider each use in turn.
Protected types may not be used in the definition
of other composite types.
Rationale:
Subelements of protected type lead to many corner cases which are not
readily defined. For example, equality and inequality are predefined for
all composite types. Either definition of these relational operators would
be needed for protected types or some composites would exist with undefined
relational operators. As a compromise, it seems feasible to consider composites
in which all subelements are either protected types or all subelements
are non-protected types.
Subtypes may be declared in which there is an optional resolution function, a type_mark denoting a protected type and no constraint. Such subtypes are functionally aliases of the original protected type.
Variables, shared variables and interface variable
may be declared which directly or indirectly use a protected type.
The VHDL 1076-93 keyword shared must preface
all shared variable (and only shared variable) declarations following the
VHDL-93 syntax:
variable_declaration ::= [shared] variable identifier_list : subtype_indication;
Rationale:
Explicit use of the keyword for all shared variables satisfies documentation
requirements and internal consistency checking requirements.
All shared variables must have a subtype indication
which directly denotes a protected type.
LRM Change:
The above semantic restriction must be added to Section 4.3.1.3 of
IEEE Std. 1076-93.
Ramification:
Note that the ability to initialize a specific object of protected
type is not provided since assignment of protected types is not defined.
In the absence of an initializer, VHDL-93 already defines default initialization
rules for variable and constant declarations appearing in a protected type
body.
LRM Change:
This semantic restriction should be explicit in Section 4.3.1.3 of
IEEE Std. 1076-93.
Non-shared variables may be of protected type.
The process containing each such variable is given exclusive read/write
access to the variable when the variable is elaborated. Such access is
never rescinded.
LRM Changes:
The above semantic restrictions on interface declarations impact Section
4.3.1 (Object Declarations).
Ramification:
Non-shared variables of protected type may ignore locking and unlocking
implied by the protected type, analogous to the way in which variables
ignore resolution functions contained in the defining subtype indication.
Ramification:
Non-shared variables of a protected type may not be initialized as
part of the variable's declaration.
Interface variables may be declared which directly
or indirectly use a protected type (no shared reserved word is used).
Such interface objects are passed by reference, assuming the same properties
as the variable object that was passed. All such interface objects must
have mode inout; any other mode is an error (detected at analysis
time).
LRM Changes:
The above semantic restrictions on interface declarations impact Section
2.1.1.1 (Constant and Variable Parameters), and Section 4.3.2 (Interface
Declarations).
Attribute values may be assigned to both protected types and objects of protected type. The base type of a protected type is always itself.
A type_mark directly or indirectly denoting a protected
type is semantically prohibited in several syntactically valid contexts.
These semantic restrictions are an intuitive extension of VHDL's existing
semantic limitations.
A file_type_definition may not depend on a type mark
which is of or contains a protected type. Instances of file types inherently
extend outside of the semantic environment defined by VHDL. This extra-language
visibility makes it difficult to assign meaningful semantics to file_types
derived from other file types or access types, resulting in IEEE Std. 1076-93
disallowing such file types. In a like manner, extra-language visibility
of file types makes it difficult to preserve the encapsulation of protected
type instances, hence file types are semantically prohibited.
An access_type_definition may not be defined using
a subtype indication which is a protected type.
Rationale:
If an access_type_definition were allowed to depend on a protected
type, objects of protected type would need to be dynamically allocated
and generally could only be disambiguated at runtime. Such capabilities
would both complicate implementation of such objects and generally reduce
the performance of language implementations. This restriction is analogous
to VHDL's current prohibitions against signals depending on access types.
LRM Change:
These semantic restrictions must be incorporated in Sections 3.3 (Access
Types) and 3.4 (File Types) of IEEE Std. 1076-93.
Constants, interface constants (including generic
constants) and user-defined attributes may not be of protected type (directly
or indirectly).
LRM Change:
These semantic restrictions must be incorporated in Sections 4.3.1.1
(Constant Declarations), 4.3.2 (Interface Declarations) and 4.4 (Attribute
Declarations) of IEEE Std. 1076-93.
Signals, signal parameters and ports may not be of
protected types (directly or indirectly).
LRM Change:
These semantic restrictions must be incorporated in Section 4.3.1.2
(Signal Declarations) and Section 4.3.2 (Interface Declarations) of IEEE
Std. 1076-93.
