Summary
The Cyclone programming language is intended to be a safe dialect of the C language. Cyclone is designed to avoid buffer overflows and other vulnerabilities that are possible in C programs, without losing the power and convenience of C as a tool for system programming. Cyclone development was started as a joint project of AT&T Labs Research and Greg Morrisett's group at Cornell University in 2001. Version 1.0 was released on May 8, 2006. Cyclone attempts to avoid some of the common pitfalls of C, while still maintaining its look and performance. To this end, Cyclone places the following limits on programs: NULL checks are inserted to prevent segmentation faults Pointer arithmetic is limited Pointers must be initialized before use (this is enforced by definite assignment analysis) Dangling pointers are prevented through region analysis and limits on free() Only "safe" casts and unions are allowed goto into scopes is disallowed switch labels in different scopes are disallowed Pointer-returning functions must execute return setjmp and longjmp are not supported To maintain the tool set that C programmers are used to, Cyclone provides the following extensions: Never-NULL pointers do not require NULL checks "Fat" pointers support pointer arithmetic with run-time bounds checking Growable regions support a form of safe manual memory management Garbage collection for heap-allocated values Tagged unions support type-varying arguments Injections help automate the use of tagged unions for programmers Polymorphism replaces some uses of void * varargs are implemented as fat pointers Exceptions replace some uses of setjmp and longjmp For a better high-level introduction to Cyclone, the reasoning behind Cyclone and the source of these lists, see this paper. Cyclone looks, in general, much like C, but it should be viewed as a C-like language. Cyclone implements three kinds of pointer: (the normal type) @ (the never-NULL pointer), and ? (the only type with pointer arithmetic allowed, "fat" pointers).
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related concepts (8)
Segmentation fault
In computing, a segmentation fault (often shortened to segfault) or access violation is a fault, or failure condition, raised by hardware with memory protection, notifying an operating system (OS) the software has attempted to access a restricted area of memory (a memory access violation). On standard x86 computers, this is a form of general protection fault. The operating system kernel will, in response, usually perform some corrective action, generally passing the fault on to the offending process by sending the process a signal.
Rust (programming language)
Rust is a multi-paradigm, general-purpose programming language that emphasizes performance, type safety, and concurrency. It enforces memory safety—ensuring that all references point to valid memory—without requiring the use of a garbage collector or reference counting present in other memory-safe languages. To simultaneously enforce memory safety and prevent data races, its "borrow checker" tracks the object lifetime of all references in a program during compilation.
Pointer (computer programming)
In computer science, a pointer is an object in many programming languages that stores a memory address. This can be that of another value located in computer memory, or in some cases, that of memory-mapped computer hardware. A pointer references a location in memory, and obtaining the value stored at that location is known as dereferencing the pointer. As an analogy, a page number in a book's index could be considered a pointer to the corresponding page; dereferencing such a pointer would be done by flipping to the page with the given page number and reading the text found on that page.
Show more