Claims
- 1. A method of managing access, by operating system images of a computing environment, of input/output resources of the computing environment, said method comprising:
submitting an input/output (I/O) request by an operating system image requesting access to an input/output subsystem image of a plurality of input/output subsystem images of the computing environment; determining whether the operating system image is authorized to access the input/output subsystem image; and authorizing the I/O request, in response to the operating system image being authorized to access the input/output subsystem image.
- 2. The method of claim 1, wherein the determining comprises checking an authorization vector.
- 3. The method of claim 2, wherein the checking comprises:
using an identification of the input/output subsystem image as an index into the authorization vector; and employing a value of the entry of the authorization vector indexed by the identification to determine authorization.
- 4. The method of claim 3, wherein the value having a first value indicates that the operating system image is not authorized to access the input/output subsystem image.
- 5. The method of claim 3, wherein the value having a second value indicates that the operating system image is authorized to access the input/output subsystem image.
- 6. The method of claim 5, wherein the second value indicates a multiple image facility image identification to be used in the access.
- 7. The method of claim 2, further comprising creating the authorization vector.
- 8. The method of claim 7, wherein the authorization vector is created, in response to a request by the operating system image to enable access of the operating system image to a plurality of input/output subsystem images.
- 9. A system of managing access, by operating system images of a computing environment, of input/output resources of the computing environment, said system comprising:
means for submitting an input/output (I/O) request by an operating system image requesting access to an input/output subsystem image of a plurality of input/output subsystem images of the computing environment; means for determining whether the operating system image is authorized to access the input/output subsystem image; and means for authorizing the I/O request, in response to the operating system image being authorized to access the input/output subsystem image.
- 10. The system of claim 9, wherein the means for determining comprises means for checking an authorization vector.
- 11. The system of claim 10, wherein the means for checking comprises:
means for using an identification of the input/output subsystem image as an index into the authorization vector; and means for employing a value of the entry of the authorization vector indexed by the identification to determine authorization.
- 12. The system of claim 11, wherein the value having a first value indicates that the operating system image is not authorized to access the input/output subsystem image.
- 13. The system of claim 11, wherein the value having a second value indicates that the operating system image is authorized to access the input/output subsystem image.
- 14. The system of claim 13, wherein the second value indicates a multiple image facility image identification to be used in the access.
- 15. The system of claim 10, further comprising means for creating the authorization vector.
- 16. The system of claim 15, wherein the authorization vector is created, in response to a request by the operating system image to enable access of the operating system image to a plurality of input/output subsystem images.
- 17. A system of managing access, by operating system images of a computing environment, of input/output resources of the computing environment, said system comprising:
an operating system image to submit an input/output (I/O) request requesting access to an input/output subsystem image of a plurality of input/output subsystem images of the computing environment; and a program to determine whether the operating system image is authorized to access the input/output subsystem image, and wherein the I/O request is authorized, in response to the operating system image being authorized to access the input/output subsystem image.
- 18. At least one program storage device readable by a machine embodying at least one program of instructions executable by the machine to perform a method of managing access, by operating system images of a computing environment, of input/output resources of the computing environment, said method comprising:
submitting an input/output (I/O) request by an operating system image requesting access to an input/output subsystem image of a plurality of input/output subsystem images of the computing environment; determining whether the operating system image is authorized to access the input/output subsystem image; and authorizing the I/O request, in response to the operating system image being authorized to access the input/output subsystem image.
- 19. The at least one program storage device of claim 18, wherein the determining comprises checking an authorization vector.
- 20. The at least one program storage device of claim 19, wherein the checking comprises:
using an identification of the input/output subsystem image as an index into the authorization vector; and employing a value of the entry of the authorization vector indexed by the identification to determine authorization.
- 21. The at least one program storage device of claim 20, wherein the value having a first value indicates that the operating system image is not authorized to access the input/output subsystem image.
- 22. The at least one program storage device of claim 20, wherein the value having a second value indicates that the operating system image is authorized to access the input/output subsystem image.
- 23. The at least one program storage device of claim 22, wherein the second value indicates a multiple image facility image identification to be used in the access.
- 24. The at least one program storage device of claim 18, wherein said method further comprises creating the authorization vector.
- 25. The at least one program storage device of claim 24, wherein the authorization vector is created, in response to a request by the operating system image to enable access of the operating system image to a plurality of input/output subsystem images.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application contains subject matter which is related to the subject matter of the following applications, each of which is assigned to the same assignee as this application. Each of the below listed applications is hereby incorporated herein by reference in its entirety:
[0002] “MULTIPLE LOGICAL INPUT/OUTPUT SUBSYSTEM FACILITY,” Brice et al., (IBM Docket No. POU920020071US1), Ser. No. ______, filed herewith;
[0003] “MANAGING INPUT/OUTPUT SUBSYSTEM IMAGES OF AN INPUT/OUTPUT SUBSYSTEM,” Brice et al., (IBM Docket No. POU920020140US1), Ser. No. ______, filed herewith;
[0004] “METHOD, SYSTEM AND PROGRAM PRODUCTS FOR ENHANCING INPUT/OUTPUT PROCESSING FOR OPERATING SYSTEM IMAGES OF A COMPUTING ENVIRONMENT,” Brice et al., (IBM Docket No. POU920020141US1), Ser. No. ______, filed herewith;
[0005] “METHOD, SYSTEM AND PROGRAM PRODUCTS FOR IDENTIFYING COMMUNICATIONS ADAPTERS OF A COMPUTING ENVIRONMENT,” Brice et al., (IBM Docket No. POU920020142US1), Ser. No. ______, filed herewith; and
[0006] “SHARING COMMUNICATIONS ADAPTERS ACROSS A PLURALITY OF INPUT/OUTPUT SUBSYSTEM IMAGES,” Brice et al. (IBM Docket No. POU920030025US1), Ser. No. ______, filed herewith.