ࡱ> KMJq` bjbjqPqP *,::8,:@244JJJ%%%???????$lAhC?%%?JJ?"""JJ?"?""R;>J( ݇eR p<]?\ @0:@=~D ~D<>~D>%Z@"4%%%??!X%%%:@ $  Computer Science 414Operating Systems Final Exam, due Thursday, 5/12/05, 1pm Time limit: Four hours (You must upload your answers within four hours from the time you fill out the web form to receive the link to the test) Upload your completed exam to the Toolkit as an assignment. You will find Final exam listed as an assignment. Your upload must be in either .txt, .pdf, .ps, or .doc format. The questions are of equal weight, but the individual parts are not. If you are stuck on a problem, dont waste time. Move on and come back to it later. This is an open-book, open-notes exam. You may also use other OS textbooks, e.g. Silberschatz et al. However, you may not use any other resources, such as other books, the Web, email, etc. You also may not refer to prior 414 tests or solutions (even if you made your own copy of them) once you start the test. You must of course work the test individually, and cannot discuss the test with anyone until after the deadline has passed. Show your work for partial credit. But do not kitchen sink incorrect statements, even if irrelevant or extraneous, will be held against you! In any question, make any assumptions that you need to, but document your assumptions. Time limit: Four hours NAME PLEDGE (Write out pledge in full. Append your name as a binding signature.): This page intentionally left blank Two different protection mechanisms that we have discussed are capabilities and access control lists. Explain how these mechanisms can be derived from the access matrix. For parts b d tell whether capabilities, ACLs, or both can be used to solve the following protection goals, and very briefly explain your answer. Ben wants his files readable by everyone except his parents. Puyan and Nick want to share some secret files. Anindo wants some of his files to be public. About demand paging: In what way is the page table like a mathematical function? Is it one-to-one? Why or why not? Which of the following pairs of TLB/page-table misses are legitimate? No TLB miss, no PT miss TLB miss but no PT miss PT miss but no TLB miss TLB miss and PT miss How could some process A be able to read data from some page P that belongs to some other processs memory, if that page P was never mapped in process As address space? Suppose a disk crash causes a complete loss of the free-block list. Can this be recovered if the file system does not use journaling? How? Can this be recovered if the file system does use journaling? How? Why do journaling file systems typically not log changes to data blocks? Soft errors (random bit flips due to cosmic rays or electrical noise) are becoming a more serious problem in memories (e.g. DRAM). Would it make sense to apply the journaling concept to memory management? Explain. Transactions: Suppose a bank transfer from account A to account B works like this: Read balance from source account: Read S Write new balance of source account: Write S Read balance from destination account: Read D Write new balance of destination account: Write D Suppose John and Alice share accounts and go to different ATMs at the same time. John transfers $100 from checking to savings; while Alice transfers $200 from savings to checking. (Note that one transfer goes from checking to savings, while the other is reversed.) Suppose