Enforce memory protection at compile time?, Operating System

Assignment Help:

Why is it not possible to enforce memory protection at compile time?

 Every process should be protected against unwanted interference by other process, whether intentional or accidental. Therefore programs in other process must not be able to reference memory locations in a process for reading or writing purposes without permission.

      Satisfaction of relocation requirements add to the difficulty in satisfying the protection requirement. For the reason that the location of the program in main memory is unpredictable, it is unfeasible to check absolute addresses at compile time to assure protection. The majority programming languages permit the dynamic calculation at the run time. Therefore all memory    references generated by a process should check at run time to ensure that they refer only to the memory space allocated to that process. It is able to be seen that the mechanism that supports relocation also supports protection.

 


Related Discussions:- Enforce memory protection at compile time?

Define coding in an independent service architecture, Define Coding in an i...

Define Coding in an independent service architecture Coding in an independent service architecture alleviates many of the traditional dependencies of monolithic applications.

Macro, What is macro expansion

What is macro expansion

What is a semaphore, Question 1: a) State the different file attribute...

Question 1: a) State the different file attributes and briefly explain the operations that can be performed on each files. b) What is a semaphore? Describe why it is impor

Define dynamic loading, Define dynamic loading. To obtain better memory...

Define dynamic loading. To obtain better memory-space utilization dynamic loading is used. With dynamic loading, a routine is not loaded until it is called. All routines are ke

Advantage of minimizing the file space, Q. a number of systems automaticall...

Q. a number of systems automatically delete all user files when a user logs off or a job terminates unless the user explicitly requests that they be kept other systems keep all fil

What are the different files attributes?, What are the different files attr...

What are the different files attributes? File name:-it's the name of the file. It's the name with which the user identifies. Identifiers:-it's created when a file is created

Hashed page table, Hashed page tables A common approach for handling ad...

Hashed page tables A common approach for handling address spaces larger than 32 bits is to use a hashed page table. Every entry in the hash table having a linked list of elemen

Networking protocols, Modern networks are not implemented as a single piece...

Modern networks are not implemented as a single piece of software; that would render the task of dealing with multiple technologies and manufacturers virtually impossible. The solu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd