STORAGE FETCH PROTECT OVERRIDE CONTROLS

    公开(公告)号:CA1180464A

    公开(公告)日:1985-01-02

    申请号:CA417965

    申请日:1982-12-17

    Applicant: IBM

    Abstract: STORAGE FETCH PROTECT OVERRIDE CONTROLS This invention relates to the fetch protection of a critical area in the main storage (MS) of a data processing system. The critical area is smaller than, and contained within, the size of a main storage block protectable by a single storage protect key having a fetch protection field. This invention extends protect key operations for system/370 extended architectures that use 4KB pages. This invention recognizes that system integrity is enhanced by providing different types of fetch protection within the PSA page which cannot be done with the associated 4KB key. To enable different fetch protections within a special 4KB block, this invention provides fetch protect override controls to partly override the normal operation of the 4KB storage key for a page located at a predetermined real address in MS. While 4KB fetch protection is set on for the special page's 4KB block, the fetch protect override controls disable fetch protection for a portion of the special page's real addresses (e.g. addresses 0-2047). Override enablement is controlled by a fetch protect override control bit in a control register (e.g. bit 6 of control register 0).

    NONHIERARCHICAL PROGRAM AUTHORIZATION MECHANISM

    公开(公告)号:CA1313424C

    公开(公告)日:1993-02-02

    申请号:CA587711

    申请日:1989-01-06

    Applicant: IBM

    Abstract: PO9-87-006 NONHIERARCHICAL PROGRAM AUTHORIZATION MECHANISM A program authorization mechanism for authorizing access to an address space in the main memory of a computer system by a program being run under a multiple address space facility. An access-list entry is associated with each address space, each access-list entry being designated by an access list-entry token contained in an access register. Each access-list entry includes a private indicator which indicates if the associated address space can be accessed by all programs from this access-list entry or if the associated address space can only be accessed by an authorized program. For a program to be authorized, an extended authorization index in a control register must match an access-list extended authorization index in the access-list entry, or the extended authorization index value must be authorized in an authority table associated with the address space. An instruction for testing a given extended authorization index for a given access-list-entry is also disclosed.

    METHOD OF SECURING OF ACCES PROTECTION FOR DATA BLOCKS AND THE DEVICE FOR REALIZATION OF THIS METHOD

    公开(公告)号:SK136193A3

    公开(公告)日:1994-08-10

    申请号:SK136193

    申请日:1992-04-29

    Applicant: IBM

    Abstract: Provides three access levels of storage key protection, comprising a supervisory level (key 0), an intermediate level of non-public and non-supervisory keys (keys 1-8, 10-15), and an unique public level (key 9). The program routines operating with a supervisory-level access key can access both the public level and the intermediate level of storage blocks. Although a program routine operating with an access key in the intermediary access level cannot access any supervisory level storage block, it can access any block assigned a public level storage key, as well as any storage block assigned the respective intermediate level key. One or more third-level public storage keys (PSKs) may be provided. A program access key using one of the PSK values can only access blocks having the same PSK value, and it cannot access blocks having any other key value.

    DOMAIN RELATED ACCESS LISTS
    6.
    发明专利

    公开(公告)号:CA1293811C

    公开(公告)日:1991-12-31

    申请号:CA583573

    申请日:1988-11-18

    Applicant: IBM

    Abstract: PO987-007 DOMAIN RELATED ACCESS LISTS A method and apparatus is provided to translate the contents of access registers into information for use in performing addressing functions for multiple virtual address spaces. The access registers represent the full addressing capability of the system but do not directly contain the addressing information. The system has a plurality of general purpose registers, a plurality of access registers associated with the general registers, an access list having access list entries which is addressed by the contents of the access register, memory storage for holding address space number second table entries (ASTE), where the contents of the access list entry locate the ASTE and where the ASTE contains the addressing information needed to locate a virtual address when combined with the contents of a general register, Access register translation (ART) consists of the process of determining addressing information by using the access list entry and the ASTE. The system has available to it at any one time a selection of one of two domains each represented by an access list. One domain is related to the dispatchable unit task to be performed and the other is related to the address space in which a particular program operates. The ART process selects the domain which the access register is using.

    ARRANGEMENT FOR PROTECTING DATA IN A COMPUTER SYSTEM MEMORY MODULE AGAINST UNAUTHORISED ACCESS

    公开(公告)号:PL170547B1

    公开(公告)日:1996-12-31

    申请号:PL30081092

    申请日:1992-04-29

    Applicant: IBM

    Abstract: Provides three access levels of storage key protection, comprising a supervisory level (key 0), an intermediate level of non-public and non-supervisory keys (keys 1-8, 10-15), and an unique public level (key 9). The program routines operating with a supervisory-level access key can access both the public level and the intermediate level of storage blocks. Although a program routine operating with an access key in the intermediary access level cannot access any supervisory level storage block, it can access any block assigned a public level storage key, as well as any storage block assigned the respective intermediate level key. One or more third-level public storage keys (PSKs) may be provided. A program access key using one of the PSK values can only access blocks having the same PSK value, and it cannot access blocks having any other key value.

    STORAGE PROTECTION UTILIZING PUBLIC KEY CONTROL

    公开(公告)号:CA2064640C

    公开(公告)日:1995-12-12

    申请号:CA2064640

    申请日:1992-04-01

    Applicant: IBM

    Abstract: Provides three access levels of storage key protection, comprising a supervisory level (key 0), an intermediate level of non-public and non-supervisory keys (keys 1-8, 10-15), and a unique public level (key 9). The program routines operating with a supervisory-level access key can access both the public level and the intermediate level of storage blocks. Although a program routine operating with an access key in the intermediate access level cannot access any supervisory level storage block, it can access any block assigned a public level storage key, as well as any storage block assigned the respective intermediate level key. One or more third-level public storage keys (PSKs) may be provided. A program access key using one of the PSK values can only access blocks having the same PSK value, and it cannot access blocks having any other key value.

    STORAGE PROTECTION UTILIZING PUBLIC KEY CONTROL

    公开(公告)号:CA2064640A1

    公开(公告)日:1992-12-07

    申请号:CA2064640

    申请日:1992-04-01

    Applicant: IBM

    Abstract: Provides three access levels of storage key protection, comprising a supervisory level (key 0), an intermediate level of non-public and non-supervisory keys (keys 1-8, 10-15), and an unique public level (key 9). The program routines operating with a supervisory-level access key can access both the public level and the intermediate level of storage blocks. Although a program routine operating with an access key in the intermediary access level cannot access any supervisory level storage block, it can access any block assigned a public level storage key, as well as any storage block assigned the respective intermediate level key. One or more third-level public storage keys (PSKs) may be provided. A program access key using one of the PSK values can only access blocks having the same PSK value, and it cannot access blocks having any other key value.

Patent Agency Ranking