A flaw in the protection system of many operating systems is argument passing. Often a common shared stack is used by all nested routines for arguments as well as for the remainder of the context of each calling process. (a) Explain what vulnerabilities this flaw presents. (b) Explain how the flaw can be controlled. The shared stack is still to be used for passing arguments and storing context.

Respuesta :

Answer and Explanation:

(a) Vulnerabilities presented by the flaw are:  

  • Utilizing a typical stack may in some cases deceive the procedures.  
  • One procedure may utilize different procedure contentions and assets.
  • The substance of the stack might be adulterated by whatever other procedure which may intrude on the different procedure execution.  

(b) The flaw can be constrained by dividing the stack and allotting the stack to each procedure. The access confinements can be applied to the procedures with the goal that they can't get to different procedure stack substance.