About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
IASIT | Back to Index page |
Prolog Control Block Contents IASIT DSECT Storage Layout Cross Reference (Contains links to field and bit definitions) |
|
IASIT Prolog | Top of page |
NAME : HCPIASIT DESCRIPTION: Internal-Address-Space-Identification Token DSECT : IASIT FUNCTION : This DSECT maps an i-ASIT, which is CP's internal identification of an address space. LOCATED BY : Any task needing an identification of an address space. Some important fields which contain i-ASITs are: RSANASIT i-ASIT for "null" address space. CREATED BY : HCPSIT%I when translating various representations of address spaces into i-ASITs. DELETED BY : Any task which no longer needs the representation. RELOCATION CONSIDERATIONS : None NOTES : An i-ASIT is an eight-byte token, doubleword aligned, and serves as a task's internal representation of a particular address space. An i-ASIT contains information designating which address space, information defining the task's "capability" to access the address space, and information defining the method of translating addresses for that task. Since it contains more information than just what is necessary to identify an address space, an i-ASIT cannot be directly compared to another i-ASIT to determine if the same space is designated. A service routine (as provided by the HCPCMPIA macro) must be used for i-ASIT comparison purposes. The capabilities represented in an i-ASIT are the following: - r-access vs. i-access - Read/write vs. read/only permission - For guest instruction-stream references, whether guest prefixing, guest low-address protection, and guest fetch-protection override apply. Translation of a guest real address into a host real address is affected by whether or not the address space is the user's base address space, and whether or not the user's reference is a primary-space or secondary-space reference. Prefixing, low-address protection, and fetch-protection override apply only when the space is the base, and when the access is a primary-space or secondary-space reference. An i-ASIT must be certified before it can be used for any purposes. A certified i-ASIT is one that meets the following criteria: - The ASTE sequence number in the i-ASIT matches the ASTE sequence number in the ASTE (i- or r-access) *or* - ASCSEQNO <= ASITSN <= ASTSN (r-access) The i-ASIT certification function is provided by either the HCPASMCI entry point or the HCPACERT macro (to be used only in cases where performance is a major concern, or the routine cannot call another routine which uses PFXTMPSV). Other services which process i-ASITS, such as HCPCMPIA and HCPCHCR7, handle certification of i-ASITs internally. |
IASIT Control Block Content | Top of page |
|
IASIT Storage Layout | Top of page |
*** IASIT - Internal-Address-Space-Identification * * +--------------------+------+---------------------------+ * 0 |////////////////////|:FLAGS| IASASTSN | * +--------------------+------+---------------------------+ * 8 * *** IASIT - Internal-Address-Space-Identification |
IASIT Cross Reference | Top of page |
Symbol Dspl Value -------------- ---- ----- IASASTEO 0000 IASASTOM 0000 00FFFFC0 IASASTSN 0004 IASFLAGS 0003 IASFPRIV 0003 01 IASFPRVM 0000 01 IASLEN 0004 00000008 IASRACC 0003 04 IASREAD 0003 02 IASREADM 0000 02 IASSIZE 0004 00000001 |
Copyright IBM Corporation, 1990, 2022