Since protected types are not scalar types, an index_subtype_definition
may not depend on a protected type. Likewise predefined attributes T'LEFT,
T'RIGHT, T'HIGH, T'LOW, T'ASCENDING, T'IMAGE, T'VALUE, T'POS, T'VAL, T'SUCC,
T'PRED, T'LEFTOF and T'RIGHTOF are prohibited. Ramification:
Protected types may not appear directly or within the definition of
an access type.
Ramification:
Protected types may not appear directly or within the definition of
a file type.
Ramification:
Protected types may not appear directly or within the definition of
a subtype indication used in an allocator expression. Thus objects of protected
type may not be dynamically allocated. Objects of protected type may be
dynamically elaborated within the declarative region of a subprogram call,
however they are not dynamically allocated.
Protected objects may generally be referenced in
expressions, sequential statements and concurrent statements. This section
describes all three uses.
Subprograms defined within a protected type specification
operate on objects of protected type via selection. The prefix denotes
the object of protected type. The suffix denotes the subprogram call, including
any actual parameters passed as part of the call. Syntactically such calls
have the form:
protected_object_subprogram_name [ (actual_parameter_part)]
For example, a shared variable called counting_semaphore
may be incremented (using a procedure defined within the protected type
of counting_semaphore) by the variable n:
counting_semaphore.increment ( n );
Objects of protected type may be referenced using
a function call applied to an object of protected type, returning a value.
The value returned may not have protected, access or file type.
Expressions referencing a shared variable may not
be evaluated during elaboration of the design hierarchy.
Objects of protected type may appear in sequential statements as:
Objects of protected type may appear in concurrent statements as:
Ramification:
Since assignment of values having protected type is undefined and signal
assignment is predefined by the language, signal objects cannot take a
protected type as their subtype indication.
Ramification:
A call to a protected type subprogram may block on entry to the protected
object at time T and resume at some later time, either in the same simulation
cycle, or in a different simulation cycle.
A shared variable passed as an actual in a concurrent
procedure call has no effect on the static sensitivity list for that concurrent
procedure.
This section discusses the declarative region formed by a protected type, the scope of a protected type, visibility related to protected types and operation of use clauses in conjunction with protected types.
A protected type specification, together with its
protected body, forms a single declarative region. These two disjoint parts
are analogous to the treatment of the single declarative region formed
by a package declaration and its corresponding package body.
LRM Change:
This requires addition of another bullet point to Section 10.1.
Declarations appearing in the protected type declaration
are directly visible from the point of declaration in the protected type
declaration to the end of the protected type declaration and throughout
the corresponding protected definition.
Ramification:
Declarations appearing in the protected specification are directly
visible in the body of all subprograms contained in the corresponding protected
type body unless hidden by VHDL's normal visibility rules.
Declarations appearing in the protected type declaration
are visible by selection at places that are defined by a prefix which is
an object of the specified protected type.
LRM Change:
This requires a change to Section 10.3 describing the selection mechanism.
Declarations appearing in the protected body are directly
visible from the point of declaration in the protected type definition
to the end of the protected type definition. Ramification:
Declarations appearing in the protected type definition are directly
visible in the body of all subsequent subprograms contained in the protected
type definition unless hidden by VHDL's normal visibility rules.
Note:
Each object of the protected type is a unique instance of the collection
of objects declared in the protected type definition (analogous to objects
of a record type).
Note:
Use clauses in VHDL achieve direct visibility for declarations which
are visible by selection such that the selection prefix is a package or
library (but not a protected type or shared variable). The declaration
brought into direct visibility can be a protected type or shared variable.
Note:
Use clauses can make a package's protected type or shared variable
directly visible. Since the package is only elaborated once, the shared
variable declared in the package is only elaborated once and thus is uniquely
defined.
Use clauses may not be used to make any declaration
within the protected type directly visible from outside the protected type.
This section describes the additional elaboration and execution functionality associated with protected types.
Elaboration of a protected type declaration consists
simply of creating the protected type as a "template". Elaboration
of the protected type functionally occurs when and if an object of the
protected type is elaborated.
Elaboration of a protected type definition declaration
consists simply of creating the protected type definition as a "template"
body. Elaboration of the protected type body definition is functionally
deferred until an object of the protected type is elaborated. At this time
the declarations present in the protected type body are elaborated.
Elaboration of the protected type declaration when
an object is created of the protected type involves elaborating the declarative
part of the declaration. Elaboration of the protected type defintion involves
elaborating the declarative part of the definition.
