Controlling access by a configuration to an adapter function
First Claim
Patent Images
1. A computer program product for controlling access to adapters in a computing environment, said computer program product comprising:
- a non-transitory computer readable storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising;
executing, by a processor coupled to an adapter, an instruction, the instruction comprising a request by a configuration to access the adapter, the adapter identified by a function handle provided with the request, the executing comprising;
using the function handle to select from a function table a function table entry particular to the adapter specified by the function the function table entry stored in memory associated with the processor and including information associated with the adapter including information to determine whether the configuration is authorized to access the adapter;
determining, by the processor, based on information in the function table entry whether the configuration is authorized to access the adapter, wherein the determining comprises comparing one or more attributes of the configuration requesting access to the adapter to one or more selected attributes of the function table entry to determine whether the configuration has permission to access the adapter; and
allowing access to the adapter, based on determining that the configuration is authorized to access the adapter.
1 Assignment
0 Petitions
Accused Products
Abstract
Access to an input/output adapter by a configuration is controlled. For each requested access to an adapter, checks are made to determine whether the configuration is authorized to access the adapter. If it is not authorized, then access is denied. If it is authorized, but access should be temporarily blocked, then instruction execution is altered to indicate such. If access is permitted, but should be blocked for another reason (other than temporarily), then access is denied.
238 Citations
21 Claims
-
1. A computer program product for controlling access to adapters in a computing environment, said computer program product comprising:
a non-transitory computer readable storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising; executing, by a processor coupled to an adapter, an instruction, the instruction comprising a request by a configuration to access the adapter, the adapter identified by a function handle provided with the request, the executing comprising; using the function handle to select from a function table a function table entry particular to the adapter specified by the function the function table entry stored in memory associated with the processor and including information associated with the adapter including information to determine whether the configuration is authorized to access the adapter; determining, by the processor, based on information in the function table entry whether the configuration is authorized to access the adapter, wherein the determining comprises comparing one or more attributes of the configuration requesting access to the adapter to one or more selected attributes of the function table entry to determine whether the configuration has permission to access the adapter; and allowing access to the adapter, based on determining that the configuration is authorized to access the adapter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A computer system for controlling access to adapters in a computing environment, said computer system comprising:
-
a memory; and a processor in communications with the memory, wherein the computer system is configured to perform a method, said method comprising; executing, by a processor coupled to an adapter, an instruction, the instruction comprising a request by a configuration to access the adapter, the adapter identified by a function handle provided with the request, the executing comprising; using the function handle to select from a function table a function table entry particular to the adapter specified by the function handle, the function table entry stored in memory associated with the processor and including information associated with the adapter including information to determine whether the configuration is authorized to access the adapter; determining, by the processor, based on information in the function table entry whether the configuration is authorized to access the adapter, wherein the determining comprises comparing one or more attributes of the configuration requesting access to the adapter to one or more selected attributes of the function table entry to determine whether the configuration has permission to access the adapter; and allowing access to the adapter, based on determining that the configuration is authorized to access the adapter. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method of controlling access to adapters in a computing environment, said method comprising:
executing, by a processor coupled to an adapter, an instruction, the instruction comprising a request by a configuration to access the adapter, the adapter identified by a function handle provided with the request, the executing comprising; using the function handle to select from a function table a function table entry particular to the adapter specified by the function handle, the function table entry stored in memory associated with the processor and including information associated with the adapter including information to determine whether the configuration is authorized to access the adapter; determining, by the processor, based on information in the function table entry whether the configuration is authorized to access the adapter, wherein the determining comprises comparing one or more attributes of the configuration requesting access to the adapter to one or more selected attributes of the function table entry to determine whether the configuration has permission to access the adapter; and allowing access to the adapter, based on determining that the configuration is authorized to access the adapter. - View Dependent Claims (20, 21)
Specification