Methods of monitoring a computer system. The methods may comprise the steps of calculating a first checksum of a data location and receiving a request from an operation running on the computer system for a lock corresponding to the data location. The methods may also comprise the steps of calculating a second checksum of the data location, and generating an indication if the first checksum and the second checksum are not equivalent. Also, methods of detecting a lock ranking violation in a computer system. The methods may comprise the steps of receiving a request from an operation for a first lock associated with a first data storage location and reviewing a list of locks issued to the operation. The methods may also comprise the step of determining whether the operation possesses a lock ranked higher than the first lock.

 
Web www.patentalert.com

< Data processing system, cache system and method for precisely forming an invalid coherency state indicating a broadcast scope

> Programmable processor and methods thereof having memory access locking

> Using a portable security token to facilitate public key certification for devices in a network

~ 00509