Answered step by step
Verified Expert Solution
Question
1 Approved Answer
3. A system has a 3 ring security model similar to that discussed in class. Ring 0 is used for a hypervisor, HV, managing
3. A system has a 3 ring security model similar to that discussed in class. Ring 0 is used for a hypervisor, HV, managing virtual machines, Ring 1 is used for the O/S kernel of any of the virtual machines running, and Ring 2 is used by applications running in those virtual machines. Assume you have AppA running on Linux in VmA and AppB running on BSD on VmB on the above system. AppB and AppA have opened a network socket between them and have can use system calls to read from and write from the socket, readSock() and writeSock(). a) AppA perfoms a writeSock() system call. What happens in terms of the system call interface and the ring values? b) What must happen for the data to be transferred between VMs? (in terms of rings) c) Assume AppB is waiting for data having called readSock(). What does the BSD kernel have to do to get the data to AppB.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
a When AppA performs a writeSock system call it initiates a request to write data to the network socket The system call interface allows the applicati...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started