The IBA Protection Mechanisms

Refer to Table 16-1 on this page. IBA provides a number of mechanisms that prevent unauthorized operations from being performed. This chapter provides a detailed explanation of each of these mechanisms.

Table 16-1. Who Provides Protection from What?
ProblemHandled bySupport Required?
Unauthorized local access to a memory area.PDYes
Logic within HCA (e.g., a local QP) attempts unauthorized access to system memory.L_KeyYes
QP on remote CA attempts unauthorized RDMA or Atomic access to an area of CA's local memory.R_KeyYes, if RDMA and Atomic operations are supported.
Port's acceptance of packet from port that is not a member of the same partition.P_Key
  • For QPs: Yes, except for Raw Datagram QPs.

  • Optional for switches and routers. ...

Get InfiniBand Network Architecture now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.