Methods and systems for end-to-end data protection in a memory controller
First Claim
1. A method for end-to-end data protection in a computer, comprising:
- associating a data integrity field with data transferred along a data path in a computer; and
associating a virtual end-to-end address with said data integrity field, wherein said virtual end-to-end address transfers encoded information to a controller through at least one address of a read and write request thereof, wherein said encoded information identifies an offending entity within said data path; and
configuring said virtual end-to-end address to further comprise at least one index and at least offset, wherein said at least one index and said at least one offset can each be varied in size to match a requirement of said controller of said computer.
9 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for end-to-end data protection in a computer are disclosed. A data integrity field is generally associated with data transferred along a data path in a computer. A virtual end-to-end address can be established, which is associated with the data integrity field, wherein the virtual end-to-end address transfers encoded information to a controller of the computer through one or more addresses of a read and/or write request thereof. The encoded information can be utilized to identify an offending entity within the data path. An end-to-end access list can also be associated with the virtual end-to-end address, such that the end-to-end access list contains at least one entry for every data transfer request provided to an interface device. Data corruption is therefore preventable in the entire I/O path in a computer from a host bus adapter through to the actual physical drive.
20 Citations
17 Claims
-
1. A method for end-to-end data protection in a computer, comprising:
-
associating a data integrity field with data transferred along a data path in a computer; and associating a virtual end-to-end address with said data integrity field, wherein said virtual end-to-end address transfers encoded information to a controller through at least one address of a read and write request thereof, wherein said encoded information identifies an offending entity within said data path; and configuring said virtual end-to-end address to further comprise at least one index and at least offset, wherein said at least one index and said at least one offset can each be varied in size to match a requirement of said controller of said computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for end-to-end data protection in a computer, said system comprising:
-
a data integrity field associated with data transferred along a data path in a computer; and a virtual end-to-end address, which is associated with said data integrity field, wherein said virtual end-to-end address transfers encoded information to a controller through at least one address of a read and write request thereof, wherein said encoded information identifies an offending entity within said data path, and wherein said virtual end-to-end address comprises at least one end-to-end bit, which is recognizable by said controller. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for end-to-end data protection in a computer, said system comprising:
-
a memory controller within a computer; a data integrity field associated with data transferred along a data path in said computer, wherein said data integrity field includes at least one reference tag, at least one meta tag and at least one guard field, wherein said at least one meta tag comprises a static value and said at least one reference tag comprises an incrementing value; a virtual end-to-end address, which is associated with said data integrity field, such that said virtual end-to-end address comprises at least one index, at least offset and at least one end-to-end bit, which is recognizable to said memory controller, and wherein said virtual end-to-end address transfers encoded information to said memory controller through at least one address of a read and write request thereof, such that said encoded information identifies an offending entity within said data path; an end-to-end access list associated with said virtual end-to-end address, wherein said end-to-end access list contains at least one entry for every data transfer request provided to an interface device; and a buffer address and a local memory associated with said memory controller, wherein said buffer address is located within said local memory associated with said memory controller.
-
Specification