8836 Multics Flashcards
What is a process In multics?
A process is a collection of code and data segments that belong to a principal/user or running on their behalf.
What are the two types of segments in multitics?
Users and supervisor segments.
What are the two types of per segment access control in Multics?
List based
- Non-hierarchical
- inter-process
concentric rings of protection
- Hierarchical
- intra-process
How is the ACL implemented for a segment in Multics.
A linked list containing.
-User identification
-Mode of Access
-Ring Brackets
In Multics which rings may J access?
J+1,J+2,J+n
What are the ring rules in Multics?
Rule1: A procedure segment in ring j can call any other procedure seegment in j or greater
Rule2: A procedure segment in ring j should only make controlled calls to a procedure seegment I I<J
Rule3: A procedure segment in ring j should not be given any access to data in lesser rings
What is called when a ring crossing fault occurs?
Gatekeeper.
How can a code segment (5,6,7) executing in a ring l+1 to m call a code segment (3,3,5) executing at k?
Via a gate in segment
What happens when a code segment b is outside the call bracket l-m of a?
It cannot access the code segment a.
In the ring bracket 0,63,63 what is the access bracket?
0-63 Since the access spans all the rings the segment gets loaded in the ring of the caller.
What does the ring bracket of 5,48,48 mean on a Data segment with effective mode of RW?
Data can be written from ring 0-5, and read from 6-48, and it is not reachable from any code segment executing in a ring greater than 48.
How do we decide which User proccess related procedures are allowed to access a Data segment?
Based on ACL.
What can access a code segment with the ring bracket (3,3,5) and access mode R,E.
Code segments in rings 0-3 R,E and E through a gate:4-5
which code segment in what rings will be able to call the segment? 3
Which code Segments in which rings will never be able to call the segment? >5
How do Modern operating systems differ in design from Multics?
Modern operating systems values portability over security.
What is a way to structure various modules that make up a non-trivial TCB?
Layered Design.