Methods of monitoring a computer system. The methods may comprise the
steps of calculating a first checksum of a data location and receiving a
request from an operation running on the computer system for a lock
corresponding to the data location. The methods may also comprise the
steps of calculating a second checksum of the data location, and
generating an indication if the first checksum and the second checksum
are not equivalent. Also, methods of detecting a lock ranking violation
in a computer system. The methods may comprise the steps of receiving a
request from an operation for a first lock associated with a first data
storage location and reviewing a list of locks issued to the operation.
The methods may also comprise the step of determining whether the
operation possesses a lock ranked higher than the first lock.