Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3. A system has a 3 ring security model similar to that discussed in class. Ring 0 is used for a hypervisor, HV, managing

 

3. A system has a 3 ring security model similar to that discussed in class. Ring 0 is used for a hypervisor, HV, managing virtual machines, Ring 1 is used for the O/S kernel of any of the virtual machines running, and Ring 2 is used by applications running in those virtual machines. Assume you have AppA running on Linux in VmA and AppB running on BSD on VmB on the above system. AppB and AppA have opened a network socket between them and have can use system calls to read from and write from the socket, readSock() and writeSock(). a) AppA perfoms a writeSock() system call. What happens in terms of the system call interface and the ring values? b) What must happen for the data to be transferred between VMs? (in terms of rings) c) Assume AppB is waiting for data having called readSock(). What does the BSD kernel have to do to get the data to AppB.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

a When AppA performs a writeSock system call it initiates a request to write data to the network socket The system call interface allows the applicati... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Control Systems Engineering

Authors: Norman S. Nise

7th Edition

1118170512, 978-1118170519

More Books

Students also viewed these Operating System questions

Question

If X has distribution function F(t) = 0, t Answered: 1 week ago

Answered: 1 week ago

Question

Briefly describe the design procedure for a controller.

Answered: 1 week ago