Protection boundary??

Answer Posted / guest

A protection boundary protects one software subsystem on a
computer from another, in such a way that only data that is
explicitly shared across such a boundary is accessible to
the entities on both sides. In general, all code within a
protection boundary will have access to all data within
that boundary.
The canonical example of a protection boundary on most
modern systems is that between processes and the kernel.
The kernel is protected from processes, so that they can
only examine or change its internal state in certain
strictly-defined ways.

Protection boundaries also exist between individual
processes on most modern systems. This prevents one buggy
or malicious process from wreaking havoc on others.

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain critical section?

612


Explain what are the main families of threads?

572


Tell me when should we use thread-safe "_r" library calls?

538


How to work unix commands on windows xp without installing unix o/s in pc?

522


Explain what is protection boundary?

574






Explain what is scheduling?

614


How would you kill a process?

632


Explain what are threads?

635


Explain what is critical section?

555


explain about the initial process sequence while the system boots up?

614


What is the window of the working set of a process?

643


What is the working set of a process?

605


Explain similarities between thread and process?

590


List the system calls used for process management?

622


Explain the architectural differences between user-space threads, and kernel-supported threads?

514