-
公开(公告)号:JPH05210570A
公开(公告)日:1993-08-20
申请号:JP22427592
申请日:1992-08-24
Applicant: IBM
Inventor: RICHIYAADO AAUIN BAUMU , BURENTO AREN KAARUSON , MUUN JIYU KIMU , MAIKERU JIERAADO MOORU , KIYASUPAA ANSONII SUKARUJI , BAASUKAA SHINHA
Abstract: PURPOSE: To provide a method for extending the size (maximum 31 bits) of a small address so that data or the like can be arranged in any place in an extremely large memory (beyond the 31st power of 2). CONSTITUTION: An extender EXR 348 is connected with the top end of a conventionally generated actual or absolute address. The value of each EXR 348 decides the section of an extremely large memory, and the type of the EXR position to be used is indicated by providing a central processing unit(CP) extended address mode(CPEAM) field 30 in a control register(CR). The CPEAM field indicates whether or not a CP EXR field is related with an AR, PTE, STE, or ASTE, and when the CP is operated in a DAT-ON mode 31, access to the indicated EXR type is performed in an address conversion process.
-
公开(公告)号:JPH05204762A
公开(公告)日:1993-08-13
申请号:JP10647392
申请日:1992-04-24
Applicant: IBM
Inventor: KAARU EDOWAADO KURAAKU , MAIKERU JIERAADO MOORU , KIYASUPAA ANSONII SUKARUJI , BASUKA SHINHA
Abstract: PURPOSE: To make it possible to expand the level of protection of a protection key for memory storage which can be controlled by programming by adding a 3rd protection level. CONSTITUTION: An array 22 of protection keys contains three storage protection keys of an administrative class, an intermediate class, and a general class. A program routine which is operated with the access key of the administrative key can access all the storage blocks in the main storage 21. A program routine operating with the access key of the intermediate level can not access the storage blocks of the administrative level, but can access storage blocks to which the keys of the general and intermediate levels are assigned. With the program access key using a general storage key (PSK) of the 3rd level, only blocks having the same PSK value can be accessed.
-
-
公开(公告)号:JPH07239783A
公开(公告)日:1995-09-12
申请号:JP31371494
申请日:1994-12-16
Applicant: IBM
Inventor: RICHIYAADO AAUIN BAUMU , GUREN ARAN BURENTO , HATEMU MOHAMETSUDO GAAFUIRU , BARAKURISHIYUNA RAGABUENDORA I , INDERUPARU SHINGU NARAN , GURURAAJI SESHIYAGIRI RAAO , KIYASUPAA ANSONII SUKARUJI , SATEIYA PURAKAASHIYU SHIYARUMA , BASUKARU SHINHA , RII HAADEII UIRUSON
Abstract: PURPOSE: To provide a coexecuter which executes a function offloaded from a central processor(CP) in a data processing system according to the request from a control program which is executing more than one. CONSTITUTION: This system designates the code module which is accessed from a host shared memory by means of a coexecuter under the same constraint as a control program and an access limit at a request of a central processor(CP) to the coexecuter. The coexecuter can emulate dynamic access conversion from a host and use a provided host storage key when it accesses a host storage area. Data maintainability is maintained through a limited access operation state which is related to the coexecuter. An offloaded module is stored in a cache of a coexecuter local storage area for use at a future request after the offloaded module is accepted by the coexecuter, and the system proceeds the following call without waiting for the same module to be loaded once more.
-
公开(公告)号:JPH0793183A
公开(公告)日:1995-04-07
申请号:JP19943493
申请日:1993-08-11
Applicant: IBM
Inventor: ARAN IAN ARUPAATO , KAARU EDOWAADO KURAAKU , MAIKERU HENRI TEODOA HATSUKU , KIYASUPAA ANSONII SUKARUJI , AARU JIEI SHIYUMARUTSU , BAASUKAA SHINHA
Abstract: PURPOSE: To provide a dynamic execution link between a uniquely controlled hook instruction and an analysis program. CONSTITUTION: A new dynamic execution link excludes the participation of an OS to a hook operation and excludes interruption used for linking the OS to the execution of the hook instruction. Thus, the dynamic execution link provides non-interruption connection from respective usable hook instructions to the analysis program 16 and the non-interruption connection from the analysis program 16 to a hooked program 10.
-
-
-
-