11.01.2013 Views

IBM AIX Continuous Availability Features - IBM Redbooks

IBM AIX Continuous Availability Features - IBM Redbooks

IBM AIX Continuous Availability Features - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

LABEL: beta_patch<br />

INSTALL DATE: 10/11/07 15:36:45<br />

[MORE...87]<br />

F1=Help F2=Refresh F3=Cancel F6=Command<br />

F8=Image F9=Shell F10=Exit /=Find<br />

n=Find Next<br />

From the Check Installed EFIXES menu, you can select the fixes to be checked. The menu is<br />

shown in Example 3-17.<br />

Example 3-17 Check Installed EFIXES menu<br />

Check Installed EFIXES<br />

Type or select values in entry fields.<br />

Press Enter AFTER making all desired changes.<br />

[Entry Fields]<br />

EFIX Label [] +<br />

-OR-<br />

LOCATION of EFIX List File [] /<br />

VERIFICATION Level [1] +<br />

DEBUG output? no +<br />

F1=Help F2=Refresh F3=Cancel F4=List<br />

F5=Reset F6=Command F7=Edit F8=Image<br />

F9=Shell F10=Exit Enter=Do<br />

3.7 Storage protection keys<br />

Storage protection keys are designed to alleviate software issues that can appear because of<br />

memory overlays and addressing errors. In <strong>AIX</strong>, a large global address space is shared<br />

among a variety of software components and products.<br />

This section explains storage protection keys and describes how kernel programmers or<br />

application programmers use them. The storage protection key concept was adopted from<br />

the z/OS® and 390 systems, so <strong>AIX</strong> can confidently rely on this feature and its robustness.<br />

3.7.1 Storage protection keys overview<br />

Storage protection keys and their support by the <strong>AIX</strong> kernel are new capabilities introduced<br />

with <strong>AIX</strong> Version 5.3 (user keys) and Version 6.1 (user and kernel keys) running on POWER6<br />

hardware. In this paper, storage protection keys are also called storage keys or simply keys.<br />

Keys provide a context-sensitive storage protection mechanism for virtual memory pages.<br />

Software might use keys to protect multiple classes of data individually and to control access<br />

to data on a per-context basis. This differs from the older page protection mechanism, which<br />

is global in nature.<br />

Storage keys are available in both kernel-mode and user-mode application binary interfaces<br />

(ABIs). In kernel-mode ABIs, storage key support is known as kernel keys. In user space<br />

Chapter 3. <strong>AIX</strong> advanced continuous availability tools and features 77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!