Elaboration of an object declaration that includes
a protected type (directly or indirectly) first involves elaboration of
the subtype indication to determine the object's subtype. This is analogous
to the template-like elaboration of a component declaration. Since the
object includes a protected type, it can't be initialized with an initial
value, so step (b) of IEEE Std. 12.3.1.4 does not occur. Step (c) involves
creating the object, and for each protected type subelement, the protected
type definition is elaborated followed by elaboration of the associated
protected type body definition. This step is analogous to the instantiation
of an entity/architecture pair from a component declaration. Step (d) of
the object elaboration process does not occur.
LRM Change:
The above semantics will need to be incorporated in Section 12.3.1.4
(Object Declarations) of IEEE Std. 1076-93.
Elaboration of a variable of protected type proceeds identically with other VHDL variables declared in a subprogram (See Section 12.5 (b) of IEEE Std. 1076-93) since the subprogram is only accessible to a single process (no atomicity is required).
Elaboration of interface objects having protected
type occurs by reference. It is as if the formal parameter becomes an alias
for the actual protected type object.
LRM Change: The LRM must
ensure that actuals of protected type are passed by reference, not value.
This should probably be noted in Section 2.1.1.1 (Constant and Variable
Parameters) of IEEE Std. 1076-93.
When such a protected-type subprogram is called
by selection, the following happens:
LRM Change:
Additional information concerning locking must be added to Section
12.5 (Dynamic Elaboration).
Ramification:
No exclusive access is requested or granted for shared variables passed
as actuals in the call association list. Therefore access to the representation
of those shared variables must occur, if at all, via subsequent calls where
one of these shared variables forms the call prefix.
Note:
Chuck Swart notes that Ada has more restrictions on protected type
functions. They are not allowed to update values (they are expected to
be pure) and hence, non-mutual read access is allowed. (other processes
are blocked from access to the type via procedures). Consideration should
be given to making these restrictions on VHDL protected types.
Ramification:
Protected subprogram calls may be nested or recursive.
Ramification:
Signal parameters passed to a subprogram are passed by reference. The
significance of this is that, if the call to the protected type subprogram
blocks, then the value of the signal when the subprogram resumes will be
the current value of the signal and not the value of the signal when the
subprogram was initially called (and blocked).
Ramification:
Two or more processes accessing the same set of shared variables, combined
with more than one level of nesting (described above) has the potential
for livelock and/or deadlock.
Although more than one object of protected type may
be assigned exclusively to the same process at the same time, the normal
visibility rules determine which internal objects of the protected type
are directly visible and which must be access via the protected type declaration
subprograms. The only circumstance in which the internal objects of more
than one protected type are simultaneously visible is in a protected type
body that is statically nested within another protected type body.
While exclusive access has been granted to a process making a call to a protected type subprogram, the sequential statements within the protected type subprogram may read and write elements of the protected type object in accordance with the nature of the subprogram (pure function, impure function or procedure).
The only change to VHDL's lexical elements are the new reserved word protected.
This LCS introduces the new reserved work protected.
LCS Change:
This LCS introduces the new keyword protected into Section 13.9 of
IEEE Std. 1076-93.
Ramification:
VHDL-87-compliant source code and VHDL-93-compliant source code that
legally use "protected" as an identifier will encounter a syntactic
error when analyzing VHDL-93 A-compliant source code.
This section briefly discusses five optional extensions to this LCS which provide increased functionality at the cost of increased complexity.
In order for the designer of a protected type to define a deep copy appropriate to a specific protected type, it would be useful to be able to overload value assignment of values with protected type. Such an extension is beyond the scope of PAR 1076A.
In order to provide for user-defined assignment, and thus deep-copy, something like constructors would probably be needed. Such an extension is beyond the scope of PAR 1076A.
If constructors were to be provided, good language design seems to dictate some form of destruction mechanism. Such an extension is beyond the scope of PAR 1076A.
Within the body of a monitor type, it is often useful to identify the process from which the subprogram call originated in order to control functionality of the protected type method. Predefined declaration of a ProcessID type and an impure function returning a value of type ProcessID would accomplish this goal (resembling VHDL's current DelayLength type and impure function Now).