that John and Alices transfers happen simultaneously. For each of the following, state whether such a scenario exists, and if so, give an example. A safe interleaving (i.e., it gives the correct final balances) [although it is safe, purely sequential operation of Johns and Alices operations isnt sufficient for this answeryou must show an interleaving] An unsafe (i.e., incorrect) interleaving A safe interleaving that can happen with the timestamp protocol but not with two-phase locking Two-phase locking causes deadlock Security: Skadco Inc. is a new e-commerce startup company and is just establishing its web presence. Customers will want their transactions to be encrypted using SSL. What information does Skadcos website provide as part of the SSL protocol to ensure that transactions with Skadco are safely encypted and that only Skadcos servers can decrypt them? Explain. If SSL is properly set up and all customer data stored in Skadcos systems is stored in encrypted form, is that sufficient to guarantee privacy of the transactions and the stored customer data? Explain. Do buffer overflows in the data or heap segments present security vulnerabilities? Explain.      PAGE 4  ',37?ABCEJKMOP\`gq/ 9 0 2 Z  L P j ) z ݝݝ hynCJ h^uCJ h+QCJ hCJ hhICJ hUCJ h+CCJ h|CJ hyn6CJ h+C6CJ h^u6CJ h|6CJ h+Q6CJhUhynhh^uh+Ch1Jh+Q6NOPg 1 2 { | E  & Fgdgd| & FgdhI$a$$a$ D E G k '< .1GHIO\_j}[]nr}BWX־ֺүүκҫҫҺҺңh(hu h1 hohhCLhh91hFl h:6h:66h:6h$h+Ch+QhR^h+Q>*CJhR^hR^>*CJ h+QCJ h+Q>*CJ@E G j FGHI^_h^hgd & F gdgd & Fgd & Fgd+Ch^hgd+C & Fgd+C6NcdXY. \]`gd$ & FgdgdCL & F gd$gd$ & Fgd & F gdgd & F gd2Q[6?2Ccde@}ſŴh(0JmHnHu hCL0JjhCL0JUhHwjhHwUhFl h$6h(hh h$hh91hCL5de@ABC}~gdFl  & F gd91gd91 & Fgd91h^hgd91 & F gdgdh^hgd$h`hgd$`gd$$a$h^hgd91gd91(/ =!"#$% 8@8 Normal_HmH sH tH P@P Heading 1$<@&5CJKHOJQJB@B Heading 2$$@&a$6CJB@B Heading 3$$@&a$6CJDA@D Default Paragraph FontViV  Table Normal :V 44 la (k(No List 2B@2 Body TextCJHC@H Body Text Indent h^hCJ4@4 Header  !4 @"4 Footer  !.)@1. Page Number<Z@B< ;F Plain Text OJQJ^J,NOPg12{|EGjFGHI^_6Ncd    X Y .   \ ]   d e @ABC}~00000P0P0P 0P0P 0P0P 0P 0P0P 0P0P0P000000000(0 0G0G 0G0G0G0G 0G 0G 0G0G0G0G 0G0G 0G0G 0G0G 0G 0G 0G 0G 0G0G 0G0G0G0G 0G0G 0G 0G 0G 0G0G0G 0G0G0G0G0G0G0G0G0G0G0G 0G 0G 0G 0G0G0G0G 0G0G 0G0G 0G0G 0G00@0I00@0I00@0I00@0I00@0@0I00dNOPg12{|EGjFHI^_6Ncd  X Y .  \ ]   d e @C00000P0P0P 0P0P 0P0P 0P 0P0P 0P0P0P000000000(0 0G0G 0G0G0G0G 0G 0G 0G0G0G 0G0G 0G0G 0G0G 0G 0G 0G 0G 0G0G 0G0G 0G0G 0G 0G 0G 0G0G 0G0G0G0G0G0G0G0G0G0G0G 0G 0G 0G 0G0G 0G0G 0G 0G@00   E  !8@0(  B S  ?*پ $e+پ h,پ |-پ f.پ 4}/پ |* * ; ; / / @ @ 8*urn:schemas-microsoft-com:office:smarttagsCity9*urn:schemas-microsoft-com:office:smarttagsplace 6z}BFMS Z`ltit 33GjI_ C ?#R ) ]X4wGCJ2?D>[t% AE T-b|8"p^ xu0R17|6^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.hh^h`o(.^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`o()^`OJPJQJ^Jo(- pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. hh^h`OJQJo(^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`OJPJQJ^Jo(-  ^ `OJQJ^Jo(hHo  ^ `OJQJo(hHxx^x`OJQJo(hHHH^H`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.  AE )-bxu]X4T7|?GC?D"p                    P                                                    .                 /.| U-- Fl 1L oTFm91:6+ChI+QplR#Yq\?@ACDEFGHILRoot Entry FNeRN1TableDWordDocument*,SummaryInformation(:DocumentSummaryInformation8BCompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q