3 - Operating Systems Flashcards
TCB requirements
Tamper-proof - hardware support for memory protection, processor execution modes (sys/user), privileged instructions, system calls
Complete mediation - No protected resource can be accessed without going through TCB
Correct - small and simple, correct, secure coding
System calls
Transfers control between user and system code
Calls go through call gates and return to user code
Execution mode/privilege ring changes
OS isolation from application code
Kernel resides in each processes address space
Process can only cross the fence in limited ways
Address translation
OS maps logical virtual addresses on to physical memory frames
Isolating users
OS uses hardware support for memory protection