The IBA Protection Mechanisms
Refer to Table 16-1 on this page. IBA provides a number of mechanisms that prevent unauthorized operations from being performed. This chapter provides a detailed explanation of each of these mechanisms.
Problem | Handled by | Support Required? |
---|---|---|
Unauthorized local access to a memory area. | PD | Yes |
Logic within HCA (e.g., a local QP) attempts unauthorized access to system memory. | L_Key | Yes |
QP on remote CA attempts unauthorized RDMA or Atomic access to an area of CA's local memory. | R_Key | Yes, if RDMA and Atomic operations are supported. |
Port's acceptance of packet from port that is not a member of the same partition. | P_Key |
|
Get InfiniBand Network Architecture now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.