Question

When a process executes a TRAP or is interrupted, the operating system uses a separate stack...

When a process executes a TRAP or is interrupted, the operating system uses a separate stack located in memory unavailable to user processes to execute any operating system code rather than the stack of the current process. Why might operating systems designers select this type of implementation?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The reason for selecting this type of implementation is due to following reasons;-

  • Suppose if OS uses same stack then the Process could crash OS, This is why the OS cannot trust the process.
  • The operating system needs to give fairness to all the processes, a single process should not utilize CPU time.
  • If there is load on Operating system i.e. too many processes are running at a time there must some memory left out so that the OS can have control over the Processes.
  • There can be some malicious processes which if utilize the whole stack can affect the CPU i.e. could hang the CPU. So there must be some memory left to have control over such processes and protect the CPU.
Add a comment
Know the answer?
Add Answer to:
When a process executes a TRAP or is interrupted, the operating system uses a separate stack...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Choose the correct answer 1. A virtual machine executes on a host operating system and a...

    Choose the correct answer 1. A virtual machine executes on a host operating system and a hypervisor provides an API to the actual hardware 2. The guest OS knows that it is not accessing the actual hardware so that it can perform better 3. The VM may supply an environment that is different than the actual host hardware 4. Applications running within the VM have an illusion that they are executing on a real machine Select one: a. All the...

  • The VAX/ VMS operating system makes use of four processor access modes to facili-tate the protection...

    The VAX/ VMS operating system makes use of four processor access modes to facili-tate the protection and sharing of system resources among processes. The access mode determines:• Instruction execution privileges: What instructions the processor may execute• Memory access privileges: Which locations in virtual memory the current instruc-tion may access The four modes are as follows:• Kernel: Executes the kernel of the VMS operating system, which includes memo-ry management, interrupt handling, and I/ O operations• Executive: Executes many of the operating...

  • Four modes vs. two modes of operationg systems (kernel / user)

    The VAX/ VMS operating system makes use of four processor access modes to facili-tate the protection and sharing of system resources among processes. The accessmode determines:• Instruction execution privileges: What instructions the processor may execute• Memory access privileges: Which locations in virtual memory the current instruc-tion may accessThe four modes are as follows:• Kernel: Executes the kernel of the VMS operating system, which includes memo-ry management, interrupt handling, and I/ O operations• Executive: Executes many of the operating system service...

  • LC-3 Programming Help!! The Stack Protocol The following outline is the protocol for passing arguments to...

    LC-3 Programming Help!! The Stack Protocol The following outline is the protocol for passing arguments to a function and returning values. Everything is stored on the runtime stack so that space is used only when the function is executing. As a result the actual address of arguments and locals may change from call to call. However, the layout of the stack frame (activation record) is constant. Thus, the offests from the frame pointer (FP) to the parameters/locals are constant. All...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Create a system flowchart and review the controls in the process. See attached document for details....

    Create a system flowchart and review the controls in the process. See attached document for details. Flowchart Assignment Business Process Diagramming and Control Evaluation The project is based on the business processes and controls for Order Entry/ Shipping and Billing / Cash Receipts at NashGulch Furnishings. NashGulch Furnishing sells high end, i.e. expensive and unique, home and office furnishings to design studios, building contractors, and architects. Customers place orders over the phone to the NashGulch customer fulfillment center, Nash Gulch...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Project 1: Implementing a Shell 1 Overview In this individual project you will have to design...

    Project 1: Implementing a Shell 1 Overview In this individual project you will have to design and implement a simple shell command interpreter called mysh. The basic function of a shell is to accept lines of text as input and execute programs in response. The shell must be able to execute built-in commands in a process different from the one executing mysh. 2 Requirements When first started, your shell should initialize any necessary data structures and then enter a loop...

  • A management information system (MIS) is a system or process that provides the information necessary to...

    A management information system (MIS) is a system or process that provides the information necessary to manage an organization effectively. MIS and the information it generates are generally considered essential components of prudent and reasonable business decisions. Management Information Systems are primarily concerned with the delivery of information (both internal and external) to organizational members from the shop floor workers to the management. The purpose of MIS is to help the smooth running of the business by providing information on...

  • C++ Programming Assignment S Mammal Lab This lab's goal is to give you some practice using inheritance, virtual functions, pointers, dynamic memory allocation, random numbers, and polym...

    C++ Programming Assignment S Mammal Lab This lab's goal is to give you some practice using inheritance, virtual functions, pointers, dynamic memory allocation, random numbers, and polymorphism. To complete the lab implement the following steps: Create a class called Mammal. All mammals have a weight and a name, so its data should be the mammal's weight and name. Provide a default constructor that sets the mammal's weight to 0 and name to null, and another constructor that allows the weight...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT