Module 5. Computer Security AND Case Study of Linux Os
Module 5. Computer Security AND Case Study of Linux Os
Module 5. Computer Security AND Case Study of Linux Os
1
Notes for Operating Systems (16MCA24)
5.2.1 Passwords
Passwords are used to protect the data in the computer, when there are no complete
protection schemes. User is asked to provide the username and password during the
access. If the password matches with the one stored in the system, access is allowed.
By: Dr. Chetana Hegde, Associate Professor, RNS Institute of Technology, Bangalore – 98
Email: [email protected]
This document can be downloaded from www.chetanahegde.in with most recent updates. 2
Notes for Operating Systems (16MCA24)
By: Dr. Chetana Hegde, Associate Professor, RNS Institute of Technology, Bangalore – 98
Email: [email protected]
This document can be downloaded from www.chetanahegde.in with most recent updates. 3
Notes for Operating Systems (16MCA24)
By: Dr. Chetana Hegde, Associate Professor, RNS Institute of Technology, Bangalore – 98
Email: [email protected]
This document can be downloaded from www.chetanahegde.in with most recent updates. 4
Notes for Operating Systems (16MCA24)
The module requestor manages loading requested, but currently unloaded, modules; it also
regularly queries the kernel to see whether a dynamically loaded module is still in use, and
will unload it when it is no longer actively needed.
Driver Registration: Allows modules to tell the rest of the kernel that a new driver has
become available. The kernel maintains dynamic tables of all known drivers, and
provides a set of routines to allow drivers to be added to or removed from these tables
at any time. Registration tables include the following items:
o Device drivers
o File systems
o Network protocols
o Binary format
Conflict Resolution: A mechanism that allows different device drivers to reserve
hardware resources and to protect those resources from accidental use by another
driver. The conflict resolution module aims to:
o Prevent modules from clashing over access to hardware resources
o Prevent autoprobes from interfering with existing device drivers
o Resolve conflicts with multiple drivers trying to access the same hardware
Process environment: The process’s environment is inherited from its parent, and
is composed of two null-terminated vectors:
By: Dr. Chetana Hegde, Associate Professor, RNS Institute of Technology, Bangalore – 98
Email: [email protected]
This document can be downloaded from www.chetanahegde.in with most recent updates. 5
Notes for Operating Systems (16MCA24)
o The argument vector lists the command-line arguments used to invoke the
running program; conventionally starts with the name of the program itself
o The environment vector is a list of “NAME=VALUE” pairs that associates
named environment variables with arbitrary textual values.
Passing environment variables among processes and inheriting variables by a
process’s children are flexible means of passing information to components of the
user-mode system software. The environment-variable mechanism provides a
customization of the operating system that can be set on a per-process basis, rather
than being configured for the system as a whole.
5.9 SCHEDULING
The job of allocating CPU time to different tasks within an OS. While scheduling is normally
thought of as the running and interrupting of processes, in Linux, scheduling also includes
the running of the various kernel tasks. Running kernel tasks encompasses both tasks that
are requested by a running process and tasks that execute internally on behalf of a device
driver.
By: Dr. Chetana Hegde, Associate Professor, RNS Institute of Technology, Bangalore – 98
Email: [email protected]
This document can be downloaded from www.chetanahegde.in with most recent updates. 6
Notes for Operating Systems (16MCA24)
Symmetric Multiprocessing: Linux 2.0 was the first Linux kernel to support SMP
hardware; separate processes or threads can execute in parallel on separate
processors. To preserve the kernel’s nonpreemptible synchronization requirements,
SMP imposes the restriction, via a single kernel spinlock, that only one processor at
a time may execute kernel-mode code.
Management of Physical Memory: The page allocator allocates and frees all physical
pages; it can allocate ranges of physically-contiguous pages on request. The allocator
uses a buddy-heap algorithm to keep track of available physical pages:
o Each allocatable memory region is paired with an adjacent partner.
o Whenever two allocated partner regions are both freed up they are combined
to form a larger region.
By: Dr. Chetana Hegde, Associate Professor, RNS Institute of Technology, Bangalore – 98
Email: [email protected]
This document can be downloaded from www.chetanahegde.in with most recent updates. 7
Notes for Operating Systems (16MCA24)
By: Dr. Chetana Hegde, Associate Professor, RNS Institute of Technology, Bangalore – 98
Email: [email protected]
This document can be downloaded from www.chetanahegde.in with most recent updates. 8
Notes for Operating Systems (16MCA24)
Passing of Data among Processes: The pipe mechanism allows a child process to
inherit a communication channel to its parent; data written to one end of the pipe can be
read by the other. Shared memory offers an extremely fast way of communicating; any data
written by one process to a shared memory region can be read immediately by any other
process that has mapped that region into its address space. To obtain synchronization,
however, shared memory must be used in conjunction with another Inter-process
communication mechanism.
**************************
By: Dr. Chetana Hegde, Associate Professor, RNS Institute of Technology, Bangalore – 98
Email: [email protected]