Protection boundary??
Answer / guest
A protection boundary protects one software subsystem on a
computer from another, in such a way that only data that is
explicitly shared across such a boundary is accessible to
the entities on both sides. In general, all code within a
protection boundary will have access to all data within
that boundary.
The canonical example of a protection boundary on most
modern systems is that between processes and the kernel.
The kernel is protected from processes, so that they can
only examine or change its internal state in certain
strictly-defined ways.
Protection boundaries also exist between individual
processes on most modern systems. This prevents one buggy
or malicious process from wreaking havoc on others.
| Is This Answer Correct ? | 2 Yes | 0 No |
Explain what is protection boundary?
explain about the initial process sequence while the system boots up?
Explain critical section?
tell me similarities between thread and process
What is Critical section?
what are the Performance differences between User-space threads and Kernel-supported threads.
What are the different kinds of threads?
3 Answers Ericsson, Fashion Technology,
Tell me when should we use thread-safe "_r" library calls?
What is the window of the working set of a process?
how to edit the network interface device type in container(zone) in solaris 10?
If your server is running on Unix and one of the sessions are keep on running without loading any data. how would you kill it?
When should we use thread-safe "_r" library calls?