Refer to Table 16-1 on this page. IBA provides a number of mechanisms that prevent unauthorized operations from being performed. This chapter provides a detailed explanation of each of these mechanisms.
Problem | Handled by | Support Required? |
---|---|---|
Unauthorized local access to a memory area. | PD | Yes |
Logic within HCA (e.g., a local QP) attempts unauthorized access to system memory. | L_Key | Yes |
QP on remote CA attempts unauthorized RDMA or Atomic access to an area of CA's local memory. | R_Key | Yes, if RDMA and Atomic operations are supported. |
Port's acceptance of packet from port that is not a member of the same partition. | P_Key |
|
Unauthorized SM attempts to access port's or device's configuration locations (i.e., its attributes). | M_Key |
|
Unauthorized Baseboard Manager (BM) attempts to access port's or device's configuration locations (i.e., its attributes). | B_Key |
|
Passing SM mastership to SM not authorized to manage this subnet. | SM_Key | Yes |
Unauthorized access to a destination UD QP. | PD | Yes |
Acceptance of a datagram (by QP's RQ Logic) from unauthorized sender. | Q_Key |
|
| RDD | Yes for RD. |