Question: Consider a variant of the round robin (RR) scheduling algorithm in which the entries in the ready queue are pointers to the Process Control Blocks
Consider a variant of the round robin (RR) scheduling algorithm in which the entries in the ready queue are pointers to the Process Control Blocks (PCBs), rather than the PCBs. A malicious user wants to take advantage and somehow, through a security loophole in the system, manages to put two pointers to the PCB of his/her process with the intention that it can run twice as much. Explain what serious consequence(s) it could have if the (malicious) intention goes undetected by the OS.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
