5.5.2.4.8.3Key-controlled protection

When an access attempt is made to an absolute address, which refers to a memory location, key-controlled protection is applied. Each 4K page, real memory location, has a 7-bit storage key associated with it. These storage keys for pages can only be set when the processor is in the supervisor state. The Program Status Word contains an access key corresponding to the current running program. Key-controlled protection is based on using the access key and the storage key to evaluate whether access to a specific memory location is granted.

The 7-bit storage key consists of access control bits (0, 1, 2, and 3), fetch protection bit (4), reference bit (5), and change bit (6). The following two diagrams show the key-controlled protection process.

Figure 5-56: Key match logic for key-controlled protection

The z/Architecture allows for fetch protection override for key-controlled protection. The following diagram describes how fetch protection override can be used. Currently, SLES does not set the fetch protection bit of the storage key.

115

Page 127
Image 127
IBM 10 SP1 EAL4 manual Key match logic for key-controlled protection