Methodology and mechanism for remote key validation for NGIO/infiniBandTM applications
First Claim
1. A host-fabric adapter, comprising:
- one or more Micro-Engines arranged to establish connections and support data transfer operations, via a switched fabric, in response to work requests from a host system for data transfer operations; and
a remote key manager arranged to manage remote keys and check the validity of the remote keys which correspond to outstanding data transfer operations, via said switched fabric.
1 Assignment
0 Petitions
Accused Products
Abstract
A host system is provided with one or more host-fabric adapters installed therein for connecting to a switched fabric of a data network. The host-fabric adapter may comprise at least one Micro-Engine (ME) arranged to establish connections and support data transfer operations via a switched fabric; a serial interface arranged to receive and transmit data packets from the switched fabric for data transfer operations; a host interface arranged to receive and transmit host data transfer work requests from the host system for data transfer operations; a context memory arranged to provide context information necessary for data transfer operations; a doorbell manager arranged to update the context information needed for the Micro-Engine (ME) to process host data transfer requests for data transfer operations; and a remote key manager arranged to manage remote keys and check the validity of the remote keys which correspond to outstanding data transfer operations
-
Citations
27 Claims
-
1. A host-fabric adapter, comprising:
-
one or more Micro-Engines arranged to establish connections and support data transfer operations, via a switched fabric, in response to work requests from a host system for data transfer operations; and
a remote key manager arranged to manage remote keys and check the validity of the remote keys which correspond to outstanding data transfer operations, via said switched fabric. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 26, 27)
-
-
13. A host-fabric adapter installed at a host system for connecting to a switched fabric of a data network, comprising:
-
at least one Micro-Engine (ME) arranged to establish connections and support data transfers via said switched fabric;
a serial interface arranged to receive and transmit data packets from said switched fabric for data transfer operations;
a host interface arranged to receive and transmit work requests, in the form of descriptors, from said host system for data transfer operations;
a context memory arranged to store context information needed for said Micro-Engine (ME) to process work requests for data transfer operations;
a doorbell manager arranged to update the context information needed for said Micro-Engine (ME) to process work requests for data transfer operations; and
a remote key manager arranged to manage remote keys and check the validity of the remote keys which correspond to outstanding data transfer operations.
-
-
25. A method of checking the validity of remote keys which correspond to outstanding remote direct memory access (RDMA) operations in a host-fabric adapter installed at a host system, comprising:
-
determining if any Virtual Interface (VI) to be processed at a Send Queue (SQ) is a Bind descriptor for a non data operation;
if the descriptor posted is not a Bind Descriptor, processing for a normal data transfer operation;
if the descriptor posted is a Bind Descriptor, determining if the “
Memory Window”
is invalidated;
if the “
Memory Window”
is not invalidated, noting that the “
Memory Window”
is moved and performing writes to a host memory of said host system to move the “
Memory Window”
;
if the “
Memory Window”
is invalidated, performing writes to the host memory of said host system to destroy the “
Memory Window”
;
searching through all outstanding RDMA operations which use the “
Memory Window”
to identify a remote key which used the “
Memory Window”
;
if the remote key which used the “
Memory Window”
is identified, invalidating the remote key until all remote keys are invalidated;
if no remote key is identified, completing invalidation of all the remote keys and returning to being idle; and
if all remote keys are not invalidated, returning to search through all outstanding RDMA operations which uses the “
Memory Window”
until all remote keys are marked “
invalidated”
so that no new remote key or new work queue pair (WQP) can come in and use that “
Memory Window”
.
-
Specification