Polymorphic Types for Leak Detection in a Session-Oriented Functional Language

  • Viviana Bono
  • Luca Padovani
  • Andrea Tosatto
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7892)

Abstract

Copyless message passing is a communication paradigm in which only pointers are exchanged between sender and receiver processes. Because of its nature, this paradigm requires that messages are treated as linear resources. Yet, even linear type systems leave room for scenarios where apparently well-typed programs may leak memory. In this work we develop a polymorphic type system for leak-free copyless messaging in a functional setting, where first-class functions can be used as messages.

References

  1. 1.
    Bono, V., Messa, C., Padovani, L.: Typing Copyless Message Passing. In: Barthe, G. (ed.) ESOP 2011. LNCS, vol. 6602, pp. 57–76. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  2. 2.
    Bono, V., Padovani, L.: Typing Copyless Message Passing. Logical Methods in Computer Science 8, 1–50 (2012)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Bono, V., Padovani, L., Tosatto, A.: Polymorphic Types for Leak Detection in a Session-Oriented Functional Language (2013), http://www.di.unito.it/~padovani/Papers/BonoPadovaniTosatto13.pdf
  4. 4.
    Gay, S.: Bounded Polymorphism in Session Types. Mathematical Structures in Computer Science 18(5), 895–930 (2008)MathSciNetMATHCrossRefGoogle Scholar
  5. 5.
    Gay, S., Hole, M.: Subtyping for Session Types in the π-calculus. Acta Informatica 42(2-3), 191–225 (2005)MathSciNetMATHCrossRefGoogle Scholar
  6. 6.
    Gay, S., Vasconcelos, V.T.: Linear Type Theory for Asynchronous Session Types. Journal of Functional Programming 20(01), 19–50 (2010)MathSciNetMATHCrossRefGoogle Scholar
  7. 7.
    Honda, K.: Types for Dyadic Interaction. In: Best, E. (ed.) CONCUR 1993. LNCS, vol. 715, pp. 509–523. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  8. 8.
    Honda, K., Vasconcelos, V.T., Kubo, M.: Language Primitives and Type Disciplines for Structured Communication-based Programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122–138. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  9. 9.
    Hunt, G., Larus, J., Abadi, M., Aiken, M., Barham, P., Fähndrich, M., Hawblitzel, C., Hodson, O., Levi, S., Murphy, N., Steensgaard, B., Tarditi, D., Wobber, T., Zill, B.: An Overview of the Singularity Project. Technical Report MSR-TR-2005-135, Microsoft Research (2005)Google Scholar
  10. 10.
    Hunt, G.C., Larus, J.R.: Singularity: Rethinking the Software Stack. SIGOPS Operating Systems Review 41, 37–49 (2007)CrossRefGoogle Scholar
  11. 11.
    Villard, J.: Heaps and Hops. PhD thesis, Laboratoire Spécification et Vérification, ENS Cachan, France (2011)Google Scholar
  12. 12.
    Wright, A.K., Felleisen, M.: A syntactic approach to type soundness. Information and Computation 115(1), 38–94 (1994)MathSciNetMATHCrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Viviana Bono
    • 1
  • Luca Padovani
    • 1
  • Andrea Tosatto
    • 1
  1. 1.Dipartimento di InformaticaUniversità di TorinoItaly

Personalised recommendations