摘要:
A virtual storage computer system having token controlled storage protection. The computer system includes a processor, a real storage, and a virtual storage containing a user space and a system space. A virtual storage area in the user space provides a protected view of one or more pages of memory located in the real storage. A virtual storage area in the system space provides a token-accessible view of the corresponding pages of memory. To protect the pages of memory, a user program first requests that token controlled protection be provided via the virtual address in the user space and that a corresponding user token be returned by the processor. The user program stores the user token for later use when accessing the protected pages. When the user program requests access to the protected pages, the processor matches the user token with a system token to obtain a token-accessible view in the system space of the protected pages.
摘要:
A non-main storage data space (NMDS) is presented, whose virtual pages may be backed by expanded storage, by a combination of expanded and auxiliary storage, but not by main storage. Mechanisms are provided to prevent direct referencing of data in a NMDS by instructions, and to bring data into and out of NMDS's. The I/O mechanisms minimize physical I/O by exchanging pointers to backing pages in appropriate cases. Additionally, control is returned immediately to I/O-initiating applications, when I/O is required between an address space and a NMDS, without the need for synchronization by the application: the mechanism provides for synchronization by the system's page fault processing.
摘要:
A linear data set is mapped to one or more non-main storage virtual data spaces. Portions of this data space are then selectively mapped to a "window" in an address space in which an application is executing, and changes made in this "window" are temporarily saved in the data space. After completion of processing, the application may permanently save changed data from the data space to the linear data set.The technique for mapping the data space to the address space may be used to map between two address spaces, and may be extended to encompass third and subsequent spaces, so that a reference to a mapped address in the first space will ultimately be interpreted as a reference to an address in the last mapped space.
摘要:
A method for sniffing packets communicated over a network includes identifying an active protocol stack. Upon identifying an active protocol stack, a packet intercept is enabled for the identified active protocol stack. Using the packet intercept, data is then collected about the packets communicated over the network.