Answer Posted / guest
A protection boundary protects one software subsystem on a
computer from another, in such a way that only data that is
explicitly shared across such a boundary is accessible to
the entities on both sides. In general, all code within a
protection boundary will have access to all data within
that boundary.
The canonical example of a protection boundary on most
modern systems is that between processes and the kernel.
The kernel is protected from processes, so that they can
only examine or change its internal state in certain
strictly-defined ways.
Protection boundaries also exist between individual
processes on most modern systems. This prevents one buggy
or malicious process from wreaking havoc on others.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain what is protection boundary?
Explain what is scheduling?
List the system calls used for process management?
Explain how to work unix commands on windows xp without installing unix o/s in pc?
explain about the initial process sequence while the system boots up?
Explain the different kinds of threads?
Explain the architectural differences between user-space threads, and kernel-supported threads?
Tell me when should we use thread-safe "_r" library calls?
What is the working set of a process?
Explain what are threads?
How would you kill a process?
Explain the performance differences between user-space threads and kernel-supported threads.?
What is protection boundary?
How to work unix commands on windows xp without installing unix o/s in pc?
Explain what are the main families of threads?