IBM AIX Continuous Availability Features - IBM Redbooks
IBM AIX Continuous Availability Features - IBM Redbooks
IBM AIX Continuous Availability Features - IBM Redbooks
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
LABEL: beta_patch<br />
INSTALL DATE: 10/11/07 15:36:45<br />
[MORE...87]<br />
F1=Help F2=Refresh F3=Cancel F6=Command<br />
F8=Image F9=Shell F10=Exit /=Find<br />
n=Find Next<br />
From the Check Installed EFIXES menu, you can select the fixes to be checked. The menu is<br />
shown in Example 3-17.<br />
Example 3-17 Check Installed EFIXES menu<br />
Check Installed EFIXES<br />
Type or select values in entry fields.<br />
Press Enter AFTER making all desired changes.<br />
[Entry Fields]<br />
EFIX Label [] +<br />
-OR-<br />
LOCATION of EFIX List File [] /<br />
VERIFICATION Level [1] +<br />
DEBUG output? no +<br />
F1=Help F2=Refresh F3=Cancel F4=List<br />
F5=Reset F6=Command F7=Edit F8=Image<br />
F9=Shell F10=Exit Enter=Do<br />
3.7 Storage protection keys<br />
Storage protection keys are designed to alleviate software issues that can appear because of<br />
memory overlays and addressing errors. In <strong>AIX</strong>, a large global address space is shared<br />
among a variety of software components and products.<br />
This section explains storage protection keys and describes how kernel programmers or<br />
application programmers use them. The storage protection key concept was adopted from<br />
the z/OS® and 390 systems, so <strong>AIX</strong> can confidently rely on this feature and its robustness.<br />
3.7.1 Storage protection keys overview<br />
Storage protection keys and their support by the <strong>AIX</strong> kernel are new capabilities introduced<br />
with <strong>AIX</strong> Version 5.3 (user keys) and Version 6.1 (user and kernel keys) running on POWER6<br />
hardware. In this paper, storage protection keys are also called storage keys or simply keys.<br />
Keys provide a context-sensitive storage protection mechanism for virtual memory pages.<br />
Software might use keys to protect multiple classes of data individually and to control access<br />
to data on a per-context basis. This differs from the older page protection mechanism, which<br />
is global in nature.<br />
Storage keys are available in both kernel-mode and user-mode application binary interfaces<br />
(ABIs). In kernel-mode ABIs, storage key support is known as kernel keys. In user space<br />
Chapter 3. <strong>AIX</strong> advanced continuous availability tools and features 77