Using an access key to protect and point to regions in...

Electrical computers and digital processing systems: memory – Storage accessing and control – Control technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C711S152000, C711S203000, C711S206000, C710S100000, C709S216000

Reexamination Certificate

active

06578122

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Technical Field
The present invention relates to memory access in computer systems, and more specifically, how to control user access to particular areas of memory.
2. Description of Related Art
In a System Area Network (SAN), the hardware provides a message passing mechanism which can be used for Input/Output devices (I/O) and interprocess communications between general computing nodes (IPC). Consumers access SAN message passing hardware by posting send/receive messages to send/receive work queues on a SAN channel adapter (CA). The send/receive work queues (WQ) are assigned to a consumer as a queue pair (QP). The messages can be sent over five different transport types: Reliable Connected (RC), Reliable datagram (RD), Unreliable Connected (UC), Unreliable Datagram (UD), and Raw Datagram (RawD). Consumers retrieve the results of these messages from a completion queue (CQ) through SAN send and receive work completions (WC). The source channel adapter takes care of segmenting outbound messages and sending them to the destination. The destination channel adapter takes care of reassembling inbound messages and placing them in the memory space designated by the destination's consumer. Two channel adapter types are present, a host channel adapter (HCA) and a target channel adapter (TCA). The host channel adapter is used by general purpose computing nodes to access the SAN fabric. Consumers use SAN verbs to access host channel adapter functions. The channel interface (CI) interprets verbs and directly accesses the channel adapter.
The HCA transfers data received on Infiniband (IB) links directly to its host system main memory and also fetches data from system main memory to be transmitted on these IB links. Currently, there are no mechanisms to provide protection against unauthorized access of this memory or to point to specific areas (regions and windows) of memory, each of which uses its own translation tables to translate the virtual addresses that reference this memory into the real addresses that the CI hardware needs to directly access it.
Therefore, it would be desirable to have mechanisms to provide protection against unauthorized access of host system main memory, as well as mechanisms that point to specific areas of this memory, which translate virtual addresses for the memory into real addresses for the CI hardware.
SUMMARY OF THE INVENTION
The present invention provides a method, system and program for controlling access to computer memory. The present invention comprises receiving a work request from a user, wherein the work request comprises an index portion and a protection portion. The index portion of the work request is used to locate an element in an address translation and protection table. The protection portion of the work request is then compared with a protection key in the table element, and access to memory is granted only if the protection portion and protection key match.


REFERENCES:
patent: 5574849 (1996-11-01), Sonnier et al.
patent: 5684993 (1997-11-01), Willman
patent: 5915088 (1999-06-01), Basavaiah et al.
patent: 6163834 (2000-12-01), Garcia et al.
patent: 6349380 (2002-02-01), Shahidzadeh et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Using an access key to protect and point to regions in... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Using an access key to protect and point to regions in..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using an access key to protect and point to regions in... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3110308

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.