Information Technology Reference
In-Depth Information
15. Write a program to verify that the operating system on your computer
protects itself from rogue system calls correctly. For a single system call
such as file system open, try all possible illegal calls: e.g., an invalid
system call number, an invalid stack pointer, an invalid pointer stored on
the stack, etc. What happens?
Search WWH ::




Custom Search