In order to illustrate the protected approach defined in this language change specification, it is useful to consider four examples of increasing complexity: a shared counter protected type, a complex number protected type, a variable size array protected type and a mutual-exclusion semaphore. Each of these examples illustrates a different characteristic of this protected type design.
The shared counter example illustrates an integer
that must be atomically incriminated, decremented and observed. Note that
all three of these operations are monadic in nature. First
the shared counter protected type specification and body appear:
type SharedCounter is protected procedure increment (n: integer); procedure decrement (n: integer); function value return integer; end protected SharedCounter; .... type SharedCounter is protected body variable counter_value: integer := 0; procedure increment (n: integer) is begin counter_value := counter_value + n; end procedure increment; procedure decrement (n: integer) is begin counter_value:= counter_value - n; end procedure decrement; function value return integer is begin return counter_value; end procedure value; end protected body SharedCounter;
Then a shared variable is created using the SharedCounter
protected type:
shared variable counter : SharedCounter;
Finally, several processes
may utilize the shared variable, such as the example process below:
example_process: process is ... counter.increment(5); ... counter.decrement(i); ... v := counter.value; if (v = 0) then ...-- by the time execution gets to here, the counter may ...-- have changed value! end if; end process example_process;
It is important to note that the if condition only
insures that the counter was 0 at the instant of the call; by the time
comparison occurs, the counter may have increased or decreased in value.
If it is important to insure that the semaphore remains
zero while the comparison and if condition executes, a more complex CountingSemaphore
would be required with methods to conditionally lock and unlock the counting
semaphore. The caller (example_process in this case) would try to acquire
the explicitly programmed lock. If the CountingSemaphore's lock subprogram
granted access via that call, it would return a key by which the owner
would be known in a subsequent call and the semaphore would reject any
other lock request. The semaphore would only honor increment and decrement
requests which contained the appropriate key (belonging to the exclusive
owner). When the conditional operation was done, the owner of exclusive
access must unlock the semaphore. While illustrating that a semaphore can
be embedded in a monitor with simple monadic functionality, the responsibility
is on the human to insure that every lock is matched by an unlock on every
path.
Abstracting high-level function into the protected
type can simplify the call down to a single call to the object of protected
type. For example, the call to get the semaphore's value followed by a
comparison with zero and an assert might be abstracted into a single CountingSemaphore
subprogram which triggers a VHDL assert statement if the semaphore_value
is zero.
The complex number example illustrates a protected
type which could be represented as a real and imaginary part or a phase
and magnitude. For purposes of illustration, the example happens to use
a real and imaginary representation, although this should not be discernible
from the interface. A single operator, addition, serves to illustrate definition
of a dyadic operator for the complex number type.
type ComplexNumber is protected procedure extract (variable r, i: out real); procedure add (variable a, b: in ComplexNumber); end protected ComplexNumber; ... type ComplexNumber is protected body variable re, im: real; procedure extract (variable r, i: out real) is begin r := re; i := im; end procedure explode; procedure add (variable a, b: in ComplexNumber) is variable a_real, b_real : real; variable a_imag, b_imag : real; begin a.extract(a_real, a_imag); b.extract(b_real, b_imag); re := a_real + b_real; im := a_imag + b_imag; end procedure add; end protected body ComplexNumber;
Then in some concurrent declarative region, perhaps
that of an architecture, three shared variables are declared with default
initial values.
shared variable sv1, sv2, result : ComplexNumber;
Sequential statements and concurrent procedure calls may reference these shared variables from many different processes. result.add(sv1,sv2); Next we consider an example of a protected type retaining a variable size object.
The variable size array example illustrates a protected
type capable of representing an object of varying size. In this case, the
varying size refers to the number of bit elements stored:
type VariableSizeBitArray is protected procedure add_bit (index: positive; value: bit); function size return integer; end protected VariableSizeBitArray; type VariableSizeBitArray is protected body type bit_vector_access is access bit_vector; -- In this simple case, element initalization works, however note -- the alternative approach suggested by Peter Ashenden below... variable bit_array: bit_vector_access := NULL; variable bit_array_length : natural := 0; procedure add_bit (index: positive; value : bit) is variable tmp : bit_vector_access; begin if index > bit_array_length then tmp := bit_array; bit_array_length := index; bit_array := new bit_vector(1 to index); if tmp /= null then bit_array(1 to bit_array_length) := tmp.all; deallocate (tmp); end if; end if; bit_array (index) := value; end procedure add_bit; function size return integer is begin return bit_array_length; end function size; impure function initialize return boolean is begin bit_array := null; bit_array_length := 0; return true; end function initialize; constant initialized : boolean := initialize; end protected body VariableSizeBitArray;
Within a sequential declarative region, perhaps
a process, we can then declare a variable bit_stack: variable
bit_stack: VariableSizeBitArray; The sequential
code within the process may then initialize the bit_stack then adds three
elements:
bit_stack.add_bit(1,'1'); bit_stack.add_bit(2,'1'); bit_stack.add_bit(3,'0');
The VariableSizeBitArray protected type could equally
well have been used to create a shared variable accessible from several
processes during the same delta cycle. As long as the array was initialized
once, the bit_stack should function equally well.
The interested reader is urged to sketch other short
examples which illustrate use of protected types for scenarios of interest
to the reader. Authors of this LCS would be very interested in examples
which imply incorrect results under some parallel processing scenerios
or which seem unacceptably awkward.
Monitors are intended to provide a more powerful,
higher level mechanism than semaphores, however monitors do not readily
replace semaphores. Chuck Swart prepared this example to illustrate the
complexity of implementing a semaphore using monitors.
In general, semaphores are used in the following way:
p1: process is ... P(s); -- Block until semaphore s is acquired ... -- Critical section c1 V(s); -- Release semaphore s ... p2: process is ... P(s); -- Block until semaphore s is acquired ... -- Critical section c2 V(s); -- Release semaphore s; ...
The P and V procedures are executed atomically.
When a process executes a P the process requests control of the semaphore.
If another process controls the semaphore, execution of the requesting
process is blocked until the semaphore is available. Execution of V releases
the semaphore for use by other processes.
The above code uses semaphores to guarantee that critical
regions c1 and c2 will not execute simultaneously.
Here is an example which tries to emulate the above
code using protected types:
entity e is end e; architecture foo of e is type Semaphore is protected procedure up ( variable ret_val: out boolean); procedure down; end protected; type Sempahore is protected body variable entry_ok: boolean := true; procedure up ( variable ret_val: out boolean) is begin ret_val := entry_ok; entry_ok := FALSE; end procedure up; procedure down is begin entry_ok := true; -- For simplicity, no error checks end procedure down; end protected; shared variable s: Semaphore; procedure P ( variable s: Semaphore) is variable success: boolean := false; begin loop1: while not (success) loop -- note busy loop s.up(success); end loop loop1; return; end procedure P; procedure V ( variable s: Semaphore) is begin s.down; return; end procedure V; ... p1: process is ... P(s); -- Block until semaphore s is acquired; ... -- Critical section c1 V(s); -- Release semaphore s; ... p2: process is ... P(s); -- Block until semaphore s is acquired; ... -- Critical section c2 V(s); -- Release semaphore s; ...
Unless this code executes in an environment which
interleaves execution of p1 and p2, the code will not execute as expected.
However, most, if not all, current uniprocessor implementations execute
a single process until that process executes a wait statement. Under
this common implementation, if p1 executes while p2 is in critical section
c2, then process p1 will busy wait forever, since control will never be
given to p2 and, thus, the semaphore will never be released.
The preferred solution is to reformulate the VHDL
code as a monitor. The critical sections (C1 and C2 above) are rewritten
as two procedures in a protected type declaration (and body). In this case
the protected type body need not have any state (variable declarations).
An object of protected type CriticalSection can be created and referenced
from two or more processes.
type CriticalSection is protected procedure c1; procedure c2; end protected CriticalSection; ... type CriticalSection is protected body procedure c1 is begin -- Body of critical section c1 end procedure c2; procedure c2 is begin -- Body of critical section c2 end procedure c2; end protected body CriticalSection; shared variable Semaphore : CriticalSection;
This language change specification introduces two primary sources of incompatibility relative to VHDL code compliant with IEEE Standard 1076-93. Introduction of the keyword protected may result in an identifier now interpreted as a keyword. This should result in a syntactic error. Any shared variables must now be of protected type. Since protected types did not previously exist, this incompatibility can be detected as part of the syntactic or type analysis phase of compilation.
In the domain of Concurrent Sequential Process (CSP) languages, there are 3 well-known approaches to providing mutual exclusion for shared resources: semaphores, critical regions and monitors. This section discusses how the requirements phase and VHDL-92 negative ballots indicated that semaphores and critical regions not the approach of choice.
Semaphores provide for independent statements denoting entry to and exit from a critical section. Their apparent simplicity and flexibility hides complications in cases where dynamic code execution does not correctly pair the entry and exit, resulting in deadlock. Within the mutual exclusion literature, semaphores are analogous to the GOTO statement within sequential programming language design. Several VHDL 1076A requirements rated as strongly desirable were not consistent with the semaphore design including:
The first (draft) version of VHDL 1992 provided
shared variables with mutual exclusion semantics through a form of critical
regions called access statements. The following sections describe this
initial implementation and some of the problems associated with it.
In VHDL 1992/A, the access statement defined a critical
region of code for one or more shared variables. Some of the more important
characteristics of the access statement were:
A shared variable access list, analogous to a process
sensitivity list, declared which shared variables needed to be locked before
execution of the critical region could proceed.
Limitations were placed on the types of statements
that could be executed in a critical region. For example, wait statements
were not permitted in critical regions.
To prevent deadlock situations, critical regions could
not be accessed from within a another critical region. Because the access
statement did not resolve the issue of more than one process containing
an access-typed variable referencing the same shared data (alias), shared
variables could not be access-typed.
Figure 1 below uses a fragment of code to demonstrate
1076-1992/A access statements. As a result of the mutual exclusion provided
by access statements, shared variable SV1 will always have a value of -2,
0, or +2. The addition operation (first access statement) or the subtraction
operation (second access statement) will always execute atomically. Without
the mutual exclusion assured by the access statement, the SV1 in P1 may
be consistently referenced on the right hand side, then the subtraction
statement in P2 might execute completely, then the increment and store
phase of the sequential statement in process P1 might complete, assigning
a sequence of ascending, even values to SV1. With more complex data structures
that a single variable and more complex, composite types, even more bizarre
results are possible in the absence of mutual exclusion.
Figure 1: Example illustrating
VHDL-93 Draft A's access statement
Balloting of 1076-1992/A raised issues concerning
access statements ranging from concern that the access statement failed
to satisfy the original requirements to concerns that the language definition
was ambiguous. Issues raised include:
Problems, primarily ambiguities, surrounding the shared
variable access list:
If the shared variable access list contains an indexed
name, sliced name or record element, what constitutes the longest static
prefix?
Does the language specify the order in which the access
list's shared variables are locked?
Restrictions against nesting of access statements
(to prevent deadlock) violated principles of information hiding, making
access statements effectively unusable within subprograms.
Restrictions against access-typed shared variables
left a key requirement for dynamically sized data structures unsatisfied.
The ballot resolution team looked at the problems
and issues with the A draft's implementation of shared variables and, due
to time constraints and the inability to agree on a better solution, decided
to provide the simplest resolution possible, global variables without any
form of mutual exclusion.
Because members of the language design team neither
had the time to flesh out a new language implementation nor would user
pressures permit omission from the language, they chose a solution that
many hated and few liked. Since all the issues with the A draft concerning
shared variables involved mutual exclusion semantics, the solution was
to eliminate all mutual exclusion semantics from the language. This solution
required implements to define their own mutual exclusion semantics for
multi-threaded simulators and parallel simulators. In the absence of language-
mandated mechanisms for mutual-exclusion, users were likely to find that
VHDL models using shared variables were at best not portable between simulators
or even versions of the same simulator.
The result of balloting the 1076-1992/B draft was
predictable. Shared variables were once again the center of attention,
primarily from those who understood the long-term ramifications of a parallel
language design with shared variables but completely lacking any mechanism
for mutual exclusion. Mutual exclusion is primarily a concern for multi-threaded
simulators, parallel simulators, synthesis systems and formal verification
systems. Such tools with support for shared variables were apparently not
widely available to the 1076-1992/B language designers or ballot group,
hence the problem was initially not widely understood.
However, since the result of the balloting was predicted,
and no one wanted the 1992 standardization held up indefinitely for a complete
fix to the shared variable problem, the B draft was distributed to balloters
with a cover letter promising the formation of a working group to address
this single language issue. Thus was born the Shared Variables Working
Group and eventually this language change specification based on monitors.
See the motivational introduction to Section 2 (Section 2.1) for an introduction to monitors. NOTE: This is the last page of the LCS.
Copyright © 1996, Contributors to the Shared Variable Working Group. All rights reserved.