Claims
- 1. A method for executing computer processes comprising
receiving execution items for each said computer process, creating a plurality of stack data structures, segregating said execution items into a plurality of classes of execution items, pushing execution items in at least a first set of said classes on respective ones of a set of first stack data structures, each of said first stack data structures being addressed by a stack pointer, storing execution items in at least a second set of said classes in respective ones of a set of second stack data structures, each of said first stack data structures being addressed by an inverse stack pointer, and applying said execution items to an instruction execution unit by
selectively popping said execution items in said at least a first set of said classes from said first set of stack data structures, and selectively reading said execution items in said at least a second set of said classes from said second stack data structures.
- 2. The method of claim 1 wherein said execution items comprise stack pointers, frame pointers, return addresses, global variables, local variables, string variables, array variables.
- 3. The method of claim 1 wherein said segregating said execution items into a plurality of classes of execution items comprises segregating said execution items into at least a protected class of execution items and a non-protected class of execution items.
- 4. The method of claim 1 wherein said set of first stack data structures comprises at least one normal stack data structure.
- 5. The method of claim 3 wherein said pushing of execution items in at least a first set of said classes in respective ones of a set of first stack data structures comprises pushing said protected class of execution items on respective ones of a set of first stack data structures.
- 6. The method of claim 5 wherein said set of first stack data structures comprises at least one normal stack data structure.
- 7. The method of claim 6 wherein said set of first stack data structures comprises exactly one normal stack data structure.
- 8. The method of claim 1 wherein said set of second stack data structures comprises at least one inverse stack data structure.
- 9. The method of claim 3 wherein said storing execution items in at least a second set of said classes in respective ones of a set of second stack data structures comprises storing said non-protected class of execution items on respective ones of a set of second stack data structures.
- 10. The method of claim 9 wherein said set of second stack data structures comprises at least one inverse stack data structure.
- 11. The method of claim 10 wherein said set of second stack data structures comprises exactly one inverse stack data structure.
- 12. The method of claim 5 wherein said selectively popping said execution items in said at least a first set of said classes from said first set of stack data structures comprises popping said protected class of execution items from respective ones of said set of first stack data structures.
- 13. The method of claim 12 wherein said set of first stack data structures comprises at least one normal stack data structure.
- 14. The method of claim 12 wherein said set of first stack data structures comprises exactly one normal stack data structure.
- 15. The method of claim 5 wherein said selectively reading said execution items in said at least a second set of said classes from said second stack data structures comprises reading said non-protected class of execution items from respective ones of said set of second stack data structures.
- 16. The method of claim 15 wherein said set of second stack data structures comprises at least one inverse stack data structure.
- 17. The method of claim 15 wherein said set of second stack data structures comprises exactly one inverse stack data structure.
- 18. The method of claim 1 wherein said execution items in said at least a second set of said classes comprises string variables.
- 19. The method of claim 1 wherein said execution items in said at least a second set of said classes comprises string variables.
- 20. The method of claim 1 wherein said execution items in said at least a first set of said classes comprises stack pointers, frame pointers and return addresses.
RELATED APPLICATIONS
[0001] This application is related to, and claims priority based on, U.S. Provisional Patent Application No. 60/466,475 filed Apr. 30, 2003, which Provisional Patent Application is hereby incorporated in its entirety in the present non-provisional application.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60466475 |
Apr 2003 |
US |