摘要:
A data processing system, having virtual addressing capability, has a real storage manager to associate virtual storage locations with real storage by accessing page tables to determine the locations of "backed" virtual storage pages in central, expanded, or auxiliary storage. The real storage manager accepts requests to copy ranges of virtual storage from one virtual storage range to another, and, in so doing, uses the page tables to effectively perform the copying by reassigning backed pages from the source range to the target range. Having been reassigned to the target range, the backed pages are artificially aged by increasing the unreferenced interval count (UIC), so that the backed pages in the target range will be likely candidates for page stealing.
摘要:
A method and system for capturing and controlling access to information in a data processing system is provided. The data processing system includes one or more operating systems coupled to a coupling facility. When one or more operating systems lose communication with the coupling facility, a surviving operating system captures some or all of the information in the coupling facility, including that information associated with the failed operating system(s). In order to capture the information when a system fails or at any other time, the information in the coupling facility is serialized, thereby preventing all access to the information except for those commands capturing the information. While the information is serialized, requests for the information are queued and then re-driven once serialization is released. If an operating system loses communication with the coupling facility during the creation of a dump, another operating system will continue the dump.
摘要:
Provided are a method, computer program product and system for providing indexed queue support for efficient retrieval of messages from a queue. An index key for expediting message retrieval is assigned to a message when the operation of placing the message on a queue is committed. The index key assigned at commit time comprises an attribute (such as a message ID or correlation ID) specified by the sending application program, which placed the message on the queue. This deferred assignment of an index key until commit time means that the index key can be used to search for messages having the particular attribute without any possibility of identifying messages for retrieval before the messages have been committed. This maintains transactional requirements of a transaction-oriented messaging system which requires a message to only be made available for retrieval by receiver application programs after the sender application's put operation has committed.
摘要:
System-managed duplexing of coupling facility structures. A plurality of instances of coupling facility structures are maintained in a plurality of coupling facilities. Duplexing processing associated with the plurality of instances is managed by one or more operating systems, making many of the steps associated with duplexing transparent to the exploiters of the coupling facility structures. System-managed duplexing provides high availability for coupling facility structure data via a robust recovery mechanism (i.e., duplexing failover).
摘要:
Resource contention monitoring and analysis are provided for a single system or multi-system environment. Resource contention is tracked at a task level when contention occurs by listing each owner of a resource in a blocker list and each waiter for the resource in a waiter list. Each list is ordered oldest to newest so each instance of contention is added to the end of the respective list. The resource request and contention lists are cross-linked to provide easy coordination between the resource queues and the contention lists. Techniques for analyzing contention using the lists, including deadlock analysis, are described.
摘要:
Castout processing for duplexed data structures. A selective data item is written from a primary instance of a data structure to at least one storage medium. A determination is made as to whether the selective data item can be deleted from a secondary instance of the data structure. If the selective data item can be deleted, it is deleted from the secondary instance.
摘要:
A method of assigning and releasing locks, in a network computing environment having a plurality of central processing units coupled to a high performance locking facility. The method comprises of the steps of first processing multiple requests for locking operations simultaneously and then recording lock names and lock states in entry records of a lock table based on the requests. When a request is being processed, providing high-speed searching to search any particular lock entry in the table and altering and modifying the table accordingly. Finally an appropriate response and the status of the lock state will be generated and sent to other requestors requesting the lock.
摘要:
The present invention provides for a computer program product and device including instructions executable by a digital processing apparatus for conducting a high-performance locking facility. At first multiple requests for locking operations are processed and received simultaneously and their lock names and lock states are recorded in entry records of a lock table based on the requests. Next high-speed searching of any particular lock entry in this table is performed followed. The table can be altered and modified at this time as well accordingly depending upon lock status that is being processed. Finally an appropriate response is generated and the status of the lock state is provided to those requesting the lock.
摘要:
A LOCK PAGE instruction is provided for locking a page of real storage using a virtual address. The LOCK PAGE instruction includes an operation code which specifies the operation to be performed, a first operand which contains the value of the real address obtained during execution of the LOCK PAGE instruction and a second operand which contains the value of the virtual address of the page to be locked during execution of LOCK PAGE. LOCK PAGE enables an address page or a data page to be locked without requiring the entire address space to be locked. A page is locked when a lock control bit in general register 0 is zero, the page is valid in main storage and a lock bit located in a page table entry is zero. In addition to the above, the technique used by an operating system service for reclaiming a page of real storage is altered to intersect with the LOCK PAGE facility.
摘要:
Storage is managed in a shared electronic store (SES) by assigning storage classes (STCs) to each directory entry having a data item stored in SES. The assignments of directory entries and data elements to the respective STCs can be changed at any time by any CPC. Eventually, no free space remains in the SES cache, and then space for new directory entries and data items must be obtained by reclaiming space occupied by directory entries and associated unchanged data items. The reclaiming of SES space is controlled on a STC basis. Any specified STC may reclaim from itself or from another STC using reclaiming software/microcode in SES, which includes a reclaim vector, a reclaim counter, a queue, and reclaiming controls. The vector and counter have respective elements for all possible STCs to controls how a specified STC may reclaim space from any or all target STC. Any enabled target STC reclaims its space according to an LRU algorithm maintained by a queue for the STC. A CPC can issue a command to load different values in target STC elements in the SES vector for a specified STC to control how reclaiming is apportioned for the specified STC. In SES, associated target counter elements are loaded from its vector. Reclaiming is done automatically in SES upon each directory miss in the current target STC having a non-zero counter value, when no free space exists. The counter is decremented for each reclaimed directory entry until its count reaches zero, and then the counter element for the next non-zero target STC is used for reclaiming until it reaches zero. When all STC elements in the counter are zero for the specified STC, the counter elements are reloaded from the vector elements to repeat the reclaiming operation, as long as a repeat factor for the specified STC has not reached zero. The repeat factor is decremented each time the counters are loaded from the vector. When the counters and repeat factor have all reached zero, reclaiming is disabled for the specified STC.