Using an access key to protect and point to regions in windows for infiniband
First Claim
Patent Images
1. A method for controlling access to computer memory, comprising:
- receiving a work request from a user, wherein the work request comprises an index portion and a protection portion;
locating an element in an address translation and protection table by means of the index portion of the work request;
comparing the protection portion of the work request with a protection key in the table element, wherein the table element is associated with a memory region and comprises a pointer to a real address in an address translation table in main memory; and
granting access to memory only if the protection portion and protection key match.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system and program for controlling access to computer memory are provided. The present invention comprises receiving a work request from a user, wherein the work request comprises an index portion and a protection portion. The index portion of the work request is used to locate an element in an address translation and protection table. The protection portion of the work request is then compared with a protection key in the table element, and access to memory is granted only if the protection portion and protection key match.
56 Citations
24 Claims
-
1. A method for controlling access to computer memory, comprising:
-
receiving a work request from a user, wherein the work request comprises an index portion and a protection portion;
locating an element in an address translation and protection table by means of the index portion of the work request;
comparing the protection portion of the work request with a protection key in the table element, wherein the table element is associated with a memory region and comprises a pointer to a real address in an address translation table in main memory; and
granting access to memory only if the protection portion and protection key match. - View Dependent Claims (2, 3, 4)
-
-
5. A method for controlling access to computer memory, comprising:
-
receiving a work request from a user, wherein the work request comprises an index portion and a protection portion;
locating an element in an address translation and protection table by means of the index portion of the work request;
comparing the protection portion of the work request with a protection key in the table element, wherein the table element is associated with a memory window and comprises a pointer to a memory region in which the memory window is contained; and
granting access to memory only if the protection portion and protection key match. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product for use in a data processing system, for controlling access to computer memory, the computer program product comprising:
-
first instructions for receiving a work request from a user, wherein the work request comprises an index portion and a protection portion, and wherein the work request is a local access key;
second instructions for locating an element in an address translation and protection table by means of the index portion of the work request;
third instructions for comparing the protection portion of the work request with a protection key in the table element, wherein the table element is associated with a memory region and comprises a pointer to a real address in an address translation table in main memory; and
fourth instructions for granting access to memory only if the protection portion and protection key match. - View Dependent Claims (10, 11, 12)
-
-
13. A computer program product for use in a data processing system, for controlling access to computer memory, the computer program product comprising:
-
first instructions for receiving a work request from a user, wherein the work request comprises an index portion and a protection portion, and wherein the work request is a local access key;
second instructions for locating an element in an address translation and protection table by means of the index portion of the work request;
third instructions for comparing the protection portion of the work request with a protection key in the table element, wherein the table element is associated with a memory window and comprises a pointer to a memory region in which the memory window is contained; and
fourth instructions for granting access to memory only if the protection portion and protection key match. - View Dependent Claims (14, 15, 16)
-
-
17. A system for controlling access to computer memory, comprising:
-
a receiver to receive a work request from a user, wherein the work request comprises an index portion and a protection portion;
a locator to locate an element in an address translation and protection table by means of the index portion of the work request;
a comparator to compare the protection portion of the work request with a protection key in the table element, wherein the table element is associated with a memory region and comprises a pointer to a real address in an address translation table in main memory; and
a security component to grant access to memory only if the protection portion and protection key match. - View Dependent Claims (18, 19, 20)
-
-
21. A system for controlling access to computer memory, comprising:
-
a receiver to receive a work request from a user, wherein the work request comprises an index portion and a protection portion;
a locator to locate an element in an address translation and protection table by means of the index portion of the work request;
a comparator to compare the protection portion of the work request with a protection key in the table element, wherein the table element is associated with a memory window and comprises a pointer to a memory region in which the memory window is contained; and
a security component to grant access to memory only if the protection portion and protection key match. - View Dependent Claims (22, 23, 24)
-
Specification